Who performs attacks on OT/IoT systems and how and why do they do it?
The growing digitalization of organizations and IoT/OT convergence have brought new responsibilities for chief information security officers (CISOs)/chief risk officers (CROs). They should address these and prepare for the risk imposed by internet-connected devices. Now, the question arises: why do we see frequent attacks on OT/IoT environments? This question can be answered in various ways, in terms of the intent of attackers, the known weaknesses, easy access, and the minimal cost of executing attacks. Before we venture to understand hackers’ motivations, it is also particularly important to understand a little bit about cyber warfare.
Cyber warfare is defined as techniques, tactics, and procedures used during a cyber war by state-sponsored hackers. There are plenty of these techniques available. Some important ones are described here:
- Espionage: Spying or using spies to steal secrets from another...