Professional Documents
Culture Documents
See Why
01 Sep 2020
Since the introduction of the first virus in the 1970s and more so with the rise of the internet in the 1980s, the need to secure
information and keep it private has become increasingly important.
Over the years, the IT world has been witnessing a shift in cyber threats. It used to be that programmers launched
bothersome viruses and malware to gain reputation in their communities. Today, with the increased reliance of civilization
on computers, and the advancements of technology, attackers have become much more sophisticated.
Up until recent years, cyber-attacks remained almost solely within the IT realm – affecting what we would call “standard”
computers.
Since then, there has been a constant increase in cyber-attacks targeting industrial organizations, affecting different
industries such as power grids (Industroyer), energy (Black Energy) petrochemical (Havex), and oil & gas (TRISIS). Hackers are
infiltrating industrial networks in order to shut down machines, demand ransom, steal data, and more. The hardware and
software that monitor and control the physical components of an industrial network are often referred to as Operational
Technology (OT).
Traditionally, OT was an ‘air-gapped’ environment, meaning that it was not connected to external networks or digital
technologies. In recent years, what was known as “traditional OT” has started to change, since the rise of the fourth industrial
revolution, also known as "Industry 4.0". Companies taking part in this change have begun implementing new digital
solutions in their networks looking to stay ahead of their competition. These solutions aim to increase automation, add
“smart” devices, make data more efficient and available, and interconnect networks for convenience.
As part of the interconnection, and in order to make OT components more accessible while being able to collect and analyze
data about them, IT and OT networks are also becoming interconnected. This movement is referred to as IT-OT Convergence.
While connecting operational with information technology opens a great door to new opportunities, it also introduces a vast
landscape of cybersecurity threats to what was once an air-gapped network.
Though operational and information technologies are becoming more connected, there are several important differences
that both IT and OT staff need to be aware of.
1. Enterprise vs Industry
The most fundamental difference between the technologies is perhaps the most important one. The two technologies
operate in different environments and serve different purposes. Briefly, IT is the world we all know. Computers, keyboards,
screens, and mice. IT environments involve common environments and solutions (the cloud, servers, firewalls, antivirus, etc.),
they communicate over known protocols (HTTP, SSH, RDP), and so forth.
Conversely, OT includes completely different components that can be found primarily in industrial environments. These
components are often screenless (machinery, PLCs), they communicate over industrial protocols that are never seen on IT
networks (e.g., Modbus, Ethernet/IP, Profinet), they lack security tools (firewalls, antivirus), and they are even programmed
differently than “normal” computers.
In OT, the safety and availability of equipment and processes dominate. Dealing with physical systems that must maintain
stable values, such as temperature and RPM, requires meticulous control. Lack of control can lead to extensive financial
losses due to temporary halts in production or even result in direct physical harm. For example, a ransomware attack that
blocks access to operations can lead to a few days of inactivity where each day may be worth millions of dollars.
OT has a lower number of gateways, making it comparatively safer. However, the potential magnitude of compromised
physical equipment tends to be greater than that of a data breach. Even slight OT cyber-incidents can lead to huge financial
losses and have damaging ramifications that can affect the general population, such as water contamination and power
outages.
Industry experts predict that IT-OT will only continue to converge. This means that OT administrators should do their best to
understand the IT environment, and vice versa - the sooner the better. Gartner recommends that organizations align their
standards, policies, tools, processes, and staff between the IT and the business to the changing OT systems. The approach to
dealing with the organizational changes in response to IT/OT convergence is called IT/OT alignment.
IT/OT alignment begins with understanding what each environment does and how they differ from each other. A
comprehensive cybersecurity strategy that considers the entire security lifecycle, beginning from the production floor and
up to the enterprise, is key when looking to advance through the industrial revolution as the new industry champions.
SUBSCRIBE
Work email
Full Name
Submit
11 Jan 2022
A House of Cards: Shoring Up the OT Digital more...
02 Mar 2021
OTORIO’s Pen-Testers discovered more than 20 vulnerabilities in a popular Industrial Remote Access Solution more...
10 Feb 2021
Florida’s Water Poisoned by Hackers: A Warning Signal more...
Popular Tags
Vulnerability
(29) Ransomware
(21) Critical Infrastructure
(18) Industrial Cyber-security
(18) ICS Bulletin
(13)
Energy
(12) Oil & Gas
(10) ot
(8) operational technology
(7) ICS
(7) Industry 4.0
(7)
Cookies Settings
By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site
Recent Posts
navigation, analyze site usage, and assist in our marketing efforts.
Reject All
GigaOm: OTORIO a “Future- Safeguarding the Electrical Take OT Digital and Cyber C
Proof Investment” for IIoT Grid Security Posture
Accept All Cookies C
31 May 2022 17 May 2022 19 Apr 2022 14