Multiple Choice - Big Flashcards
What cryptographic-based solutions are presented for ensuring confidentiality in CPS communication channels?
A. Ultra-lightweight and low-latency block ciphers
B. Bump-in-the-wire (BITW)
C. Security Information and Event Management (SIEM)
D. Honeypots & Deception
A
What is the purpose of Bump-in-the-wire (BITW) in CPS security, especially for legacy devices?
A. Adds integrity and authentication
B. Encrypts and provides message authentication
C. Monitors communication between the embedded controller and physical process
D. Secures the communication channel
D
What is Trustworthy Autonomic Interface Guardian Architecture (TAIGA) used for in CPS security?
A. Ensures confidentiality
B. Monitors communication between the embedded controller and physical process
C. Provides real-time analysis of security alerts
D. Adds integrity and authentication
B
What is the role of Shadow Security Unit (SSU) in CPS security for ensuring integrity?
A. Monitors communication channels
B. Adds watermark to the physical system
C. Secures SCADA.systems
D. Provides a last line of defense against cyber attacks
C
How does homomorphic encryption enhance communication confidentiality in CPS?
A. Encrypts and provides message authentication
B. Adds watermark to the physical system
C. Enables arithmetic operations on encrypted variables without decryption
D. Detects abnormal behavior in the network
C
What does an Intrusion Detection System (IDS) do in CPS security?
A. Monitors communication channels
B. Adds watermark to the physical system
C. Combines security information management and security event management
D. Enables arithmetic operations on encrypted variables without decryption
A&C
How does Watermarking contribute to ensuring integrity in CPS?
A. Adds watermark to the physical system
B. Monitors communication channels
C. Secures SCADA.systems
D. Provides a last line of defense against cyber attacks
A
What is the objective of a Honeypot in CPS security?
A. Monitors communication channels
B. Adds watermark to the physical system
C. Acts as a decoy to hide and protect the system
D. Provides a last line of defense against cyber attacks
C
What does NA-Safe Controllability aim to achieve in CPS security?
A. Prevents unauthorized access
B. Minimizes control system deviation in DoS attack environment
C. Monitors communication channels
D. Adds watermark to the physical system
B
What challenges does the high availability requirement impose on security mechanisms in ICS?
A. Low latency demands
B. Limited downtime for security updates
C. Excessive use of firewalls
D. Inability to perform vulnerability assessments
B
Why might security updates/patching be delayed in ICS, according to the provided information?
A. Lack of security mechanisms in ICS
B. Increased risk of cyber attacks
C. Incompatibility with security patches
D. Mandatory reboots after patch installation
B
How can security assessment activities impact ICS operations?
A. Improve system reliability
B. Enhance communication channels
C. Degrade system performance or even crash the system
D. Expedite scheduled maintenance/outages
C
What is the potential downside of fail-closed security mechanisms in ICS?
A. Improved system safety
B. Negative impact on ICS operations if incorrectly blocking authorized operations
C. Enhanced system reliability
D. Reduced security risks
B
In geographically distributed ICSs, what vulnerability arises due to remote device tampering?
A. Unauthorized physical access
B. Manipulation of control
C. Enhanced system reliability
D. Improved system safety
B
How do distributed systems present challenges in system management for ICS operators and engineers?
A. Improved system safety
B. Physical access to the system
C. Implementation of remote administration interfaces
D. Limited access to system resources
C
What is a common characteristic of embedded systems in ICS?
A. Abundant processing power
B. Support for IDS and anti-virus
C. High resource availability
D. Resource constraints, such as limited processing power and storage
D
What is a key reason for the limited support of security mechanisms in OT systems?
A. Abundant support for security features
B. Comprehensive ICS security
C. Lack of technical capabilities in OT systems
D. Inadequate security controls in OT environments
C
How do resource constraints in embedded systems influence the implementation of security features?
A. Facilitate the implementation of IDS and anti-virus
B. Increase battery life
C. Simplify scheduling of security-related tasks
D. Limit the ability to support certain security mechanisms
D
What security-related differences exist between IT and OT network protocols?
A. IT protocols focus on communication errors
B. OT protocols lack security features
C. IT protocols do not use CRCs and parity check
D. OT protocols are designed for user confidentiality
B
How do real-time performance demands impact the implementation of security mechanisms in ICS?
A. Facilitate encryption and authentication of messages
B. Simplify scheduling of security-related tasks
C. Introduce challenges, such as communication latency and jitter
D. Improve the lifespan of battery-powered devices
C
What is a challenge associated with implementing cryptographic protections on system communications in ICS?
A. Increased reliability from communication errors
B. Limited support for network security devices
C. Reduced latency in power systems
D. Availability of ample computation power
B
How do legacy technologies contribute to security challenges in ICSs?
A. Enhance security against modern threats
B. Provide built-in encryption
C. Have undergone extensive security testing
D. Lack support for encryption and authentication
D
Why do cyber-physical risk analysis in ICSs present unique challenges?
A. Physical systems are directly vulnerable to cyber attacks
B. Mechanical and analog systems do not require analysis
C. Non-digital controls simplify risk analysis
D. Cyber components, physical system properties, and non-digital control complicate analysis
D
What is the traditional priority in human operators of ICSs?
A. Availability and safety
B. IT security
C. User confidentiality
D. System hardening
A
Why is it critical to understand the differences between IT and ICS security methods?
A. To prioritize user confidentiality
B. To manage expectations of future ICS security
C. To simplify ICS operations
D. To enhance IT security
B
Which event in 1999 was attributed to a malfunction of the SCADA.system, resulting in casualties and environmental damage?
A. Maroochy Shire sewage plant incident
B. Bellingham gasoline pipe explosion
C. Stuxnet cyber attack
D. AGA.cryptographic protection
B
How did a disgruntled employee cause environmental damage at the Maroochy Shire sewage plant in Australia?
A. Manually tampered with the physical systems
B. Remotely accessed wireless networks and dumped sewerage
C. Implemented real-time performance demands
D. Conducted cyber-physical risk analysis
B
Who presented a detailed analysis of cracking Stuxnet, a 21st-century cyber weapon?
A. AGA.
B. Ralph Langner
C. NIST
D. IEC
B
What are the technical challenges associated with ICS?
A. Limited support for security mechanisms
B. Enhanced security in OT systems
C. Abundant support for all security features
D. Seamless integration with IT systems
A
What does ‘fail-closed’ mean in the context of security mechanisms in ICS?
A. Mechanisms default to a state denying access
B. Mechanisms default to open state
C. Mechanisms prioritize safety over security
D. Mechanisms are resistant to failures
A
What is the purpose of a fail-closed security mechanism in ICS?
A. Prioritize safety by defaulting to open state
B. Block unauthorized access by defaulting to deny state
C. Facilitate security assessment activities
D. Minimize the impact on ICS operations
B
How do geographic locations pose challenges to ICS security?
A. Enhance physical system protections
B. Simplify implementation of security mechanisms
C. Increase vulnerability to physical tampering
D. Facilitate direct physical access to ICS
C
What is a key factor influencing the implementation of security features in embedded systems?
A. Abundant processing power
B. Limited resource constraints
C. Support for security mechanisms like IDS
D. Increased lifespan of battery-powered devices
B
What is the role of network protocols in ICS security?
A. Simplify the integration of digital, analog, and mechanical controls
B. Provide limited support for protocols in network security devices
C. Increase support for IT protocols in ICS
D. Facilitate real-time performance demands
B
What is a limitation of using traditional IT protocols in ICS security?
A. Enhanced reliability from communication errors
B. Increased support from network security devices
C. Improved security capabilities
D. Limited support of protocols in many network security devices
D
How do real-time operations complicate the scheduling of security-related tasks in ICS?
A. Simplify the implementation of security features
B. Provide ample time for scheduling security tasks
C. Leave little time for scheduling security tasks
D. Decrease power consumption in battery-powered devices
C
How do resource constraints in embedded systems affect the implementation of security features?
A. Facilitate implementation of security mechanisms like IDS
B. Enable seamless scheduling of security tasks
C. Increase support for cryptographic protections
D. Influence the ability to implement security features
D
What is a characteristic of many ICSs due to long system lifespans?
A. Regular updates to security mechanisms
B. Extensive security testing during design
C. Dependence on modern technologies
D. Heavy reliance on legacy technologies
D
How does the lack of security mechanisms in OT systems impact ICS security?
A. Facilitates comprehensive ICS security
B. Simplifies the implementation of security controls
C. Results in challenges due to lack of supported security features
D. Enhances technical security controls
C
What is a challenge posed by embedded systems in ICS?
A. Increased lifespan of battery-powered devices
B. Ample support for security mechanisms like IDS
C. Limited processing power and storage
D. Seamless scheduling of security tasks
C
What is the significance of network protocols in ICS security?
A. Increase support for IT protocols in ICS
B. Simplify integration of digital, analog, and mechanical controls
C. Provide extensive support for protocols in network security devices
D. Ensure real-time performance demands are met
B
What is a consequence of real-time performance demands on ICS security?
A. Simplification of scheduling security-related tasks
B. Decreased reliance on cryptographic protections
C. Challenges in implementing security mechanisms like encryption
D. Enhanced latency for various substation operations
C
What is a challenge associated with legacy systems in ICS?
A. Regular updates to security mechanisms
B. Extensive security testing during design
C. Lack of user authentication, access control, and auditing capabilities
D. Dependence on modern technologies
C
What contributes to the complexity of cyber-physical risk analysis in ICS?
A. Direct vulnerability of mechanical and analog systems
B. Digital controllers influencing non-digital control systems
C. Limited understanding of security postures of esoteric technologies
D. Overestimation of the risk from a cyber attack
B
How do ICSs differ from traditional IT systems?
A. Similar hardware and network infrastructure
B. Different human usage policies
C. Focus on user confidentiality and integrity
D. Convergence of technologies
B
What is a characteristic of IT security methods in contrast to ICS security?
A. Similar performance requirements
B. Focus on protecting process control
C. Understanding and analyzing differences
D. Managing expectations of future ICS security
C
How do high-availability requirements impact security updates/patching in ICS?
A. Increase the risk of cyber attacks
B. Require frequent unscheduled downtime
C. Allow immediate installation of patches
D. Often necessitate waiting until scheduled maintenance/outage period
D
What is a limitation of security assessments in high-availability ICS?
A. Increase in system performance during assessments
B. Limited impact on vulnerability assessments
C. Compatibility with various assessment and auditing activities
D. Potential degradation or system crashes due to assessment techniques
D
How can fail-closed security mechanisms negatively impact ICS operations?
A. Ensure uninterrupted access to authorized individuals
B. Always default to a state allowing unrestricted access
C. Block unauthorized individuals but may also block authorized operations
D. Prioritize safety over security in all cases
C
In geographically distributed ICSs, what makes the system vulnerable to physical tampering?
A. Centralized physical system protections
B. Remote device access with manipulation capabilities
C. Inability to implement remote administration interfaces
D. Limited access to system resources by attackers
B
What challenge do resource constraints pose in embedded systems of ICSs?
A. Enhanced support for security mechanisms like IDS
B. Increased processing power for advanced security features
C. Seamless scheduling of security-related tasks
D. Limitations in implementing security features due to constrained resources
D
How do OT systems differ from IT systems in terms of security mechanisms?
A. Both have extensive support for OT protocols
B. OT systems lack security mechanisms to protect ICS
C. IT systems provide limited support for protocols
D. IT protocols often lack security features like HTTP->HTTPS
B
How does the performance overhead for cryptographic operations impact ICS domains?
A. Decreases latency in power systems
B. Has minimal effect on computation power of embedded systems
C. Increases power consumption and reduces device lifespan
D. Supports the viability of RSA.and DSA.for most ICS
C
What challenge is associated with the long lifespan of legacy technologies in ICSs?
A. Frequent updates to security mechanisms
B. Continuous security testing during design
C. Extensive support for encryption and authentication
D. Lack of security mechanisms to protect against modern threats
D
What is a characteristic of non-digital control systems in ICS cyber-physical risk analysis?
A. Vulnerability to cyber attacks
B. Direct manipulation by digital controllers
C. Simplification of risk analysis process
D. Complexity introduced by mechanical, electromagnetic, and analog systems
C
How do ICS security concerns differ from traditional IT systems?
A. Convergence of hardware and network infrastructure
B. Focus on protecting user confidentiality and integrity
C. Similar human usage policies
D. Minimal impact of technologies converging into ICSs
B
What key requirements are associated with securing Cyber-Physical Systems (CPS)?
A. Connectivity and speed
B. Privacy, resiliency, dependability, interaction, operational security
C. Frequent unscheduled downtime
D. Minimal coordination and system hardening
B
In the context of OT challenges, what does ‘Limited Support’ refer to in NIST 800-82?
A. Extensive support for OT protocols
B. Key security mechanisms supported in OT environments
C. Lack of supported security features in many OT systems
D. Comprehensive OT system security without challenges
C
What influences the ability to implement security features in embedded systems of ICSs?
A. Increased processing power
B. Seamless scheduling of security tasks
C. Resource constraints like limited processing power, storage, bandwidth
D. Compatibility with advanced security mechanisms
C
What is a security-related difference between IT and OT network protocols?
A. Both prioritize security over communication errors
B. IT protocols lack security features like HTTPS
C. OT protocols often have updated versions with enhanced security
D. Firewalls and IDS have extensive support for OT protocols
B
How do communication latency and jitter impact real-time performance in ICS?
A. Have no effect on real-time operation
B. Increase the efficiency of security mechanisms
C. Introduce challenges in implementing security mechanisms
D. Support the implementation of encryption and authentication
C
What is a challenge associated with the use of legacy technologies in ICSs?
A. Frequent updates and continuous testing during design
B. Extensive support for encryption and authentication
C. Lack of security mechanisms to protect against modern threats
D. Inherent security features in legacy systems
C
Why are cyber-physical risk analysis processes complicated in ICSs?
A. Simplification due to digital controllers
B. Limited complexity in the analysis of cyber attacks
C. Non-digital control systems that are directly vulnerable
D. Minimal impact on the risk analysis process
C
In managerial challenges, what is the emphasis of ICS security concerns over traditional IT systems?
A. Convergence of hardware and network infrastructure
B. Focus on protecting user confidentiality and integrity
C. Similar human usage policies
D. The dominance of availability and safety over security concerns
D
What is the uptime requirement for ICS systems in terms of percentage, according to high availability needs?
A. 95% - 99%
B. 99.99% - 99.999%
C. 90% - 95%
D. 80% - 85%
B
Why is security assessment challenging in ICS, particularly regarding penetration testing and vulnerability assessments?
A. They enhance system performance
B. They require minimal computation
C. They can crash the system or degrade performance
D. They are unnecessary in ICS environments
C
What is a consequence of introducing fail-closed security mechanisms in ICS?
A. Increased vulnerability to cyber attacks
B. Improved system reliability
C. Enhanced ease of operation
D. Limited impact on ICS operations
A
How does the geographic distribution of ICS systems pose challenges for physical system protections?
A. It enhances physical security
B. It eliminates the risk of physical tampering
C. It leaves the system vulnerable to physical tampering
D. It simplifies system management
C