Test 2 Flashcards
Reference Architecture
A framework for integrating operational technology (OT) with information technology (IT) to enhance data accessibility and security.
Operational Technology (OT)
Hardware and software that detects or causes changes through direct monitoring and control of physical devices, processes, and events.
Information Technology (IT)
Systems and technologies used for managing and processing information, including hardware, software, and networks.
Purdue Model
A hierarchical architecture that segments OT networks into functional levels and uses point-to-point connections for data sharing.
Event-Centric Integration
An integration pattern that utilizes unidirectional message streams for efficient communication between various systems.
MQTT Broker
A lightweight, publish-subscribe messaging protocol that facilitates the transfer of messages from event producers to consumers.
Sparkplug B
An open-source specification that provides an MQTT topic namespace and defines state management and payload encoding for industrial applications.
Unified Namespace (UNS)
A design approach that standardizes data access and organization across different systems and teams in industrial settings.
CPS Protection Platform
A platform designed to discover, protect, and secure cyber-physical assets while integrating with IT security tools.
Data Hub
A centralized system that accesses and normalizes OT data at the edge, sharing it with applications in the cloud.
Industrial Internet of Things (IIoT)
A network of interconnected devices and systems in industrial environments that leverage data for enhanced operational efficiency.
Zero-Trust Security
A security model that mandates strict verification for every user and device trying to access resources, particularly in industrial contexts.
Cyber-Physical Systems (CPS)
Systems that integrate physical processes with computational elements to monitor and control physical devices and systems.
Hierarchical Architecture
An architecture that organizes components in layers, each with specific functions and responsibilities.
API (Application Programming Interface)
A set of rules and protocols for building and interacting with software applications, facilitating data exchange.
Event Streams
Continuous flows of data generated by devices or applications that can be processed in real-time.
Data Integration
The process of combining data from different sources to provide a unified view for analysis and reporting.
ISA-95
A standard for developing an automated interface between enterprise and control systems, often used in manufacturing.
SCADA (Supervisory Control and Data Acquisition)
A system used for controlling industrial processes and gathering real-time data from remote locations.
Cloud Computing
Delivery of computing services over the internet, including storage, processing, and networking.
Edge Computing
Processing data near the source of data generation to reduce latency and bandwidth use.
Data Collectors
Tools or systems that gather data from various sources for processing and analysis.
Cybersecurity
The practice of protecting systems, networks, and programs from digital attacks.
Ransomware
A type of malicious software that encrypts a user’s files and demands payment for the decryption key.
Malware
Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
Trust Zones
Segregated areas within a network that provide different levels of access and security for resources.
Event Brokers
Middleware that manages and routes events between producers and consumers in an event-driven architecture.
Data Auto Discovery
Automated identification and cataloging of data sources within an organization.
Machine Learning (ML)
A subset of artificial intelligence that enables systems to learn and improve from experience without explicit programming.
Digital Twins
Virtual replicas of physical systems used for simulation, analysis, and optimization.
Secure Connection
A protected link established between devices or networks to ensure data integrity and confidentiality.
Transport Protocols
Protocols used to transfer data across a network, ensuring delivery and error checking.
Management Protocols
Protocols that facilitate the management and monitoring of devices and applications.
Control Protocols
Protocols that enable commands and control messages to be sent between devices or systems.
Fragmented Data
Data that is scattered across various systems and formats, making it difficult to analyze and utilize effectively.
Real-Time Data
Information that is delivered immediately after collection, allowing for timely processing and decision-making.
Data Flows
The movement of data between systems, applications, and devices within an architecture.
Data Hierarchy
The organization of data in a structured manner, often reflecting relationships and dependencies between data elements.
Cyber-Physical Security
Security measures specifically designed to protect the intersection of cyber and physical systems.
Asset Discovery
The process of identifying and cataloging all assets within an organization’s IT and OT environments.
Legacy Systems
Older computer systems or applications that may no longer be efficient or supported but are still in use.
Interconnected Systems
Systems that are linked together, allowing for data and information sharing across different platforms and environments.
Technical Professionals
Individuals with expertise in technology and engineering, responsible for implementing and managing IT and OT solutions.