OT Glossary
Not sure what a term or acronym means? You’re in the right place. This glossary is your go-to guide for understanding the key terms and acronyms used in OT cybersecurity. Whether it's a protocol, standard, or security concept, we’ve broken it down to help make your training smoother and more approachable. Looking for a term we don't have? Let us know!
Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL
K |
---|
Kill chainCyber kill chain A model describing the stages of a cyber attack, from initial reconnaissance to actions on objectives. The term comes from military usage (stopping an attack by breaking the chain at any stage). In ICS security, you might hear about the “ICS kill chain” which adapts these stages to control system scenarios (like initial penetration, then moving into control network, then manipulating process). The Lockheed Martin kill chain stages (Recon, Weaponization, Delivery, Exploitation, Installation, Command & Control, Actions) or the MITRE ATT&CK framework can be considered in analyzing how an attacker might systematically progress to sabotage a physical process. The takeaway: thinking in kill-chain terms helps defenders put in controls to interrupt the adversary early (e.g., catch them in the reconnaissance or delivery phase before any damage is done). | |