“…In [52] the present authors discussed how these design complexities, instigated by the IT-driven business model [50], might introduce safety hazards via security flaws. The same can be said for cyber security risks of non cyber physical systems within the supply chain.…”