CIP Security: How Does it Work?