An IT perspective of control systems security
Enterprises with industrial operations typically utilize at least two types of computer networks: Information Technology (IT) — a network that supports enterprise information system functions like finance, HR, order entry, planning, email and document creation; and Operational Technology (OT)— a network that controls operations in real time. This second type of network supports real-time or control system products, generally referred to as Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), Energy Management Systems (EMS) or Manufacturing Execution Systems (MES), depending on the industry.
There has been much discussion and debate around the convergence between Information Technology (IT) and Operational Technology (OT). In an effort to provide better visibility and information flow between revenue generating OT assets and enterprise applications, these systems have often been interconnected, in many cases without properly securing the control systems from cyber attack first. If the IT and OT networks are interconnected, yet not properly secured, a breach to one network can easily transverse to the other, leaving the entire computing infrastructure at risk.
This paper is intended to educate IT professionals on the unique requirements of operational technology and what is required to properly secure these networks from cyber attack, so that organizations can assure security, reliability and safety of information and revenue generating assets.
There's More to This Story
Get more. You can read the rest of this story and other exclusive content as a Plant Services member. It's FREE, and it’s easy. We just need your name and email address. Then you can read everything you want on our site and even comment on it.
Find more white papers on Data, software and systems