Introduction to Control System Security Flashcards

1
Q

Define Control System

A

Definition 1
Hardware and software components of an Industrial Automation and Control System (IACS)

Definition 2
Is a collective term used to describe different types of control system and associated instrumentation, which include the devices, systems, networks, and controls used to operate and/or automate industrial process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Cybersecurity

A

Definition 1
Measures taken to protect a computer or system against unauthorized access or attack.

Definition 2
Is the practice of protecting systems, networks, and programs from digital attacks.

These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users via ransomware, or interrupting normal business processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trends in Control System Cybersecurity

A

Increase in malicious code attacks

More COTS (commercial off the shelf)

Increased remote monitoring and access

Tools to automate attacks

More unauthorized attempts

Internet Protocols expose control systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Associated risk with COTS

A

COTS components, increased connectivity and common protocols lead to:

  • Potential adversaries are familiar with the technology
  • Many risk are common with business systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Potential consequences of cybersecurity breach.

A

Unauthorized access, theft of misuse of data

Loss of integrity or reliability of the control system

Loss of control system availability

Equipment damage

Personnel injury

Violation of legal and regulatory requirements.

Health, Safety and Environmental (HSE) impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware Events and Trends

Name four malware services available for purchase on the Internet

A
  • Malware as a Service (MaaS)
  • Hacking as a Service (HaaS)
  • Crimeware as a Service (CaaS)
  • Fraud as a Service (FaaS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Five Common Myths regarding IACS Security

A
  • We Don’t Connect to the Internet
  • Control Systems are behind a Firewall
  • Hackers Don’t Understand Control Systems
  • Our Facility is Not a Target
  • Our Safety Systems will protect us
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe differences Between IT and IACS

Different Performance Requirements

A

IT:
1. Response must be realiable
2. High throughput
3. High delay and jitter tolerated
4. IT protocols

OT:
1. Response is time critical
2. Modest throughput
3. High delay is a serious concern
4. IT and industrial protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe differences Between IT and IACS

Different Security Priorities

A
  • Different Security Priorities (CIA vs AIC):

IT
CIA: Confidentiality, Integrity and Availability

OT
AIC: Availability, Integrity and Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe differences Between IT and IACS

Differences Availability Requirements

A

IT:
1. Scheduled operation
2. Occassional failures tolerated
3. Rebooting tolerated
4. Beta testing in the field acceptable
5. Modifications possible with little paperwork

OT:
1. Continuos operation
2. Outages intolerable
3. Rebooting may not be acceptable
4. Thorough QA testing expected in non-production enviroment
5. Formal certification may be required after any change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Differences Between IT and IACS

Differences Risk Management Goals

A

IT:
1. Data Confidentiality and Integrity are paramount
2. Risk impact is loss of data, delay of business operations
3. Recovery by reboot

OT:
1. HSE and production are paramount (integrity & availability)
2. Risk Impact is loss of life, equipment or product
3. Fault tolerance is essential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Defense in Depth

A

Applying multiple countermeasures in a layered or stepwise manner

  1. Physical Security
  2. Policies and Procedures
  3. Zones & Conduits
  4. Malware Prevention
  5. Access Control
  6. Monitoring & Detection
  7. Patching
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cyber Risk Equation

A

Risk = Threat x Vulnerability x Consequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk Response Strategies

A
  • Desing the risk out
  • Reduce the risk
  • Accept the risk
  • Transfer the or share the risk
  • Redesign ineffective controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly