Slovak national Computer Emergency Response Team.
  • Contacts
  • Report an incident
  • Text version
  • Graphic version
  • Slovenčina
www.nbu.gov.sk   www.slovensko.sk
  • About Us
  • Services
  • Statistics
  • Publications
  • Tips and Tricks
  • Legislation
  • Tips and Tricks
  • Responsible Vulnerability Disclosure Guideline
  • Security of Operational Technology Systems
    • Technological and Functional Difference between IT and OT
    • Myths and Superstitions
    • Concepts and Standards for Cybersecurity of OT Systems
    • Recommendations for Energy Sector
    • Frequently Asked Questions
  • When to Contact Us
  • Report an Incident
  • Security Recommendations
    • Online Safety Basics
      • What to Do if You Are a Victim
      • Spam
      • Phishing
      • Malicious E-mail
      • Spam and Phishing on Social Networks
      • Tips for Avoiding Being a Victim
    • Securing Accounts and Devices
      • Passwords and Securing Your Accounts
      • Hacked Accounts
      • Social Media Platforms
      • Securing Your Home Network
    • Data Backup
      • Cloud
    • Privacy Protection
      • Tips to Manage Your Privacy
    • Online Shopping
      • Shopping on the Go
      • Online Shopping Tips
      • Basic Safety and Security Tips
    • Mobile Devices
    • Malware and Botnets
      • Botnets
      • Ransomware
      • Spyware
      • Virus
      • Protection against Malware
    • Identity Theft, Fraud and Cybercrime
      • Identity Theft and Fraud
      • Cyberbullying and Harassment
  • Business Organizations
    • Asset Identification
    • Asset Protection
    • Incident Detection
    • Incident Response
    • Recovery
  • Teens
    • Tips for Teens
    • Tips for Parents
    • Parental Controls
  • Seniors
    • Tips for Seniors

Myths and Superstitions

This part contains the most common responses to the topic of cybersecurity of OT systems. Many responses come from the past, low knowledge of the issue, or simply from underestimating the significance and importance of addressing cybersecurity.

Myth No. 1

“till now we haven’t needed it and nothing has happened“… we add “yes, but only so far”. Implementation of new technologies for industrial control systems based on microprocessor solutions and emergence of new types of malicious codes (malware) inevitably require to address cybersecurity.

  • More information in Security of Industrial Operational Technology Systems

Myth No. 2

“we have a separate LAN technology that is secured by a firewall”. Separation of LAN networks through a separate firewall is currently insufficient as statistics show that about 80% of cyberattacks are “from inside”, what means that a malicious code is infiltrated via a direct connection to an internal LAN network or even via a direct connection to end devices of OT systems. The reasons therein may be also common, whether the activity is intentional or unintentional, such as service works, planned changes on devices, and so on. Effective and proven security is ensured by thorough implementation of the principles described in the defense-in-depth concept in each end device of OT systems.

Note: At present, each end device of IT system (computer, server, notebook,…) has its own separate firewall, antivirus and encryption functions implemented. However, most current OT devices do not contain such functions.

  • More information in Recommendations for Energy Sector

Myth No. 3

“our systems are secured with usernames and passwords”. Currently using only a username and a password no longer provides a sufficient level of security for OT systems. The fact is that the process of assigning and managing login names and passwords is based on the “human factor” and brings vulnerabilities into the system. The solution is to implement the principles described in the defense-in-depth concept.

  • More information in Recommendations for Energy Sector

Myth No. 4

“our IT staff deals with it”. A typical reaction reflecting a low knowledge of differences between IT and OT systems or the human quality  “to pass the problem on somebody else’s shoulders”. Cybersecurity of IT and OT systems is very similar in basic features. Nevertheless, OT systems have their own particularities exceeding IT requirements. Moreover, OT devices do not belong to the management and maintenance of IT engineers.

  • More information in Technological and Functional Difference between IT and OT

Cybersecurity of OT systems requires a comprehensive approach and needs to be solved at the level of internal processes, competences and responsibilities, and the organizational structure will be adjusted accordingly.

Myth No. 5

“manufacturers of OT systems declare that they have everything under control“. It is another typical response like “one lady said…” or “paper does not blush” (with the meaning that paper will bear anything that is written on it) or “no one can give you as much as I can promise you”. The truth is that we face the pressure of misinformation, half-truths and compromised information. We also experience cases in which a manufacturer submits a cybersecurity certificate issued by himself.

First publication 04. 6. 2020. Last update 04. 6. 2020 15:12
Current threats
Current threats

SK-CERT Bezpečnostné varovanie V20250520-08

Dôležitosť Kritická Klasifikácia Neutajované/TLP:CLEAR CVSS Skóre 10.0 Identifikátor Pluginy redakčného systému WordPress – ...20. May 2025

SK-CERT Bezpečnostné varovanie V20250520-07

Dôležitosť Kritická Klasifikácia Neutajované/TLP:CLEAR CVSS Skóre 9.8 Identifikátor Jenkins produkty – dve kritické ...20. May 2025

SK-CERT Bezpečnostné varovanie V20250520-06

Dôležitosť Kritická Klasifikácia Neutajované/TLP:CLEAR CVSS Skóre 10.0 Identifikátor Schneider Electric produkty – dve ...20. May 2025
all publications
CVEs
Tweets by sk_cert
Links
Links
  • ENISA
  • CERT
  • Trusted Introducer
  • FIRST
Copyright © 2025 All rights reserved - Last update 06. 06. 2025 11:44
  • Sitemap
  • Declaration of accessibility
  • Technical support
  • Content
  • Contacts
  • Report an incident
  • RSS