Network Security Flashcards

1
Q

Why are newer DCS and SCADA systems more vulnerable to outside threats than the systems of the past?

A

Older control systems were vendor specific and came with proprietary software and hardware. This made these control systems more secure.

Modern control systems use standardized protocols derived from Microsoft and Unix. This is cheaper but leaves the networks more vulnerable to threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of Security Filtering?

A

An approach that allows outside entities securely connect to a private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a firewall?

A

Network tool that prevents unauthorized devices from entering a private secured network. These can be stand alone devices or combined with hardware like routers and gateways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is responsible for 80% of firewall breaches?

A

Incorrect firewall configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 2 most common firewall configuration mistakes?

A

Making IP addresses or management interfaces visible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can a firewall be more secured?

A

1) Update with latest firmware
2) Use unique passwords
3) Have a proper configuration
4) Never using shared accounts
5) Restricting traffic
6) Disabling Simple Network Management Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an access control list?

A

Exist in routers or firewalls and are designed to conform to rules that restrict access to the network for specific users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is MAC filtering?

A

An Access Control List rule that allows only remote MAC addresses to access the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is IP filtering?

A

An ACL rule that filters access by IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a VPN?

A

Virtual Private Network: strategy that creates a private network within a public network by using tunneling and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is encryption?

A

Process of encoding data that can not be deciphered by unauthorized entities. Data is ran through an algorithm that generates “ciphertext”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe symmetric or Private Key encryption.

A

Uses the same key that is known only to the sender and receiver that encrypts and decrypts data.`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe Asymmetric or Public Key ecryption.

A

Use a public key and a private key to encrypt and decrypt data. Public key encrypts the data and the private key is used for decryption. This method is not suited for large messages due to slow speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Industry standard for encryption?

A

Industry uses Advanced Encryption Standard (AES) that utilizes symmetric encryption and an algorithm to apply multiple rounds of encryption to produce a 128 bit key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give an example where Remote Access might be used in an Industrial Control Network environment.

A

Telecommuting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly