RubyComm
OT Cybersecurity Glossary
Last updated: 20 August 2025
B
BACnet
A communication protocol used in building automation systems for HVAC, lighting, and access control.
Backup and Restore Policy
A documented plan for backing up OT system configurations and restoring them in case of an incident.
Baseline Configuration
The approved, standard configuration for OT systems, used as a benchmark for operational and security integrity.
Behavioral Whitelisting
Allowing only known and expected processes or communications in OT networks based on baseline observations.
A comprehensive reference for facility owners, system integrators, security teams, and critical infrastructure operators to understand essential concepts in Operational Technology (OT) and Industrial Cybersecurity.
A
Access Control List (ACL)
A set of rules applied to devices or systems that defines who or what is allowed to access particular network resources.
Air-Gapping
A security measure where critical systems are physically isolated from unsecured networks (such as the internet) to prevent remote cyberattacks.
Anomaly Detection
The identification of unusual patterns in OT network traffic or operations that may indicate a security threat or equipment malfunction.
Asset Inventory
A complete record of all OT devices, software, and connections in a facility, essential for vulnerability management and compliance.
C
Change Management
A structured process for documenting, reviewing, and approving OT system changes to avoid introducing vulnerabilities.
Command Injection
An attack technique sending unauthorized commands to manipulate OT systems or devices.
CRA (Cyber Resilience Act)
EU regulation requiring cybersecurity-by-design for connected products, including industrial devices.
Critical Infrastructure
Essential systems and assets such as power grids, water treatment, healthcare facilities, and transportation.
Cyber-Physical System (CPS)
Integrated computing, networking, and physical systems used to control industrial processes.
D
Data Diode
A one-way communication hardware device preventing inbound traffic to an OT network.
Defense-in-Depth
A layered security model applying multiple protective measures at different levels.
Denial-of-Service (DoS)
An attack that disrupts normal operations by overwhelming networks or devices.
Distributed Control System (DCS)
Automation architecture with decentralized control elements spread across the facility.
E
Edge Computing
Processing and analyzing data at local OT devices instead of sending it to centralized systems.
Endpoint Security
Security controls applied to individual OT devices like PLCs, HMIs, or sensors.
Event Logging
Recording system events for monitoring, troubleshooting, and forensics.
Exploit
A method or tool used to take advantage of a system vulnerability.
F
Fail-Safe State
A design principle ensuring equipment defaults to a safe condition during failures.
Firewall
A hardware or software system controlling network traffic based on predetermined rules.
Firmware
Low-level software embedded in OT hardware.
Firmware Signing
Verification method to ensure firmware updates are from trusted sources.
G
Gateway
A device enabling communication between different networks or protocols, often a security-critical point.
Geofencing
Restricting system access based on defined physical locations using GPS or location data.
GICS (Global Industry Classification Standard)
A global standard for categorizing industry sectors, used in risk assessments.
H
Hardening
The process of securing a system by disabling unnecessary services, ports, and protocols.
High Availability (HA)
System design that ensures minimal downtime during failures or incidents.
HMI (Human-Machine Interface)
The user interface allowing operators to monitor and control OT systems.
HoneyPot
A decoy system placed to lure and detect cyber attackers.
I
ICS (Industrial Control System)
General term for systems controlling industrial processes, including SCADA and DCS.
IEC 62443
International industrial control cybersecurity standard.
Incident Response Plan (IRP)
Documented procedures for detecting, responding to, and recovering from cyber incidents.
Industrial IoT (IIoT)
Connected OT devices that enhance operational efficiency but increase cyber risks.
Intrusion Detection System (IDS)
A tool that detects suspicious or unauthorized network activity.
J
JTAG (Joint Test Action Group)
A hardware interface for diagnostics and debugging that must be secured to avoid exploitation.
K
Key Management
Processes for securely handling encryption keys in OT environments.
Kill Chain (Cyber Kill Chain)
A model describing stages of a cyberattack from reconnaissance to data exfiltration.
L
Least Privilege Principle
Limiting user/system permissions to only those required for their function.
Legacy System
Older OT systems with limited or no built-in cybersecurity features.
Load Shedding
Intentional shutdown or reduction of system operations to avoid overload.
M
Maintenance Port Security
Protection measures for physical and logical maintenance interfaces.
Microsegmentation
Dividing OT networks into small, secure zones to contain incidents.
MITM (Man-in-the-Middle)
An attack where a third party intercepts and potentially modifies communications.
Modbus
A widely used industrial communication protocol.
N
NAC (Network Access Control)
Tools enforcing compliance checks before permitting a device connection.
Network Segmentation
Dividing a network to limit the spread of breaches.
NIST CSF (Cybersecurity Framework)
A standard providing best practices for managing cyber risks.
Node Authentication
Verifying device identities before allowing network access.
O
Operational Continuity
The ability to maintain essential operations during adverse events.
Operational Technology (OT)
Hardware and software controlling and monitoring physical processes.
OWE (Opportunistic Wireless Encryption)
A wireless standard providing encryption without pre-shared keys.
One-Way Data Flow
Design where data flows in one direction
P
Patch Management
Process for testing and deploying security and stability updates.
Penetration Testing (Pentest)
Simulated cyberattacks to identify vulnerabilities.
PLC (Programmable Logic Controller)
Industrial computer controlling machinery and processes.
Protocol Whitelisting
Allowing only approved communication protocols in an OT network.
Q
Quality of Service (QoS)
Ensuring critical OT network traffic is prioritized to avoid delays.
R
Remote Access Gateway
A secured entry point for external OT network access.
Resilience Engineering
Designing systems to maintain operations during cyber or physical disruptions.
Risk Assessment
Identifying threats, vulnerabilities, and potential impacts.
S
SCADA (Supervisory Control and Data Acquisition)
Systems for remotely monitoring and controlling industrial processes.
Secure Boot
Firmware process that allows only trusted code to load during startup.
Secure Remote Access
Controlled, monitored, and encrypted remote OT connections.
Security Information and Event Management (SIEM)
Centralized platform for log collection and threat analysis.
Supply Chain Security
Measures to protect against third-party or vendor-related cyber risks.
T
Threat Hunting
Proactively searching an environment for undetected threats.
TLS (Transport Layer Security)
Protocol ensuring secure communications over networks.
Time-Sensitive Networking (TSN)
Standards for deterministic and reliable OT communication.
Trusted Platform Module (TPM)
Dedicated hardware storing cryptographic keys securely.
U
Unidirectional Gateway
Similar to a data diode, allows data to travel only one way.
USB Control Policy
Rules for USB use in OT to prevent malware spread.
V
Virtual LAN (VLAN)
Logical network segmentation without changing physical network design.
Vulnerability Management
Ongoing process of identifying, analyzing, and mitigating security weaknesses.
W
Whaling Attack
Phishing targeting senior executives.
WIDS (Wireless Intrusion Detection System)
Detected unauthorized or rogue wireless activity.
Wireless Access Control
Restricting and monitoring which wireless devices can connect.
X
XML Injection
An attack inserting malicious XML into a system to manipulate its operation.
Z
Zero Trust Architecture (ZTA)
Security model requiring continuous verification of every connection and action.
Zone and Conduit Model
IEC 62443 network design segmenting OT assets into secure zones with controlled conduits.