More Revision Flashcards
What are the two types of Control Systems?
Open-loop, Closed-loop
Which zone in the Purdue model is associated with business-related systems?
Enterprise Zone
What is the main purpose of the Perception layer in CPS?
Measurement
In Modbus, what is the function of Coils?
1-bit data that can be written to or read from
Which protocol is commonly used for communication in ICS?
Modbus
What does the Defense-in-Depth strategy involve?
Multiple layers of security
Which attack type involves injecting false sensor signals to manipulate control logic?
Sensor erasure attack
What is the purpose of the Transmission layer in CPS?
Transmitting data
What does the acronym ICS stand for?
Industrial Control System
Which layer in the Purdue model contains systems for monitoring and controlling physical processes?
Control Zone
Which Modbus data type is 16-bit input data controlled by I/O?
Input register
What is the main goal of the Closed-loop control system?
Continuously adjust output to maintain a desired state
What is the primary challenge associated with CPS security?
Interoperability
Which layer in the Purdue model involves physical processes, operations, and equipment?
Field Zone
What is the primary function of the Application layer in CPS?
Computation
What is the primary purpose of the Digital Twin model?
Detect anomalies
Which attack involves blocking information from sensors to the controller?
DoS attacks
What is the main purpose of the Enterprise Zone in the Purdue model?
Business-related systems
Which protocol is commonly associated with the “master-slave” terminology?
Modbus
What is the main function of Coils in Modbus?
1-bit data that can be written to or read from
Which layer in the Purdue model involves hardware and software that detects or causes a change through direct monitoring and control of physical devices?
Operational Domain
What is the primary difference between Open-loop and Closed-loop control systems?
No feedback on output
Which type of attack involves injecting false sensor events or erasing genuine sensor events?
Sensor insertion attack
What is the main purpose of the Transmission layer in CPS?
Transmitting data
Which layer in the Purdue model involves information technology for the processing and distribution of data?
Technical Domain
What is the primary purpose of the Control Zone in the Purdue model?
Monitoring and controlling physical processes
Which Modbus data type is 16-bit output data controlled by the user program?
Holding register
What is the primary challenge associated with CPS security?
Interoperability
What type of attacks can be mitigated using Cryptographic-based solutions?
DoS attacks
Which ICS component is responsible for controlling physical processes?
PLC