Malicious software that can disrupt or damage OT systems, such as ransomware or trojans.
Cybercriminals use social engineering techniques to trick users into sharing sensitive information or executing malicious code.
Malicious or unintentional actions by authorized users that can compromise the security of OT systems.
Attackers target third-party vendors to gain access to OT systems through software or hardware vulnerabilities.
Overwhelming a system with traffic to cause it to crash or become unavailable.
Attackers intercept and manipulate data between two parties in a communication.
Physical damage or tampering with OT systems, such as theft or destruction of hardware.
Misconfigured or improperly secured systems can lead to security vulnerabilities and weaknesses.
Failing to apply security updates and patches can leave OT systems vulnerable to known threats.
Unintentional actions, such as misconfigured systems, can lead to security breaches.