• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/45

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

45 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

Industrial systems

System of machines such as an assembly line at a manufacturing plant

Internet of Things (IoT)

When industrial systems use Internet for connectivity. Connects objects that are not used as computers to the internet

Thermostat, refrigerator, security lighting

Industrial control system

Group of networked computers used to manage a physical system of industrial processes

Single facility Physical system

Type of industrial/physical system. Examples: power plant, sewage plant, water filtration plant

Think plants

ICS Components

Contain same types that a LAN or WAN would use, including workstations, printers, routers, cabling, switches

SCADA

Supervisory Control and Data Acquisition - system responsible for obtaining real-time data from the physical system and presenting data to humans. Includes software, servers, and communication channels

RTU

Remote Terminal Units - devices installed at key locations in the industrial system. Sense attributes of the physical system, convert analog data to digital data.


Example: an RTU might sense temperature, water depth, humidity, speed.

Considered a field device

PLC

Programmable Logic Controller - small dedicated (meaning specific task) computer capable of converting analog to digital data. Can control machinery, works in real time, critical point of a physical system.


Example: dishwasher PLC senses water temperature

Fieldbus

Communication channel between a PLC and an RTU when both devices are seperate

HMI

Human-machine Interface - computers (hardware and software) that people monitor to manage a physical system

Acquisitions server

Also called an I/O Server. Collects and stores raw data; connected to field devices from which it receives raw data and passes the data to other servers.

Control server

Supervisory computer which can control the physical system; also called the master terminal unit (MTU) or the SCADA Server.

Historian

Centralized database of collected and analyzed data and control activities. The data is analyzed to recognize trends in the physical system.

Two methods an ICS uses to control physical system

Open looped system and Closed loop system.

Open loop system

Also called open network. Makes decisions based on predetermined expectations, events, and past history of the system. Doesn't have any regard to what the system is currently doing.



Controller --> Actuator --> Process (disturbance)

Actuator

Any device in an ICS that is motorized and can control the physical system

Closed loop system

Also called a closed network; makes decisions on real-time data.



Controller --> Actuator --> Process (disturbance) --> Sensor Input --> Back to Controller

How can you help keep an ICS network secure?

-inventory connections to ICS/SCADA network, disconnect unnecessarys


-segment ICS network from corporate network


-isolate network by using a DMZ, use firewalls in between networks


-completely disconnect ICS network from the internet


-implement strict firewall rules, IDS, and physical security (guards/officers


-deploy redundancy where appropriate (devices not used but needed in case a similar device fails)

How can you help secure an ICS network? Part 2.

-strictly control access to the network with encryption


-protect historian with a DMZ, or put a backup historian in a DMZ for corporate use


-place a Faraday cage around wifi hotspots


-keep documentation of all configuration management


Asset management

Monitoring and maintaining of all assets that make up the ICS network. This includes keeping inventory of all components

Asset management

Monitoring and maintaining of all assets that make up the ICS network. This includes keeping inventory of all components

Business documents

RFP


MOU


SOW


SLA


MSA


MLA

RFP

Request for Proposal - request to vendors to submit a proposal for a product or service your company wants to buy.

MOU

Memorandum of Understanding - documents intentions of two or more parties to enter a binding agreement, or contract. Usually not legally binding, does not grant extensive rights to one party, no legal recourse

SOW

Statement of Work - documents in detail the work that must be completed for a particular project. Can be enforced in a court of law (legally binding)

SLA

Service-level Agreement - legally binding contract, defines in plain language the aspects of a service provided to a customer, such as an ISP

MSA

Master service agreement - contract that defines the terms of future contracts between parties, such as payment terms

MLA

Master License Agreement - grants license from creator such as a software producer to a third party for purposes of marketing the product to consumers.

Software changes

Patch


Upgrade


Rollback

Patch

Correction, improvement, or enhancement to software. Corrects bugs, adds minor enhancements, or closes vulnerabilities.

Upgrade

Software upgrade is a major change to software that enhances functionality and features, while also correcting bugs amd vulnerabilities.


When applied, it is called a driver update.

Rollback

Software rollback, also called back leveling or downgrading, reverts to a previous software version after a patch or upgrade attempt

Cipher locks

Physical or electronic lock that requires a code to open the door. Controls access in and out of a room, controlling access times, logging who comes in and out, etc.

Access badges

Also called smart cards, can be programmed to allow the owner access to some, but not all, rooms in a building.

Proximity cards

Badges that don't need to come in physical contact with the proximity reader in order to be detected.


Can even be concealed in a wall


Typical range of about 5-10cm

Passive cards

Similar to NFC tags, they collect power from the readers power field in order to transmit data.

Active cards

Contain internal lithium batteries and provide for greater range (up to 150m), which makes active cards ideal for long-range applications such as security gates or tollbooths

Biometrics

More expensive physical security solutions that involves biorecognition access, which a device scans an individuals unique physical characteristic (aka biometrics)

Mantrap

Type of security that uses two doors on either side of a small entryway or hallway, where the first for must close before the second one can open.


A seperate form of Identification might be required for each door.


Both doors could become locked in order to detain an intruder

AIT

Advanced imaging technology - uses millimeter wave scanners that emit radio waves (similar to cell phones) to indicate areas of concern on an individual to security personnel.

CCTV

Closed-circuit TV - video surveillance systems used to monitor activity in secured rooms such as data centers or computer rooms

What is done with the footage obtained by CCTV?

It's contained within a seperate, secured segment of the network



Saved for a period of time in case it's needed later

Disaster recovery

Process of restoring your critical functionality and data after an outage that affects more than one system

eDiscovery (electronic discovery)

Reveals information about ESI, electronically stored information, or active data, contained on a computers hard drive and storage media.

Computer forensics

Process of investigating deeper into a computer's data to discover hidden data. This hidden data could be deleted files or file fragments, and also reveals who accessed the data and when.