OT Glossary
Not sure what a term or acronym means? You’re in the right place. This glossary is your go-to guide for understanding the key terms and acronyms used in OT cybersecurity. Whether it's a protocol, standard, or security concept, we’ve broken it down to help make your training smoother and more approachable. Looking for a term we don't have? Let us know!
Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL
H |
---|
HAZOPHazard and operability study A structured approach for examining a process or system to identify potential hazards and operability problems. In industrial contexts, a HAZOP is done by a team brainstorming “what if” scenarios for each part of a process (e.g. “What if valve X fails closed?”) to foresee what could go wrong. While HAZOP itself is a process safety technique (ensuring the process is designed safely), it’s increasingly being adapted to consider cybersecurity (e.g. what if a hacker did X). | |
HistorianA specialized database system for time-series data in industrial environments. A historian continuously collects and stores chronological data from the process, things like temperatures, pressures, flow rates, equipment statuses, etc., often at high frequency. These databases are optimized for time-stamped data and for rapid retrieval of trends. They’re crucial for analysis, troubleshooting, and regulatory reporting in industrial operations. | |
HMIHuman machine interface - Visually represents the current state of a process, typically providing operators some way to interact with the process as well (change set points, open/close valves, start/top equipment...). | |
HoneypotA decoy system or server set up to attract attackers, so their techniques can be studied. In OT, a honeypot might mimic a PLC or a SCADA server to lure in would-be intruders. Researchers deploy ICS honeypots that emulate vulnerable control systems to see how attackers behave when they think they’ve found an exposed power plant or factory. The honeypot has no real control over a process. It’s a trap, and any interaction with it is by definition suspicious, since legitimate users wouldn’t normally be there. | |
HoneywellA major ICS vendor known for DCS and process control systems (Experion), as well as building automation. | |