Lecture #6 - IT/OT-Security Aspects for CPPS Flashcards

1
Q

What is the difference between IT and OT security

A

Information Technology Security:

  • IT security primary deals with safeguarding the information, data and computing resources used in traditional business operations.

Operational Technology Security:

  • OT security is focused on safeguarding the critical infastructure and operational systems used in industrial settings, such as manufacturing, energy production, transportation and utilities.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Pipedream 2022

A
  1. A toolkit that provides a wide range of functionality for malicious actors.
  2. 7th known ICS-specific malware
  3. Potentially vulnerable systems and devices:
  • Windows
  • OPC-UA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the biggest causes of OT vulnerability?

A
  1. Compromised Credentials; Bad password
  2. Firmware manipulation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the IEC 62445

A

The only existing cyber security in IT and OT cyber security production systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens when the cycle is manipulated between layers

A

The real model needs to be in parallel and be in sync with the virtual model.

If the simulation’s cycle times between layers can be manipulated, then DT won’t know whether to trust the real or virtual system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name and describe the three major security aspects for AAS

A
  1. Identification; name, social security number
  • We need a name or a number that identifies us.
  • Identify a SW application or person e.g. username, email address.
  1. Authenticate; password
  • Authenticate that it is you! Password for example.
  1. Authorisation; access or roles
  • Getting thrown out in your ILIAS course.
  • What you’re allowed to do, or say.
  • When it comes to roles, you have permissions; change, delete, overwrite, store, view-only

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the concept of Symmetric key cryptogrophy

A
  1. Symmetric key cryptography, uses the same key to encrypt and decrypt data.
  2. User A and B have negotiated the same key. Encryption and decryption process is as follows:
  3. User A uses the symmetric key to encrypt data and send the encrypted data to user B.
  4. User B decrypts the data using the symmetric key and gets the original data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain private key infastructure

A
  1. Private key uses different keys (public and private) for data encryption and decryption.
  2. Public key; open to public
  3. Private; possessed by only the owner.
  1. Two keys created at the same time
  2. User A sends a message and uses a public key for encrypting. Not his own, but user B (receiver).
  3. Receiver creates a private and public key.
  4. The private key then decrypts it, which is turned back into plain text.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain what hashing is

A

Hashing is the process of transforming any given key or a string of character into another value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain what a digital signature is

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain what the EU cyber resilience act is

A
  1. Going to be implemented in 2024
  2. Every product with digital elements will be designed in such a way that they ensure an appropriate level of cybersecurity based on the risks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name one form of hashing

A

One form of hashing can be seen as shows:

17 -> 8

So, hashing is basically translating one language into another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain the role of the public key

A

The public key in the encrypts in the private key infastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain the role of the private key

A
  1. Stored in your own world.
  2. Only able to decrypt message that was encrypted by public key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly