Skip to content

Threat Models in OT systems

Goals

  • You will be capable of explaining the definition and importance of OT threat models in understanding risks and vulnerabilities in OT systems
  • You will be capable of identifying the critical consequences of OT system failures, such as safety risks and operational disruptions
  • You will understand why OT threat models require different considerations compared to IT threat models, such as the focus on physical integrity and availability

  • You will be capable of identifying the primary threat actors in OT environments, including cybercriminals, nation-state actors, hacktivists, and insiders

  • You will be capable of evaluating insider threats in OT, including both malicious and unintentional risks from employees or contractors evaluating the safety risks posed by compromised OT systems, including potential harm to workers and the public
  • You will be capable of conducting a risk assessment for OT systems, identifying critical assets, vulnerabilities, and potential attack vectors

Course Slides

Exercices

In the related exercice section, you will experience the use of concepts presented in the slides.