Four cybersecurity concepts, technologies, reduce risk
Since the IT network was seen as the only way into the operational technology (OT) network, this was deemed sufficient for a lot of companies. The idea of zero trust is assuming an attacker could already be on the network, undetected. Because of this, companies should have no trust in any communicat...
Saved in:
Published in | Control Engineering Vol. 69; no. 7; pp. 28 - 29 |
---|---|
Main Author | |
Format | Trade Publication Article |
Language | English |
Published |
Barrington
CFE Media
01.08.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Since the IT network was seen as the only way into the operational technology (OT) network, this was deemed sufficient for a lot of companies. The idea of zero trust is assuming an attacker could already be on the network, undetected. Because of this, companies should have no trust in any communication coming into devices, servers and software. If users can connect to a PLC or RTU from a supervisory control and data acquisition (SCADA) system with a native protocol, using only an IP address, chances are it's insecure. |
---|---|
ISSN: | 0010-8049 2163-4076 |