Industrial Cyber Security Flashcards

(36 cards)

1
Q

What is the overall objective of process control?

A

To cause the PV to remain at some specific, predetermined value referred to as the set point (sp). The set point may be a fixed reference, such as a simple liquid level sensor mounted on a post, or it can be an adjustable reference like a common thermostat where the user can set a desired temperature to be maintained. For more information, see the section “Basic Process Control Systems.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What small intelligent control units are commonly deployed in an ICS environment?

A

Remote Telemetry Units (RTUs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In any process control system, what is responsible for taking input information and sending corrective error signals?

A

Controller

The controller compares input information to a reference and decides on necessary actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the preferred local control device in modern industrial processing?

A

Programmable Logic Controllers (PLCs)

PLCs are widely used for automation and control in various industrial applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do PLCs and RTUs differ from each other?

A

Unlike IT computers, industrial process controllers are not designed to store data and process it later. Instead, they produce output conditions based on the current states of their inputs according to their internal configuration or programming. For more information, see the section “Industrial Process Controllers.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of control system is required when processes become too complex for a single controller?

A

Distributed Control System (DCS)

A DCS is used to manage complex operations across multiple controllers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a distributed control system that provides data acquisition and supervisory control functions referred to as?

A

Supervisory Control and Data Acquisition (SCADA) system

SCADA systems are essential for monitoring and controlling industrial processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What process employs sensors to collect information in a remote location?

A

Telemetry. For more information, see the section “Remote Telemetry Units.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What enables human operators to observe operating parameters in a SCADA-based process?

A

Human-Machine Interface (HMI)

HMIs allow operators to interact with the system and make necessary adjustments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of automated process control systems are designed to monitor unsafe conditions?

A

Safety Instrumented Systems (SIS)

SIS are specifically created to ensure safety in potentially hazardous environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What two major systems are brought together to form an integrated control and safety system (ICSS)?

A

The ICS package and the SIS package. Safety instrument systems (SIS) are basically automated process control systems specifically designed to monitor and control conditions in and around the process that have been defined as unsate or potentially unsafe. The SIS is typically created as an integral part of the overall ICS package (but not the same components).
The SIS must be able to successtully perform its functions when the process control system fails. Together these two systems are referred to as the integrated control and safety system (ICSS). For more information, see the section “Safety Instrument Systems.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are a specific type of SIS designed to minimize the consequences of emergency conditions?

A

Emergency shutdown systems (EMS). For more information, see the section “Emergency Shutdown Systems.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are devices called that are commonly attached to rotating machines to monitor their vibration patterns over time?

A

The recorded vibration patterns generated can be compared to previous points in time to determine the rate of machine wear. Devices called accelerometers are attached to rotating machines to monitor these vibration patterns over time. The recorded patterns can be compared at preset intervals to determine the rate of machine wear. For more information, see the section “Vibration Monitoring.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of sensors are added to the SIs package to detect the presence of hazardous gases, chemicals, and liquids?

A

Leak detectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Burner management systems are used to _____

A

Assure the safe startup, operation, and shutdown of burners in a process control system. For more information, see the section “Burner Management Systems.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of the set point (sp) in industrial control systems?

A

To cause the PV to remain at some specific, predetermined value

The set point may be a fixed reference or an adjustable reference like a thermostat.

17
Q

What does RTU stand for in industrial control systems?

A

Remote Telemetry Units

RTUs are used for data acquisition in industrial processes.

18
Q

What is the role of a controller in a control system?

A

To maintain the process variable (PV) at the set point

Controllers are essential components in basic process control systems.

19
Q

What does PLC stand for?

A

Programmable Logic Controller

PLCs are designed specifically to perform industrial control functions.

20
Q

How do industrial process controllers differ from IT computers?

A

IPC produce output conditions based on current input states, not storing data for later processing

This functionality is critical for real-time control.

21
Q

What is a distributed control system (DCS)?

A

A system that distributes the control function over multiple controllers

DCS is necessary for complex processes or geographically separated components.

22
Q

What are the two distinct functions of a Supervisory Control and Data Acquisition (SCADA) system?

A
  • Data acquisition (input)
  • Supervisory control functions (output)

SCADA systems are a type of distributed control system.

23
Q

What is telemetry in the context of industrial control systems?

A

The process of recording and transmitting readings from remote sensors

Telemetry is often managed by Remote Telemetry Units (RTUs).

24
Q

What role does SCADA software play in industrial processes?

A

It provides supervisory control for all PLCs and a human-machine interface (HMI)

This allows operators to observe and control process parameters.

25
What is AES encryption?
AES encryption is a symmetric encryption algorithm used to secure data.
26
What is z-Force?
z-Force is a packet interception and injection tool used to compromise and exploit Z-Wave.
27
What is Zigbee?
Zigbee is a standard for a wireless, mesh-networked PAN protocol that provides a 10-meter communication range with data transfer rates of 250Kbps.
28
What is the ZigBee Alliance?
The ZigBee Alliance is an open, nonprofit association working to develop new ZigBee standards.
29
What are zombies in computing?
Zombies are infected computers that can be controlled remotely by a malicious user, often used in denial-of-service attacks.
30
What is zoning in networking?
Zoning is the separation of the network into subnetworks, also known as network segmentation.
31
What is z-Wave?
z-Wave is a wireless communication standard created to support communication between devices in the home automation market.
32
An attack where the attacker sends fake ARP messages to associate their MAC address with the IP address of another user. Once the association has been established, messages directed to that address will be diverted to the attacker. The attacker can then use information obtained from the intercepted messages to mount other types of attacks, such as DoS or man-in-the-middle attacks.
Address Resolution Protocol (ARP) spoofing attack.
33
A block-level encryption algorithm that uses symmetric keys. Announced by NIST in 2001, it has been adopted by the US government and supersedes DES.
Advanced Encryption Standard (AES)
34
The corresponding infrastructure for the new digital power monitoring meters that provide a communication path between the utility's central office and a HAN of smart energy devices at the customer's end.
Advanced Metering Infrastructure (AMI)
35
Threats that target very specific and very secure systems over a continuous period of time.
Advanced persistent threats
36