Essays about: "OT security"

Showing result 1 - 5 of 15 essays containing the words OT security.

  1. 1. Streamlining the Process of Surveying Cybersecurity Vulnerabilities in OT

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Willem Brahmstaedt; Eira Höglund; Caspian Kullgren; Simon Larsson; Hanna Schaff; Johanna Thall; [2023-03-03]
    Keywords : operational technology; cybersecurity standards; containerization; computer aided process optimization; software development; application; web server;

    Abstract : Operational Technology, OT, is the backbone of the 21st-century society since it eases access for managing critical infrastructure like water, transportation, and energy supply. Therefore, the security of such systems is of utmost importance. READ MORE

  2. 2. Attack Surface Management : Principles for simplifying the complexity of OT security

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Jyotirmay Veshne; [2023]
    Keywords : OT; ICS; SCADA; CPS; IIoT; IoT; Attack Surface; MES; Attack Surface Management; Security; Remote connectivity;

    Abstract : Purpose: Operational technology (OT) environments face significant risks and threats stemming from Industry 4.0. The security landscape for OT is confronted with unprecedented challenges due to the expanding attack surface resulting from factors like cloud adoption, Industrial Internet of Things, and increased mobility. READ MORE

  3. 3. The effect of the IT/OT gap on the NIS 2 implementation

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Niklas Andersson; [2023]
    Keywords : NIS2 Directive; IT OT gap; OT security; IT security;

    Abstract : Cyber attacks are steadily increasing, and their impact is becoming more significant. To combat this, the European Union has created directives to enhance the cyber security in critical services in the Union, one example being the NIS 2 directive. READ MORE

  4. 4. Cyber Supply Chain Security and the Swedish Security Protected Procurement with Security Protective Agreement

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Carina Dios Falk; [2023]
    Keywords : Cyber Security; Protective Security; Public Procurement; Cyber Supply Chain Security; Swedish National Security; Risk Management; Cyber Security Risk Management; NIST 800-161; ISO IEC 27036; NISTIR 8276;

    Abstract : Digitalisation and globalisation are increasing the number of integrated and interconnected information technology (IT) systems worldwide. Consequently, these relationships and dependencies develop technological relationships through their services. READ MORE

  5. 5. PERFORMANCE ANALYSIS OF RADIUS AND DIAMETER AUTHENTICATION SYSTEMS IN 802.1X BASED SECURED NETWORKS

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Nadim Rahimi; [2022]
    Keywords : IEEE802.1X; Port-Based Authentication; RADIUS; Diameter; EAP; NAS; AAA;

    Abstract : There is increasing attention to the security challenges of IT-OT networks. Mitigating these challenges needs sophisticated methods to secure such networks, especially by securing access to the network. One valuable strategy that provides security to the network access level is Port-Based Authentication. READ MORE