2016 49th Hawaii International Conference on System Sciences (HICSS) 2016
DOI: 10.1109/hicss.2016.331
|View full text |Cite
|
Sign up to set email alerts
|

IT vs. OT Security: A Time to Consider a Change in CIA to Include Resilienc

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(11 citation statements)
references
References 1 publication
0
9
0
2
Order By: Relevance
“…Some key differences between IT and OT security revolve around the risks associated with loss of operation, asset availability, communication latency, architectural differences and contingency management strategies [122]- [124].…”
Section: Risk Assessment Methodologymentioning
confidence: 99%
“…Some key differences between IT and OT security revolve around the risks associated with loss of operation, asset availability, communication latency, architectural differences and contingency management strategies [122]- [124].…”
Section: Risk Assessment Methodologymentioning
confidence: 99%
“…For example, as noted by Ladkin and others, some computer evidence would satisfy what they termed the 'Tapper Condition' i.e., having immediately discernible flaws/faults due to their simplistic nature (2020). A lot of these are Operational Technology systems, which are hardware and software that monitor or regulate physical processes (Conklin, 2016) such as speedometers, and unlike Information Technology systems, ascertaining their reliability is relatively easier (Ladkin, and others, 2020). In view of this reality, it is problematic to treat all forms of eevidence identically with respect to preconditions for admissibility.…”
Section: Unique Challenges For E-evidencementioning
confidence: 99%
“…However, it also comes with many challenges which must be surpassed-cybersecurity being crucial. Massive digitalization of industrial processes, growing convergence between information technologies (IT) and operational technologies (OT), the increasing interconnectivity of the different systems are the main reasons for cybersecurity being a challenge [5][6][7][8][9][10][11]. For example, cyber-attacks are a significant incident.…”
Section: Introductionmentioning
confidence: 99%