After a delayed start, in the last years OT security has substantially caught up with IT security. Many technical IT security controls are also available for machines and plants. But the maturity distribution in the field of OT is more complex and fragmented, as shown in the present article. Certain fundamental issues and contradictions of IT security become particularly obvious here and might need to be solved within OT security.
You are currently not logged in / not yet registered.
In order to download the desired file(s), you must be logged in and have an appropriate inclusive subscription. Alternatively, you can also obtain access by paying a one-off fee.