Operations Technology Terms Flashcards Preview

Terms and basic concepts: OT, AWS (SL) > Operations Technology Terms > Flashcards

Flashcards in Operations Technology Terms Deck (32):
1

What is OT

Operational Technology

2

What 4 areas encompass OT?

ICS,
PLC,
SCADA,
DPC
(Industrial Control Systems, Programmable Logic Controllers, Discrete Process Control Systems, Supervisory Control and Data Acquisition)

3

What is SCADA

Display unit that shows process under management in graphic display

4

What is an RTU?

Remote Terminal Unit

5

What are the main components of a SCADA?

Control Unit, Fieldbus Communication link (Ethernet, WAN link, or telemetry link for equipment), and Remote Terminal Unit

6

SIS

Safety Instrumented Systems

7

What is RTO?

Recovery Time Objective - measure of how much downtime is acceptable, or how quickly must the data be made accessible again

8

What is RPO?

Recovery Point Objective - measure of how much data or work it’s acceptable to lose

9

List 5 examples of Controls Systems

Building Automation System, Closed Circuit TV, Surveillance System, Digital Signature System, Emergency Management System, Fire Alarm System

10

What 2 documents/publications did you read to prep?

NIST Guide to Industrial Control Systems Special Publication 800-82
ICS Cert Recommend Practices by

11

What is a RMF (risk)?

Risk Management Framework

12

OSI stands for

Open Systems Interconnection

13

MAC stands for

Media Access Control

14

UDP stands for

User Datagram Protocol

15

DNS stands for

Domain Name System

16

ADS stands for

Active Directory Services

17

TFTP stands for

Trivial File Transfer Protocol

18

DHCP stands for

Dynamic Host Configuration Protocol

19

ARP stands for

Address Resolution Protocol

20

SOAP stands for

Simple Object Access Protocol ( XML based format syntax to exchange messages)

21

SMTP

Simple Mail Transfer Protocol

22

SNMP

Simple Network Management Protocol

23

DCOM

Distributed Component Object Model

24

RPC

Remote Procedure Call

25

NAT

Network Address Translation

26

SIS

Safety Instrumented System

27

What is End-To-End Ecryption

encryption keys must only be known to the communicating parties. E2EE systems can encrypt data using a pre-arranged string of symbols, called a pre-shared secret (PGP, Pretty Good Privacy), or a one-time secret derived from such a pre-shared secret (DUKPT, Derived Unique Key Per Transaction). They can also negotiate a secret key on the spot using Diffie-Hellman key exchange (OTR).[3]

28

CJIS

Criminal Justice Information Services
Recommendations by FBi for Law Enforcement.

29

What is TDE

Transparent Data Encryption - encrypts the data within the physical files of the database, the 'data at rest'. Without the original encryption certificate and master key, the data cannot be read when the drive is accessed or the physical media is stolen

30

HMI

Human Machine Interface

31

Define ePO

ePolicy Orchestrator

32

What is theMcAfee SuperAgent

distributed repository designed to reduce load on McAfee ePO