Protocol-specific measures to secure Modbus communications in OT environments, such as encryption and authentication to prevent unauthorized access or command injection.
Read MoreFind what you're looking for by selecting the first letter of your topic.
A coordinated cyberattack where multiple systems flood a target network, rendering OT services unavailable.
Protecting DNS infrastructure in OT environments to prevent threats like DNS spoofing or hijacking.
Strategies to ensure the availability of OT systems and reduce the impact of outages caused by cyber incidents.
Adjusting access permissions in real-time based on user roles, behavior, or system status.
Creating adaptable and flexible network partitions to isolate OT devices and mitigate threats.
A safety mechanism in OT systems designed to halt processes during critical failures or attacks automatically.
Monitoring and responding to threats targeting endpoints like HMIs, servers, and RTUs in OT environments.
Measures taken to protect devices like PLCs, HMIs, and industrial computers from cyber threats.
Techniques used to identify and address faults or anomalies in OT systems during operation.
Security measures in OT applications to prevent misuse or exploitation of system errors.
A cyberattack technique where attackers gain unauthorized access to higher privilege levels in OT systems.
Analyzing and linking related security events in OT systems to detect patterns or threats.
Recording system events in OT environments for monitoring, auditing, and forensics.
Continuous observation of OT systems to detect anomalies or potential security threats.
Automated actions triggered by specific events, such as isolating a compromised device upon detecting a security breach.
Ensuring that only authorized and validated software or commands are executed within OT systems.
Techniques used to stop unauthorized data extraction from OT networks.
Entry points in OT systems are accessible from external networks, and attackers could exploit them.