diff --git a/docs/background-ot/index.md b/docs/background-ot/index.md index a1e6bab..9e49d4d 100644 --- a/docs/background-ot/index.md +++ b/docs/background-ot/index.md @@ -102,7 +102,6 @@ segmentation and separation between IT and OT (in this case realized by Level 3.5 IT/OT DMZ). As most security incidents still occur in IT, it is of utmost importance to prevent such an incident to spread to OT. - ## Stakeholders To achieve security in OT systems and devices, several stakeholders have to work diff --git a/docs/background-ot/ot-vs-it.md b/docs/background-ot/ot-vs-it.md index ebbe6b9..956ce00 100644 --- a/docs/background-ot/ot-vs-it.md +++ b/docs/background-ot/ot-vs-it.md @@ -67,7 +67,7 @@ altered invoices. The OT world works differently. Here availability is paramount: the worst case if often that, e.g., a power plant is not producing any power anymore -(availabiliity) and this is more severe than exposing financial data of the +(availabiliity) and this is more severe than exposing financial data of the power plant company (confidenciality). Sometimes, this differentiation is not as clear-cut: imagine an attacker