Essays about: "OT security"
Showing result 1 - 5 of 15 essays containing the words OT security.
-
1. Streamlining the Process of Surveying Cybersecurity Vulnerabilities in OT
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Operational Technology, OT, is the backbone of the 21st-century society since it eases access for managing critical infrastructure like water, transportation, and energy supply. Therefore, the security of such systems is of utmost importance. READ MORE
-
2. Attack Surface Management : Principles for simplifying the complexity of OT security
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Purpose: Operational technology (OT) environments face significant risks and threats stemming from Industry 4.0. The security landscape for OT is confronted with unprecedented challenges due to the expanding attack surface resulting from factors like cloud adoption, Industrial Internet of Things, and increased mobility. READ MORE
-
3. The effect of the IT/OT gap on the NIS 2 implementation
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Cyber attacks are steadily increasing, and their impact is becoming more significant. To combat this, the European Union has created directives to enhance the cyber security in critical services in the Union, one example being the NIS 2 directive. READ MORE
-
4. Cyber Supply Chain Security and the Swedish Security Protected Procurement with Security Protective Agreement
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Digitalisation and globalisation are increasing the number of integrated and interconnected information technology (IT) systems worldwide. Consequently, these relationships and dependencies develop technological relationships through their services. READ MORE
-
5. PERFORMANCE ANALYSIS OF RADIUS AND DIAMETER AUTHENTICATION SYSTEMS IN 802.1X BASED SECURED NETWORKS
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : There is increasing attention to the security challenges of IT-OT networks. Mitigating these challenges needs sophisticated methods to secure such networks, especially by securing access to the network. One valuable strategy that provides security to the network access level is Port-Based Authentication. READ MORE