Section 15.143 ICS and SCADA Flashcards

Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources

1
Q

Industrial Control Systems (ICS)

A

Systems used to monitor and control industrial processes, found in various industries like electrical, water, oil, gas, and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examples of ICS systems

Distributed Control Systems (DCS)

A

Used in control production systems within a single location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Example of ICS systems

Programmable Logic Controllers (PLCs)

A

Used to control specific processes such as assembly lines and factories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Supervisory Control and Data Acquisition (SCADA) Systems

A

Type of ICS designed for monitoring and controlling geographically dispersed
industrial processes

Common in industries like…

Electric power generation, transmission, and distribution systems

Water treatment and distribution systems

Oil and gas pipeline monitoring and control systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Supervisory Control and Data Acquisition (SCADA) Systems Risks

Unauthorised Access

A

Unauthorised individuals can manipulate system operations without proper protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Supervisory Control and Data Acquisition (SCADA) Systems Risks

Malware Attacks

A

Vulnerable to disruptive malware attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Supervisory Control and Data Acquisition (SCADA) Systems Risks

Lack of Updates

A

Running outdated software with unpatched vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Supervisory Control and Data Acquisition (SCADA) Systems Risks

Physical Threats

A

Susceptible to damage to hardware or infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Securing ICS and SCADA Systems

Implement Strong Access Controls

A

● Strong passwords
● Two-factor authentication
● Limited access to authorized personnel only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Securing ICS and SCADA Systems

Regularly Update and Patch Systems

A

Keep systems updated to protect against known vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Securing ICS and SCADA Systems

Use Firewall and Intrusion Detection Systems

A

Detect and prevent unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Securing ICS and SCADA Systems

Conduct Regular Security Audits

A

Identify and address potential vulnerabilities through routine
assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Securing ICS and SCADA Systems

Employee Training

A

Train employees on security awareness and response to potential threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly