IC33M Flashcards

1
Q

Module 1

A

Identify and document the scope of the IACS under assessment

Specify, gather or generate the cybersecurity information required to perform the assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the security lifecycle?

A
  1. Assess
  2. Design & Implement
  3. Maintain

The security lifecycle is a continuous process needed to minimize risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cyber Risk Response

Design the risk out

A

One form of mitigation is to change the design of the system so that the risk is removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cyber Risk Response

Reduce the risk

A

Risks can be decreased to an acceptable level through the implementation of countermeasures that reduce the likelihood or the consequences of an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cyber Risk Response

Transfer or share the risk

A

It may be possible to establish some sort of insurance or agreement that transfers some or all of the risk to a third entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cyber Risk Response

Eliminate redundant or ineffective controls

A

A good risk assessment process will identify these types of controls that need to be addressed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cyber Risk Response

Accept the risk

A

There is always an option to accept the risk, to see it as the cost of doing business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why conduct Cybersecurity Vulnerability Assessments?

A

It defines, identifies , and classifies the security vulnerabilities in an industrial control system and its related network infrastructure.

Critical step in evaluating cyber risk

Evaluates the IACS design, implementation, configuration, operation and management

Determines the adequacy of the security measures and identifies security deficiencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the types of Cybersecurity Vulnerability assessments? (4)

A
  1. High Level (Gap Assessment) - Least invasive
  2. Passive
  3. Active
  4. Penetration Test - Most invasive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Benefits of CSET

A

A repeatable and systematic approach for assessing an organization’s cyber security posture

Evaluation and comparison of existing industry standards and regulations

Facilities discussion and input from subject matter experts throughout the organization

Identifies potential vulnerabilities in the control system design and security policies

Offers guidelines for IACS cybersecurity solutions and mitigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cyber Security Management System

Policy, Procedures Training, and Procedures

A
  1. IC33M - High-level cyber risk Assessment
  2. IC33M - Allocation of IACS assets to security zones or conduits
  3. IC33M - Detailed cyber risk assessment
  4. IC34M - Cybersecurity requirements specification
  5. IC34M - Design and engineering of cyber security countermeasures
    6.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define the scope of a cyber security assessment

A

Scope determines the parameters of what is included in the assessment and how it is performed

  1. Identify requirements
  2. Specify devices
  3. Select collection method
  4. Document
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the elements of a good project plan?

A
  1. What is the goal of the project, and what does the organization hope to achieve.
  2. Clearly define the scope of the project, and what are the parameters, including what is not included in the scope, this helps keep resources focused.
  3. What is the project budget, and what resources are required.
  4. Identify all stakeholders and their interest in the
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Module 3 - After completing this module, you will be able to:

A
  1. Identify or discover cybersecurity vulnerabilities inherent in the IACS products or system design
  2. Organize and facilitate a cybersecurity risk assessment for an IACS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to conduct an IAC vulnerability assessment:

A
  1. Pre-assessment
  2. Kick-off meeting
  3. Walkthrough
  4. Passive data collection
  5. Network Scanning (Active)
  6. Vulnerability Scanning (Active)
  7. Analysis
  8. Reporting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly