7. Establishing an IACS Security Program Flashcards

1
Q

List 6 Activities that are part of developing a CSMS

A
  1. Initiate CSMS Program
  2. High Level Risk Assessment
  3. Detailed Risk Assessment
  4. Establish Policy, organization and awareness
  5. Select and implement countermeasures
  6. Maintain the CSMS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List 4 tasks that occur within “Initiate a CSMS”.

A
  1. Obtain leadership commitment, support and funding
  2. Develop a business rationale
  3. Develop the CSMS Scope
  4. Involve Stakeholders
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List 5 tasks that occur within “High level risk assessment”

A
  1. Define the methodology for identifying risks
  2. Identify risks
  3. Define the methodology for assessing the priority of risks
  4. Assess the priority of risks
  5. Document the results and rationale
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List 4 tasks that occur within “Detailed risk assessment”

A
  1. Inventory IACS systems, networks and devices
  2. Screen and prioritize
  3. Identify detailed vulnerabilities
  4. Identify and prioritize associated risks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List 5 tasks that occur within “Establish Policy, Organization & awareness”

A
  1. Create policies and procedures
  2. Implement policies and procedures
  3. Communicate policies
  4. Develop training activities
  5. Assign organisational responsibilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List 5 tasks that occur within “Select and implement countermeasures”

A
  1. Establish the risk tolerance
  2. Select common countermeasures
  3. a) Select countermeasures - common countermeasures are a starting point to this
  4. Implement countermeasures
  5. Develop new or modify existing systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly