A security feature that ensures OT devices only load trusted, verified software during the boot process to prevent malware from executing.
Read MoreFind what you're looking for by selecting the first letter of your topic.
Mechanisms that limit access to systems, devices, or data based on user roles and permissions.
A directory service by Microsoft used for access management and identity authentication in OT/IT environments.
A prolonged and targeted cyberattack aimed at stealing or disrupting OT operations.
Techniques used to identify unusual behavior in OT systems that may indicate potential threats.
A security practice that allows only approved applications to run on OT systems to minimize risks.
A complete list of physical and digital assets in an OT environment is crucial for managing vulnerabilities.
The sum of all vulnerabilities and entry points an attacker can exploit in an OT system.
A record of events, actions, or changes within an OT system for monitoring and forensics.
Processes used to verify the identity of users, devices, or systems before granting access.
Granting or denying access to resources in an OT environment based on user roles or credentials.
Systems designed to automatically mitigate or respond to detected security threats in OT environments.
Regularly saving critical OT data and system configurations to protect against data loss and enable swift recovery after incidents.
The minimum security controls and measures established to protect OT systems and ensure compliance with standards.
A technique that monitors and analyzes the behavior of users, devices, or systems to detect anomalies or threats.
Techniques used by attackers to manipulate binaries (compiled programs) within OT environments to execute unauthorized commands.
Security measures that use unique physical traits, such as fingerprints or retinal scans, to authenticate users accessing OT systems.