Intro to IACS Flashcards

1
Q

Electronic Security?

A

Action Required to protect the critical infrastructure or Information system from unauthorized access, modifications, Denial of Service, destruction, loss of revenue, disclosure, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cybersecurity?

A

measures taken to protect computers and computer systems against unauthorized access or attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Control System?

A

Hardware and Software components of Industrial Automation Control System (IACS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Dimensions of Modern Warfare?

A

Air
Land
Water
Space
Cyber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the reasons for increased cyber attacks on IACS? Why are businesses reporting increased cyber-attacks or malicious code injection attempts?

A

Use of more Commercial Of The Shelf (COTS) hardware and software.
Common use of Internet Protocols.
Use of propriety communication protocols.
Extensive use of remote access solutions increases the attack surface.
Tools that can automate the attacks are freely available.
Use of Flat Network design (lack of segmentations/ separations).
More & More vulnerabilities are being published that are used by attackers.
Cybercriminals Focus on targeting/attacking critical infrastructures and essential services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Consequences of Cyber Attack on Organization?

A
  • Unauthorized Access to the control system and confidential data can lead to data theft/loss and misuse.
  • Loss of Integrity of the control system can lead to loss of reliability.
  • Loss of Availability of the control system can lead to production downtime and commercial impact.
  • Loss of reputation and investors/public trust in an organization.
    Damage to System and components.
  • Compromised IACS can lead to safety issues, endangering the lives of personnel.
  • This can violate legal and regulatory requirements, implicating penalties and other actions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Consequences of Cyber Attack on Society?

A

A compromised IACS Infrastructure, such as power substations/grids, nuclear plants, water and wastewater treatment plants, Pharmaceutical companies, etc., can disrupt ordinary people’s everyday lives and lead to genocides by various means, such as poisoned water supplies, harmful batches of life-saving drugs, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IACS

A

Industrial Automation Control System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware

A

Short for malicious software, it refers to any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of Malwares

A

Virus
Trojan Horse
key Logger
Ransomware
Spyware
Bots
Rootkits
Worms
Fileless Malware
Wiper
Adware
Cryptojacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Common Myths in IACS

A
  1. Our systems don’t connect to the Internet.
  2. Our IACS infrastructure is behind the firewall.
  3. Hackers do not understand IACS.
  4. Our Safety systems will protect us from Cyber Attacks.
  5. We are not a target for the hackers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Known Industrial Protocols Examples?

A

Modbus - Open Scada protocol
Ethernet/IP - Common Industrial Protocol
BACnet - Building Automation
DNP3 - Water/ Electrical
Siemens S7 - Siemens S7 PLC
Niagara Fox with SSL - Building Automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SHODAN?

A

Internet Exposed IACS component can be searched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Difference Between IT & IACS security priority

A

IT Follows:
Confidentiality (C)
Integrity (I)
Availability (A)

OT Follows:
Availability (A)
Integrity (I)
Confidentiality (C)

*OT cybersecurity must address issues related to Safety.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Different performance requirements in IT and OT

A

IT:
1 - IT Protocols
2 - High bandwidth and throughput.
3 - Response time must be reliable.
4 - High delay and jitter can be tolerated (case-to-case).
5 - Less critical emergency interaction.

OT:
1 - IT and OT Protocols
2 - Moderate bandwidth and throughput.
3 - Response time is critical.
4 - High delay and jitter are not accepted.
5 - Response to emergencies is critical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Different availability requirements in IT and OT

A

IT:
1 - Scheduled Operations.
2 - Reboot is tolerated.
3 - Occasional failures tolerated.
4 - Beta testing in the field is acceptable.
5 - Modifications are possible with very little paperwork.

OT:

1 - Continuous Operation.
2 - Reboots may not be tolerated.
3 - Outage is not tolerated.
4 - Complete QA testing is required in a non-production environment.
5 - Modifications may require complete re-certification of the system.

17
Q

Different operating requirements in IT and OT

A

IT:
1 - Data Center or Office environment.
2 - Typical Office Applications.
3 - Standard OS.
4 - Abundant resources (memory, storage, etc.)
5 - Patching is straightforward.
6 - COTS Asset Lifespan (3-5 Yrs)

OT:
1 - Industrial Environment.
2 - Special Applications.
3 - Standard and embedded OS.
4 - Resource Constraints.
5 - Patching is challenging and may impact hardware, graphics, and logic.
6 - Legacy Assets with a life span of (15-20 yrs)

18
Q

Different risk Management Goals in IT and OT

A

IT:
1 - Recovery By reboot is accepted
2 - Impact is attributed to data loss, delayed operations, and revenue.
3 - Data Confidentiality and Integrity are paramount.

OT:
1 - Fault tolerance is essential.
2 - Impact could lead to loss of life, equipment or product.
3 - HSE and production are of paramount importance (Integrity & Availability)

19
Q

Risk Equation

A

Risk = Threat X Vulnerability X Consequences

20
Q

Defense In depth

A

*Layered security approach.
1-Physical Security.
2-Policy, Procedure & Guidelines.
3-Zones and Conduits.
4-Malware Protection.
5-Access Control.
6-Detection & Monitoring.
7-Patch Management.

21
Q

Detection in depth

A

1- Detection on unknown/new devices.
2 - Detection of missing devices.
3 - Detection of devices with out-of-date patching and antivirus.
4 - Detection of Unusual traffic.
5 - Detection of the use of unknown/new protocols for communication.
6 - Detection of communication with a new set of IP/MAC than usual.
7 - Detection of traffic during unexpected times.
8 - Deployment of IDS at various sections of the production environment
9 - Deployment of syslog for central log collection and monitoring.

22
Q

Risk Responses

A

D- Design the risk out.
R- Reduce the risk.
A- Accept the risk.
T- Transfer the risk.
E- Eliminate the risk by redesigning ineffective controls.

23
Q

Risk Tolerance

A

Unique to every organization.
Management is responsible for determining.