OT Glossary
Not sure what a term or acronym means? You’re in the right place. This glossary is your go-to guide for understanding the key terms and acronyms used in OT cybersecurity. Whether it's a protocol, standard, or security concept, we’ve broken it down to help make your training smoother and more approachable. Looking for a term we don't have? Let us know!
Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL
O |
---|
OPC UAOpen process communication unified architecture The modern evolution of the OPC standard, redesigned to be platform-independent, robust, and secure. OPC UA is a communication protocol that allows various industrial devices and software to share data in a unified way. It is more commonly found at the higher levels of the network and can use a binary TCP format or HTTPS format. Unlike OPC Classic, it’s not tied to Windows COM, and it includes built-in security (encryption, authentication). | |
OperatorThe person (or people) who monitor and control the industrial process using the ICS. Operators sit in the control room or at local panels, keep an eye on HMI screens, acknowledge alarms, start and stop equipment, and adjust setpoints as needed to keep things running smoothly. They are the human-in-the-loop of an ICS. | |
OSINT(Open source intelligence) Essentially just gathering information about a target from public sources. Could include Google, Shodan, social media, or ship tracking websites. | |
OTOperational technology Technology dealing with physical operations, including ICS, SCADA, DCS, and PLCs. Compared to Information technology dealing only with data and information. | |