SecPlusP3 Flashcards
(489 cards)
What are Industrial Control Systems (ICS)?
Monitor and control industrial processes
What are the two types of ICS?
Distributed Control Systems (DCS) and Programmable Logic Controllers (PLCs)
What are SCADA systems?
ICS designed for monitoring and controlling geographically dispersed industrial processes
What industries commonly use SCADA systems?
Electric power, water treatment, oil and gas
What is unauthorized access?
Manipulating system operations
What is a risk of malware attacks?
Disruptive attacks
Why is lack of updates a vulnerability?
Unpatched vulnerabilities
What are physical threats?
Damage to hardware or infrastructure
What are some ways to implement strong access controls?
Strong passwords, Two-factor authentication, Limited access to authorized personnel only
Why is it important to regularly update and patch systems?
To protect against known vulnerabilities
What are some measures to detect and prevent unauthorized access?
Use Firewall and Intrusion Detection Systems
Why is conducting regular security audits important?
To identify and address potential vulnerabilities through routine assessments
What is the purpose of employee training?
To train employees on security awareness and response to potential threats
What are embedded systems?
Specialized computing components designed for dedicated functions within larger devices
What is a Real-Time Operating System (RTOS)?
A system designed for real-time applications that process data without significant delays
What are some risks and vulnerabilities in embedded systems?
Hardware Failure
Software Bugs
Security Vulnerabilities
Outdated Systems
What are some key security strategies for embedded systems?
Network Segmentation
Wrappers (e.g., IPSec)
Firmware Code Control
Challenges in Patching
What are OTA updates?
Patches delivered and installed remotely
What are the objectives of the Security Infrastructure section?
3.2 - Apply security principles to secure enterprise architecture, 4.5 - Modify enterprise capabilities to enhance security
What does the Security Infrastructure encompass?
Hardware, software, networks, data, and policies
What are the different types of firewalls?
Web Application, Unified Threat Management, Next-generation
What are the functions of network appliances?
Load Balancing, Proxying
What is the purpose of Port Security?
Restricting and controlling network access
What is the basis of Port Security?
Media Access Control (MAC) addresses