Claroty's CPS Security Glossary includes industry terms and definitions, along with additional resources, that provide a foundational understanding of multiple components of cybersecurity.
Active monitoring works by sending test traffic into the network and polling endpoints with which it comes into contact. By sending packets directly to endpoints, active scanning can be faster in collecting data, but this also increases the risk of endpoint malfunction by pushing incompatible queries to them or saturating smaller networks with traffic.
The Cyber-Physcial Systems (CPS) Protection Platform (PP) market is defined by Gartner as “products and services that use knowledge of industrial protocols, operational/production network packets or traffic metadata, and physical process asset behavior to discover, categorize, map and protect CPS in production or mission-critical environments outside of enterprise IT environments.”
The XIoT refers to all connected assets that underpin cyber-physical systems (CPS) in industrial, healthcare, and commercial environments. It has emerged as a side effect of digital transformation and, thus, has escalated interconnectivity between the internet and assets that control physical processes.
Human Machine Interface (HMI) is a user interface or dashboard that connects a person to a machine, system, or device. While the term can technically be applied to any screen that allows a user to interact with a device, HMI is most commonly used in the context of an industrial process.
Indicators of Compromise (IoCs) is forensic evidence of potential intrusions on a host system or network.
Industrial control systems can be defined as a collection of hardware and software systems, networks, and controls that are designed to monitor, control, operate, and/or automate industrial processes. These systems are present in various different critical infrastructure industries including chemical, electric, oil & gas, manufacturing, transportation, and more.
Operational efficiency in healthcare refers to the effectiveness and competency in which a healthcare delivery organization (HDO) optimizes their resources and processes to deliver high-quality services to patients in a timely, cost-effective manner. It involves improving patient satisfaction, utilizing technologies effectively, reducing waste, streamlining processes, coordination among staff, and making data-driven decisions.
The Purdue Model was designed as a reference model for data flows in computer-integrated manufacturing (CIM). CIM is a manufacturing approach of using computers to control the entire production process — allowing operations to be faster and less error-prone. This model later came to define the standard for building an ICS network architecture that supports OT security by separating the layers of the network.
Security Operations Center (SOC) is an organized and highly skilled team whose mission is to continuously monitor and improve an organization's security posture while preventing, detecting, analyzing, and responding to cyber security incidents with the aid of both technology and well-defined processes and procedures.
Also known as perimeterless security, Zero Trust architecture emerged as an alternative to the perimeter-based security model, which was quickly rendered outdated as digital transformation and remote access were widely adopted across virtually all sectors. While Zero Trust originally pertained mainly to IT assets, the rapid digitization of operational technology (OT), medical devices, and other cyber-physical systems have made Zero Trust a fundamental best practice for securing the Extended Internet of Things (XIoT).
Want to learn more about how the Claroty Platform can empower your CPS cybersecurity journey?