FAQs
xxx
Common OT Acronyms
0-9
5 terms ▼1G
▼First Generation (cellular technology)
3DES
▼Triple Data Encryption Standard - Enhanced encryption algorithm using three iterations of DES
3GPP
▼3rd Generation Partnership Project - Standards organization for cellular technology development
5G
▼Fifth Generation (cellular network technology)
802.11
▼IEEE Wi-Fi Standard
A
17 terms ▼A/D
▼Analog-to-Digital
ABB
▼Asea Brown Boveri - Industrial automation and power technology company
AC
▼Alternating Current (also refers to 802.11ac Wi-Fi standard)
ACK
▼Acknowledgment - Frame type confirming successful packet receipt
AES
▼Advanced Encryption Standard - Symmetric encryption algorithm available in 128-bit and 256-bit versions
AESO
▼Alberta Electric System Operator - the organization responsible for electrical grid operations in Alberta, Canada.
AMI
▼Automatic Metering Infrastructure - Bi-directional smart meter communication system
AMR
▼Automatic Meter Reading - One-way smart meter communication system
AP
▼Access Point
API
▼Application Programming Interface
APT
▼Advanced Persistent Threat - Long-term, sophisticated cyber campaigns typically associated with nation-state actors
ARP
▼Address Resolution Protocol - Maps IP addresses to MAC addresses
ASN
▼Autonomous System Number - Unique identifier for internet routing systems
ASP
▼Application Service Provider
ATT
▼American Telephone and Telegraph
ATT&CK
▼Adversarial Tactics, Techniques, and Common Knowledge - MITRE's framework for understanding adversary behavior
AX
▼Refers to 802.11ax (Wi-Fi 6) wireless standard
B
5 terms ▼BACnet
▼Building Automation and Control Network
BAS
▼Building Automation System - Control system for building HVAC, lighting, and security
BCP
▼Business Continuity Plan - formal procedures for maintaining operations during disruptions
BCV
▼Basic Control Vehicle (Yokogawa)
BE
▼Refers to 802.11be (Wi-Fi 7) wireless standard
C
19 terms ▼CCTV
▼Closed-Circuit Television - Video surveillance systems
CDM
▼Code Division Multiplexing
CDM/CDMA
▼Code Division Multiple Access - Multiple access technique using spread spectrum technology
CDMA
▼Code Division Multiple Access - Cellular access technology using spread spectrum techniques
CEO
▼Chief Executive Officer - Top executive of an organization
CFATS
▼Chemical Facility Anti-Terrorism Standards - regulations governing chemical industry cybersecurity requirements
CFO
▼Chief Financial Officer - Senior executive responsible for financial operations
CIA
▼Confidentiality, Integrity, Availability - The three pillars of cybersecurity, with OT prioritizing availability and integrity over confidentiality
CIDR
▼Classless Inter-Domain Routing - Method for IP address allocation and routing
CIO
▼Chief Information Officer - The executive responsible for an organization's information technology strategy and operations
CIP
▼Critical Infrastructure Protection - standards and regulations designed to protect essential infrastructure systems.
CISA
▼Cybersecurity and Infrastructure Security Agency - U.S. federal agency providing cybersecurity guidance and threat intelligence for critical infrastructure
CISO
▼Chief Information Security Officer - The executive responsible for an organization's information security program and strategy
COM
▼Component Object Model
CPU
▼Central Processing Unit
CSO
▼Chief Security Officer - The executive responsible for an organization's overall security program, including both physical and information security
CTS
▼Clear to Send - Collision avoidance frame type
CVE
▼Common Vulnerabilities and Exposures
CVSS
▼Common Vulnerability Scoring System - A standardized method for rating the severity of security vulnerabilities, typically using a 1-10 scale.
D
15 terms ▼D/A
▼Digital-to-Analog
DC
▼Direct Current
DCOM
▼Distributed Component Object Model
DCS
▼Distributed Control System - A control system architecture used in industrial processes where control elements are distributed throughout the system.
DEF CON
▼Defensive Computing Conference - Annual hacker convention
DES
▼Data Encryption Standard - Symmetric encryption algorithm (predecessor to 3DES and AES)
DHCP
▼Dynamic Host Configuration Protocol - network service for automatic IP address assignment
DHS
▼Department of Homeland Security - federal agency responsible for critical infrastructure protection
DIN
▼Deutsches Institut für Normung - German standards organization (DIN rail mounting)
DMS
▼Distribution Management System - SCADA for electrical power distribution
DMZ
▼Demilitarized Zone - A network segment that sits between internal networks and external networks, providing controlled access between different security zones
DNP
▼Distributed Network Protocol
DNP3
▼Distributed Network Protocol - Communication protocol used in SCADA systems
DNS
▼Domain Name System - Internet system that translates domain names to IP addresses
DSSS
▼Direct Sequence Spread Spectrum - Continuous frequency spreading technique
E
12 terms ▼EAP-TLS
▼Extensible Authentication Protocol-Transport Layer Security - Certificate-based authentication
EDGE
▼Enhanced Data Rates for GSM Evolution - Improved data transmission technology for GSM networks
EDR
▼Endpoint Detection and Response - Security monitoring software for individual devices
EEPROM
▼Electrically Erasable Programmable Read-Only Memory
EMS
▼Energy Management System - Software applications used by electric utilities to monitor, control, and optimize the performance of generation and transmission systems.
ENISA
▼European Union Agency for Cybersecurity - EU critical infrastructure authority
EPA
▼Environmental Protection Agency - U.S. federal agency responsible for environmental protection and regulation enforcement.
EPC
▼Engineering, Procurement, and Construction - Project delivery method for industrial facilities
ERP
▼Enterprise Resource Planning - integrated business management software
eSIM
▼Embedded Subscriber Identity Module - Programmable SIM card technology
ESIX
▼A variant of Unix operating system
ETL
▼Extract, Transform, Load
F
9 terms ▼FAA
▼Federal Aviation Administration - US aviation regulatory body
FAT
▼Factory Acceptance Test - Testing conducted at vendor facilities to verify system functionality before delivery
FBD
▼Function Block Diagrams
FCC
▼Federal Communications Commission - U.S. federal agency regulating radio communications
FDA
▼Food and Drug Administration - US pharmaceutical and medical device regulatory body
FERC
▼Federal Energy Regulatory Commission - federal agency regulating interstate energy markets
FFD
▼Full Function Device
FHSS
▼Frequency Hopping Spread Spectrum - Alternative spread spectrum technique not chosen for Wi-Fi
FTP
▼File Transfer Protocol - Network protocol for transferring files between systems
G
11 terms ▼GHz
▼Gigahertz
GIS
▼Geographic Information System
GM
▼General Motors
GNU
▼GNU's Not Unix (recursive acronym for open-source software)
GOOSE
▼Generic Object Oriented Substation Events
GPO
▼Group Policy Object - Windows Active Directory mechanism for centralized configuration management
GPRS
▼General Packet Radio Service - Packet-switched data service for GSM networks
GPS
▼Global Positioning System - Satellite navigation system also used for precision timing in industrial applications
GRC
▼Governance, Risk, and Compliance - Integrated approach to managing organizational governance, risk management, and regulatory compliance
GSM
▼Global System for Mobile Communication - Digital cellular technology standard
GUI
▼Graphical User Interface - Visual interface for software applications
H
9 terms ▼HA
▼High Availability - System design for maximum uptime
HART
▼Highway Addressable Remote Transducer - Industrial communication protocol for smart devices
HDMI
▼High-Definition Multimedia Interface
HMI
▼Human Machine Interface - Control system component that provides operator interaction with industrial processes.
HTTP
▼Hypertext Transfer Protocol
HTTP/HTTPS
▼Hypertext Transfer Protocol (Secure) - Web communication protocols
HTTPS
▼Hypertext Transfer Protocol Secure
HUMINT
▼Human Intelligence - Intelligence gathered from human sources
HVAC
▼Heating, Ventilation, and Air Conditioning - Building climate control systems
I
23 terms ▼I/O
▼Input/Output - Interface between control systems and field devices
IC
▼Industrial Control - referring to systems that control industrial processes and equipment.
ICCP
▼Inter-Control Center Communication Protocol
ICMP
▼Internet Control Message Protocol - Network protocol used for diagnostic and error reporting, often involved in ping sweep activities
ICS
▼Industrial Control Systems - Computer-based systems that monitor and control industrial processes and infrastructure.
IDS
▼Intrusion Detection System - security technology for monitoring and alerting on suspicious network activity
IDU
▼Indoor Unit - Indoor component of VSAT system
IEC
▼International Electrotechnical Commission - International standards organization
IEC 62443
▼International Electrotechnical Commission standard 62443 - A series of standards for industrial automation and control systems security.
IED
▼Intelligent Electronic Device
IEEE
▼Institute of Electrical and Electronics Engineers - Technical professional organization and standards body
IOC
▼Indicators of Compromise - Forensic evidence of potential intrusion or malicious activity on systems or networks
IoC
▼Indicator of Compromise
IoT
▼Internet of Things - Network of connected smart devices
IOT
▼Internet of Things
IP
▼Internet Protocol - fundamental networking protocol for data transmission
IPSec
▼Internet Protocol Security - Network protocol suite for secure communications
ISA
▼International Society of Automation - professional organization that develops industrial automation standards
ISA 100.11A
▼International Society of Automation standard 100.11A - A wireless networking standard for industrial automation applications.
ISM
▼Industrial, Scientific, and Medical - Unlicensed frequency band designation
ISO
▼International Organization for Standardization - International standards body
ISP
▼Internet Service Provider - company providing internet connectivity services
IT
▼Information Technology - computing systems that primarily handle data and information, with different security requirements than OT systems.
L
4 terms ▼LIMS
▼Laboratory Information Management System - software for managing laboratory operations and data
LoRa
▼Long Range - Wireless communication standard for industrial applications
LoRaWAN
▼Long Range Wide Area Network - IoT communication protocol
LTE
▼Long Term Evolution - Fourth generation cellular technology (4G)
M
13 terms ▼M&A
▼Mergers and Acquisitions - Business transactions involving consolidation of companies or assets
MAC
▼Media Access Control - Unique identifier assigned to network interface controllers
MES
▼Manufacturing Execution System - Middleware between business and plant floor
MFA
▼Multi-Factor Authentication - security process requiring multiple verification methods
MHz
▼Megahertz (frequency unit)
MITRE
▼Originally an acronym for Massachusetts Institute of Technology Research and Engineering, now used as the organization name
MITRE ATT&CK
▼Framework documenting adversary tactics, techniques, and procedures based on real-world observations of cyberattacks.
MMI
▼Man-Machine Interface
MMS
▼Manufacturing Message Specification
MPLS
▼Multi-Protocol Label Switching - Label-based routing technique
MSSP
▼Managed Security Service Provider - A company that provides outsourced monitoring and management of security devices and systems.
MSTP
▼Master-Slave/Token-Passing
MTU
▼Maximum Transmission Unit - Largest packet size that can be transmitted on a network
N
8 terms ▼NASA
▼National Aeronautics and Space Administration
NDA
▼Non-Disclosure Agreement
NERC
▼North American Electric Reliability Corporation - the organization responsible for electrical grid reliability standards in North America.
NERC CIP
▼North American Electric Reliability Corporation Critical Infrastructure Protection - Cybersecurity standards for the bulk electric system.
NIST
▼National Institute of Standards and Technology - US standards and technology agency
NMAP
▼Network Mapper - A network discovery and security auditing tool
NT
▼New Technology (Windows NT)
NTP
▼Network Time Protocol - Networking protocol for clock synchronization between computer systems over networks
O
9 terms ▼ODU
▼Outdoor Unit - Outdoor component of VSAT system including dish and transceiver
ODVA
▼Open DeviceNet Vendors Association - Organization managing Ethernet/IP standards
OEM
▼Original Equipment Manufacturer - Companies that manufacture components or systems that are used in other companies' products
OLE
▼Object Linking and Embedding
OPC
▼Open Platform Communications - Set of standards for industrial communication between automation devices and systems
OSHA
▼Occupational Safety and Health Administration - Federal agency regulating workplace safety
OSI
▼Open Systems Interconnection - Seven-layer networking model
OSINT
▼Open Source Intelligence - Information gathering from publicly available sources for reconnaissance purposes.
OT
▼Operational Technology - computing systems that monitor and control physical processes, which face unique security challenges due to their design and operational requirements.
P
12 terms ▼PCAP
▼Packet Capture - File format for storing network traffic data
PCAP-NG
▼Packet Capture Next Generation - Enhanced packet capture file format
PCI
▼Peripheral Component Interconnect
PCII
▼Protected Critical Infrastructure Information - sensitive information about critical infrastructure
PI
▼Process Information - A data historian system commonly used in industrial environments (referring to OSIsoft PI System).
PLC
▼Programmable Logic Controller - An industrial computer control system that continuously monitors the state of input devices and makes decisions based on a custom program.
POP
▼Post Office Protocol
POTS
▼Plain Old Telephone Service
PP&E
▼Personal Protective Equipment - safety equipment required in industrial environments
PPE
▼Personal Protective Equipment - Safety gear
PSI
▼Pounds per Square Inch
PTO
▼Paid Time Off - employee leave benefits
Q
1 term ▼QNX
▼A real-time operating system
R
15 terms ▼RADIUS
▼Remote Authentication Dial-In User Service - Centralized authentication system
RAT
▼Remote Access Trojan - Malware providing unauthorized remote access and control of compromised systems
RC4
▼Rivest Cipher 4 - Stream cipher used in WEP (now obsolete)
RDP
▼Remote Desktop Protocol - A proprietary protocol developed by Microsoft for remote access to Windows-based systems.
RF
▼Radio Frequency - Electromagnetic waves used for wireless communication, often referring to industrial wireless systems operating at 900 MHz.
RFC
▼Request for Comments
RFD
▼Reduced Function Device
RFP
▼Request for Proposal - Document organizations use to solicit bids from potential vendors for projects or services
RITA
▼Real Intelligence Threat Analytics - Network traffic analysis tool for security
RJ45
▼Registered Jack 45 - standard connector for Ethernet network cables
RS-232
▼Recommended Standard 232 (serial communication interface)
RSPAN
▼Remote Switch Port Analyzer - Remote network traffic monitoring feature
RTOS
▼Real-Time Operating System
RTS
▼Request to Send - Collision avoidance frame type
RTU
▼Remote Terminal Unit - A microprocessor-controlled electronic device that interfaces objects in the physical world to a distributed control system.
S
23 terms ▼SAM
▼Security Account Manager - Windows database storing user account and password information
SAN
▼Storage Area Network
SAP
▼Systems, Applications & Products in Data Processing - enterprise resource planning software
SAT
▼Site Acceptance Test - Testing conducted at customer facilities to verify system functionality in the operational environment
SCADA
▼Supervisory Control and Data Acquisition - Control system architecture comprising computers, networked data communications, and graphical user interfaces
SDR
▼Software Defined Radio
SFC
▼Sequential Function Charts
SIEM
▼Security Information and Event Management - platform for security event correlation and analysis
SIGINT
▼Signals Intelligence - Intelligence gathered from electronic signals
SIM
▼Security Information Management - Systems used for collecting, analyzing, and reporting security-related data.
SIP
▼Standards for Interconnection of Plants - NERC reliability standards addressing cybersecurity for bulk electric system cyber assets
SIS
▼Safety Instrumented System - A system designed to bring industrial processes to a safe state when predetermined conditions are violated
SMB
▼Server Message Block - Network communication protocol used for providing shared access to files and other services
SMS
▼Short Message Service
SMTP
▼Simple Mail Transfer Protocol
SNMP
▼Simple Network Management Protocol
SOC
▼Security Operations Center - A centralized facility where security professionals monitor, detect, analyze, and respond to cybersecurity incidents.
SPAN
▼Switch Port Analyzer - Network switch feature for traffic monitoring
SQL
▼Structured Query Language - Programming language designed for managing and querying relational databases
SSH
▼Secure Shell - Encrypted network protocol for secure remote system administration
SSID
▼Service Set Identifier - Network name identifier for wireless networks
SSL
▼Secure Sockets Layer
ST
▼Structured Text
T
6 terms ▼TCP
▼Transmission Control Protocol - Reliable internet communication protocol
TCP/IP
▼Transmission Control Protocol/Internet Protocol - Fundamental communication protocols of the internet and many networks
TCP/UDP
▼Transmission Control Protocol/User Datagram Protocol - Core internet transport protocols
TLS
▼Transport Layer Security
TSA
▼Transportation Security Administration - U.S. federal agency responsible for transportation security, including cybersecurity guidelines for critical transportation infrastructure.
TTP
▼Tactics, Techniques, and Procedures - Behavioral patterns describing how threat actors plan, execute, and sustain attacks
U
3 terms ▼UA
▼Unified Architecture
UDP
▼User Datagram Protocol - Fast but unreliable internet communication protocol
USB
▼Universal Serial Bus - Standard for connecting peripheral devices to computers, often used as attack vector in isolated systems
V
6 terms ▼VLAN
▼Virtual Local Area Network - Method of creating independent logical networks within a physical network infrastructure
VNC
▼Virtual Network Computing - remote desktop access protocol
VoIP
▼Voice over Internet Protocol
VPN
▼Virtual Private Network - A technology that creates secure connections over public networks
VSAT
▼Very Small Aperture Terminal - Small antenna satellite communication system
VSD
▼Variable Speed Drive - Electronic devices used to control the speed and torque of electric motors in industrial applications.
W
11 terms ▼WAN
▼Wide Area Network
WEP
▼Wired Equivalent Privacy - An older, less secure wireless security protocol that has been largely superseded by WPA/WPA2.
Wi-Fi
▼Wireless Fidelity - Wireless local area network technology
WiMAX
▼Worldwide Interoperability for Microwave Access - Broadband wireless communication standard
WLAN
▼Wireless Local Area Network
WPA
▼Wi-Fi Protected Access - Intermediate Wi-Fi security standard
WPA/WPA2/WPA3
▼Wi-Fi Protected Access - Progressive generations of wireless security protocols, with WPA3 being the most current and secure.
WPA2
▼Wi-Fi Protected Access 2 - Modern Wi-Fi security standard based on 802.11i
WPA3
▼Wi-Fi Protected Access 3 - current wireless security protocol standard
WPS
▼Wi-Fi Protected Setup - Wireless network setup protocol
WRT
▼Wireless RouTer - networking device with customizable firmware capabilities
X
3 terms ▼XM
▼(Satellite radio service name, not an acronym)
XML
▼Extensible Markup Language - Format for storing and transporting structured data
XOR
▼Exclusive OR (logical operation)
Common Terms and Definitions
0-9
10 terms ▼3DES (Triple Data Encryption Standard)
▼An encryption algorithm that applies the DES cipher three times to each data block, commonly offered by VSAT providers for secure data transmission.
3DES Tunnels
▼Triple Data Encryption Standard tunneling protocol providing encrypted communication channels for securing data transmission over VSAT and cellular networks.
4 to 20 milliamps
▼A standard analog sig nal range used in industrial instrumentation, where 4 milliamps represents the low end of the measurement range and 20 milliamps represents the high end. The use of 4 milliamps rather than 0 provides a "live zero" to distinguish between low readings and system failures.
4-20 milliamp
▼Standard analog signal range used in industrial instrumentation, where 4mA represents minimum value and 20mA represents maximum value.
802.11a
▼Wi-Fi standard operating on 5.6 GHz frequency band providing 54 Mbps data rates, representing early high-frequency Wi-Fi implementation.
802.11b
▼Wi-Fi standard operating on 2.4 GHz frequency band with initially lower data rates than 802.11a, becoming widely adopted due to better range characteristics.
802.11g
▼Wi-Fi standard providing backward compatibility with 802.11b while achieving 54 Mbps data rates on the 2.4 GHz band.
802.11i
▼IEEE security standard introduced in June 2004 that formed the foundation for WPA2, implementing AES 256-bit encryption and RADIUS server integration.
802.11n
▼Wi-Fi standard providing significantly higher data rates than previous generations through improved antenna and signal processing technologies.
802.15.4
▼An IEEE standard defining the physical layer and media access control for low-rate wireless personal area networks. This standard serves as the foundation for Zigbee, wireless HART, and ISA-100 protocols, making it crucial for industrial wireless communications.
A
38 terms ▼A/D Conversion (Analog-to-Digital)
▼The process of converting continuous analog signals into discrete digital values that controllers can process and store in memory.
Access Point
▼Central wireless network device that allows Wi-Fi devices to connect to a wired network, contrasted with device-to-device connectivity.
Access Point (AP)
▼A wireless networking device that allows Wi-Fi devices to connect to a wired network, acting as a bridge between wireless and wired infrastructure.
Access Protocols
▼Established procedures for authenticating and authorizing access to OT systems, including credential management and sharing restrictions.
ACK Frames
▼Acknowledgment frames sent by receiving devices to confirm successful receipt of data packets in Wi-Fi communications.
Active Network Tap
▼A powered network monitoring device that guarantees complete traffic capture without signal degradation, providing reliable monitoring capabilities for critical network segments.
Active Scanning
▼Testing methods that actively probe systems and may potentially disrupt operations, inappropriate for live OT environments.
Active Taps
▼Powered network tap devices that guarantee complete traffic capture with no signal degradation or communication loss.
Active Testing
▼Testing methodologies that involve generating new network traffic, writing data to system storage, installing software on target systems, or otherwise changing the state of systems being tested. Active testing provides comprehensive security assessment but carries higher risk of operational disruption.
Active Testing Techniques
▼Security testing methods that involve sending test traffic, attempting to exploit vulnerabilities, or otherwise interacting with systems in ways that could potentially cause disruption. These techniques are standard in IT penetration testing but inappropriate for most ICS assessments.
Actuator
▼A device that takes physical action in a process based on commands from a controller, such as opening a valve, starting a pump, or adjusting motor speed. Actuators are the mechanism by which control systems affect the physical world.
Advanced Persistent Threat (APT)
▼A sophisticated, long-term cyber attack campaign typically conducted by nation-state actors or advanced criminal groups, characterized by extended dwell time, advanced techniques, and specific strategic objectives.
AES (Advanced Encryption Standard)
▼A encryption algorithm commonly available in 128-bit and 256-bit implementations, used to secure wireless communications by encrypting data transmitted over spread spectrum systems.
AES Encryption
▼Advanced Encryption Standard using symmetric key encryption, available in 128-bit and 256-bit key lengths for securing wireless communications.
AESO CIP
▼Alberta Electric System Operator Critical Infrastructure Protection - a regional adaptation of NERC CIP standards for the Alberta electrical system.
Air Gap
▼A network security measure that involves physical isolation of systems from unsecured networks, including the Internet. True air-gapping is nearly impossible in practice due to maintenance and operational requirements.
Aircrack-ng
▼A suite of tools for auditing wireless networks, capable of monitoring, attacking, testing, and cracking wireless network security.
AMI (Advanced Metering Infrastructure)
▼Two-way communication systems that enable utilities to remotely read meter data and manage customer services, forming the foundation of smart grid operations.
AMI (Automatic Metering Infrastructure)
▼An upgraded smart grid technology that enables bi-directional communication between utility companies and smart meters at customer locations, allowing remote meter reading, rate changes, and service disconnection/reconnection.
AMR (Automatic Meter Reading)
▼An earlier generation of smart metering technology that enabled one-way communication from customer meters to utility companies, typically collected by trucks with receivers driving through neighborhoods or via telephone/power line carriers.
Analog Input
▼A continuous variable measurement from a sensor that changes over time, such as temperature, pressure, flow rate, or level. These inputs provide precise numerical values rather than simple on/off states.
Analog Output
▼A variable control command from a controller to an actuator specifying a particular percentage, level, or position, such as commanding a valve to 75% open. This allows for fine-grained control of processes.
Application Service Provider (ASP)
▼A cloud-based service model where SCADA and other industrial applications are hosted remotely and accessed through communication links rather than being installed on-site.
ARP (Address Resolution Protocol)
▼A network protocol that maps IP addresses to MAC addresses, creating tables that can be passively read to identify connected devices without generating disruptive traffic.
ARP Scanner
▼Network tool that passively reads Address Resolution Protocol tables to identify active devices without directly interrogating systems
ASN (Autonomous System Number)
▼A unique number assigned to autonomous systems on the internet, used to identify network ownership and routing information.
Asset Operator
▼The organization responsible for running and maintaining an industrial facility on a day-to-day basis. The operator may be the same entity as the asset owner or may be a contracted company.
Asset Owner
▼The organization that owns an industrial facility and bears ultimate responsibility for its operation, maintenance, and regulatory compliance. The owner may contract operations to another company.
Association Request/Response Frames
▼Frame types used during Wi-Fi connection establishment to negotiate connection parameters between client devices and access points.
Assumed Breach Scenario
▼The most common approach to control system penetration testing where testers are provided with initial IT network access to simulate the post-compromise state following a successful phishing attack or similar initial intrusion.
Assurance
▼A security discipline focused on ensuring that security controls are effective and that security standards or internal policies are properly implemented organization-wide. Assurance requires mature governance systems and established policies and standards.
ATT&CK Framework
▼A knowledge base of adversary tactics and techniques based on real-world observations, developed by MITRE Corporation to help organizations understand and defend against cyber threats.
Attack Surface
▼The collection of systems, ports, applications, and services that an organization exposes to potential attackers, particularly those accessible from the internet or other external networks.
Attack Vector
▼Any pathway or method that attackers can use to compromise systems, including software installations, network connections, and device interfaces.
Auto-run
▼A Windows feature that automatically executes programs or scripts when removable media is inserted, historically exploited by malware but now typically disabled for security reasons.
Automation
▼The process of rendering a physical system automatic, self-moving, and self-controlling to minimize or eliminate human intervention. Automation requires inputs (sensors), control logic (controllers), and outputs (actuators) working in a continuous loop.
Availability
▼In the context of security, ensuring systems and data are accessible when needed. In OT environments, availability is the top priority because process disruptions can have safety and operational consequences.
Availability Requirements
▼The need for OT systems to maintain extremely high uptime, often 99.99999% availability, which translates to only minutes of allowable downtime per year.
B
24 terms ▼Backdoor
▼A method of bypassing normal authentication or security mechanisms to gain unauthorized access to a system, used by attackers to maintain persistent access to compromised systems.
Backplane
▼A flat electronic circuit board containing slots for various functional modules in a PLC, similar to expansion slots in a computer but designed for industrial applications.
BACnet (Building Automation and Control Network)
▼Specialized communication protocol designed for building automation systems, HVAC control, and utility management with support for multiple communication media and device profiles.
Bad USB
▼A category of USB-based attacks that exploit the trust model between USB devices and host systems, typically involving HID device impersonation to execute malicious commands.
Badge Sharing
▼The practice of using one person's access credentials to allow another person entry to secure areas, creating security vulnerabilities and accountability problems.
Baggage Handling System
▼Highly automated airport systems that sort, store, and route luggage using conveyor belts, tracking systems, and integration with flight scheduling to ensure bags reach the correct aircraft.
BAS (Building Automation System)
▼An industrial control system that integrates and manages building functions including HVAC, lighting, fire suppression, security systems, and building access control. BAS typically uses protocols like BACnet or LonWorks.
BAS (Building Automation Systems)
▼Control systems that automate all aspects of large buildings including heating, cooling, emergency lighting, security, and fire suppression systems.
Baud Rate
▼The speed of data transmission in serial communication, measured in bits per second, with common rates including 9600, 19200, and 38400 baud.
Beacon
▼In wireless networking, periodic broadcast frames sent by access points to announce their presence and network parameters; attackers monitor beacons to identify target networks for cloning.
Beacon Frames
▼Periodic broadcast frames sent by access points containing network information including SSID, security settings, and connection parameters.
Bidirectional Communication
▼Two-way satellite communication allowing both sending and receiving data, contrast to receive-only broadcast systems.
Black Box Testing
▼Penetration testing approach where testers enter environments with no prior knowledge about target systems, most closely simulating real-world external attacks but carrying higher risks in control system environments.
Blue Team
▼The team responsible for defending the environment during red team exercises. The blue team typically doesn't know the specific timing, methods, or targets of the red team's attacks, creating a realistic testing environment.
Bluetooth
▼Short-range wireless technology designed as replacement for RS-232 serial cables, available in Enhanced Data Rate and Low Energy variants.
Branch Office Backup
▼Use of VSAT as secondary communication link when primary connections (MPLS, POTS) fail or become unavailable.
Breach Data
▼Information stolen from compromised systems and databases, often including usernames, passwords, and personal information that becomes available through various sources.
Bridge
▼A device that connects two different types of networks, such as converting Zigbee communications to Wi-Fi or Ethernet.
Brownfield Installation
▼The integration of new technology into existing industrial systems that are already deployed and operational in the field.
Building Automation System
▼Integrated systems that control and monitor building services such as lighting, heating, ventilation, air conditioning, fire safety, and security systems.
Bump Key
▼A specially cut key that can open many locks of the same type through impact and turning techniques, commonly used in physical security assessments and by criminals.
Burden of Proof
▼The responsibility of penetration testing teams to document every step of their process through screenshots, logs, and detailed descriptions. This documentation provides defending teams with clear remediation roadmaps and prevents unsubstantiated security claims.
Bus Network
▼A communication system that allows multiple instruments to share a common communication trunk, reducing wiring requirements and enabling enhanced device capabilities.
Business Analysis
▼The systematic examination of an organization's operations, revenue sources, competitive advantages, and strategic vulnerabilities to understand why it might be targeted by adversaries and which systems are most critical to protect.
C
35 terms ▼Capacitor
▼An electronic component that stores electrical energy; in Kill USB devices, capacitors accumulate and amplify USB port power to destructive levels.
Cellular Modem
▼A device that uses cellular network infrastructure to provide wireless communication capabilities, increasingly being embedded directly into industrial equipment such as PLCs and RTUs.
Center Channel
▼Primary frequency used by direct sequence spread spectrum systems, such as channels 1, 6, or 11 in Wi-Fi networks.
Channel Encoder
▼Device or software component that applies spreading codes to input data before transmission, enabling spread spectrum communication by distributing signal energy across multiple frequencies.
CIA Triad
▼The foundational information security model consisting of Confidentiality, Integrity, and Availability. In OT security, this triad is inverted, with availability and integrity prioritized over confidentiality.
CIDR Notation
▼A method for describing IP address ranges using a slash followed by a number (e.g., /24) to indicate the subnet mask.
Client-Server
▼Communication model where only designated client devices can initiate transactions, with servers responding to client requests but not initiating communication independently.
Coast Guard Site
▼Critical infrastructure facilities subject to specific federal reporting requirements when security breaches occur, requiring notification to multiple agencies within strict timeframes.
Coax Cable
▼Coaxial cable used in VSAT installations to carry RF signals between outdoor and indoor units with low signal loss.
Coaxial Cable
▼High-fidelity transmission cables used in VSAT systems to connect outdoor and indoor units with minimal signal loss.
Command and Control (C2)
▼Infrastructure used by attackers to communicate with compromised systems, issue commands, and exfiltrate data; typically involves encrypted channels to evade detection.
Communication Protocols
▼Standardized rules and conventions that define how data is transmitted and received over networks, ensuring devices and systems can understand each other effectively.
Compensating Controls
▼Security measures that provide alternative protection when standard security controls cannot be implemented, such as physical security for shared credentials.
Compliance Violation
▼An action or failure to act that violates regulatory requirements, potentially resulting in fines, reputational damage, or other consequences.
Component Twin
▼The most basic type of digital twin that models a single component such as an engine, transmission, or sensor to understand its fundamental operation and test concepts.
Conduit
▼In the context of the Purdue Model, a controlled communication pathway between security zones that manages and restricts information flow according to security policies.
Configuration Analysis
▼The process of examining exported device settings and operational parameters to identify security misconfigurations, weak authentication, and inadequate access controls.
Connection Establishment
▼Multi-stage process by which Wi-Fi devices authenticate and establish communication with access points or other devices.
Control Systems Network
▼The operational technology (OT) network containing industrial control systems, PLCs, HMIs, and other devices that monitor and control physical processes.
Controller
▼The decision-making component of an automation system that receives inputs, processes them according to programmed logic, and sends commands to outputs. Examples include PLCs and DCS controllers.
Convergence
▼The increasing integration of physical and digital worlds, which has created new capabilities for OT systems but also increased their vulnerability to cyber attacks.
COTS (Commercial-Off-The-Shelf)
▼Technology products that are ready-made and available for purchase, rather than custom-developed solutions.
Credential Separation
▼The practice of using different usernames and passwords for IT and OT systems to prevent lateral movement between environments.
Credential Stuffing
▼An attack method where stolen username/password combinations are tested against multiple systems to gain unauthorized access.
Critical Cyber Asset
▼In NERC CIP terminology, any device with a routable interface that requires specific physical security protections including "six walls of protection" and access monitoring.
Critical Infrastructure
▼Systems and assets whose disruption would have significant impact on national security, economic security, public health, or safety. Examples include energy, water, transportation, and healthcare sectors.
Crown Jewels
▼The most critical assets in an OT environment, typically the control system devices at IEC 62443 levels 3, 2, 1, and 0 that directly control industrial processes.
CVSS (Common Vulnerability Scoring System)
▼A standardized method for ranking vulnerabilities typically using 1-through-10 scales, helping organizations prioritize remediation efforts to address the greatest amount of risk in the shortest amount of time.
CVSS Score
▼Common Vulnerability Scoring System score ranging from 0 to 10 that indicates the severity of a vulnerability. Scores between 9-10 are considered critical.
Cyber Attack
▼Deliberate, malicious action taken by a threat actor to compromise, disrupt, or damage computer systems, networks, or data through various techniques and tools.
Cyber Attack Sophistication
▼The ability of cyber attacks to make subtle changes that go unnoticed for weeks or months, rather than causing immediate obvious failures.
Cyber Breach
▼Successful penetration or compromise of security defenses resulting in unauthorized access to systems, data, or networks by threat actors.
Cyber Event
▼Any occurrence in cyberspace that may have an impact on organizational operations, ranging from benign network activity to serious security incidents.
Cyber Incident
▼Cyber event with actual or potentially adverse effects on organizational systems, operations, or assets requiring response and investigation.
Cyber Kill Chain
▼A model describing the stages of a cyber attack, from initial reconnaissance through objective achievement, used for threat analysis and defensive planning.
D
31 terms ▼D/A Conversion (Digital-to-Analog)
▼The process of converting digital values from controller memory into analog signals that can drive field devices such as valve actuators.
Data Historian
▼A specialized system that receives and stores process data from controllers for long-term trending, analysis, and regulatory compliance.
DCOM (Distributed Component Object Model)
▼Microsoft technology that formed the foundation for original OPC implementations, creating significant firewall and security challenges due to random port usage.
DCS (Distributed Control System)
▼A highly integrated, redundant control system designed for complex processes within a single geographical facility. DCS systems typically feature primary and backup controllers, redundant networking, and are common in refineries, chemical plants, and power generation.
De-authentication Frames
▼Management frames used to forcibly disconnect devices from wireless networks, often exploited in security attacks.
Defense in Depth
▼A security strategy that uses multiple layers of security controls to protect systems, acknowledging that no single control is perfect.
Defiant Oil
▼Fictional oil company case study used to demonstrate realistic red team scenario development with multiple threat actor types including nation-state, activist, criminal, and insider threats.
Denial of Service (DoS)
▼An attack that disrupts or prevents legitimate access to services or systems, often by overwhelming resources or exploiting vulnerabilities.
Device ID
▼Unique identifier (1-247 in Modbus) that specifies which field device should respond to a particular protocol message.
Device-to-Device Connectivity
▼Direct wireless connection between two Wi-Fi devices without requiring an access point, commonly used for file transfers in early Wi-Fi implementations.
Digital Input
▼A binary input to a control system that has only two states: on or off, open or closed, true or false. Examples include limit switches, float switches, and contact closures.
Digital Output
▼A binary command from a controller that turns a device either on or off, such as starting a pump or opening a valve fully.
Digital Twin
▼A virtual model of a physical process, component, or system that uses computational mathematics to replicate real-world operation. Digital twins enable testing, training, optimization, and anomaly detection without affecting actual operations.
DIN Rail
▼A standardized metal mounting rail used throughout the industrial automation industry for mounting PLCs, power supplies, and other control equipment.
Direct Sequence Spread Spectrum
▼Underlying radio technology used by Wi-Fi to spread signals across wide frequency ranges, covered in Module 1.
Direct Sequence Spread Spectrum (DSSS)
▼A modulation technique that spreads data across multiple frequency channels simultaneously, providing resistance to interference and improved security. Used by Wi-Fi and ISA-100 systems, contrasting with frequency hopping spread spectrum approaches.
DirectTV
▼Example of publisher-subscriber VSAT model using bundled antennas in single dish for broadcast television content distribution.
Discovery Phase
▼The stage of an attack where adversaries map out control systems and assets after gaining initial access to the network. This phase involves identifying what systems are present, their configurations, and their relationships to understand the environment before proceeding to impact operations.
Discrete Input
▼Another term for digital input; see Digital Input.
Discrete Output
▼Another term for digital output; see Digital Output.
DMS (Distribution Management System)
▼A specialized SCADA system designed for managing electrical power distribution at lower voltages to neighborhoods and end customers, stepping down from transmission levels.
DMZ (Demilitarized Zone)
▼In the Purdue Model, Level 3.5 serves as a secure boundary between trusted OT networks (below) and less-trusted IT/internet networks (above). The DMZ contains security devices and data exchange servers that mediate communication.
DNP3 (Distributed Network Protocol)
▼Communication protocol developed for North American utility applications, enabling communication between SCADA master stations and field devices like RTUs and IEDs.
DNS Dumpster
▼A tool that performs DNS reconnaissance to discover subdomains, IP addresses, and other network information associated with a target domain.
Do Not Touch List
▼A critical component of rules of engagement that identifies systems that should never be tested due to their operational importance. These systems could cause enormous financial loss or operational disruption if they go down even briefly.
Document and Media Exploitation (DOMEX)
▼The process of searching for, collecting, and analyzing specific documents, files, and information during red team exercises to achieve intelligence objectives or demonstrate access to sensitive systems.
DoS (Denial of Service)
▼An attack that overwhelms systems with excessive requests or traffic, making them unavailable to legitimate users.
Downstream
▼In the oil and gas industry, the processing and refining of raw materials into products like gasoline and plastics, and their distribution to end customers.
DSSS (Direct Sequence Spread Spectrum)
▼Spread spectrum technique that spreads signal energy continuously across a wide frequency band using XOR operations with pseudorandom codes, typically implemented in 2.4 GHz, 5.6 GHz, and 6 GHz bands.
Dual Homed Infrastructure
▼Network architecture where systems have connections to multiple networks simultaneously, creating potential security vulnerabilities that require careful management.
Dual-Homed Network
▼A network configuration where a device has simultaneous connections to two different networks, creating potential security vulnerabilities.
E
20 terms ▼Early Bird
▼Nickname for Intelsat I, first commercial communications satellite launched April 6, 1965.
East-West Traffic
▼Network communications between devices or network segments within the same network zone, common in industrial control system communications.
EDGE (Enhanced Data rates for GSM Evolution)
▼An enhanced version of GSM technology that provides improved data transmission capabilities.
EEPROM (Electrically Erasable Programmable Read-Only Memory)
▼Non-volatile memory used in PLCs to store critical system firmware and retain programs and data during power outages.
Embedded Device
▼A specialized computer system designed for specific applications, running minimalistic operating systems and purpose-built for particular functions rather than general computing.
Emissions Control
▼OT systems that monitor and automatically adjust industrial processes to keep emissions within regulatory limits while maintaining operational efficiency.
EMS (Energy Management System)
▼A specialized SCADA system designed for monitoring and controlling high-voltage electrical transmission systems, typically managing remote substations from centralized control centers.
Encryption Methods
▼Various security protocols used to protect Wi-Fi communications, evolving over time to address discovered vulnerabilities.
Energy Grid
▼The interconnected network of power generation, transmission, and distribution systems that deliver electricity to consumers, requiring precise real-time balancing of supply and demand.
Engineering Unit Scaling
▼The process of converting raw digital values from controllers into meaningful physical units (such as feet, PSI, or percentage) that operators can understand and use.
Engineering Workstation
▼Specialized computers that provide configuration and programming capabilities for control systems, including control logic development, HMI graphics creation, and system commissioning.
Environment
▼In the context of ICS, the physical process being controlled, such as manufacturing, chemical blending, or power generation.
Environmental Protection
▼The use of operational technology to minimize environmental impacts through precise control of emissions, waste generation, and resource consumption.
Ethernet/IP
▼Industrial protocol that runs industrial automation applications over standard Ethernet networks.
EtherNet/IP
▼Rockwell Automation's Ethernet-based industrial protocol that encapsulates ControlNet communications within TCP/IP, using ports 44818 for explicit messaging and 2222 for implicit messaging.
Evil Pineapple
▼A specialized wireless device designed for security testing that can clone legitimate access points and perform man-in-the-middle attacks. This tool demonstrates the potential for rogue access point deployment and highlights the importance of comprehensive wireless monitoring.
Evil Twin
▼A wireless attack technique where attackers create a malicious wireless access point that impersonates a legitimate one to intercept user communications.
Exploit
▼A piece of code or technique that takes advantage of a vulnerability to cause unintended behavior in a system. Exploits are not inherently malicious but become dangerous through their payloads.
External Penetration Testing
▼A method of attacking the security of a computer system or network from an external or public source using the same mindset, framework, and tools that an attacker would use, with no insider knowledge of the target environment.
External Testing
▼Penetration testing conducted from outside the organization's network perimeter, typically from the internet, focusing on reconnaissance and exposed systems.
F
15 terms ▼Factory Acceptance Test (FAT)
▼A testing process conducted at vendor facilities to verify that systems meet specifications before delivery to customer sites. The course emphasizes that cybersecurity testing should be integrated into FAT processes.
FCC (Federal Communications Commission)
▼United States regulatory agency responsible for managing and licensing radio frequency spectrum allocations.
FFD (Full Function Device)
▼Zigbee device capable of transmitting, receiving, storing, forwarding data and coordinating network functions.
FHSS (Frequency Hopping Spread Spectrum)
▼Spread spectrum technique that rapidly switches transmission frequency according to a predetermined pseudorandom sequence, commonly implemented in 900 MHz band for long-range industrial applications.
Field Device
▼Industrial control equipment such as PLCs, RTUs, and smart instrumentation that directly interfaces with physical processes and equipment.
First Line of Defense
▼Operational management teams who own and manage daily operational risks and are responsible for implementing security controls. In industrial environments, this includes plant engineers, operators, and maintenance personnel.
Flat-file Database
▼Database architecture optimized for speed rather than data persistence, used in HMI systems to provide millisecond-level updates while automatically discarding outdated information.
Float Switch
▼A level-sensing device that uses a floating component to make or break an electrical contact when liquid reaches a certain height, providing a digital input signal to controllers.
Flow Meter
▼A sensor that measures the volume of liquid passing through pipes over a specific time period.
Footprinting
▼The comprehensive reconnaissance phase of red team exercises involving both digital and physical intelligence gathering to map target attack surfaces, identify potential access points, and understand security measures.
Foundation Fieldbus
▼A digital communication protocol used in industrial automation for connecting field devices to control systems.
Frequency Hopping Spread Spectrum (FHSS)
▼A method of transmitting radio signals by rapidly switching among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver. Commonly used in 900 MHz industrial radio systems for improved reliability and interference resistance.
FUD (Fear, Uncertainty, and Doubt)
▼A strategy used to spread negative or misleading information about security threats, often to influence decision-making or sell products.
Full Function Device
▼Zigbee device capable of performing routing, coordination, and complete network management functions, including the ability to relay data between other devices in the mesh network.
Function Code
▼Numerical identifier in protocols like Modbus that specifies what operation to perform, such as reading coils, writing registers, or controlling devices.
G
9 terms ▼Geosynchronous Orbit
▼Satellite orbital position matching Earth's rotation period, maintaining fixed position relative to ground stations to enable consistent communication links.
GNU Radio
▼An open-source software development toolkit for implementing software-defined radio systems, commonly used with Ubuntu Linux for RF spectrum analysis.
GOOSE (Generic Object Oriented Substation Events)
▼High-speed messaging protocol within IEC 61850 that enables protection coordination and fault isolation in electrical substations with 4-millisecond response requirements.
GPRS (General Packet Radio Service)
▼A packet-based wireless communication service that enables cellular networks to carry TCP/IP data packets using standard networking protocols.
GPS (Global Positioning System)
▼Satellite-based navigation system used in wireless audits to record the precise location of wireless signal detections.
Gray Box Testing
▼Balanced penetration testing approach that provides sufficient information to ensure safety while maintaining enough unknowns to meaningfully test security controls, commonly used in control system environments.
Greenfield Installation
▼The deployment of new technology in new industrial systems that are being built from the ground up.
Ground Rules
▼Fundamental safety and legal principles that must be followed when conducting security testing on operational technology systems.
GSM (Global System for Mobile Communication)
▼The original European standard for mobile voice communication that became the de facto global standard.
H
17 terms ▼H2S Sensor
▼Hydrogen sulfide detection device required in certain industrial environments for personnel safety during assessment activities
Hardware-Based Threats
▼Malicious capabilities embedded in physical devices like cables or USB devices that can compromise systems through hardware rather than software.
HART (Highway Addressable Remote Transducer)
▼A communication protocol that allows digital communication with field instruments while maintaining compatibility with existing 4-20 mA analog systems.
Hefty Fines
▼Substantial financial penalties imposed by regulatory authorities for non-compliance with mandatory OT security requirements.
HID (Human Interface Device)
▼A computer device class that includes keyboards, mice, and other input devices; exploited in USB attacks because HID devices typically have unrestricted system access.
HID Device
▼Human Interface Device such as keyboards and mice that register with computer systems without security restrictions, often exploited by USB attack tools to execute commands through simulated keystrokes.
Hidden SSID
▼Network configuration that suppresses SSID broadcasting in beacon frames, providing limited security benefit due to other discovery mechanisms.
High-Gain Antenna
▼An antenna that focuses radio frequency energy in a specific direction, providing increased range and signal strength.
HMI (Human Machine Interface)
▼A graphical user interface that allows human operators to monitor processes and interact with control systems. HMIs display process status and allow operators to change setpoints and issue commands.
HMI (Human-Machine Interface)
▼Computer systems that provide operators with graphical interfaces for monitoring and controlling industrial processes, displaying real-time data and enabling control actions.
Hotspot
▼A physical location where people can access the Internet using Wi-Fi technology, often created by mobile devices sharing cellular connections.
Hub System
▼Ground-based antenna infrastructure managing satellite communications between multiple remote VSAT terminals and terrestrial networks.
Hub-and-Spoke Architecture
▼A network configuration where multiple remote terminals communicate through a central hub station.
Human Element
▼The critical role that humans play in both causing and preventing OT security incidents, making human awareness and judgment essential components of security.
Human Machine Interface (HMI)
▼Control system component that provides operators with graphical interfaces for monitoring and controlling industrial processes, often containing web interfaces that can present security vulnerabilities.
Hunter.io
▼A web service that helps discover email addresses associated with specific domains and identifies email formatting patterns used by organizations.
Hybrid DCS
▼Control systems that combine proprietary controllers for real-time process control with standard IT technologies for operator interfaces and business integration.
I
47 terms ▼ICMP (Internet Control Message Protocol)
▼Network protocol used for diagnostic and error messages, commonly used in ping commands but often disabled for security reasons.
ICS (Industrial Control System)
▼The umbrella term for all types of control systems used in industrial environments, including SCADA, DCS, SIS, and others. ICS encompasses the software, hardware, controllers, networks, and all components involved in monitoring and controlling physical processes.
ICS (Industrial Control Systems)
▼Specialized computer systems used to control and monitor industrial processes. These systems include programmable logic controllers (PLCs), human-machine interfaces (HMIs), and other devices that control physical processes in industrial facilities.
ICS Matrix
▼The visual representation of the MITRE ATT&CK for ICS framework that organizes all tactics across the top row and corresponding techniques beneath each tactic. This matrix serves as a navigation tool for understanding the complete attack lifecycle in industrial control systems.
ICS Protocol
▼Industrial Control System protocols specifically designed for real-time control communications requiring low latency and high reliability.
ICS Security Maturity Lifecycle
▼A framework describing the typical progression of industrial control system security programs from initial spot checks through control implementation to comprehensive penetration testing validation.
ICS Vulnerability Assessment
▼A methodology to identify, quantify, and rank vulnerabilities within industrial control systems using passive techniques that do not harm the target system, emphasizing collaboration with operational personnel.
IDS (Intrusion Detection System)
▼A security system that monitors network traffic and flags anomalies for investigation without automatically blocking traffic.
IDU (Indoor Unit)
▼Interior component of VSAT system containing electronics, power supply, and connection ports for integration with network equipment.
IEC 61131-3
▼The international standard that defines six programming languages approved for PLC programming, including ladder logic, function block diagrams, and structured text.
IED (Intelligent Electronic Device)
▼Specialized controllers used exclusively in the power industry for high-speed monitoring and protection of electrical power systems.
IEEE Address
▼A unique identifier used by Zigbee devices instead of IP addresses, enabling networks to support up to 65,535 devices per network segment.
Impact Phase
▼The final stage of an attack where adversaries achieve their ultimate objectives, such as disrupting operations, preventing operator response, causing equipment damage, or creating safety hazards. In OT environments, this phase can result in physical consequences including plant shutdowns, explosions, or environmental harm.
Incident Response
▼Structured approach to handling and investigating security breaches or cyber attacks in industrial environments.
Indicator of Compromise (IoC)
▼Observable artifacts or behaviors that suggest a system may have been compromised by malicious activity, such as unusual network traffic patterns or unauthorized communications.
Indicators of Compromise (IOC)
▼Observable evidence that a system has been compromised, including suspicious network traffic, file modifications, or unusual system behavior.
Indicators of Compromise (IOCs)
▼Evidence that suggests a system or network has been breached or infected with malware.
Industrial Automation
▼The broad term for automating processes without human intervention using technological systems.
Industrial Control System
▼The central control systems for factories, power plants, refineries, and other industrial facilities that manage complex manufacturing and production processes.
Industrial Control System (ICS)
▼Integration of hardware and software used to monitor and control industrial processes and equipment.
Industrial Control Systems
▼Complex OT systems that manage dangerous industrial processes like chemical production, oil refining, and power generation with multiple safety layers.
Industrial Control Systems (ICS)
▼Computer-based systems that monitor and control industrial processes, including manufacturing, power generation, water treatment, and other critical infrastructure operations. These systems typically include components such as SCADA systems, PLCs, and HMIs.
Initial Compromise
▼The first successful attack phase where attackers achieve initial access to target environments through internet-based, email-based, physical access, supply chain, or insider threat vectors.
Input
▼A measurement or signal from the physical world that provides information to a controller, such as temperature, pressure, flow, level, or switch status. Inputs are essential for automation because controllers cannot control what they cannot measure.
Input/Output Module
▼Digital devices that serve as the interface between real-world process conditions and digital control systems, sensing physical conditions and converting them to digital information.
Integrity
▼One of the three pillars of cybersecurity, referring to ensuring that data and systems remain accurate, complete, and trustworthy.
Intellectual Property (IP)
▼Proprietary knowledge and information about how systems operate. In the context of digital twins, the physics models and operational parameters represent valuable IP that must be protected.
Intellectual Property Theft
▼The theft of valuable manufacturing processes and operational techniques through observation and replication, even without access to written recipes or formulas.
Intelsat I
▼First commercial communications satellite, also known as Early Bird, launched in 1965 marking beginning of commercial satellite communications.
Internal Penetration Testing
▼A method of attacking the security of a system from within the network using the same tools that a real attacker would use, focusing on validating network segmentation and access controls for users already inside the environment.
Internal Testing
▼Penetration testing conducted from within the organization's network, often simulating insider threats or compromised internal systems.
Intervention
▼The act of directly challenging or stopping unsafe practices when they are observed, rather than simply reporting them after the fact.
Intrusion Detection System (IDS)
▼Security tools that monitor network or system activities for malicious activities or policy violations and generate alerts for security personnel.
Investigative Mindset
▼The approach used in ICS vulnerability assessment where testers think like detectives examining evidence rather than adversaries trying to break into systems, emphasizing safe collection and analysis of system artifacts.
IoT (Internet of Things)
▼The network of physical devices embedded with sensors, software, and connectivity that enables them to collect and exchange data. Industrial IoT (IIoT) applies these concepts to industrial environments.
IPS (Intrusion Prevention System)
▼A security system that monitors network traffic and automatically blocks suspicious activity in real-time.
IPSec (Internet Protocol Security)
▼A protocol suite for securing Internet Protocol communications by authenticating and encrypting IP packets.
IPSec Tunnels
▼Internet Protocol Security tunneling providing encrypted and authenticated communication channels over public networks.
ISA 100
▼A wireless communication standard for industrial automation applications, providing standardized protocols for wireless sensor networks.
ISA 100.11a
▼An internationally recognized wireless standard developed by the International Society for Automation as a vendor-agnostic protocol for industrial wireless communications.
ISA-100
▼An industrial automation standard (ISA-100.11a) for wireless networking in process control and related applications. Developed as an open standard alternative to proprietary wireless protocols, providing reliable and secure wireless operation for non-critical monitoring and control functions.
ISA/IEC 62443
▼International standard framework defining cybersecurity requirements and guidelines for industrial automation and control systems
ISA100.11a
▼International standard for wireless communications in automation environments, developed by the International Society of Automation.
ISM Band (Industrial, Scientific, Medical)
▼Radio frequency bands reserved for industrial, scientific, and medical purposes, including 2.4 GHz used by Wi-Fi and Zigbee.
ISM Bands
▼Industrial, Scientific, and Medical frequency bands (900 MHz, 2.4 GHz, 5.6 GHz) designated for unlicensed use including Wi-Fi applications.
IT (Information Technology)
▼Systems including computers, servers, databases, and firewalls that process, store, or transmit information.
IT/OT DMZ
▼Network zone that sits between corporate IT networks and operational technology networks, typically containing systems like data historians, patching servers, and jump boxes that bridge the two environments.
J
1 term ▼Jump Host
▼An intermediary system that manages and controls user access between different network segments, similar to trampolines that users must traverse to reach their destination.
K
5 terms ▼Karma Firmware
▼Modified wireless access point firmware that enables advanced wireless attacks, including automatic response to client device probe requests.
Kill USB
▼A destructive USB device that uses capacitors and diodes to amplify USB port power to levels that permanently damage connected electronic devices.
Kismet
▼A wireless network detector and intrusion detection system that works with Wi-Fi, Bluetooth, and other wireless protocols.
Ku Band
▼Frequency range used by modern VSAT systems, first commercially developed by Schlumberger and Hughes Aerospace in 1985.
Ku-Band
▼A frequency range (12-18 GHz) commonly used for VSAT communications, offering advantages including smaller antenna requirements.
L
29 terms ▼Ladder Logic
▼The most common PLC programming language that uses graphical symbols resembling electrical relay diagrams to represent control logic.
LAN Turtle
▼A covert network access tool disguised as a USB Ethernet adapter that provides various network attack capabilities including remote access and man-in-the-middle attacks.
Last Mile Communication
▼The communication link between SCADA terminals and field devices that collect data from instrumentation and sensors.
Last Mile Communications
▼Final segment of communication path connecting end-user locations to broader network infrastructure.
Latency
▼The time delay between signal transmission and reception, particularly problematic in satellite communications due to the distances involved.
Lateral Movement
▼The process by which attackers move through a network after initial compromise, seeking to access additional systems and escalate privileges.
Layer 2 Separation
▼A network security method that uses VLAN tagging to keep different customers' data streams separate throughout the transmission path.
Layer 2/Layer 3 Separation
▼Network segmentation technique isolating data link layer and network layer functions to improve security and network management.
Layer 3 VLAN Tagging
▼A method of creating multiple virtual circuits for the same customer using network layer addressing.
Legacy Operating System
▼Older operating systems like Windows NT and Windows 2000 that are still commonly used in OT environments despite being obsolete in IT contexts.
Legacy Systems
▼Older systems that may lack modern security features, be out of vendor support, or be incompatible with current security technologies.
Level 0 (Purdue Model)
▼The lowest level containing sensors and actuators that interface directly with the physical process but have no independent decision-making capability.
Level 1 (Purdue Model)
▼Basic control level containing PLCs and controllers that have the capability to make controlled changes to the physical world.
Level 2 (Purdue Model)
▼Supervisory control level containing HMIs, SCADA servers, and operator consoles that can send control commands to Level 1 controllers.
Level 3 (Purdue Model)
▼Operations and control zone containing support systems like data historians that need to connect to control systems but don't directly command controllers.
Level 3.5 (Purdue Model)
▼The DMZ security boundary between OT (below) and IT (above) networks, containing firewalls, data diodes, and data exchange servers.
Level 4/5 (Purdue Model)
▼Business network (Level 4) and internet-connected systems (Level 5) that should be segmented from OT environments.
Licensed Spectrum
▼Radio frequency bands requiring federal agency approval and specific authorization for use, providing dedicated frequencies with legal protection from interference.
Licensed Wireless System
▼A wireless communication system that operates on frequencies allocated exclusively to a specific organization through government licensing, providing dedicated spectrum access and protection from interference.
Licensed Wireless Systems
▼Radio frequency systems requiring government license for operation, providing exclusive use of specific frequencies with legal protection.
Lifecycle
▼The operational lifespan of systems, with IT systems typically lasting years while OT systems operate for decades, creating different security maintenance requirements.
Line of Sight
▼Direct unobstructed path between transmitting and receiving antennas, critical for reliable RF communications.
Live Zero
▼The use of 4 milliamps instead of 0 milliamps as the low end of analog signal ranges, enabling detection of system faults when signals drop to zero.
Living Off the Land
▼Advanced attack technique using legitimate system tools, utilities, and processes already present in the target environment to avoid detection by security controls.
Living off the Land
▼A technique where attackers use legitimate, built-in operating system tools rather than installing malware, making detection more difficult.
Local Control
▼Control functions performed autonomously by a controller at a field location without requiring communication with or commands from supervisory systems.
Lock Picking
▼The practice of unlocking locks without the original key by manipulating lock components; a common physical security assessment technique.
LoRa (Long Range)
▼An open wireless communication standard for long-range, low-power industrial and IoT applications, used for wireless input/output devices.
LoRaWAN (Long Range Wide Area Network)
▼A low-power wide-area network protocol designed for Internet of Things applications requiring long-range communication.
M
26 terms ▼MAC Address Filtering
▼Early Wi-Fi security mechanism restricting network access based on hardware addresses, easily circumvented by address spoofing.
Malicious Attack
▼Intentional cyber attacks that can create scenarios that would never occur in normal operations but could have catastrophic consequences.
Malicious Behavior
▼Intentional actions designed to compromise security, such as unauthorized access attempts or information gathering activities.
Malicious Insider
▼An authorized user (employee or contractor) who intentionally causes harm to an organization's systems or data, as demonstrated by historical attacks like Shamoon.
Malware
▼Malicious software that can compromise systems and spread through various connection methods, including charging cables and network connections.
Man-in-the-Middle (MITM)
▼An attack where the attacker secretly intercepts and potentially alters communications between two parties who believe they are communicating directly.
Man-in-the-Middle Attack
▼A cybersecurity attack where an attacker intercepts and potentially alters communications between two parties who believe they are communicating directly with each other. In wireless contexts, this often involves rogue access points that masquerade as legitimate networks.
Mandatory Requirements
▼Regulatory obligations that must be met by organizations in specific industries or regions, with enforcement mechanisms and penalties for non-compliance.
Master Polling Server
▼Central servers in SCADA systems that initiate communication with field devices and coordinate data collection from remote sites.
Master-Slave
▼Communication model where only master devices can initiate transactions, with slave devices waiting to be polled before responding with data.
Memory Address
▼A specific location in controller memory where input values are stored and from which output values are read.
MES (Manufacturing Execution System)
▼Middleware software that sits between business systems and plant floor control systems, managing production scheduling, inventory, work orders, and material tracking.
MES (Manufacturing Execution Systems)
▼Systems that bridge control systems with enterprise applications, handling batch management, work orders, logistics, and quality control.
Mesh Network
▼A wireless network topology where each device can communicate with multiple other devices, enabling automatic routing around failed devices and eliminating single points of failure.
Mesh Topology
▼A network architecture where devices connect to multiple other devices, providing redundant communication paths and improved reliability.
Midstream
▼In the oil and gas industry, the transportation and storage of oil and gas via pipelines, trucks, rail, or storage facilities.
MITRE ATT&CK for ICS
▼A comprehensive framework created by MITRE that documents how attackers break into control system environments and impact plant networks. The framework organizes adversary behavior into tactics, techniques, and procedures based on real-world incidents.
MITRE Corporation
▼A not-for-profit organization that operates federally funded research and development centers in the United States. MITRE develops frameworks and tools to improve cybersecurity, including the ATT&CK framework for documenting adversary behaviors.
MMI (Man-Machine Interface)
▼Historical term for human-machine interfaces, still found on older equipment and documentation, now replaced by HMI for political correctness.
Modbus
▼Open, royalty-free industrial communication protocol originally developed by Modicon, widely adopted due to its simplicity and clear-text format.
Modbus Plus
▼A network communication protocol used for connecting industrial devices and controllers.
Modbus TCP
▼Ethernet version of Modbus that encapsulates traditional Modbus messages within TCP/IP headers, using port 502 for communication.
MPLS (Multi-Protocol Label Switching)
▼A routing technique that directs data from one network node to the next based on short path labels rather than long network addresses.
MPLS (Multiprotocol Label Switching)
▼Wide area networking technology used to connect remote facilities and provide dedicated communication circuits
MPLS Network
▼Multi-Protocol Label Switching network technology commonly used for business communications, often backed up by VSAT.
Multi-Vendor Complexity
▼The integration challenges created when OT systems consist of components from multiple suppliers, requiring coordination between vendors for security updates.
N
12 terms ▼Narrow Band Data
▼Low bandwidth data transmission suitable for telemetry, polling, and small transaction applications typical of VSAT usage.
NERC SIP (North American Electric Reliability Corporation Critical Infrastructure Protection)
▼Regulatory standards requiring specific physical and cybersecurity controls for electric power systems
NetOptics
▼A company that manufactures professional network monitoring and tap devices used for traffic analysis and security monitoring.
Network Isolation
▼The practice of keeping OT systems separate from external networks like the Internet to prevent remote attacks and maintain security boundaries.
Network Miner
▼A specialized analysis tool that extracts and analyzes files, images, and other objects transmitted across networks from packet capture data.
Network Sniffing
▼A technique used to passively monitor network traffic and gain insights into communications without actively probing systems. In industrial environments, this technique can reveal operational data and control commands that traverse the network.
Network Tap
▼A hardware device that provides access to network communications for monitoring and analysis purposes without disrupting normal network operations.
Node Address
▼A unique identifier assigned to each device on a bus network, enabling controllers to communicate with specific instruments.
Non-volatile Memory
▼Memory that retains stored information when power is removed, typically used for storing PLC programs and critical system data.
North-South Traffic
▼Network communications entering or leaving a network, typically between different network zones or external systems.
NTP (Network Time Protocol)
▼Protocol used to synchronize computer clocks across networks, critical for accurate logging and event correlation
Nuisance Trip
▼Unexplained shutdown or safety system activation in industrial control systems, often caused by communication failures.
O
18 terms ▼ODU (Outdoor Unit)
▼The outdoor component of a VSAT system that includes the satellite dish, transceiver/receiver, and weatherproof enclosures.
OEM (Original Equipment Manufacturer)
▼A vendor that provides specific components, devices, or subsystems used in industrial control systems, such as Siemens, Rockwell Automation, or Schneider Electric.
Omni-directional Antenna
▼An antenna that radiates or receives radio frequency energy equally in all horizontal directions, providing 360-degree coverage.
Omnidirectional Antenna
▼Antenna design capable of transmitting and receiving radio signals in a 360-degree pattern, typically used for master stations requiring broad coverage areas.
Onion Layer Model
▼A security architecture concept where the most sensitive systems (crown jewels) are at the center, protected by multiple layers of security controls.
Onion Layer Security Model
▼A security architecture concept where control system devices at the core are protected by multiple layers of security controls, with each layer providing protection for the layers beneath it.
OPC (Open Platform Communications)
▼Standardized interface technology that enables communication between diverse industrial devices and enterprise applications without requiring device-specific drivers.
OPC UA (Unified Architecture)
▼Modern version of OPC that addresses security and platform limitations through built-in encryption, authentication, single-port communication, and platform independence.
Open Source Intelligence (OSINT)
▼The collection and analysis of information from publicly available sources, including websites, social media, public records, and other openly accessible materials. Attackers use OSINT to gather information about target organizations without being detected.
Operational Data
▼Information related to manufacturing processes, control systems, and site operations that could have severe impacts if accessed by unauthorized parties.
Operational Technology (OT)
▼Hardware and software systems that monitor and control physical devices, processes, and infrastructure in industrial environments. OT is distinguished from Information Technology (IT) by its focus on operational processes rather than information processing.
OSINT (Open Source Intelligence)
▼Intelligence gathered from publicly available sources, including websites, social media, news articles, and other information freely accessible on the internet.
OT (Operational Technology)
▼The hardware and software systems used to monitor and control physical processes in industrial environments. OT systems differ from traditional IT systems in that they directly control physical processes and often have different security requirements.
OT Network Core
▼The central switching infrastructure that distributes communications throughout industrial control environments.
OT Vulnerability Assessment
▼Systematic testing of operational technology systems to identify security defects, configuration issues, and hardening opportunities without impacting system performance.
Outdoor Unit
▼Exterior component of VSAT system including dish antenna, transceiver, and weatherproof enclosure.
Output
▼A command or signal from a controller to a device that affects the physical process, such as starting a pump, opening a valve, or displaying information to an operator.
Outside-Inside Approach
▼A testing methodology that begins assessment at the most externally exposed systems and progressively moves toward more sensitive internal systems.
P
54 terms ▼Packet
▼Unit of data transmitted over a network, containing both header information and payload data.
Packet Broker
▼A specialized device that provides advanced traffic filtering and routing capabilities for complex network monitoring scenarios.
Packet Filtering
▼Process of selecting and analyzing specific packets based on criteria such as protocol, IP address, or content.
Packet Squirrel
▼A small network device that sits inline with existing network connections to provide remote access capabilities while appearing as a transparent network component to monitoring systems.
Parity
▼Basic error detection mechanism in serial communication that adds an extra bit to make the total number of 1 bits even (even parity) or odd (odd parity).
Passive Network Tap
▼A simple, unpowered device that enables traffic monitoring but may not capture all network communications reliably.
Passive Scanning
▼Assessment techniques that gather information without sending packets to target devices, minimizing risk of disruption to operational systems.
Passive Taps
▼Simple network tap devices that split network signals without requiring power, though with potential for signal loss.
Passive Techniques
▼Security assessment methods that gather information without actively probing or potentially disrupting target systems, essential for OT environments.
Passive Testing
▼Testing approaches that focus on observing and analyzing systems without generating new network traffic or modifying system states. Passive testing minimizes operational disruption while still providing valuable security insights.
Passive Testing Techniques
▼Security testing methods that involve observing and documenting system configurations, network traffic, and operational parameters without sending probing traffic or attempting to exploit vulnerabilities.
Patching Paradox
▼The difficulty of applying security updates to OT systems due to availability requirements and complexity, making traditional IT patching approaches impractical.
Pay-Per-Use Billing
▼A billing model where users pay for services based on actual usage, such as bandwidth consumption in VSAT systems.
Pay-per-Use Billing
▼Pricing model where costs are based on actual bandwidth consumption rather than flat monthly rates.
Payload
▼Malicious code or commands delivered by an exploit to accomplish the attacker's objective, such as data theft, system control, or destructive actions.
Payment Firewall
▼Commercial Wi-Fi implementation that restricts network access until payment authentication is completed, demonstrating connection state transitions.
PC-based Control
▼Control systems that use general-purpose computers running specialized software instead of dedicated hardware controllers like PLCs.
PCAP (Packet Capture)
▼A file format for storing network traffic data that can be analyzed offline to understand communication patterns and identify security concerns.
Penetration Testing
▼A testing methodology that simulates how motivated attackers with no prior knowledge of the environment might attempt to compromise systems, typically testing defensive capabilities by attempting to move from external networks through corporate systems to industrial control systems.
Penetration Testing (Pentesting)
▼Authorized security testing where human testers simulate real-world attacks to identify vulnerabilities and security gaps in systems and networks.
Persistence
▼The ability to maintain access to compromised systems over extended periods through techniques that survive system reboots, security scans, and routine maintenance activities.
Personal Protective Equipment (PPE)
▼Safety equipment designed to protect workers from workplace hazards. In industrial wireless audits, this may include hard hats, safety glasses, Nomex flame-retardant coveralls, and steel-toed boots, depending on facility hazard levels.
Pharmaceutical Manufacturing
▼Highly regulated production processes that use OT systems to ensure medications are produced with exact specifications and zero tolerance for errors.
Phishing
▼A social engineering attack that uses deceptive communications (typically email) to trick users into revealing sensitive information or installing malware.
Physical Equipment Damage
▼The unique vulnerability of OT systems where cyber attacks can cause physical damage to equipment and infrastructure requiring repair or replacement.
Physical Security
▼The protective measures including surveillance cameras, locks, and alarms that prevent unauthorized physical access to OT systems.
Physical World Impact
▼The tangible, real-world consequences that result from OT system operations or failures, affecting people, property, and the environment.
Pine AP
▼The attack framework used by WiFi Pineapple devices to conduct wireless attacks, including access point impersonation and client exploitation.
PLC (Programmable Logic Controller)
▼An industrial computer designed for reliable control of manufacturing processes and automated systems. PLCs read inputs, execute control logic, and generate outputs in real-time.
Port Scanning
▼An assessment technique that probes network devices to identify open TCP and UDP ports, but which can potentially disrupt industrial control systems not designed to handle simultaneous connection attempts.
POTS Lines
▼Plain Old Telephone Service traditional landline connections often backed up by satellite communication.
PPE (Personal Protective Equipment)
▼Safety equipment required for personnel working in industrial environments, which may include hard hats, safety glasses, fire-resistant clothing, and specialized detection devices.
Pre-shared Key
▼Authentication method using a shared password between clients and access points for network access control.
Pressure Cooker Valve
▼An analogy for OT safety systems that automatically activate when conditions exceed safe parameters, similar to how a pressure cooker valve releases pressure when it becomes too high.
Pressure Sensor
▼A device that measures the force exerted by gases or liquids within containers or systems.
Probe Request/Response Frames
▼Frame types used by client devices to discover available wireless networks and by access points to respond with network information.
Procedures
▼In the MITRE ATT&CK framework, these are real-world examples of how specific techniques have been used by attackers in documented incidents. Procedures provide concrete evidence of how theoretical attack techniques are implemented in practice.
Process Twin
▼The most complex type of digital twin that models entire operational processes such as zero-inventory manufacturing or facility-wide operations, enabling optimization of complex, multi-variable systems.
Product Twin
▼A digital twin that models the interactions between multiple components, such as how an engine, transmission, and braking system work together, enabling analysis of complex system behaviors.
Profibus
▼A fieldbus communication protocol used in industrial automation for connecting field devices to control systems.
Programmable Logic Controller (PLC)
▼Industrial computer that controls manufacturing processes and machinery, often containing firmware and communication interfaces that can present security vulnerabilities.
Protocol Agnostic
▼A characteristic of spread spectrum technology meaning it can carry any communication protocol without altering or affecting the underlying data or protocol structure.
Protocol Gateway
▼Devices that translate between different communication protocols, enabling unified communication with diverse field equipment using different proprietary protocols.
Protocol Hierarchy
▼Organizational structure showing the different network protocols and their relationships in captured traffic.
Protocol Negotiation
▼Process by which Wi-Fi devices agree on communication parameters during connection establishment.
Protocol-Agnostic
▼Technology characteristic allowing spread spectrum to work with any data protocol or communication standard without modification to the underlying communication method.
Proxmark
▼An RFID research and penetration testing device that can read, clone, and emulate various RFID and proximity cards used in access control systems.
Pseudo Noise Generator
▼A component that creates pseudo-random number sequences used in spread spectrum systems to encode and decode wireless communications, with common algorithms including time-based seeds like seconds since 1970.
Pseudo-random Number Generator
▼Algorithm that produces sequences of numbers that appear random but are actually deterministic, used in spread spectrum systems.
Pseudorandom Number Generator
▼Mathematical algorithm that produces sequences of numbers that appear random but are predictable and reproducible when the same seed value is used, essential for synchronizing spread spectrum communications.
Public Source Intelligence
▼Information gathering using only publicly available sources such as websites, social media, professional platforms, and published materials.
Publisher-Subscriber
▼Communication model where publishers continuously broadcast data to all subscribers on the network, typically using UDP for real-time data distribution.
Publisher-Subscriber Model
▼One-way communication architecture where central source distributes content to multiple receiving locations.
Purdue Model
▼A reference architecture model (formalized in ISA-95 and IEC 62443) that defines hierarchical security zones for OT networks from Level 0 (field devices) through Level 5 (internet), specifying that communication should only flow between adjacent levels.
Q
1 term ▼Quality Control Compromise
▼Attacks that subtly alter manufacturing processes to produce defective products without immediately obvious failures.
R
34 terms ▼Ransomware
▼A type of malware that encrypts files and locks users out of systems while demanding payment for restoration.
RAT (Remote Access Tool)
▼Software that allows remote control of computer systems; can be used legitimately by administrators or maliciously by attackers.
Re-association Frames
▼Management frames used when devices move between access points or reconnect after temporary disconnection.
Real-time
▼In industrial contexts, extremely demanding timing requirements such as 4-millisecond fault detection in power systems or 10,000 samples per second in substation automation.
Real-time Operating System (RTOS)
▼An operating system designed to provide predictable response times and deterministic behavior required for industrial control applications.
Reconnaissance
▼The initial phase of an attack where attackers gather information about their target. In industrial environments, reconnaissance activities are often invisible to the target organization and may involve gathering information from public sources.
Red Team
▼A small group of trained experts from multiple disciplines (physical security, cybersecurity, social engineering) who work together to simulate sophisticated, coordinated attacks against organizational defenses.
Red Team Exercise
▼The most comprehensive form of security testing involving multi-faceted attacks that can include physical security breaches, social engineering, network penetration, and other techniques designed to test technical, human, and procedural security elements.
Reduced Function Device
▼Limited Zigbee device providing only basic sensor or actuator functionality without routing capabilities, designed for battery operation with minimal power consumption.
Regulation
▼Mandatory legal requirements issued by governmental or regulatory bodies that asset owners must comply with or face fines, penalties, or operational shutdown. Examples include NERC CIP, FDA regulations, and FERC requirements.
Regulatory Compliance
▼The process of adhering to laws, regulations, and standards that govern OT security and critical infrastructure protection.
Relay Logic
▼The original form of industrial control using electromechanical relays connected with electrical wiring to create logical functions.
Reliability
▼The consistent, uninterrupted operation of critical systems enabled by OT technology, ensuring services like power and water remain available 24/7.
Remote Attack Capability
▼The ability of cyber attackers to target OT systems from anywhere in the world without physical presence, creating a global threat landscape.
Reputational Damage
▼Harm to an organization's reputation and stakeholder confidence resulting from publicized compliance failures or security incidents.
Reverse Engineering
▼The process of analyzing control system operations, logic, and processes to understand how they function. Attackers use reverse engineering to determine how to effectively disrupt or manipulate industrial processes.
RF (Radio Frequency)
▼The portion of the electromagnetic spectrum used for wireless communications, typically measured in megahertz (MHz) or gigahertz (GHz).
RF Spectrum
▼The portion of the electromagnetic spectrum used for radio frequency communications, with specific bands allocated for different purposes including licensed and unlicensed uses.
RFD (Reduced Function Device)
▼Zigbee device with limited capabilities, able to communicate but not coordinate network functions.
RFID (Radio Frequency Identification)
▼A technology that uses radio waves to identify and track objects, commonly used in access control systems and vulnerable to cloning attacks.
RFID Cloning
▼The process of duplicating radio frequency identification cards or badges to gain unauthorized physical access to facilities using specialized reading and writing devices.
Risk
▼The potential that a threat will exploit a vulnerability to cause harm to a system or organization.
Risk-Reward Analysis
▼The process of evaluating whether the benefits of a particular action justify the security risks it creates, often different for OT and IT systems.
RITA (Real Intelligence Threat Analytics)
▼A specialized tool for analyzing network traffic to detect beaconing behaviors and command and control communications.
Rogue Access Point
▼An unauthorized wireless access point installed on a network, either maliciously by an attacker or inadvertently by well-meaning personnel. These devices can create security vulnerabilities by bypassing network security controls and providing unauthorized network access.
Round-Robin
▼Communication pattern where a master device polls slave devices sequentially, communicating with only one device at a time in a predetermined order.
RS-485
▼Multi-drop serial communication standard that enables multiple devices to share a two-wire communication bus, with all devices receiving all messages but only addressed devices responding.
RSPAN (Remote Switch Port Analyzer)
▼A switch feature that enables remote monitoring of network traffic but may impact network performance.
RTS/CTS
▼Request to Send/Clear to Send frame types used for collision avoidance in wireless networks, particularly important in hidden node scenarios.
RTU (Remote Terminal Unit)
▼Industrial control devices that interface with field equipment and communicate with central control systems, typically used in geographically distributed operations.
Rubber Ducky
▼A USB device that appears as a flash drive but registers as a keyboard to execute pre-programmed keystroke sequences, often used to deploy malware or establish remote access.
Rubber Ducky Antenna
▼Omnidirectional short antenna (typically less than 10 inches) commonly used in cellular modem applications.
Rules of Engagement
▼Formal documentation that describes what attacking teams can do, what defending teams can do, what systems should never be touched, and what actions are prohibited during security testing.
Rung
▼A single line of ladder logic that represents a complete logical statement, with power flowing from left to right when conditions are satisfied.
S
56 terms ▼Safety Systems
▼OT systems that continuously monitor critical parameters and automatically implement protective measures when conditions approach dangerous thresholds.
SCADA (Supervisory Control and Data Acquisition)
▼A centralized control system architecture designed for monitoring and controlling geographically dispersed assets such as oil wells, water pumps, or electrical substations from a central control room.
SCADA Pack
▼A compact RTU designed for basic data collection and totalization functions in small industrial applications.
SCADA Terminal
▼Supervisory Control and Data Acquisition system endpoint where operators monitor and control industrial processes.
Scan Cycle
▼The continuous process by which a PLC reads inputs, executes the control program, updates outputs, and performs communication tasks.
Scenario Building
▼The process of creating realistic attack narratives that define red team motivations, capabilities, objectives, and constraints to frame exercise activities and success criteria.
Schlumberger
▼Oil services company that co-developed first Ku band VSAT system with Hughes Aerospace for oilfield operations.
Scope Consideration Framework
▼A strategic approach to selecting testing methodologies based on whether the focus is organizational processes, systems and networks, or specific products and applications.
Scope Creep
▼Unauthorized expansion of testing boundaries during project execution, either by testing teams seeking new challenges or vendors seeking increased revenue.
SDR (Software Defined Radio)
▼Radio communication system where components traditionally implemented in hardware are instead implemented in software.
Second Line of Defense
▼Risk management and compliance teams responsible for risk oversight, security governance, and policy compliance. These teams often provide support and guidance to operational teams while maintaining oversight responsibilities.
Security Onion
▼A comprehensive open-source platform that integrates multiple security tools for intrusion detection and network analysis.
Security Testing Devices
▼Automated devices that can be deployed to perform wireless attacks or security assessments without manual operation.
Sensor
▼A device that measures physical conditions such as temperature, pressure, flow, level, vibration, or position and provides this information as an input to control systems.
Service Set Identifier (SSID)
▼The name assigned to a wireless network that identifies it to users and devices. SSIDs can be broadcast publicly or hidden, and their analysis forms a crucial component of wireless discovery and security assessment.
Shamoon Attack
▼A 2012 malicious insider attack at Saudi Aramco where three system administrators deployed destructive malware to 30,000 computers, causing massive operational disruption.
Shared Operator Accounts
▼Authentication credentials that are shared among multiple operators for safety reasons, typically with compensating physical security controls.
Shared Responsibility
▼The principle that regulatory compliance requires participation from all employees who interact with OT systems, not just compliance specialists.
Shared Responsibility Model
▼The approach to OT security where everyone who interacts with these systems contributes to their protection, rather than relying solely on technical specialists.
Shodan
▼A search engine that indexes internet-connected devices and systems, allowing users to discover exposed infrastructure, services, and potential vulnerabilities.
Signal Strength
▼The power level of a radio frequency signal, typically measured in decibels (dBm) and used to determine wireless coverage quality.
SIM (Subscriber Identity Module)
▼A card used in cellular systems to identify and authenticate users on cellular networks.
SIM Card
▼Subscriber Identity Module used in cellular systems for authentication and network access.
SIS (Safety Instrumented System)
▼An independent control system that monitors the main process control system and automatically intervenes to maintain safe conditions if the primary control system fails or if the process enters dangerous parameters. SIS acts as a safety net, like a lifeguard watching over the primary system.
SIS (Safety Instrumented Systems)
▼Independent control systems designed to ensure processes remain in safe states, activating only when conditions could harm personnel, equipment, or the environment.
Site Acceptance Test (SAT)
▼Testing conducted at customer facilities to verify that systems function properly in their operational environment. The course emphasizes integrating cybersecurity testing into SAT processes to ensure systems are secure before commissioning.
Six Walls of Protection
▼NERC CIP requirement that critical cyber assets must be physically protected by six walls (typically an equipment cabinet) with controlled access and monitoring.
Smart Grid
▼An enhanced electrical grid infrastructure that incorporates bi-directional digital communications with intelligent devices, enabling real-time monitoring, demand response, and automated control.
Smishing
▼SMS-based phishing attacks that use text messages to deliver malicious links or social engineering content to mobile device users.
SNMP (Simple Network Management Protocol)
▼Network protocol used for collecting information and configuring network devices remotely
SOC (Security Operations Center)
▼A centralized facility where security professionals monitor, detect, analyze, and respond to cybersecurity incidents.
Social Engineering
▼The manipulation of human psychology and conventional social interactions to elicit desired responses such as providing access, information, or assistance to unauthorized individuals.
Soft PLC
▼Software that emulates PLC functionality on general-purpose computers, enabling the same control logic to run in virtualized environments.
Software Defined Radio
▼A radio communication system where traditional hardware components are implemented in software, enabling flexible analysis and implementation of various wireless technologies.
SPAN Port
▼Switch port configured to mirror traffic from other ports, enabling passive network monitoring without interrupting communications
Span Port
▼A network switch port configured to mirror traffic from other ports, enabling passive monitoring and analysis without disrupting normal network operations.
SPAN Port (Switch Port Analyzer)
▼A switch feature that mirrors traffic from other ports to enable monitoring without disrupting normal operations.
Spear Phishing
▼Highly targeted email attacks directed at specific individuals using personalized information and realistic pretexts to increase the likelihood of successful credential theft or malware deployment.
Spectrum Analyzer
▼A test instrument used to examine the spectral composition of radio frequency signals. In wireless audits, spectrum analyzers help identify active frequencies, signal strength, and potential interference sources across different RF bands.
Spread Spectrum
▼Technology that distributes signal energy across multiple frequencies using pseudorandom codes, providing benefits including frequency reuse, jamming resistance, signal hiding, and bandwidth sharing.
Spreading Code
▼A pseudo-random sequence used in spread spectrum systems to encode data before transmission and decode it after reception, known only to authorized transmitters and receivers.
SSID (Service Set Identifier)
▼A network name that identifies a specific Wi-Fi network, with all devices joining the same SSID using the same spreading codes and pseudo noise generators.
SSID Cloning
▼A wireless attack technique where attackers create fake access points using the same name as legitimate networks to intercept user communications.
Stakes Differential
▼The higher consequences of OT security failures compared to IT security failures, including potential safety hazards and environmental damage.
Standard
▼Voluntary guidelines and best practices developed by organizations like ISO, ISA, IEC, IEEE, and NIST that provide recommendations for designing, implementing, and securing systems. Compliance with standards is optional but demonstrates due diligence.
Standards vs. Regulations
▼The distinction between voluntary best practices (standards) and mandatory requirements with enforcement mechanisms (regulations).
StarLink
▼Modern satellite internet constellation providing global broadband coverage using advanced VSAT technology.
Stuxnet
▼Sophisticated malware campaign targeting Siemens industrial control systems, particularly uranium enrichment centrifuges, demonstrating the first widely-documented cyber weapon designed for physical destruction.
Subdomain
▼A subdivision of a larger domain name, typically used to organize different services or sections of a website (e.g., mail.example.com).
Supervisory Control
▼High-level monitoring and control performed from a central location (such as a control room) over multiple field controllers or remote sites, typically via SCADA systems.
Supply Chain Attack
▼Cyber attack method targeting less-secure elements in the supply chain to gain access to primary targets, including compromising software or hardware during development or manufacturing processes.
Suspicious Activity
▼Any unusual behavior or activity that could indicate security threats, including both malicious actions and innocent mistakes.
Syncom
▼NASA's first geosynchronous satellite communication system (Syncom 1-3) that transmitted 1964 Olympics coverage.
System
▼In the context of ICS, all the supporting infrastructure that allows industrial control to operate, including sensors, actuators, networks, protection devices, and communication systems.
System Twin
▼A digital twin that models larger, complex environments such as entire facilities or interconnected processes, enabling analysis and optimization at a systems level.
Systems Integrator
▼A company responsible for combining components from multiple OEM vendors into a complete, functioning control system by programming controllers, building networks, creating HMIs, and conducting acceptance testing.
T
33 terms ▼Tabletop Exercise
▼A discussion-based exercise that simulates security incidents or emergencies in a low-risk environment, allowing teams to practice response procedures and identify gaps in preparedness without impacting operational systems.
Tactics
▼High-level objectives or organizational categories that represent the strategic goals that attackers pursue during their campaigns against industrial systems. In the MITRE ATT&CK framework, tactics serve as the primary organizational structure.
Tag Database
▼The configuration system that maps field device addresses to HMI display elements, including scaling parameters, alarm limits, and display characteristics.
Tailgating
▼The practice of unauthorized individuals following authorized personnel through secure entrances without proper authentication.
TCP Dump
▼A command-line packet analyzer that enables capture and analysis of network traffic with better performance characteristics than GUI-based tools for high-volume industrial networks.
TCP/UDP Ports
▼Communication endpoints that allow different network services to operate on the same system, identified by numerical values (e.g., port 80 for HTTP, port 502 for Modbus).
TCPDump
▼Lightweight command-line packet capture utility suitable for resource-constrained deployments.
TeamViewer
▼Legitimate remote access software that can be misused by attackers to maintain persistent access to compromised systems.
Technical Limitations
▼The constraints in OT environments that prevent many automated security approaches used in IT systems, requiring greater human involvement.
Techniques
▼The specific methods or approaches that adversaries employ to achieve their tactical objectives. Each tactic in the MITRE ATT&CK framework contains multiple techniques that represent different ways of accomplishing the same strategic goal.
Technology and Vulnerability Drift
▼The natural process by which secure systems become vulnerable over time as new attack techniques emerge, operating systems evolve, and security configurations appropriate for older systems become inadequate for newer environments.
Telemetry
▼Automated remote measurement and transmission of data from distant sources to receiving equipment for monitoring purposes.
Ten-Foot Rule
▼Security awareness practice of acknowledging and greeting unknown individuals within ten feet, making eye contact, and asking helpful questions about their purpose and authorization.
Testing
▼The activity of identifying vulnerabilities, software bugs, or security flaws in systems, typically using either automated tools or manual approaches. Testing is exploratory in nature, looking for unknown problems.
Third Line of Defense
▼Independent assurance functions, typically internal audit teams, that provide independent validation of security controls and report directly to executive leadership and boards of directors.
Third-Party Provider
▼External companies that provide communication services, creating dependencies that must be managed in industrial applications.
Threat
▼Potential source of danger or harm to organizational assets, including malicious actors, natural disasters, system failures, or human errors that could exploit vulnerabilities.
Threat Actor
▼Individual, group, or organization responsible for cyber attacks, ranging from individual hackers to sophisticated nation-state sponsored groups with varying motivations and capabilities.
Three Lines of Defense
▼Governance model identifying operational management (first line), risk management/compliance (second line), and independent assurance/audit (third line) as distinct roles in organizational risk management.
Three-Phase Strategic Approach
▼A methodical testing progression that begins with external penetration testing, progresses to internal penetration testing, and concludes with ICS vulnerability assessment, mirroring real-world attack patterns.
Three-Phase Testing Approach
▼A systematic methodology for OT security testing that progresses from external penetration testing to internal penetration testing to ICS vulnerability assessment.
Three-Stage Process
▼Specific sequence of steps required for Wi-Fi connection establishment, each with distinct security implications.
Three-State Connection Model
▼Wi-Fi connection framework progressing through unauthenticated/unassociated, authenticated/unassociated, and authenticated/associated states.
Throwing Star
▼An unpowered network tap device that provides passive network monitoring capability without requiring external power sources.
Top-Down Testing Approach
▼A methodology for ICS vulnerability assessment that starts with systems at the highest level of network architecture and works down toward field devices, following the same path external attackers would take.
Traffic Light Optimization
▼An example of OT efficiency where sensors and algorithms dynamically adjust signal timing based on real-time traffic conditions and historical patterns.
Transceiver
▼Combined transmitter and receiver component in VSAT outdoor unit for bidirectional satellite communication.
Transitory Cyber Assets
▼Portable devices such as laptops, smartphones, USB drives, and tablets that can be brought into operational environments from external networks, potentially carrying malware infections.
Transmitter
▼A device within sensors that converts physical measurements into standardized electrical signals for transmission to control systems.
TShark
▼A command-line network protocol analyzer that can be used to capture and analyze network traffic. In industrial environments, TShark can help attackers understand communication patterns and identify valuable information transmitted over the network.
TTP (Tactics, Techniques, and Procedures)
▼Behavioral patterns and methods used by threat actors to plan, execute, and sustain cyber attacks, providing insights for defensive planning and threat hunting.
TTPs (Tactics, Techniques, and Procedures)
▼The behavior patterns used by adversaries in cyber attacks, described in frameworks like MITRE ATT&CK.
Tunnel Ownership
▼The principle that organizations should control both ends of encrypted communication tunnels to maintain security.
U
6 terms ▼Unauthorized Changes
▼Modifications to OT systems or processes that have not been approved through proper channels, potentially creating security or safety risks.
Unlicensed Spectrum
▼Radio frequency bands (900 MHz, 2.4 GHz, 5.6 GHz, 6 GHz) available for public use without requiring specific authorization, similar to private IP address ranges in networking.
Unlicensed Wireless System
▼A wireless communication system that operates in frequency bands designated for general use without requiring specific government licenses, typically using spread spectrum technology.
Unmanaged Network
▼Network using basic layer 2 switches without configuration logic that only forward traffic to intended ports.
Upstream
▼In the oil and gas industry, the exploration and production phases, which can occur offshore or onshore.
USB (Universal Serial Bus)
▼A standard interface for connecting devices to computers, commonly exploited in attacks due to automatic device recognition and trust relationships.
V
11 terms ▼Verification
▼A security discipline focused on confirming that security specifications and controls have been properly implemented, typically involving code reviews, configuration audits, or formal inspections against established standards.
VLAN (Virtual Local Area Network)
▼A network segmentation technology that allows logical separation of network traffic while using the same physical infrastructure.
VLAN Tagging
▼Virtual Local Area Network segmentation technique using identifier tags to separate different types of network traffic on shared infrastructure.
Volatile Memory
▼Memory that loses stored information when power is removed, used for high-speed program execution and real-time data processing in PLCs.
VPN (Virtual Private Network)
▼A secure connection that encrypts data transmitted over an insecure network, providing privacy and security for wireless communications.
VPN Acceleration
▼Compression and optimization techniques improving virtual private network performance over high-latency connections like satellite links.
VSAT (Very Small Aperture Terminal)
▼A satellite communication technology that uses relatively small satellite dishes (typically less than 3 meters) to provide communication capabilities.
Vulnerability
▼Weakness, flaw, or deficiency in system design, implementation, or configuration that could be exploited by threats to cause harm to organizational operations or assets.
Vulnerability Assessment
▼A systematic approach to identifying security defects in systems and opportunities to improve security configurations, typically using automated tools and manual techniques to catalog potential security issues.
Vulnerability Scanner
▼Software that combines port scanning with vulnerability database correlation to identify specific security weaknesses, but which can be disruptive to industrial control systems.
VxWorks
▼A real-time operating system commonly used in embedded industrial control devices.
W
25 terms ▼War Dialing
▼An attack technique that systematically dials phone numbers to identify modems and other remote access systems that could provide unauthorized network access.
War Driving
▼The practice of searching for wireless networks while moving in a vehicle, bicycle, or on foot. This technique enables comprehensive coverage of large facilities and helps map the geographic distribution of wireless signals.
Waste Reduction
▼The ability of OT systems to identify and eliminate sources of waste through continuous monitoring and process optimization.
Water Treatment Facility
▼Critical infrastructure that uses OT systems to monitor water quality, control treatment processes, and ensure safe drinking water for communities.
WEP (Wired Equivalent Privacy)
▼An obsolete wireless security protocol that provides weak encryption and is easily compromised.
White Box Testing
▼Penetration testing approach where organizations provide comprehensive information about target environments to reduce safety risks while enabling deeper security evaluation.
Wi-Fi Alliance
▼Nonprofit organization formed in 1999 to maintain wireless networking standards and ensure interoperability between vendors.
Wi-Fi Pineapple
▼A wireless attack platform that clones legitimate wireless access points to capture user credentials and communications through man-in-the-middle techniques.
Wi-Fi Protected Access (WPA)
▼Security protocol developed as WEP replacement but quickly compromised, leading to WPA2 development.
Wi-Fi Protected Access (WPA/WPA2/WPA3)
▼Security protocols designed to secure wireless networks. WPA3 represents the current standard with enhanced encryption and security features, while earlier versions (WPA, WPA2) have known vulnerabilities that make them less suitable for security-sensitive environments.
Wi-Fi Protected Setup (WPS)
▼A network security standard designed to simplify the connection of devices to wireless networks. While convenient, WPS has known security vulnerabilities that make it unsuitable for long-term wireless security in industrial environments.
Wi-Spy
▼A commercially available USB spectrum analyzer device from MetaGeek that enables RF spectrum analysis when connected to laptop computers.
WiFi Pineapple
▼A wireless audit platform used for network penetration testing and security research, capable of conducting various wireless attacks including SSID cloning and client exploitation.
Wired Equivalent Privacy (WEP)
▼An early wireless security protocol that has been deprecated due to significant security vulnerabilities. Often referred to as "Welcome Everyone to the Party" due to its ease of exploitation.
Wireless Audit
▼A specialized security assessment that identifies and evaluates all wireless technologies deployed in industrial environments, including Wi-Fi, spread spectrum communications, and wireless I/O systems.
Wireless Fidelity
▼Original name for Wi-Fi technology before abbreviation, emphasizing the goal of reliable wireless networking.
Wireless HART
▼A wireless mesh network communication protocol designed for process automation applications. Built on the proven HART protocol foundation, it enables wireless communication between field devices and control systems using 802.15.4 radio technology.
Wireless I/O
▼Industrial wireless communication systems used to connect remote sensors and actuators to control systems, often using protocols like ISA 100.11A or proprietary RF systems.
Wireless Man-in-the-Middle
▼Specific attack technique targeting wireless communications to intercept and potentially modify data transmissions.
Wireless Sensor Network
▼A network of sensors and/or actuators that communicate via wireless protocols rather than hardwired connections, reducing installation costs for distributed devices.
WirelessHART
▼The first industry standard for wireless communications in industrial control systems, developed by the HART Communication Foundation to extend wired HART protocol capabilities to wireless applications.
Wireshark
▼A network protocol analyzer that allows users to capture and analyze network traffic in real-time. In industrial cybersecurity, Wireshark can be used both by attackers to understand network communications and by defenders to monitor network activity.
WPA (Wi-Fi Protected Access)
▼A security protocol for wireless networks, with WPA, WPA2, and WPA3 representing successive generations of improved security.
WPA/WPA2 (WiFi Protected Access)
▼Wireless security protocols that replaced WEP, providing stronger encryption and authentication mechanisms for wireless networks.
WPS (Wi-Fi Protected Setup)
▼A network security standard that allows easy establishment of secure wireless connections, though it has known vulnerabilities.
X
1 term ▼XM Radio
▼Example of receive-only satellite service delivering audio content to mobile receivers in vehicles.
Y
2 terms ▼Yagi Antenna
▼A directional antenna that provides focused signal transmission and reception in a specific direction, typically used in point-to-point wireless communications requiring long range.
Yasager
▼Early wireless attack platform based on modified router firmware, predecessor to more advanced tools like the WiFi Pineapple.
Z
6 terms ▼Zero Day
▼A vulnerability in software or hardware that is unknown to the vendor and for which no patch or fix is available.
Zero-Day Exploit
▼Attack that takes advantage of previously unknown vulnerabilities for which no patches or protective measures exist, providing attackers temporary advantage before defenses can be developed.
Zero-Install
▼Portable software versions that run without permanent installation, though may still require system modifications.
Zero-Knowledge Testing Approach
▼A penetration testing methodology where testing teams receive only basic information like company name and domain, with no network diagrams or insider knowledge, mirroring how real attackers would approach the target.
Zigbee
▼A wireless communication standard based on 802.15.4 that enables low-power, low-data-rate communication between devices in a mesh network topology. Commonly used in industrial sensor networks, smart lighting systems, and IoT applications due to its low power consumption and self-healing network capabilities.
Zone
▼In the Purdue Model, a defined security area where devices with similar trust levels, functions, and security requirements reside. Zones are separated by controlled conduits.

Copyright © 2025
