A Milestone in my journey | Referenced in IRJMETS for Industrial Cybersecurity
Purdue Model by Antoinette Hodes

A Milestone in my journey | Referenced in IRJMETS for Industrial Cybersecurity

?? Honored and Grateful ??

I am thrilled to announce that my work has been referenced in conjunction with the renowned Purdue Model in the International Research Journal of Modern Engineering and Technology Studies (IRJMETS). You can view the paper here: IRJMETS Paper.

This paper delves into the intricacies of OT engineering practices, and it's a privilege to be acknowledged in a discussion of such a pivotal model that aligns with my professional ethos. A huge thank you to the research community for this recognition.

What is Operational Technology (OT)?

Operational Technology (OT) refers to hardware and software systems that monitor and control physical processes, devices and infrastructure. OT is critical in industries such as manufacturing, energy and transportation, where real-time operations and precise control are essential. Unlike Information Technology (IT), which focuses on data management and processing, OT ensures the functionality and safety of physical systems, often involving complex industrial machinery or critical infrastructure.


IT vs OT infographic

The Purdue Model and its Relevance

The Purdue Model, also known as the Purdue Enterprise Reference Architecture (PERA), is a layered framework that remains fundamental in addressing complex industrial systems, integrating cybersecurity and enabling communication between control systems. Its importance has grown as we navigate an increasingly interconnected and technologically driven landscape.

One of the key advantages of the Purdue Model is its segmentation and hierarchical structure. System components and assets are organized into distinct layers, and these layers serve as logical points for network segmentation, helping to manage access between various operational levels. In Industrial IoT (IIoT) environments, for example, we might see a three-component architecture involving devices, field or cloud gateways, and backend services.


Energy & Utilities | Distributed Topology

However, the model may not perfectly fit all OT architectures, particularly with the rise of edge computing and blurred boundaries between traditional OT and IoT/ IT. While the Purdue Model remains a solid foundation for identifying critical assets and structuring security around OT systems, adjustments may be needed depending on the specific industry: for example, the architecture in critical manufacturing can be vastly different from that in energy sectors.


Substation automation & Smart Metering overview

It’s an exciting journey to see my work acknowledged in such a prestigious context, and I look forward to continuing to contribute to the advancement of sustainable engineering and cybersecurity.

"Engineering is the closest thing to magic that exists in the world." ?

?

#iotspartan


Shlomi Feldman

Product Manager at Cato Networks

5 个月

Excellent job

Daniel Ehrenreich

Leading ICS-OT-IIOT Cyber Security Expert, Consultant, Workshops Lecturer, International Keynote Speaker

5 个月

Hi Antoinette Hodes, The Purdue Model, if correctly drafted, is fine. No need for renewal. Besides that I saw IPS in the architecture which makes me feel that the chart was done by people not appreciating SRP

David Galdrán Alvarez

SE Team Leader Enterprise at Check Point Software Technologies, Ltd.

5 个月

Amazing job Antoinette Hodes !!!!

要查看或添加评论,请登录

Antoinette Hodes的更多文章

社区洞察

其他会员也浏览了