INDUSTRY
The number of attacks on Operational Networks is increasing from year to year. These are particularly vulnerable, as security was not a priority when they were designed. Devices in such networks have an incomparably longer life expectancy, even up to 10 years, and at the same time any changes and updates are undesirable, as we often can not afford to fail.
Outdated protocols that already have known vulnerabilities are also common, and it is not possible to replace them without replacing the entire system.
IT / OT
IT / OT comparison
Due to the differences between information and operational technologies, cybersecurity in industry needs to be addressed in a slightly different way. The tools and good practices used are similar, but their configurations, purpose, and priorities vary widely.
In the world of cyber security, we know three security concepts: Integrity, confidentiality and accessibility. Their order of priority, however, is reversed between IT and OT.
OT
Accessibility
Integrity
Confidentiality
PRIORITY
HIGH
MEDIUM
LOW
IT
Confidentiality
Integrity
Accessibility
This means that in the industry, the failure of the System is the last thing we want. While in information networks the outage is to some extent acceptable, the confidentiality and accuracy of the information is more important.