Preparing for an Assessment Flashcards

1
Q

Security Lifecycle

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Assess Phase

A
  • High-Level Cyber Risk Assessment
  • Allocation of IACS Assets to Security Zones or Conduits
  • Detailed Cyber Risk Assessment

ISA 62443-3-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cyber Incident Response & Recovery which security life does it fall under?

A

Maintain Phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Design and Engineering of Cybersecurity Countermeasures.

Which stage of the security lifecycle does this correspond to?

A

Develop & Implement Phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Detailed Cyber Risk Assesment

which phase of the security lifecycle does this correspond to?

A

Assess Phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Scope Assessment Phase

A

Scope determines the parameters of what is included in the assessment and how it is performed

  • Identify Requirements
  • Specify Devices
  • Select Collection Method
  • Document
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Scope the System. Goals

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Key Components of Scope

A
  • System Archictecture Diagrams
  • Network Diagrams
  • Asset Inventory
  • Criticality Assessment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ISA 62443 Refrence Model

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Asset Inventory contents

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Asset Inventory - Software Contents

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Assessment Critically?

A

Assessment of the criticality, of an IACS asset, is the measure of the negative impact, should information be unavailable, unreliable, or compromised.

The AIC Method offers a way to insure consequences are considered:

Consider Availability:
How severe is the consequence if this asset is unable to perform its intended function?

Consider Integrity:
How severe are the consequences if the information this asset processes or stores was compromised?

Consdier Confidentiality
How severe are the consequences if the information this asset processes or stores were to be breached?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which document details how the network is physically and logically constructed?

A

Network Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the criticality assessment of an IACS asset called?

A

Cyber Security Criticality Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which level in ISA 62443 Reference Model include Business Planning and Logistics?

A

Level 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three main phases of the IACS Cybersecurity Lifecycle?

A

Assess, Develop and Implement, Maintain

17
Q

When creating network diagrams it is suggested to follow which model?

A

Purdue

18
Q

Which assessment measures the negative impact on an IACS asset should information be unavailable, unreliable or compomised?

A

Cyber Criticality Assessment

19
Q

Which documents illustrate components of a system, connectivity and physical location?

A

System Architecture Diagrams

20
Q

Which level in the ISA 62443 Reference Model defines the actual physical processes?

A

Level 0

21
Q

The first step in preparing for an assessment is to:

A

Define Scope

22
Q

What are Solarwinds, Spiceworks, Microsoft Assessment and Planning Toolkit and MDT AutoSave?

A

Examples of Asset Inventory Tools

23
Q

What are Solarwinds, Spiceworks, Microsoft Assessment and Planning Toolkit and MDT AutoSave?

A

Examples of Asset Inventory Tools