Operations Technology (OT) and Internet of Things (IoT) Security

The Internet of Things (IoT) describes the network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet. These devices range from ordinary household objects to sophisticated industrial tools.

OT security is the full stack of hardware and software being used to monitor, detect and control changes to devices, processes and events. OT security is commonly used to protect Industrial Systems and networks from attacks.

Some of the topics covered under this domain include the following:

  • Introduction to IoT and OT Computing
  • Edge and Fog Computing
  • Embedded Systems
  • Industrial Control Systems (ICS) and Supervisory control and data acquisition (SCADA) Security

 

 

Introduction to IoT and OT Computing

1
Introduction to IoT and OT Computing
IoT devices are the nonstandard computing devices that connect wirelessly to a network and have the ability to transmit data, such as the many devices on the internet of things. IoT devices, by definition, are networked computing devices with the ability to collect, transfer and analyse data. Traditional OT devices – sensors, for example – can collect data, but can't transmit the data over a large network or perform any sort of in-depth analysis on that data. OT focuses on the management and control of physical devices existing and operating in the physical world. The control of real-world devices is as old as industry and manufacturing itself.
2
Training session 1
3
Training session 2
4
Training session 3

Edge and Fog Computing

1
Edge and Fog Computing
Edge computing and fog computing both are enablers of data traffic to the cloud. Edge computing happens where data is being generated, right at “the edge” of a given application’s network. This means that an edge computer is connected to the sensors and controllers of a given device and then sends data to the cloud. However, this traffic of data can be massive and inefficient, as irrelevant data might be sent to the cloud as well as the useful information that’s actually needed. Unfortunately, even the cloud has its limits in terms of capacity, security and efficiency when connected directly to edge devices. This is where fog computing comes in. Fog computing is a compute layer between the cloud and the edge. Where edge computing might send huge streams of data directly to the cloud, fog computing can receive the data from the edge layer before it reaches the cloud and then decide what is relevant and what isn’t. The relevant data gets stored in the cloud, while the irrelevant data can be deleted, or analysed at the fog layer for remote access or to inform localized learning models.
2
Training session 1
3
Training session 2
4
Training session 3

Embedded Systems

1
Embedded Systems
An embedded system is a microprocessor-based computer hardware system with software that is designed to perform a dedicated function, either as an independent system or as a part of a large system. At the core is an integrated circuit designed to carry out computation for real-time operations. Embedded systems security is a cybersecurity field focused on preventing malicious access to and use of embedded systems. Embedded systems security provides mechanisms to protect a system from all types of malicious behaviour.
2
Training session 1
3
Training session 2
4
Training session 3

Industrial Control Systems (ICS) and Supervisory control and data acquisition (SCADA) Security

1
Industrial Control Systems (ICS) and Supervisory control and data acquisition (SCADA) Security
Supervisory control and data acquisition (SCADA) is a system of software and hardware elements that allows industrial organizations to: Control industrial processes locally or at remote locations Monitor, gather, and process real-time data Directly interact with devices such as sensors, valves, pumps, motors, and more through human-machine interface (HMI) software Record events into a log file SCADA systems are crucial for industrial organizations since they help to maintain efficiency, process data for smarter decisions, and communicate system issues to help mitigate downtime. Due to the valuable role and vulnerabilities of these networks, measures are taken by governments and private companies to ensure the safety of these systems. SCADA security is a term to describe measures taken to protect SCADA networks as well as to discuss vulnerabilities (i.e. common SCADA security problems).
2
Training session 1
3
Training session 2
4
Training session 3

Operations Technology (OT) and Internet of Things (IoT) Security

1
Quiz
30 questions

Be the first to add a review.

Please, login to leave a review
Operations Technology (OT) and Internet of Things (IoT) Security