Specialized Technology Flashcards

1
Q

A security policy set by a company that allows employees to use their personal
smartphones, laptops, and tablets for work and connection to the corporate
network

A

Bring Your Own Device (BYOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The process and supporting technologies for tracking, controlling, and securing
the organization’s mobile infrastructure

A

Mobile Device Management (MDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A mobile device management suite with broader capabilities, such as identity and
application management

A

Enterprise Mobility Management (EMM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A group of objects (electronic or not) that are connected to the wider Internet by using
embedded electronic components

A

IoT Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A computer system that is designed to perform a specific, dedicated function

A

Embedded System Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A type of computer designed for deployment in an industrial or outdoor setting
that can automate and monitor mechanical systems

A

Programmable Logic Controller (PLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A processor that integrates the platform functionality of multiple logical
controllers onto a single chip

A

System-on-Chip (SoC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A type of OS that prioritizes deterministic execution of operations to ensure
consistent response for time-critical tasks

A

Real-Time Operating System (RTOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A processor that can be programmed to perform a specific function by a customer
rather than at the time of manufacture

A

Field Programmable Gate Array (FPGA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A communications network designed to implement an industrial control system
rather than data networking

A

Operational Technology (OT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network that manages embedded devices

A

Industrial Control Systems (ICS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Digital serial data communications used in operational technology networks to
link PLCs

A

Fieldbus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Input and output controls on a PLC to allow a user to configure and monitor the
system

A

Human-Machine Interface (HMI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Software that aggregates and catalogs data from multiple sources within an
industrial control system

A

Data Historian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A type of industrial control system that manages large-scale, multiple-site devices
and equipment spread over geographic region

A

Supervisory Control and Data Acquisition (SCADA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A communications protocol used in operational technology networks

A

Modbus

17
Q

Four key controls for mitigating vulnerabilities in specialized systems
o Establish administrative control over Operational Technology networks by
recruiting staff with relevant expertise
o Implement the minimum network links by disabling unnecessary links, services,
and protocols
o Develop and test a patch management program for Operational Technology
networks
o Perform regular audits of logical and physical access to systems to detect possible
vulnerabilities and intrusions

A

Mitigating Vulnerabilities

18
Q

Systems used for building automation and physical access security

A

Premise Systems

19
Q

Components and protocols that facilitate the centralized configuration and
monitoring of mechanical and electrical systems within offices and data centers
▪ Process and memory vulnerabilities in PLC
▪ Plaintext credentials or keys in application code
▪ Code injection via web user interface

A

Building Automation System (BAS)

20
Q

Components and protocols that facilitate the centralized configuration and
monitoring of security mechanisms within offices and data centers

A

Physical Access Control System (PACS)

21
Q

Vehicles connect numerous subsystems over a controller area network (CAN)

A

Vehicular Vulnerabilities

22
Q

A digital serial data communications network used within vehicles

A

Controller Area Network (CAN)