● Category
OT / ICS / IoT
25 entries
- ot-iot№ 762
Operational Technology (OT)
Hardware and software that monitor and control physical processes, devices, and infrastructure such as factories, power plants, and utilities.
- ot-iot№ 529
Industrial Control System (ICS)
An umbrella term for systems that automate and supervise industrial processes, including SCADA, DCS, PLCs, RTUs, and safety controllers.
- ot-iot№ 972
SCADA
Supervisory Control and Data Acquisition systems that gather telemetry from remote field devices and let operators monitor and command large industrial processes.
- ot-iot№ 864
Programmable Logic Controller (PLC)
A ruggedized industrial computer that executes deterministic control logic to read sensors and drive actuators in real-time processes.
- ot-iot№ 502
Human-Machine Interface (HMI)
Software or panel that lets operators visualize process state and issue commands to PLCs, DCS, and SCADA systems.
- ot-iot№ 328
Distributed Control System (DCS)
An integrated ICS architecture in which controllers, operator stations, and engineering tools are distributed across a plant and tightly coupled by a vendor backbone.
- ot-iot№ 957
Safety Instrumented System (SIS)
An independent control system that brings a process to a safe state when monitored variables exceed defined limits, protecting people, environment, and assets.
- ot-iot№ 702
Modbus
A simple, openly documented industrial protocol for polling registers and coils on PLCs, RTUs, and field devices, available over serial (RTU/ASCII) and TCP.
- ot-iot№ 863
PROFINET
An industrial Ethernet protocol standardized by PROFIBUS & PROFINET International for real-time communication between PLCs, drives, and field devices.
- ot-iot№ 334
DNP3
Distributed Network Protocol 3, an event-driven ICS protocol used in electric utilities, water, and oil & gas to communicate between SCADA masters and remote outstations.
- ot-iot№ 758
OPC UA
OPC Unified Architecture, a service-oriented industrial protocol with built-in authentication and encryption used to exchange semantic data across OT and IT systems.
- ot-iot№ 513
IEC 62443
The IEC family of standards for the cybersecurity of industrial automation and control systems, addressing asset owners, integrators, and product suppliers.
- ot-iot№ 881
Purdue Enterprise Reference Architecture
A layered reference model for industrial networks that segments business IT from process control, widely used to design ICS network segmentation.
- ot-iot№ 1111
Stuxnet
A highly sophisticated 2010 worm that sabotaged Iran's uranium-enrichment centrifuges by reprogramming Siemens PLCs, widely attributed to the United States and Israel.
- ot-iot№ 1174
TRITON / TRISIS
Malware discovered in 2017 that targeted Schneider Triconex Safety Instrumented Systems at a Saudi petrochemical plant, attributed to a Russia-linked actor.
- ot-iot№ 530
Industroyer / CrashOverride
Modular ICS malware used in the 2016 Ukraine power-grid attack and updated as Industroyer2 in 2022, capable of speaking native grid protocols to trip substations.
- ot-iot№ 552
IoT Security
The discipline of protecting Internet-of-Things devices, gateways, networks, and cloud services from compromise, given their scale, constrained resources, and long lifetimes.
- ot-iot№ 422
Firmware Over-the-Air (OTA)
A mechanism for delivering and installing firmware updates to remote devices through wireless or networked channels, without physical access.
- ot-iot№ 1267
Zigbee Security
The set of cryptographic and network controls that protect Zigbee mesh networks of low-power IoT devices, based on IEEE 802.15.4 and AES-CCM* keys.
- ot-iot№ 115
Bluetooth LE Security
The pairing, encryption, and privacy mechanisms defined by the Bluetooth Core Specification for Bluetooth Low Energy devices.
- ot-iot№ 634
LoRaWAN Security
The end-to-end key, join, and message-protection model defined by the LoRaWAN specification for low-power wide-area IoT networks.
- ot-iot№ 551
IoT Botnet
A network of compromised Internet-of-Things devices remotely controlled to launch attacks such as DDoS, credential stuffing, click fraud, or cryptomining.
- ot-iot№ 683
Mirai Botnet
An IoT malware family first seen in 2016 that recruits routers, cameras, and DVRs through default credentials and was used in the Dyn DNS DDoS that broke much of the U.S. internet.
- ot-iot№ 267
Cyber-Physical System (CPS)
An engineered system that integrates sensors, actuators, and computation to monitor and control physical processes, where digital and physical layers are tightly coupled.
- ot-iot№ 038
Air-Gapped Network
A network that is physically and logically isolated from other networks, especially the internet, to protect highly sensitive systems such as ICS, classified networks, or vaults.