From the Winter 2019 Issue

Evaluating the Operational Technology Environment: Improving DHSs Cybersecurity Evaluation Tool (CSET)

Henry J. Sienkiewicz
Faculty | Georgetown University

Servers, laptops, mobile devices, routers, industrial control systems, fire control systems, elevator operations, are the connected technology components of modern life that perform particular functions, offer ease of use, and that represent risks and vulnerabilities to an organization’s cyber environment.

The cyber environment is tied to physical devices, including networking equipment, intrusion detection systems, data servers, and cable plant. It also includes hardware not traditionally thought of as cyber-related and not routinely under the control of any single organization, such as: the electrical grid, the Internet provider’s switching equipment, the telephone company’s central office, and the . . .

Leave a Comment