Why Operational Technology Security Cannot Be Avoided


Operational technology (OT) includes any hardware and software that directly monitors and controls industrial equipment and all its assets, processes and events to detect or initiate a change. Yet despite occupying a critical role in a large number of essential industries, OT security is also uniquely vulnerable to attack.


From power grids to nuclear plants, attacks on OT systems have caused devastating work interruptions and physical damage in industries across the globe. In fact, cyberattacks with OT targets have substantially increased, and attackers most frequently target the manufacturing industry.


It’s clear that further steps are needed to improve the standard of OT security. Operators of critical infrastructure must recognize the pivotal role of OT, the risks presented by threat actors and, finally, how to create a secure OT framework. 


The Scope of OT


A wide variety of crucial industrial sectors utilize OT, including mining, construction, oil and gas transmissions, power and utilities, chemical plants, water treatment, industrial machinery and transportation. Settings for OT include industrial networks, industrial controls systems (ICS) and processes for operation and maintenance. 


The OT revolution occurred well before the information technology (IT) revolution. In fact, OT has existed since the beginning of the Industrial Revolution.



In What Ways Do OT and IT Differ?


IT refers to the processing of digital data through computer systems that support corporate operations like marketing, sales, customer relationship management, communications and more. Your email server, web server, enterprise resource planning system, voice-over-IP phone, print server and helpdesk application are examples of typical IT systems.


While industries require computer systems to monitor and control industrial and technological processes, OT manages the operation of physical processes and machinery.


Applications and procedures emplo ..

Support the originator by clicking the read the rest link below.