Chapter_1_Introduction to SilentDefense Flashcards

1
Q

What are some characteristics of an IT environment?

A

High density environment
Random changes – hosts coming and going
Hosts running many applications
Throughput and confidentiality are important

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some characteristics of an OT environment?

A

Purpose builtHosts running specific application
Longevity and stability are key
Network traffic is fixed – not worried about throuput
Control and integrity are important

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does ICS stand for?

A

Industrial Control System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe an ICS. What does it do?

A

It is a system which manages or handles an industrial process. For example:a factory which produces cars, an electricity grid, or the transportation system within a city.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What components make up a SilentDefense solution?

A

A Command Center and one or more sensors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the2 types of sensors used in a live production environment?

A
Monitoring (Passive) Sensor
ICS Patrol (Active) Sensor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe a Monitoring Sensor.

A

Connected to a SPAN or TAP port and monitors traffic to/from ICSPassively inspects trafficSends events and log information to Command Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe an ICS Patrol Sensor:

A

An optional type of sensor that can be used to query hosts in a controlled way from within the Command Center. This is the only Sensor that is capable of issuing controlled, active requests for information on the network. This will always be done at the request of a SilentDefense user via the Command Center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does LAN CP stand for and how does it recognize suspicious traffic?

A

The LAN Communication Profiler learns a “normal” baseline of traffic, creating a whitelist. Then, after tuning the whitelist, in Detection mode, it sends alerts when traffic is seen which does not match the previously built whitelist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly