13. Introduction to Security Risk Assessment for System Design Flashcards

1
Q

Define the term “Security level”

A

The measure of confidence that the IACS is free from vulnerabilities and functions in an intended manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the 5 security levels defined in 62443

A

SL0
SL1
SL2
SL3
SL4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define SL4

A

Protection against intentional violation using sophisticated means, with extended resources, IACS specific skills and high motivation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define SL3

A

Protection against intentional violation using sophisticated means, with moderate resources, IACS specific skills and moderate motivation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define SL2

A

Protection against intentional violation using simple means with low resources, generic skills and low motivation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define SL1

A

Protection against casual or coincidental violation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define SL0

A

No specific requirements or security protection necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security levels can be broken down into 3 types. List these 3 types.

A

Target (SL-T)
Achieved (SL-A)
Capability (SL-C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define SL-T

A

Target security level
- Desired level of security for a particular system
- This is determined by performing a risk assessment on a system and determining that it needs a particular level of security for correct operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define SL-C

A

Capability SL
- This states that a particular component or system is capable of meeting the target SL natively, and without additional measures when properly configured and integrated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define SL-A

A

Achieved SL
- actual level of security of a particular system
- measured after a system design is available or in place
- used to establish that a system meets the goals set out in the SL-T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

7 Foundational requirements are defined in 62443-3-3. List them.

A

FR1 - Identification and Authentication Control (IAC)
FR2 - Use control (UC)
FR3 - System integrity (SI)
FR4 - Data confidentiality (DC)
FR5 - Restrict data flow (RDF)
FR6 - Timely response to events (TRE)
FR7 - Resource availability (RA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define FR1 - IAC

A

Identification and authentication control
- control access to selected devices, information, or both
- protect against unauthorized interrogation of the device or information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define FR2 - UC

A

Use control
- Control use of selected devices, information, or both
- protect against unauthorized operation of the device or use of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define FR3 - SI

A

System Integrity
- Ensure the integrity of data on selected communication channels
- protect against unauthorized changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define FR4 - DC

A

Data confidentiality
- Ensure the confidentiality of data on selected communication channels
- protect against eavesdropping

17
Q

Define FR5 - RDF

A

Restrict data flow
- Restrict the flow of data on communication channels
- Protect against the publication of information to unauthorized sources

18
Q

Define FR6 - TRE

A

Timely response to events
- Respond to security violations
- Notify the proper authority
- Report needed forensic evidence of the violation
- Automatically taking timely corrective action in mission critical or safety critical situations

19
Q

Define FR7 - RA

A

Resource availability
- Ensure the availability of all network resources
- Protect against denial of service attacks

20
Q

Define the risk equation. Risk = …

A

Risk = Threat x Vulnerability x Consequence

also

TxV can be simplified to likelihood

therefore Risk = Likelihood x Consequence

21
Q

Define threat in the context of the risk equation

A

Potential for violation of security, which exists when there is a circumstance, capability, action or event that could breach security and cause harm.

Circumstance or event with the potential to adversely affect operations (mission, functions, image or reputation), assets control systems or individuals via unauthorized access, destruction, disclosure, modification of data and/or denial of service.

22
Q

Define vulnerability in the context of the risk equation

A

Flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s integrity or security policy

weakness in a system function, procedure, internal control or implementation that could be exploited or triggered by a threat source, either intentionally designed into computer components or accidentally inserted at any time during it’s lifecycle.

23
Q

Define consequence in the context of the risk equation

A

Result that occurs from a particular incident

condition or state that logically or naturally follows from an event

24
Q

Define likelihood in the context of the risk equation

A

Quantitative chance that an action, event or incident may occur

25
Q

Which document covers risk assessment of an IACS?

A

Assessing risks of an IACS is covered in ISA/IEC 62443-3-2

26
Q

Which document lists foundational requirements to address the assessed risks?

A

ISA/IEC 62443-3-3

27
Q
A