The practice of dividing an OT network into isolated sections to limit the spread of cyber threats and improve security.
Read MoreFind what you're looking for by selecting the first letter of your topic.
The practice of enforcing secure password policies in OT environments to prevent unauthorized system access.
Regularly updating OT systems and devices with security patches to protect against vulnerabilities and exploits.
Testing and confirming that patches applied to OT systems do not negatively affect operational processes.
A proactive security assessment method used to identify vulnerabilities in OT systems by simulating cyberattacks.
Training OT personnel to recognize and avoid phishing attacks that could compromise the security of OT systems.
Measures to protect OT devices and infrastructure from physical threats, such as theft, sabotage, or unauthorized access.
A security practice that limits and monitors the use of elevated privileges in OT networks to reduce the risk of insider threats and unauthorized changes.
Securing PLCs, which are essential for controlling industrial processes, against unauthorized access, tampering, or malware.
The practice of monitoring OT network protocols to identify deviations from normal behavior that may indicate a cyberattack.
A system for managing digital certificates and encryption keys to secure communications and ensure authentication in OT networks.
A certified professional responsible for auditing and assessing the security posture of OT systems.
A network management feature to prioritize OT traffic for reliable communications.
Encryption methods are designed to withstand attacks from quantum computers, ensuring long-term security for OT systems.
A set of rules that dictate how potentially compromised OT devices should be isolated and managed to prevent further risks.
A network segment used to isolate suspicious or compromised OT devices to prevent the spread of malware or cyberattacks.
A security measure that ensures only authenticated queries are processed by OT systems, preventing unauthorized data requests.
The process of filtering data queries in OT networks to prevent unauthorized access to sensitive information.
The process of controlling network traffic flow in OT environments to prevent delays or disruptions caused by congestion.
Incident response procedures designed to mitigate cybersecurity threats in OT networks quickly.
Temporarily halting or reducing OT system operations to perform secure updates or maintenance without causing disruptions.