Five-step Plan for IT Security in Manufacturing