OT Security Glossary

Comprehensive reference guide for Operational Technology security terminology, designed for cybersecurity professionals, engineers, and industry specialists.

241 Terms
Professional Grade
Industry Standard
Expert Curated
Category Filter
Alphabetical Filter

Showing 241 of 241 terms

100% of total

ADC (Analog to Digital Converter)

Other/GeneralSection A

AIC Triad

Other/GeneralSection A

Access Control

Security Concept/ControlSection A

Active Directory

Other/GeneralSection A

Actuator

OT Device/ComponentSection A

Advanced Metering Infrastructure (AMI)

Other/GeneralSection A

Advanced Persistent Threat (APT)

Other/GeneralSection A

Air Gap

Other/GeneralSection A

Alarm Management

Other/GeneralSection A

Alarm Server

Other/GeneralSection A

Anomaly Detection

Security Concept/ControlSection A

Application Whitelisting

Security Concept/ControlSection A

Asset Inventory

Other/GeneralSection A

Asset Owner

Other/GeneralSection A

Attack Surface

Other/GeneralSection A

Attack Vector

Other/GeneralSection A

Authentication

Security Concept/ControlSection A

Authorization

Security Concept/ControlSection A

Auto/Manual Station

Other/GeneralSection A

Automation Controller

Other/GeneralSection A

Availability

Other/GeneralSection A

APT33

APT/Threat GroupSection A

Allanite

APT/Threat GroupSection A

BACnet

ProtocolSection B

Backup Controller

Other/GeneralSection B

Baseline Configuration

Other/GeneralSection B

Basic Process Control System (BPCS)

Other/GeneralSection B

Bastion Host

Other/GeneralSection B

Blacklisting

Other/GeneralSection B

Boolean Logic

Other/GeneralSection B

Buffer Overflow

Attack/TechniqueSection B

Bus Network

Term Related to CommunicationSection B

Bypass Switch

Other/GeneralSection B

CHERNOVITE

APT/Threat GroupSection C

CIA Triad

Other/GeneralSection C

CISA

Standard/FrameworkSection C

Centralized Logging

Other/GeneralSection C

Change Management

Governance/RiskSection C

Command and Control (C2)

Other/GeneralSection C

Common Industrial Protocol (CIP)

ProtocolSection C

Communication Protocol

Other/GeneralSection C

Conduits (IEC 62443)

Architecture/ModelSection C

Configuration Drift

Other/GeneralSection C

Control Center

Other/GeneralSection C

Control Loop

Other/GeneralSection C

Controller (PLC, PAC, RTU)

Other/GeneralSection C

CrashOverride/Industroyer

Attack/TechniqueSection C

Critical Infrastructure

Other/GeneralSection C

Cyber-Physical System (CPS)

Other/GeneralSection C

Cybersecurity Framework (CSF)

Other/GeneralSection C

CEA Guidelines

Standard/FrameworkSection C

CRA (Cyber Resilience Act)

Standard/FrameworkSection C

DCS (Distributed Control System)

Other/GeneralSection D

DMZ (Demilitarized Zone)

Architecture/ModelSection D

DNP3

ProtocolSection D

DNS in OT

Term Related to CommunicationSection D

Data Diode

Other/GeneralSection D

Defense-in-Depth

Security Concept/ControlSection D

Denial of Service (DoS)

Attack/TechniqueSection D

Deterministic Networking

Other/GeneralSection D

Device Hardening

Other/GeneralSection D

Digital Twin

Other/GeneralSection D

Dragos

Other/GeneralSection D

Dual-Homed Host

Other/GeneralSection D

Eavesdropping

Other/GeneralSection E

Edge Device

Other/GeneralSection E

Electrum

APT/Threat GroupSection E

Encryption

Other/GeneralSection E

Endpoint Detection & Response (EDR)

Other/GeneralSection E

Engineering Workstation

OT Device/ComponentSection E

Ethernet/IP

ProtocolSection E

Event Correlation

Other/GeneralSection E

Event Logger / Historian

Other/GeneralSection E

Exploit

Other/GeneralSection E

Factory Acceptance Test (FAT)

Other/GeneralSection F

Fail-Safe

Other/GeneralSection F

Field Device

OT Device/ComponentSection F

Firewall

Security Concept/ControlSection F

Firmware

Other/GeneralSection F

Forensics

Tool/TechniqueSection F

Functional Safety

Other/GeneralSection F

Fuzz Testing

Tool/TechniqueSection F

GOOSE

Other/GeneralSection G

Gateway

OT Device/ComponentSection G

Governance (OT Security Governance)

Other/GeneralSection G

Governance Risk Compliance (GRC)

Governance/RiskSection G

Granular Access Control

Other/GeneralSection G

Grey Zone

Architecture/ModelSection G

Grounding

Other/GeneralSection G

HART

Other/GeneralSection H

HART Protocol

ProtocolSection H

HMI (Human-Machine Interface)

Other/GeneralSection H

Hard Real-Time System

Other/GeneralSection H

Hardening

Security Concept/ControlSection H

Hashing

Other/GeneralSection H

High Availability

Other/GeneralSection H

Historian

OT Device/ComponentSection H

Honeypot

Other/GeneralSection H

ICS (Industrial Control System)

Other/GeneralSection I

IDS (Intrusion Detection System)

Other/GeneralSection I

IEC 62443

Standard/FrameworkSection I

IP Whitelisting

Other/GeneralSection I

IT/OT Convergence

Other/GeneralSection I

Incident Response

Other/GeneralSection I

Indicators of Compromise (IoCs)

Governance/RiskSection I

Input/Output (I/O)

Other/GeneralSection I

Insider Threat

Other/GeneralSection I

Integrity

Other/GeneralSection I

IED (Intelligent Electronic Device)

OT Device/ComponentSection I

ISO/SAE 21434

Standard/FrameworkSection I

JSON-RPC

Other/GeneralSection J

Jitter

Other/GeneralSection J

Jump Host

Other/GeneralSection J

Just-In-Time Access

Other/GeneralSection J

Kernel-Level Protection

Other/GeneralSection K

Key Management System (KMS)

Other/GeneralSection K

Kill Chain

Tool/TechniqueSection K

Kill Chain (ICS Cyber Kill Chain)

Other/GeneralSection K

Knowledge Base

Other/GeneralSection K

Knowledge Base (ICS Threat Knowledge Base)

Other/GeneralSection K

Ladder Logic

Other/GeneralSection L

Lateral Movement

Attack/TechniqueSection L

Least Privilege

Security Concept/ControlSection L

Levels (Purdue Model)

Other/GeneralSection L

Local Control Panel

Other/GeneralSection L

Log Aggregation

Other/GeneralSection L

Logic Solver

Other/GeneralSection L

Lazarus Group

APT/Threat GroupSection L

MITRE ATT&CK for ICS

Other/GeneralSection M

MTTD

Other/GeneralSection M

MTTR

Other/GeneralSection M

Malware

Other/GeneralSection M

Man-in-the-Middle (MitM)

Attack/TechniqueSection M

Modbus

ProtocolSection M

Monitoring

Other/GeneralSection M

Multi-Factor Authentication (MFA)

Other/GeneralSection M

MITRE D3FEND

Standard/FrameworkSection M

NAT

Other/GeneralSection N

NERC CIP

Other/GeneralSection N

NIS2 Directive

Standard/FrameworkSection N

NIST Cybersecurity Framework (CSF)

Standard/FrameworkSection N

NIST SP 800-82

Standard/FrameworkSection N

Network Access Control (NAC)

Other/GeneralSection N

Network Segmentation

Other/GeneralSection N

Non-Repudiation

Other/GeneralSection N

OPC UA

ProtocolSection O

OSI Model

Architecture/ModelSection O

OT (Operational Technology)

Other/GeneralSection O

OT Security Monitoring

Other/GeneralSection O

OTA (Over-The-Air) Updates

Other/GeneralSection O

One-Way Communication

Term Related to CommunicationSection O

Operator Station

Other/GeneralSection O

Orchestration

Other/GeneralSection O

Overcurrent Protection

Other/GeneralSection O

Overload/Denial-of-Service

Other/GeneralSection O

PIPEDREAM (Incontroller)

Attack/TechniqueSection P

Patch Management

Security Concept/ControlSection P

Penetration Testing

Other/GeneralSection P

Perimeter Security

Other/GeneralSection P

Physical Security

Other/GeneralSection P

Policy (Security Policy)

Governance/RiskSection P

Privilege Escalation

Other/GeneralSection P

Process Historian

Other/GeneralSection P

Profinet

ProtocolSection P

Protocol Gateway

Term Related to CommunicationSection P

Purdue Model

Architecture/ModelSection P

PLC (Programmable Logic Controller)

OT Device/ComponentSection P

QoS

Term Related to CommunicationSection Q

Quantum Computing Impact

Other/GeneralSection Q

Quarantine Zone

Other/GeneralSection Q

Query Injection

Other/GeneralSection Q

Quick Response Test (QRT)

Other/GeneralSection Q

RBAC

Security Concept/ControlSection R

RTU (Remote Terminal Unit)

OT Device/ComponentSection R

Ransomware

Other/GeneralSection R

Real-Time Operating System (RTOS)

Other/GeneralSection R

Redundancy

Other/GeneralSection R

Remote Access

Other/GeneralSection R

Replay Attack

Attack/TechniqueSection R

Risk Assessment

Governance/RiskSection R

Rogue Device

Other/GeneralSection R

RTU (Remote Terminal Unit)

OT Device/ComponentSection R

SAML

Other/GeneralSection S

SCADA

OT Device/ComponentSection S

SIEM

Tool/TechniqueSection S

SL (Security Level)

Other/GeneralSection S

Safety Instrumented System (SIS)

Other/GeneralSection S

Secure Boot

Other/GeneralSection S

Secure Update Mechanism

Other/GeneralSection S

Security by Design

Governance/RiskSection S

Social Engineering

Other/GeneralSection S

Stuxnet

Attack/TechniqueSection S

Supply Chain Risk

Other/GeneralSection S

Supply Chain Security

Other/GeneralSection S

Safety PLC

OT Device/ComponentSection S

Sandworm

APT/Threat GroupSection S

TCP/IP Stack

Other/GeneralSection T

TRISIS/Triton

Attack/TechniqueSection T

TTPs

Other/GeneralSection T

Tamper Detection

Other/GeneralSection T

Threat Intelligence

Other/GeneralSection T

Threat Modeling

Other/GeneralSection T

Time-Sensitive Networking (TSN)

Other/GeneralSection T

Tokenization

Other/GeneralSection T

Triaging

Other/GeneralSection T

TwinCAT

Other/GeneralSection T

TSA Pipeline Security Guidelines

Standard/FrameworkSection T

UPS

Other/GeneralSection U

USB Control

Other/GeneralSection U

Unidirectional Gateway

Other/GeneralSection U

Update Management

Other/GeneralSection U

User Access Control (Least Privilege)

Other/GeneralSection U

User Behavior Analytics (UBA)

Other/GeneralSection U

VLAN

Other/GeneralSection V

VPN

Other/GeneralSection V

Vendor Access Management

Other/GeneralSection V

Version Control

Other/GeneralSection V

Virtual Patching

Other/GeneralSection V

Visibility

Other/GeneralSection V

Voltzite

APT/Threat GroupSection V

Vulnerability Assessment

Other/GeneralSection V

Watering Hole Attack

Attack/TechniqueSection W

Whitelisting

Other/GeneralSection W

Windows Domain Integration

Other/GeneralSection W

Wireless Sensor Network

Other/GeneralSection W

WirelessHART

ProtocolSection W

Work Instruction

Other/GeneralSection W

Workstation Lockdown

Other/GeneralSection W

XENOTIME

APT/Threat GroupSection X

XIoT

Other/GeneralSection X

XML Injection

Other/GeneralSection X

XOR-based Encryption

Other/GeneralSection X

YAML Configuration Files

Other/GeneralSection Y

YARA Rules

Tool/TechniqueSection Y

Yield Optimization

Other/GeneralSection Y

Yokogawa (Vendor Reference)

Other/GeneralSection Y

Zero Trust Architecture

Security Concept/ControlSection Z

Zero-Day Exploit

Other/GeneralSection Z

Zigbee Protocol

Other/GeneralSection Z

Zone-Based Segmentation

Other/GeneralSection Z

Zones (Security Zones)

Architecture/ModelSection Z