Plugging IT/OT vulnerabilities – part 1

2018 
The separation between IT and operational technology (OT) networks, such as those linking manufacturing control systems, is breaking down. Not long ago, systems that monitor and control physical equipment were engineered and implemented independently from the computers, systems and applications that process, store and exchange operational data. But the line between IT and OT is blurring. In this, the first instalment of a two-part article on the impact of increasing IT and operating technology convergence on network security, industry experts contribute their assessment of the emerging threats. The separation between IT and operational technology (OT) networks, such as those linking manufacturing control systems, is breaking down. Not long ago, systems that monitored and controlled physical equipment were engineered and implemented independently from the computers, systems and applications that process, store and exchange operational data. But the line between IT and OT is blurring. In this first instalment of a two-part article, Tracey Caldwell asks industry experts for their assessment of the emerging threats.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    3
    Citations
    NaN
    KQI
    []