Security measures that use unique physical traits, such as fingerprints or retinal scans, to authenticate users accessing OT systems.
Read MoreFind what you're looking for by selecting the first letter of your topic.
Secure generation, distribution, storage, and disposal of cryptographic keys to protect OT systems.
A framework for understanding the stages of cyberattacks in OT systems and identifying mitigation points.
Restricting OT system interfaces to a single-purpose mode to prevent unauthorized access or tampering.
Sharing OT-specific cybersecurity knowledge between stakeholders to improve defense capabilities.
A method of verifying identity using pre-set security questions to control access to OT systems.
The comprehensive process of managing OT assets from acquisition to decommissioning while ensuring they remain secure and up to date.
Safeguarding OT systems that rely on load balancers to ensure uninterrupted performance against distributed denial-of-service (DDoS) attacks.
Establishing guidelines for how long security logs should be stored to meet compliance requirements and support incident investigation.
Dividing OT networks into smaller, isolated segments to limit the spread of malware or unauthorized access.
The use of ML algorithms to analyze data from OT networks, detect anomalies, and identify potential security threats before they escalate.
Implementing strict controls during scheduled maintenance periods to prevent unauthorized access or changes to OT systems.
An internal threat actor with legitimate access to OT systems who intentionally compromises security to cause harm or steal information.
A type of cyberattack where an attacker intercepts and potentially alters communications between OT devices or systems without detection.
Creating highly granular network segments to isolate OT devices and limit the spread of malware or unauthorized access.