{"version":"1.0","provider_name":"Institute for Security Science &amp; Technology","provider_url":"https:\/\/blogs.imperial.ac.uk\/security-institute","author_name":"Andrew Burton","author_url":"https:\/\/blogs.imperial.ac.uk\/security-institute\/author\/aburton\/","title":"Security of Industrial Control Systems - Institute for Security Science &amp; Technology","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"GAXSDQIDL5\"><a href=\"https:\/\/blogs.imperial.ac.uk\/security-institute\/2016\/03\/21\/security-of-industrial-control-systems\/\">Security of Industrial Control Systems<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blogs.imperial.ac.uk\/security-institute\/2016\/03\/21\/security-of-industrial-control-systems\/embed\/#?secret=GAXSDQIDL5\" width=\"600\" height=\"338\" title=\"&#8220;Security of Industrial Control Systems&#8221; &#8212; Institute for Security Science &amp; Technology\" data-secret=\"GAXSDQIDL5\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/blogs.imperial.ac.uk\/security-institute\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"A post by Professor Chris Hankin, Director ISST Operational Technology (OT), as distinct from Information Technology (IT), refers to the hardware and software that controls an industrial process.\u00a0 Despite increasing similarities between OT and IT architectures and components there are quite fundamental differences in the make-up of cyber attacks on each.\u00a0 In To Kill a [&hellip;]","thumbnail_url":"https:\/\/blogs.imperial.ac.uk\/security-institute\/files\/2016\/03\/RITICS-Generic-Architecture-1024x843.png"}