Four cybersecurity concepts, technologies, reduce risk

Since the IT network was seen as the only way into the operational technology (OT) network, this was deemed sufficient for a lot of companies. The idea of zero trust is assuming an attacker could already be on the network, undetected. Because of this, companies should have no trust in any communicat...

Full description

Saved in:
Bibliographic Details
Published inControl Engineering Vol. 69; no. 7; pp. 28 - 29
Main Author McClusky, Kevin
Format Trade Publication Article
LanguageEnglish
Published Barrington CFE Media 01.08.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Since the IT network was seen as the only way into the operational technology (OT) network, this was deemed sufficient for a lot of companies. The idea of zero trust is assuming an attacker could already be on the network, undetected. Because of this, companies should have no trust in any communication coming into devices, servers and software. If users can connect to a PLC or RTU from a supervisory control and data acquisition (SCADA) system with a native protocol, using only an IP address, chances are it's insecure.
ISSN:0010-8049
2163-4076