OThello
خدمات
المنتجات
الصناعات
الموارد
الشركة
طلب نسخة تجريبية
Select Language
Arabic (UAE)
OThello
خدمات
المنتجات
الصناعات
الموارد
الشركة
طلب نسخة تجريبية
Select Language
Arabic (UAE)
التهديد المستمر المتقدم (APT)
Glossary Terms & Definitions
All
A
B
C
D
E
F
G
H
I
L
M
N
O
P
R
S
T
U
V
W
X
Z
A
Access Control
Active Directory (AD)
Actuator
Advanced Persistent Threat (APT)
Air Gap
Alarm Management
Asset Discovery
Asset Inventory
Attack Surface
B
BACnet
Basic Process Control System (BPCS)
BlackEnergy
Bootloader Security
Building Management System (BMS)
Bulk Electric System (BES)
C
CIP Safety
Command Injection
Common Industrial Protocol (CIP)
Compensating Control
Configuration Management
Continuous Threat Detection (CTD)
Control Network
Control Systems Zone
Cyber-Physical System (CPS)
Cyber Process Hazard Analysis (CyberPHA)
Cybersecurity Capability Maturity Model (C2M2)
D
Data Diode
Data Historian
Deep Packet Inspection (DPI)
Defense-in-Depth
DeviceNet
Distributed Control System (DCS)
Distributed Network Protocol 3 (DNP3)
E
East-West Traffic
Edge Computing Security
Electronic Security Perimeter (ESP)
Emergency Shutdown System (ESS)
Engineering Workstation (EWS)
EtherNet/IP
F
Fail-Safe
Fieldbus
File Integrity Monitoring (FIM)
FOUNDATION Fieldbus
Functional Safety
G
Gateway
H
Hardening
Hardware Safety Integrity
Highway Addressable Remote Transducer (HART)
Human-Machine Interface (HMI)
I
IEC 61508
IEC 61850
IEC 62443 (ISA/IEC 62443)
Incident Command System (ICS)
Industroyer
Industrial Automation and Control Systems (IACS)
Industrial Control System (ICS)
Industrial Demilitarized Zone (IDMZ)
Industrial Firewall
Industrial Internet of Things (IIoT)
Industrial Secure Remote Access (I-SRA)
Insider Threat
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
IT/OT Convergence
L
Lateral Movement
Layer of Protection Analysis (LOPA)
Least Privilege
Legacy Systems
Level 0 (Physical Process)
Level 1 (Basic Control)
Level 2 (Supervisory Control)
Level 3 (Manufacturing Operations)
Level 3.5 (DMZ)
Level 4 (Enterprise Network)
Level 5 (Corporate IT)
Logic Injection
M
Management of Change (MOC)
Man-in-the-Middle (MitM)
Master Terminal Unit (MTU)
Micro-segmentation
Mitre ATT&CK for ICS
Modbus
Modbus RTU
Modbus TCP/IP
MTConnect
N
NERC CIP
NERC CIP-002
NERC CIP-005
Network Segmentation
NIST SP 800-82
North-South Traffic
O
OLE for Process Control (OPC)
OPC Unified Architecture (OPC UA)
Operational Disruption
Operational Technology (OT)
Operator Workstation (OWS)
OTAR (Over-The-Air Rekeying)
P
Passive Network Monitoring
Patch Management
Penetration Testing
Physical Process Zone
Privilege Escalation
Process Control Network (PCN)
Process Hazard Analysis (PHA)
Profibus
Profinet
Programmable Automation Controller (PAC)
Programmable Logic Controller (PLC)
Purdue Enterprise Reference Architecture (PERA)
Purdue Model
R
Ransomware as a Service (RaaS)
Remote Access Trojan (RAT)
Remote Privileged Access Management (RPAM)
Remote Terminal Unit (RTU)
Routable Protocol
S
Safe State
Safety Function
Safety Instrumented Function (SIF)
Safety Instrumented System (SIS)
Safety Integrity Level (SIL)
SCADA Server
Secure by Design
Secure Remote Access (SRA)
Security Level (SL)
Segment
Site-Wide Control
Smart Grid
Stuxnet
Supervisory Control and Data Acquisition (SCADA)
Supply Chain Attack
Synchrophasor
System Integrity
T
Target Security Level (SL-T)
Telemetry
Threat Actor
Threat Hunting
Threat Intelligence
TriStation
U
Unidirectional Gateway
Unified Namespace
V
Verification and Validation
Virtual Zone
Vulnerability Assessment
W
WannaCry
WITS (Water Industry Telemetry Standard)
X
XIoT (Extended Internet of Things)
Z
Zero Day Exploit
Zero Trust
Zero Trust Network Access (ZTNA)
Zone and Conduit
احجز استشارتك اليوم!
‹
›
×