A cyber threat is a malicious act that seeks to damage data, steal data/technology asset or disrupt digital life in general. Cyber threats include computer viruses, data breaches, Denial of Service (DoS) attacks and other attack vectors.
Information technology definition is the application of technology to solve business or organizational problems on a broad scale.
An information technology system (IT system) including all hardware, software, and peripheral equipment.
Operational technology (OT) is hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes and events.
Examples of operational technology include: PLCs, SCADA, DCS etc.
Intrusion Prevention System (IPS), is a technology that identify any suspicious activity and either allowing (IDS) or prevent (IPS) the threat. The attempt is logged and reported to the network managers or Security Operations Center (SOC) staff.
Defense-In-Depth is defending a system against any particular attack using several independent methods. It is a layering tactic and comprehensive approach to information and electronic security. The information security strategy involves multiple layers of controls.
A network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules. Used as a barrier between your internal network and incoming traffic from external sources.