A resource management system used in distributed computing environments. In OT systems, ensuring the secure use of Yarn prevents unauthorized resource allocation and potential cyber threats.
Read MoreFind what you're looking for by selecting the first letter of your topic.
A security mechanism requiring multiple verification forms (e.g., device certificates and biometrics) to access OT systems, reducing the risk of credential-based attacks.
A method used to mask internal OT network addresses from external networks, adding a layer of security.
A widely adopted set of guidelines and best practices for improving the security of OT and IT systems.
A security solution that restricts unauthorized devices from connecting to OT networks, ensuring only verified users and systems gain access.
Using tools and techniques to identify unusual or suspicious activities in OT network traffic, indicating potential security incidents.
A technique used to hide network resources from unauthorized access.
A tool that monitors network traffic for signs of malicious activity or policy violations in OT environments.
Measures taken to secure the boundary of an OT network from external threats, including firewalls, VPNs, and intrusion detection systems.
The practice of dividing an OT network into isolated sections to limit the spread of cyber threats and improve security.
The process of securing time synchronization across OT devices to prevent attackers from altering timestamps, which can affect operations and logs.
Verifying the identity of devices (nodes) connecting to an OT network to prevent unauthorized access.
Guidelines and procedures designed to protect OT networks and systems from cybersecurity threats.
Encrypting offline data in OT systems to protect sensitive information from physical theft or unauthorized access.
The process of securely adding new devices or users to an OT network, ensuring they comply with security policies.
A security mechanism that generates a unique password for each login session to secure OT system access.
Measures taken to secure the OPC protocol, widely used in OT environments for data exchange between devices and systems.
The ability of OT systems to withstand cyberattacks and continue essential operations without significant disruptions.
The practice of continuously monitoring OT environments to gain insights into network activity, device status, and potential security threats.