OT Glossary
Not sure what a term or acronym means? You’re in the right place. This glossary is your go-to guide for understanding the key terms and acronyms used in OT cybersecurity. Whether it's a protocol, standard, or security concept, we’ve broken it down to help make your training smoother and more approachable. Looking for a term we don't have? Let us know!
Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL
C |
---|
CISACybersecurity and Infrastructure Security Agency | |
Control loopA fundamental concept in process control where a sensor, controller, and actuator work together to regulate a physical process. In a closed-loop system, a sensor measures a process variable (like temperature), the controller compares it to a desired setpoint, and if there’s a difference it sends a command to an actuator to correct it. This loop continuously “feeds back” so the process stays on target. (Example: a thermostat (sensor/controller) measuring room temperature and turning a heater (actuator) on/off to maintain the set temperature.) | |
Control systemA system that manages, commands, or regulates the behavior of other devices or systems using control loops (with sensor, actuator, and controller). An industrial control system controls an industrial-scale process. | |
CPNICentre for Protection of National Infrastructure UK government organization kind of like the US CISA organization, focused on the security of national infrastructure. | |
CPSCyber-physical systems Integrated systems that have both computational (cyber) and physical components, tightly interconnected. An industrial robot, a smart grid, or an autonomous vehicle are examples of CPS: they involve sensors and actuators interacting with the physical world, guided by software and networking. ICS and OT systems are prime examples of CPS, where a cyber attack can have real-world kinetic impact. | |