• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/141

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

141 Cards in this Set

  • Front
  • Back
ICS
Industrial Control Systems
SCADA
Supervisory Control And Data Acquisition
DCS
Distributed Control Systems
PLC
Programmable Logic Controllers
Major security objectives for an ICS implementation should include the following:
Restricting logical access to the ICS network and network activity.
Restricting physical access to the ICS network and devices.
Protecting individual ICS components from exploitation.
Maintaining functionality during adverse conditions.
Restoring system after an incident.
Continuous Manufacturing Processes.
These processes run continuously, often with transitions to
make different grades of a product. Typical continuous manufacturing processes include fuel or
steam flow in a power plant, petroleum in a refinery, and distillation in a chemical plant.
Batch Manufacturing Processes.
These processes have distinct processing steps, conducted on a
quantity of material. There is a distinct start and end step to a batch process with the possibility of
brief steady state operations during intermediate steps. Typical batch manufacturing processes
include food manufacturing.
FISMA
Federal Information Security Management Act
SGIP
Smart Grid Interoperability Panel
CSWG
Cyber Security Working Group
NERC
North American Electric Reliability Corporation
NSTB
National SCADA Test Bed
LOCIIC
Linking the Oil and Gas Industry to Improve Cyber Security
CIGRE
International Council on Large Electric Systems
IEC
International Electrotechnical Commission
I3P
Institute for Information Infrastructure Protection
EPRI
Electric Power Research Institute
CSSP
The DHS Control Systems Security Program
CIDX
Chemical Industry Data Exchange
ChemITC
Chemical Information
Technology Center
AC
Alternating Current
ACL
Access Control List
AGA
American Gas Association
API
American Petroleum Institute
ARP
Address Resolution Protocol
BCP
Business Continuity Plan
CIDX
Chemical Industry Data Exchange
CIGRE
International Council on Large Electric Systems
CIP
Critical Infrastructure Protection
CMVP
Cryptographic Module Validation Program
COTS
Commercial Off-the-Shelf
CPNI
Centre for the Protection of National Infrastructure
CPU
Central Processing Unit
CSE
Communications Security Establishment
CSRC
Computer Security Resource Center
CSSC
Control System Security Center
CVE
Common Vulnerabilities and Exposures
DCOM
Distributed Component Object Model
DCS
Distributed Control System(s)
DETL
Distributed Energy Technology Laboratory
DHS
Department of Homeland Security
DMZ
Demilitarized Zone
DNP
Distributed Network Protocol
DNS
Domain Name System
DOE
Department of Energy
DoS
Denial of Service
DRP
Disaster Recovery Plan
EAP
Extensible Authentication Protocol
EMS
Energy Management System
EPRI
Electric Power Research Institute
ERP
Enterprise Resource Planning
FIPS
Federal Information Processing Standards
FISMA
Federal Information Security Management Act
FTP
File Transfer Protocol
GAO
Government Accountability Office
GPS
Global Positioning System
HMI
Human-Machine Interface
HSPD
Homeland Security Presidential Directive
HTTPS
Hypertext Transfer Protocol Secure
HVAC
Heating, Ventilation, and Air Conditioning
I/O
Input/Output
I3P
Institute for Information Infrastructure Protection
IAONA
Industrial Automation Open Networking Association
ICMP
Internet Control Message Protocol
ICS
Industrial Control System(s)
IDS
Intrusion Detection System
IEC
International Electrotechnical Commission
IED
Intelligent Electronic Device
IEEE
Institute of Electrical and Electronics Engineers
IETF
Internet Engineering Task Force
IGMP
Internet Group Management Protocol
INL
Idaho National Laboratory
IP
Internet Protocol
IPS
Intrusion Prevention System
IPsec
Internet Protocol Security
ISA
The Instrumentation Systems and Automation Society
ISID
Industrial Security Incident Database
ISO
International Organization for Standardization
IT
Information Technology
ITL
Information Technology Laboratory
LAN
Local Area Network
MAC
Media Access Control
MES
Manufacturing Execution System
MIB
Management Information Base
MTU
Master Terminal Unit (also Master Telemetry Unit)
NAT
Network Address Translation
NCSD
National Cyber Security Division
NERC
North American Electric Reliability Council
NFS
Network File System
NIC
Network Interface Card
NISCC
National Infrastructure Security Coordination Centre
NIST
National Institute of Standards and Technology
NSTB
National SCADA Testbed
OLE
Object Linking and Embedding
OMB
Office of Management and Budget
OPC
OLE for Process Control
OS
Operating System
OSI
Open Systems Interconnection
PCSF
Process Control System Forum
PDA
Personal Digital Assistant
PIN
Personal Identification Number
PID
Proportional – Integral - Derivative
PIV
Personal Identity Verification
PLC
Programmable Logic Controller
PP
Protection Profile
PPP
Point-to-Point Protocol
R&D
Research and Development
RADIUS
Remote Authentication Dial In User Service
RBAC
Role-Based Access Control
RFC
Request for Comments
RMA
Reliability, Maintainability, and Availability
RPC
Remote Procedure Call
RPO
Recovery Point Objective
RTO
Recovery Time Objective
RTU
Remote Terminal Unit (also Remote Telemetry Unit)
SC
Security Category
SCP
Secure Copy
SFTP
Secure File Transfer Protocol
SIS
Safety Instrumented System
SMTP
Simple Mail Transfer Protocol
SNL
Sandia National Laboratories
SNMP
Simple Network Management Protocol
SP
Special Publication
SPP-ICS
System Protection Profile for Industrial Control Systems
SQL
Structured Query Language
SSH
Secure Shell
SSID
Service Set Identifier
SSL
Secure Sockets Layer
TCP
Transmission Control Protocol
TCP/IP
Transmission Control Protocol/Internet Protocol
TFTP
Trivial File Transfer Protocol
TLS
Transport Layer Security
UDP
User Datagram Protocol
UPS
Uninterruptible Power Supply
US-CERT
United States Computer Emergency Readiness Team
USB
Universal Serial Bus
VFD
Variable Frequency Drive
VLAN
Virtual Local Area Network
VPN
Virtual Private Network
WAN
Wide Area Network
XML
Extensible Markup Language