Cybersecurity of Operational Technology in Critical Infrastructures

Aim: The aim of this study is to present the relationship between critical infrastructures and operational technology (OT) and to explore the cybersecurity challenges arising from the integration of IT and OT systems. The central research question is: What are the main vulnerabilities that emerge i...

Full description

Saved in:
Bibliographic Details
Main Authors: Péter Hunorfi, Tibor Farkas
Format: Article
Language:English
Published: Ministry of Interior of Hungary 2025-06-01
Series:Belügyi Szemle
Subjects:
Online Access:https://belugyiszemlejournal.org/index.php/belugyiszemle/article/view/2145
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850122163306102784
author Péter Hunorfi
Tibor Farkas
author_facet Péter Hunorfi
Tibor Farkas
author_sort Péter Hunorfi
collection DOAJ
description Aim: The aim of this study is to present the relationship between critical infrastructures and operational technology (OT) and to explore the cybersecurity challenges arising from the integration of IT and OT systems. The central research question is: What are the main vulnerabilities that emerge in critical infrastructures due to the interconnection of OT and IT systems, and what defense strategies can mitigate these risks? Methodology: The research adopts an interdisciplinary approach that combines theoretical-logical analysis, literature review, case study analysis, and the examination of practical examples. The following hypotheses were investigated: H1: The convergence of IT and OT systems results in an increased attack surface, as OT systems become vulnerable through IT networks. H2: The security mechanisms applied in critical infrastructures do not always meet the specific security requirements of OT, increasing system vulnerabilities. H3: Proper segmentation strategies and the establishment of controlled communication channels between IT and OT networks can reduce the risk of cyberattacks. The research also includes comparative analyses examining security measures applied in industrial and critical infrastructure settings. To gain a deeper understanding of the cybersecurity challenges of OT systems, industry reports and case studies were also analysed. Findings: The protection of operational technology systems in critical infrastructures is crucial for maintaining social and economic stability. The digitalization of OT systems and their increasing integration with IT systems create new cybersecurity challenges that require a complex and multi-layered approach to address. The study highlights that proper segmentation and secure interconnection of IT and OT systems are key to effectively managing cyber threats. Value: This research provides a comprehensive overview of the cybersecurity challenges associated with operational technology, with a particular focus on critical infrastructures. It offers valuable guidance for developing defense strategies from both scientific and practical perspectives, supporting the secure integration of IT and OT systems.
format Article
id doaj-art-dda29571786d4eb689dbed014d625b50
institution OA Journals
issn 2062-9494
2677-1632
language English
publishDate 2025-06-01
publisher Ministry of Interior of Hungary
record_format Article
series Belügyi Szemle
spelling doaj-art-dda29571786d4eb689dbed014d625b502025-08-20T02:34:54ZengMinistry of Interior of HungaryBelügyi Szemle2062-94942677-16322025-06-01731.ksz10.38146/bsz-ajia.2025.v73.i1SI.pp183-197Cybersecurity of Operational Technology in Critical InfrastructuresPéter Hunorfi0Tibor Farkas1University of ÓbudaUniversity of Óbuda Aim: The aim of this study is to present the relationship between critical infrastructures and operational technology (OT) and to explore the cybersecurity challenges arising from the integration of IT and OT systems. The central research question is: What are the main vulnerabilities that emerge in critical infrastructures due to the interconnection of OT and IT systems, and what defense strategies can mitigate these risks? Methodology: The research adopts an interdisciplinary approach that combines theoretical-logical analysis, literature review, case study analysis, and the examination of practical examples. The following hypotheses were investigated: H1: The convergence of IT and OT systems results in an increased attack surface, as OT systems become vulnerable through IT networks. H2: The security mechanisms applied in critical infrastructures do not always meet the specific security requirements of OT, increasing system vulnerabilities. H3: Proper segmentation strategies and the establishment of controlled communication channels between IT and OT networks can reduce the risk of cyberattacks. The research also includes comparative analyses examining security measures applied in industrial and critical infrastructure settings. To gain a deeper understanding of the cybersecurity challenges of OT systems, industry reports and case studies were also analysed. Findings: The protection of operational technology systems in critical infrastructures is crucial for maintaining social and economic stability. The digitalization of OT systems and their increasing integration with IT systems create new cybersecurity challenges that require a complex and multi-layered approach to address. The study highlights that proper segmentation and secure interconnection of IT and OT systems are key to effectively managing cyber threats. Value: This research provides a comprehensive overview of the cybersecurity challenges associated with operational technology, with a particular focus on critical infrastructures. It offers valuable guidance for developing defense strategies from both scientific and practical perspectives, supporting the secure integration of IT and OT systems. https://belugyiszemlejournal.org/index.php/belugyiszemle/article/view/2145Critical Infrastructure, Operational Technology, Cyber Defense, Hacker Attack, Industrial Control Systems (ICS), Insider Threats, SCADA
spellingShingle Péter Hunorfi
Tibor Farkas
Cybersecurity of Operational Technology in Critical Infrastructures
Belügyi Szemle
Critical Infrastructure, Operational Technology, Cyber Defense, Hacker Attack, Industrial Control Systems (ICS), Insider Threats, SCADA
title Cybersecurity of Operational Technology in Critical Infrastructures
title_full Cybersecurity of Operational Technology in Critical Infrastructures
title_fullStr Cybersecurity of Operational Technology in Critical Infrastructures
title_full_unstemmed Cybersecurity of Operational Technology in Critical Infrastructures
title_short Cybersecurity of Operational Technology in Critical Infrastructures
title_sort cybersecurity of operational technology in critical infrastructures
topic Critical Infrastructure, Operational Technology, Cyber Defense, Hacker Attack, Industrial Control Systems (ICS), Insider Threats, SCADA
url https://belugyiszemlejournal.org/index.php/belugyiszemle/article/view/2145
work_keys_str_mv AT peterhunorfi cybersecurityofoperationaltechnologyincriticalinfrastructures
AT tiborfarkas cybersecurityofoperationaltechnologyincriticalinfrastructures