Looking a bit closer, most of the attacks seem to have spilt over from traditional IT.
That’s to be expected, as production systems are commonly connected to ordinary corporate networks at this point.
Though our data does not indicate at this point that a lot of threat actors specifically target industrial systems – in fact, most evidence points to purely opportunistic behaviour – the tide could turn any time, once the added complexity of compromising OT environments promises to pay off.
Criminals will take any chance they get to blackmail victims into extortion schemes, and halting production can cause immense damage. It is likely only a matter of time.
So cybersecurity for operational technology (OT) is vitally important.
Deception is an effective option to improve threat detection and response capabilities. However, ICS security differs from traditional IT security in several ways.
While deception technology for defensive use like honeypots has progressed, there are still challenges due to fundamental differences like the protocols used.
This article is intended to detail the progress and challenges when deception technology transits from traditional IT to ICS security.
Full Link ( Here )
© CopyRights RawNews1st