Network services Flashcards

1
Q

IT (Information Technology) vs. OT (Operational Technology):

A

IT: Focus on data, servers, and networks.
OT: Focus on controlling physical processes (e.g., industrial control systems).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Embedded Systems

A

Definition: Dedicated systems designed for specific functions.
Examples:
Medical devices, smart meters, industrial controllers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of Embedded Systems

A

PLCs (Programmable Logic Controllers): Automate processes like valve control.
RTOS (Real-Time Operating System): Ensures predictable response times for critical tasks.
System-on-a-Chip (SoC): Compact, efficient chips integrating all computer components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Embedded Systems Security

A

Operate in static environments; updates are infrequent.
Isolate embedded systems for security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Industrial Control Systems (ICS)

A

Localized control of processes in manufacturing or critical infrastructure.
Priority: Availability > Integrity > Confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SCADA

A

Manages distributed ICS over wide-area networks.
Communication methods: Cellular, satellite, fiber.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fieldbus

A

Links PLCs and devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HMI (Human-Machine Interface)

A

Interfaces for monitoring and control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Legacy Systems

A

No longer supported by the vendor.
Common examples: Windows XP, old manufacturing systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Proprietary Systems

A

Owned and controlled by specific vendors.
Support depends on vendor contracts and cycles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mitigating Legacy and Proprietary Systems

A

Isolate on separate networks.
Use firewalls and segmentation.
Apply compensating controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Networking and Security Tools

A

Firewalls:
Unified Threat Management (UTM):
Next-Generation Firewalls (NGFW):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Firewalls

A

Control traffic based on Access Control Lists (ACLs).
Types: Packet filtering, stateful, proxy, kernel proxy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Unified Threat Management (UTM)

A

All-in-one security devices (firewall, antivirus, intrusion prevention, etc.).
Advantages: Lower costs, easier management.
Disadvantages: Single point of failure, less efficient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Next-Generation Firewalls (NGFW)

A

Use efficient engines for deep traffic inspection.
Suitable for performance-focused environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Remote Access Protocols

A

Telnet: Plain text, insecure.
SSH: Encrypted, secure alternative to Telnet.
RDP: GUI-based remote access for Windows.
VNC: Cross-platform GUI access.
TTY: Command-line interface emulation.

17
Q

Monitoring Tools

A

Syslog: Logs events for network devices.
- Modern versions support TCP, TLS, and authentication.

SNMP: Monitors network-attached devices.

18
Q

Load Balancers

A

Function:
- Distributes traffic across multiple servers.
Prevents server overload and enhances efficiency.

DDoS Mitigation:
- Techniques: Blackholing, IPS, Elastic Cloud Infrastructure.
- Examples: Amazon, GitHub surviving large-scale DDoS attacks.

19
Q

CIA Triad

A

(Confidentiality, Integrity, Availability):
Understand how availability is prioritized in OT and ICS environments.

20
Q

Key Concepts and Exam Tips

A

CIA Triad (Confidentiality, Integrity, Availability):
Understand how availability is prioritized in OT and ICS environments.
Network Segmentation:
Crucial for isolating vulnerable systems (e.g., legacy systems).
System Security:
Apply compensating controls when updates are unavailable.
Prioritize real-time responses for critical applications (e.g., RTOS).
Device-Specific Characteristics:
Know the distinctions between PLCs, RTOS, SoC, and standard systems.