Slovak national Computer Emergency Response Team.
  • Contacts
  • Report an incident
  • Text version
  • Graphic version
  • Slovenčina
www.nbu.gov.sk   www.slovensko.sk
  • About Us
  • Services
  • Statistics
  • Publications
  • Tips and Tricks
  • Legislation
  • Tips and Tricks
  • Responsible Vulnerability Disclosure Guideline
  • Security of Operational Technology Systems
    • Technological and Functional Difference between IT and OT
    • Myths and Superstitions
    • Concepts and Standards for Cybersecurity of OT Systems
    • Recommendations for Energy Sector
    • Frequently Asked Questions
  • When to Contact Us
  • Report an Incident
  • Security Recommendations
    • Online Safety Basics
      • What to Do if You Are a Victim
      • Spam
      • Phishing
      • Malicious E-mail
      • Spam and Phishing on Social Networks
      • Tips for Avoiding Being a Victim
    • Securing Accounts and Devices
      • Passwords and Securing Your Accounts
      • Hacked Accounts
      • Social Media Platforms
      • Securing Your Home Network
    • Data Backup
      • Cloud
    • Privacy Protection
      • Tips to Manage Your Privacy
    • Online Shopping
      • Shopping on the Go
      • Online Shopping Tips
      • Basic Safety and Security Tips
    • Mobile Devices
    • Malware and Botnets
      • Botnets
      • Ransomware
      • Spyware
      • Virus
      • Protection against Malware
    • Identity Theft, Fraud and Cybercrime
      • Identity Theft and Fraud
      • Cyberbullying and Harassment
  • Business Organizations
    • Asset Identification
    • Asset Protection
    • Incident Detection
    • Incident Response
    • Recovery
  • Teens
    • Tips for Teens
    • Tips for Parents
    • Parental Controls
  • Seniors
    • Tips for Seniors

Technological and Functional Difference between IT and OT

Today, anybody of us can no longer imagine a life without technological achievements such as personal computers, mobile phones, the Internet and other devices using modern IT technologies. In relation to these devices, cybersecurity can be perceived as their integral part. Functions such as firewall, antivirus, encryption or login via “username-password” are very common today.

Main functions of IT systems include information processing, transmission and presentation. Cybersecurity refers to so called end devices such as servers, personal computers, notebooks, mobile phones, etc. Cyberattacks on IT systems endanger particularly data and information.

Unlike IT systems, OT systems (also referred to as ICS – Industrial Control System or IACS – Industrial Automation and Control Systems) are used for:

  • signalling / monitoring,
  • measurement and regulation,
  • control / handling,
  • protection

of industrial technological devices from various areas and sectors such as:

  • manufacturing industry,
  • chemical, gas, metallurgical industry,
  • power industry,
  • transport,
  • water management and others.

End devices of OT systems represent different devices with specific functions such as:

  • PLC (Programmable Logic Computer)
  • RTU (Remote Terminal Unit)
  • IED (Intelligent Electronic Device), energy
  • DCS (Distributed Control Systems)
  • SCADA (Supervisory Control And Data Acquisition)
  • EMS (Energy Monitoring (Management) Systems), measuring devices and electrometers
  • CNC (Computer Numerical Control)
  • BMS/BAS (Building Management Systems / Building Automation Systems)

A cyberattack on OT systems does not pose only a threat of damage to an end device, but above all, it poses a threat of significantly greater damage to a technological device itself, with a potential impact on people’s lives, health and property as well as possible environmental risks.

Cybersecurity of IT and OT systems is very similar in basic features. Nevertheless, OT systems have their own particularities.

The following table shows a comparison of characteristic features of both systems:

 

Office IT Systems:

OT Systems (ICS/IACS):

Main processes:

Information processing

Management of technological processes

Characteristics:

Dynamic systems

Deterministic systems

Life cycle:

4-6 years

15-20 years

Patch management:

2 or 3 times per year

once a year (once every 2 years)

Availability:

outages accepted

24/7

Current security:

good

low/no

Communication protocols:

TCP/IP

IEC80750, IEC61850

End devices:

server, PC/NTB, LAN

RTU, SCADA, PLC, DCS, EMS, …

 

First publication 04. 6. 2020. Last update 04. 6. 2020 14:17
Current threats
Current threats

SK-CERT Bezpečnostné varovanie V20250520-08

Dôležitosť Kritická Klasifikácia Neutajované/TLP:CLEAR CVSS Skóre 10.0 Identifikátor Pluginy redakčného systému WordPress – ...20. May 2025

SK-CERT Bezpečnostné varovanie V20250520-07

Dôležitosť Kritická Klasifikácia Neutajované/TLP:CLEAR CVSS Skóre 9.8 Identifikátor Jenkins produkty – dve kritické ...20. May 2025

SK-CERT Bezpečnostné varovanie V20250520-06

Dôležitosť Kritická Klasifikácia Neutajované/TLP:CLEAR CVSS Skóre 10.0 Identifikátor Schneider Electric produkty – dve ...20. May 2025
all publications
CVEs
Tweets by sk_cert
Links
Links
  • ENISA
  • CERT
  • Trusted Introducer
  • FIRST
Copyright © 2025 All rights reserved - Last update 06. 06. 2025 11:44
  • Sitemap
  • Declaration of accessibility
  • Technical support
  • Content
  • Contacts
  • Report an incident
  • RSS