IC34M02 - Conceptual Design Flashcards

1
Q

Key Componentes of Conceptual Design

A
  • Interpret Risk Assessment Result
  • Mitigate Results (4T’s)
  • Treat Risk (5 D’s)
  • Develop Security Strategy
  • Prepare Conceptual Design Specification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Example Risk Profile

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Level (SL) Definitions

A
  • Level 0: No requirements or security protection necessary
  • Level 1: Protection against casual or coincidental violation
  • Level 2: Protection against violation with low resources, generic skill, and low motivation
  • Level 3: Protection against violation with moderate resources, IACS specific skills, and moderate motivation
  • Level 4: Protection against intentional violation with extended resources, IACS specific skill, and high motivation

See 62443-3-3 Annex A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CRRF (Ciber Risk Reduction Factor)

A

Is a measure of the degree of risk reduction required to achieve tolerable risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fourt T’s of Managing Risk

A

Tolerate
The risk is known and accepted by the organization. The organization is willing to Tolerate this risk

Transfer
The risk is passed to a third party, for example an insurer or an outsource, to manage the risk. This does not eliminate the risk.

Terminate
The process, activity, tool, etc. is no longer used. Terminating or stopping the usage the risk is no longer relevant.

Treat
Redice the likelihood of the threat materializing or the resultant impact by introducing relevant controls and continuity strategies. Treat the risk through mitigating controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Five D’s of Treating Risk

A

** Deter**
Objetive is to deter attacker from attemping breach

** Detect**
Objetive is to monitor large areas of spaces to acuurately detect unauthorized intrusion in time to respond appropriately

Delay
Objetive is to delay an active intrusion to force intruduer to give up or allow security to respond.

Deny
Objetive is to deny access or keep unauthorized person out while allowing authorized persons to enter.

Defeat
Objetive is to defeat intrusion by apprehending intruder often involving law enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Developing a Security Strategy

A
  • Identify zones
  • Review risk assessment
  • Establish Target Security Level
  • Identify physical and cyber access points
  • Develop 5D physical and cyber security strategy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Foundational Requirements

A

FR1 – Identification and Authentication Control
FR2 – Use Control
FR3 - System Integrity
FR4 – Data Confidentiality
FR5 – Restricted Data Flow
FR6 – Timely Response to Events
FR7 – Resource Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What should be included in a good risk assessment

A
  • Risk Profile
  • Severity of Consequences
  • Threats & Vulnerabilities from least to highest risks
  • Target Security Levels
  • Recomendations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name three characteristics of a Target Security Level (SL-T)?

A
  • SL-T is required for each security zone or conduit
  • SL-T is dependent upon Cyber Risk Reduction Factor (CRRF)
  • Relationship between CRRF and SL-T is based upon organizations risk matrix and risk tolerance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is CRRF?

A

Cyber Risk Reduction Factor (CRRF) is:
* A measure of the degree of risk reduction required to achieve tolerable risk
* Calculated as ratio by dividing unmitigated risk by tolerable risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the four T’s of Managing Risk?

A
  • Tolerate
  • Transfer
  • Terminate
  • Treat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 5D’s of treating risk?

A
  • Deter
  • Detect
  • Delay
  • Deny
  • Defeat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the steps to developing a Security Strategy?

A
  • Identify zones
  • Review risk assessment results
  • Establish SL-T
  • Identify physical and cyber access points
  • Develop 5D physical & cyber security strategy for each access point.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are four components of Conceputal Cybersecurity Design Specification?

A
  • Document new or upgraded security countermeasures to achieve with SL-T
  • Scope of Work
  • Conceptual system architecture
  • Budgetary and schedule estimates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Waht are the four parts to defining scope?

A
  • Identify Requirements
  • Specify Devices
  • Select collection Method
  • Document
17
Q

Name some benefits of Cybersecurity Risk Assessments

A
  • Determine order or priority
  • Define threats, vulnerabilities, and consequences
  • Design and apply countermeasures
  • Prioritize mitigation activities and resources
  • Evaluate effectiveness versus cost of countermeasure procedures
18
Q

What is produced in every step of the Cyber Risk Assessment Process?

A

Documentation
If you didn’t document your steps, there is nothing to verify, audit, or prove the findings of the assessment.

19
Q

What are the four key concepts of scope?

A
  • System Architecture Diagrams
  • Network Diagrams
  • Asset Assessment
  • Criticality Assessment