• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back
Acquisitionsserver
acquisitionsserver An ICS server that collects and stores raw data. This serverconnects to field devices from which it receives the raw data andpasses that information on to other servers in the SCADA system.
Activecard
Aproximity card that contains an internal lithium battery to provide agreater range (up to 150 m). These cards are ideal for long-rangeapplications such as security gates or tollbooths
Activedata
(ESL)Informationstored on a computer’s hard drive and storage media, such ascalendars, email, and databases.
AITmachine
(advancedimaging technology) machine, A security device similar to an X-raymachine that uses millimeter-wave scanners, which emit radio wavessimilar to those emitted by cell phones, to indicate on cartoonlikeimages any areas of concern to security personnel.
AssetManagement
Theprocess of collecting and storing data on the number and types ofsoftware and hardware assets in an organization’s network. The datacollection is automated by electronically examining each network nodefrom a server.
Businesscontinuity
Theability of a company to continue doing business with the least amountof interruption possible after a major outage or other disaster.
Cipherlock
Aphysical or electronic lock requiring a code to open the door.
Closed-loopsystem
Oneof two methods that an ICS might use to control the physical system.In a closed loop system, decisions are made based on real-time data.Also called a closed network.
Computerforensics
Theprocess of investigating deeper data on a computer, essentiallyperforming an autopsy on the computer to discover hidden data, suchas deleted files and file fragments, and who has accessed that dataand when.
Degausser
Amagnetic hard drive eraser.
eDiscovery
Theprocess of collecting information from a computer’s hard drive andstorage media.
ESI
(electronicallystored information) Information stored on a computer’s hard driveand storage media, such as calendars, email, and databases.
Faradaycage
Anenclosure made of conductive material that is designed to blockelectromagnetic signals, including Wi-Fi.
Fieldbus
Thecommunication channel that connects a PLC to an RTU (when these areseparate devices) or to an actuator.
Historian
AnICS server that stores a centralized database of collected andanalyzed data and control activities. This data is often analyzed torecognize trends in the physical system
HMI
(human-machineinterface) A computer, including hardware and software, thattechnicians use to monitor and manage physical systems in anindustrial system.
Hot/Warm/ColdSite

coldsite -A place where the computers, devices, and connectivity necessary torebuild a network exist, but are not appropriately configured,updated, or connected to match the network’s current state.




hotsite -A place where the computers, devices, and connectivity necessary torebuild a network exist, and all are appropriately configured,updated, and connected to match a network’s current state.




warmsite -A place where the computers, devices, and connectivity necessary torebuild a network exist, though only some are appropriatelyconfigured, updated, or connected to match the network’s currentstate

ICSserver
Aserver in an ICS or SCADA system that might include an acquisitionsserver, which collects and stores raw data, a supervisory server,which controls the physical system, or a historian, which is acentralized database of collected and analyzed data and controlactivities.
Mantrap
Anentryway to an access-controlled area that consists of two doors oneither end of the entryway. The first door must close before thesecond door can open. A separate form of identification might berequired for each door, and in some cases both sets of doors can belocked to detain a suspect attempting unauthorized access.
MLA
(1)(masterlicense agreement) A contract that grants a license from a creator,developer, or producer, such as a software producer, to a third partyfor the purposes of marketing, sublicensing, or distributing theproduct to consumers as a stand-alone product or as part of anotherproduct. (2)(multilateralagreement) A contract between three or more parties.
PLC
(programmablelogic controller) A very small dedicated computer in an industrialsystem that is capable of converting analog data to digital data. ThePLC works in real time, can control machinery, and is a criticalcomponent of the ICS (industrial control system).
Rollback
Theprocess of reverting to a previous version of a software applicationafter attempting to patch or upgrade it.
Telemetry
Aterm that sometimes refers to wired communication, but generallyrefers to wireless communication that transmits data regardingspecific measurements and conditions, such as weather datatransmitted from a weather balloon to ground antennas.
Whykeep your systems up to date?
Increasedperformance, security, etc