Which of the following BEST describes a primary security concern for an RTOS in the context of an industrial control system?
Preventing unauthorized physical access to the system hardware.
Blocking port scanning and reconnaissance activities on the network.
Ensuring tasks are processed within a specific time frame to maintain operational continuity.
Protecting against data leakage by employing full disk encryption.