Question: paragraph feedback comment to Sumaia's discussion post providing input and feedback Exploring Operational Technologies Sumaia Ome posted May 31, 2025 6:46 PM LY Subscribe 1.

paragraph feedback comment to Sumaia's discussion post providing input and feedback

paragraph feedback comment to Sumaia's discussion
Exploring Operational Technologies Sumaia Ome posted May 31, 2025 6:46 PM LY Subscribe 1. What is an operational technology? How is it similar or different than Consumer lot? Operational Technology (OT) refers to the hardware and software systems used to monitor and control physical devices and industrial processes, such as those found in energy grids, manufacturing plants, and water systems (National Institute of Standards and Technology [NIST], 2019). OT systems are designed for real-time operations, safety, and reliability in critical environments. OT and Consumer Internet of Things (loT) are similar in that both involve connected devices that collect and transmit data. However, they differ significantly in purpose and function. OT is built for industrial use, often involving legacy infrastructure with limited connectivity and long lifecycles. Consumer lot, on the other hand, includes devices like smart thermostats or fitness trackers, designed for user convenience and frequently updated software (Boyes et al., 2018). OT systems typically prioritize uptime and safety, while consumer lot prioritizes usability and connectivity. 2. What emerging risks can you identify for an operational technology in a hypothetical utilities distribution monitoring & control environment (pipelines & transmission grids)? In a utilities distribution environment-such as pipelines and transmission grids- several emerging risks threaten OT systems. One major concern is cyberattacks, including ransomware or remote access exploitation, which can disrupt operations or cause physical damage. The Colonial Pipeline incident highlighted how OT vulnerabilities can impact national infrastructure (Cybersecurity and Infrastructure Security Agency [CISA], 2021). Additional risks include outdated software with unpatched vulnerabilities, inadequate network segmentation between IT and OT systems, and a growing attack surface due to the integration of loT and cloud- based technologies. References Boyes, H., Hallaq, B., Cunningham, J., & Watson, T. (2018). The industrial internet of things (IloT): An analysis framework. Computers in Industry, 101, 1-12. https://doi.org/10.1016/j.compind.2018.04.015 Cybersecurity and Infrastructure Security Agency. (2021). DarkSide ransomware: Best practices for preventing business disruption from ransomware attacks. https://www.cisa.govews-events/alerts/2021/05/11/darkside-ransomware- best-practices-preventing-business-disruption National Institute of Standards and Technology. (2019). Guide to industrial control systems (ICS) security (NIST SP 800-82 Rev. 2). https://doi.org/10.6028/NIST.SP.800-82r2

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!