OT Glossary
Not sure what a term or acronym means? You’re in the right place. This glossary is your go-to guide for understanding the key terms and acronyms used in OT cybersecurity. Whether it's a protocol, standard, or security concept, we’ve broken it down to help make your training smoother and more approachable. Looking for a term we don't have? Let us know!
Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL
N |
---|
NERC CIP(North American Electric Reliability Corporation) NERC (Critical Infrastructure Protection) CIP Set of cybersecurity and reliability standards and regulations for the US power grid. | |
Network segmentationDividing a network into smaller parts (segments or zones) to control traffic flow and enhance security. In an ICS, segmentation is key: for example, isolating the control network from the business network, and further segmenting within control (keeping the safety system on a separate subnet, or each production line in its own VLAN). By doing this, even if one segment is compromised, the others are not immediately affected. Segmentation can be done physically or logically (via VLANs, firewalls, routers). It limits broadcast domains and limits an attacker’s ability to move laterally. A common guideline is to segment according to levels of the Purdue Model and by function (safety, control, DMZ, etc.). Good segmentation is like having watertight compartments in a ship: a breach in one doesn’t sink the whole ship. | |
Niagara FrameworkA software framework (by Tridium) widely used in building automation and some industrial settings to integrate various devices and protocols. It’s known for the Niagara Fox protocol which is used by Niagara stations to communicate. If you’re dealing with building management systems, you often encounter Niagara; it allows different building subsystems (HVAC, lighting, security) to be unified. From a security perspective, Niagara nodes have had vulnerabilities and the Fox protocol is often exposed on the public Internet. | |
NIST CSFThe National Institute of Standards and Technology Cybersecurity Framework A framework by NIST for improving cybersecurity risk management. While not OT-specific, it’s widely applied to ICS/OT environments. It comprises six functions – Govern, Identify, Protect, Detect, Respond, Recover – to organize security efforts. Many organizations use the NIST CSF as a common language to evaluate and improve the security of their control systems. | |
NIST SP 800-82NIST Special Publication 800-82 "Guide to OT Security" It provides detailed guidance on how to secure ICS, covering typical architectures (like Purdue model levels), threats, vulnerabilities, and recommended security controls for ICS environments. It’s a go-to document for best practices, and many other standards reference its content. | |
NonrepudiationA concept from security (not ICS-specific): ensuring that a party in a communication cannot deny the authenticity of their signature on a document or a message that they originated. In OT, this might come into play with logging and forensics: ensuring actions (like a command to change a setpoint) are traceable to a user and cannot be refuted. Digital signatures and audit logs contribute to non-repudiation. It’s less talked about than confidentiality, integrity, availability in ICS, but it’s one of those classic infosec principles. | |