Lecture #6 - IT/OT-Security Aspects for CPPS Flashcards
What is the difference between IT and OT security
Information Technology Security:
- IT security primary deals with safeguarding the information, data and computing resources used in traditional business operations.
Operational Technology Security:
- OT security is focused on safeguarding the critical infastructure and operational systems used in industrial settings, such as manufacturing, energy production, transportation and utilities.
What is Pipedream 2022
- A toolkit that provides a wide range of functionality for malicious actors.
- 7th known ICS-specific malware
- Potentially vulnerable systems and devices:
- Windows
- OPC-UA
What are the biggest causes of OT vulnerability?
- Compromised Credentials; Bad password
- Firmware manipulation
What is the IEC 62445
The only existing cyber security in IT and OT cyber security production systems
What happens when the cycle is manipulated between layers
The real model needs to be in parallel and be in sync with the virtual model.
If the simulation’s cycle times between layers can be manipulated, then DT won’t know whether to trust the real or virtual system.
Name and describe the three major security aspects for AAS
- Identification; name, social security number
- We need a name or a number that identifies us.
- Identify a SW application or person e.g. username, email address.
- Authenticate; password
- Authenticate that it is you! Password for example.
- Authorisation; access or roles
- Getting thrown out in your ILIAS course.
- What you’re allowed to do, or say.
- When it comes to roles, you have permissions; change, delete, overwrite, store, view-only
-
Describe the concept of Symmetric key cryptogrophy
- Symmetric key cryptography, uses the same key to encrypt and decrypt data.
- User A and B have negotiated the same key. Encryption and decryption process is as follows:
- User A uses the symmetric key to encrypt data and send the encrypted data to user B.
- User B decrypts the data using the symmetric key and gets the original data.
Explain private key infastructure
- Private key uses different keys (public and private) for data encryption and decryption.
- Public key; open to public
- Private; possessed by only the owner.
- Two keys created at the same time
- User A sends a message and uses a public key for encrypting. Not his own, but user B (receiver).
- Receiver creates a private and public key.
- The private key then decrypts it, which is turned back into plain text.
Explain what hashing is
Hashing is the process of transforming any given key or a string of character into another value.
Explain what a digital signature is
Explain what the EU cyber resilience act is
- Going to be implemented in 2024
- Every product with digital elements will be designed in such a way that they ensure an appropriate level of cybersecurity based on the risks
Name one form of hashing
One form of hashing can be seen as shows:
17 -> 8
So, hashing is basically translating one language into another.
Explain the role of the public key
The public key in the encrypts in the private key infastructure
Explain the role of the private key
- Stored in your own world.
- Only able to decrypt message that was encrypted by public key.