Multiple Choice - Big Flashcards
What cryptographic-based solutions are presented for ensuring confidentiality in CPS communication channels?
A. Ultra-lightweight and low-latency block ciphers
B. Bump-in-the-wire (BITW)
C. Security Information and Event Management (SIEM)
D. Honeypots & Deception
A
What is the purpose of Bump-in-the-wire (BITW) in CPS security, especially for legacy devices?
A. Adds integrity and authentication
B. Encrypts and provides message authentication
C. Monitors communication between the embedded controller and physical process
D. Secures the communication channel
D
What is Trustworthy Autonomic Interface Guardian Architecture (TAIGA) used for in CPS security?
A. Ensures confidentiality
B. Monitors communication between the embedded controller and physical process
C. Provides real-time analysis of security alerts
D. Adds integrity and authentication
B
What is the role of Shadow Security Unit (SSU) in CPS security for ensuring integrity?
A. Monitors communication channels
B. Adds watermark to the physical system
C. Secures SCADA.systems
D. Provides a last line of defense against cyber attacks
C
How does homomorphic encryption enhance communication confidentiality in CPS?
A. Encrypts and provides message authentication
B. Adds watermark to the physical system
C. Enables arithmetic operations on encrypted variables without decryption
D. Detects abnormal behavior in the network
C
What does an Intrusion Detection System (IDS) do in CPS security?
A. Monitors communication channels
B. Adds watermark to the physical system
C. Combines security information management and security event management
D. Enables arithmetic operations on encrypted variables without decryption
A&C
How does Watermarking contribute to ensuring integrity in CPS?
A. Adds watermark to the physical system
B. Monitors communication channels
C. Secures SCADA.systems
D. Provides a last line of defense against cyber attacks
A
What is the objective of a Honeypot in CPS security?
A. Monitors communication channels
B. Adds watermark to the physical system
C. Acts as a decoy to hide and protect the system
D. Provides a last line of defense against cyber attacks
C
What does NA-Safe Controllability aim to achieve in CPS security?
A. Prevents unauthorized access
B. Minimizes control system deviation in DoS attack environment
C. Monitors communication channels
D. Adds watermark to the physical system
B
What challenges does the high availability requirement impose on security mechanisms in ICS?
A. Low latency demands
B. Limited downtime for security updates
C. Excessive use of firewalls
D. Inability to perform vulnerability assessments
B
Why might security updates/patching be delayed in ICS, according to the provided information?
A. Lack of security mechanisms in ICS
B. Increased risk of cyber attacks
C. Incompatibility with security patches
D. Mandatory reboots after patch installation
B
How can security assessment activities impact ICS operations?
A. Improve system reliability
B. Enhance communication channels
C. Degrade system performance or even crash the system
D. Expedite scheduled maintenance/outages
C
What is the potential downside of fail-closed security mechanisms in ICS?
A. Improved system safety
B. Negative impact on ICS operations if incorrectly blocking authorized operations
C. Enhanced system reliability
D. Reduced security risks
B
In geographically distributed ICSs, what vulnerability arises due to remote device tampering?
A. Unauthorized physical access
B. Manipulation of control
C. Enhanced system reliability
D. Improved system safety
B
How do distributed systems present challenges in system management for ICS operators and engineers?
A. Improved system safety
B. Physical access to the system
C. Implementation of remote administration interfaces
D. Limited access to system resources
C
What is a common characteristic of embedded systems in ICS?
A. Abundant processing power
B. Support for IDS and anti-virus
C. High resource availability
D. Resource constraints, such as limited processing power and storage
D
What is a key reason for the limited support of security mechanisms in OT systems?
A. Abundant support for security features
B. Comprehensive ICS security
C. Lack of technical capabilities in OT systems
D. Inadequate security controls in OT environments
C
How do resource constraints in embedded systems influence the implementation of security features?
A. Facilitate the implementation of IDS and anti-virus
B. Increase battery life
C. Simplify scheduling of security-related tasks
D. Limit the ability to support certain security mechanisms
D
What security-related differences exist between IT and OT network protocols?
A. IT protocols focus on communication errors
B. OT protocols lack security features
C. IT protocols do not use CRCs and parity check
D. OT protocols are designed for user confidentiality
B
How do real-time performance demands impact the implementation of security mechanisms in ICS?
A. Facilitate encryption and authentication of messages
B. Simplify scheduling of security-related tasks
C. Introduce challenges, such as communication latency and jitter
D. Improve the lifespan of battery-powered devices
C
What is a challenge associated with implementing cryptographic protections on system communications in ICS?
A. Increased reliability from communication errors
B. Limited support for network security devices
C. Reduced latency in power systems
D. Availability of ample computation power
B
How do legacy technologies contribute to security challenges in ICSs?
A. Enhance security against modern threats
B. Provide built-in encryption
C. Have undergone extensive security testing
D. Lack support for encryption and authentication
D
Why do cyber-physical risk analysis in ICSs present unique challenges?
A. Physical systems are directly vulnerable to cyber attacks
B. Mechanical and analog systems do not require analysis
C. Non-digital controls simplify risk analysis
D. Cyber components, physical system properties, and non-digital control complicate analysis
D
What is the traditional priority in human operators of ICSs?
A. Availability and safety
B. IT security
C. User confidentiality
D. System hardening
A