IoT and OT Security Flashcards
Describe the following OT terminology:
1) Assets
2) Zones and Conduits
3) Industrial Network
4) Business Network
1) Are the physical assets.
2) Is the network segregation techniques used to isolate networks.
3) A network of automated systems.
4) Network of systems that offer information infrastructure.
What is OT?
Is the hardware/software designed to detect or cause changes in industrial operations.
Describe the following OT terminology:
1) Industrial Protocols
2) Network Perimeter
3) Electronic Security Perimeter
4) Critical Infrastructure
1) Protocols used for serial communication and over standard Ethernet.
2) The outermost boundary of a network zone.
3) The boundary between secure and insecure zones.
4) A collection of physical or logical systems that if they fail, will severely impact security, safety, health, etc.
Describe the three zones of the Purdue Model.
1) IT Systems (Enterprise Zone) - Business Logistics Systems, Enterprise network
2) IDMZ
3) OT Systems (Manufacturing Zone) - Physical Process, Basic Controls, Constrol Systems, Operations Systems,.
What is an ICS?
Is a collection of industrial control systems.
Describe the components of an ICS:
1) Distributed Control System (DCS)
2) Supervisory Control and Data Acquisition (SCADA)
3) Programmable Logic Controller (PLC)
4) Basic Process Control System
5) Safety Instrumented Systems
1) A centralized supervisory control system that is used to perform industry specific tasks.
2) Used for controlling and monitoring industrial facilities and infrastructure.
3) A solid-state computer that can perform a specific task.
4) Responsible for process control and monitoring of the industrial infrastructure.
5) Control system diesgned to safeguard the manufacturing envrionment.
Describe these components of IoT System Management:
1) Device Management
2) User Management
3) Security Management
1) Ensures secure data transmission between devices and functionality of devices.
2) Provides control of users who have access to IoT devices.
3) Address security breaches and prevent attacks on IoT systems.