Test 2 Flashcards

1
Q

Reference Architecture

A

A framework for integrating operational technology (OT) with information technology (IT) to enhance data accessibility and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Operational Technology (OT)

A

Hardware and software that detects or causes changes through direct monitoring and control of physical devices, processes, and events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information Technology (IT)

A

Systems and technologies used for managing and processing information, including hardware, software, and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Purdue Model

A

A hierarchical architecture that segments OT networks into functional levels and uses point-to-point connections for data sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Event-Centric Integration

A

An integration pattern that utilizes unidirectional message streams for efficient communication between various systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MQTT Broker

A

A lightweight, publish-subscribe messaging protocol that facilitates the transfer of messages from event producers to consumers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sparkplug B

A

An open-source specification that provides an MQTT topic namespace and defines state management and payload encoding for industrial applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Unified Namespace (UNS)

A

A design approach that standardizes data access and organization across different systems and teams in industrial settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CPS Protection Platform

A

A platform designed to discover, protect, and secure cyber-physical assets while integrating with IT security tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Hub

A

A centralized system that accesses and normalizes OT data at the edge, sharing it with applications in the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Industrial Internet of Things (IIoT)

A

A network of interconnected devices and systems in industrial environments that leverage data for enhanced operational efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Zero-Trust Security

A

A security model that mandates strict verification for every user and device trying to access resources, particularly in industrial contexts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cyber-Physical Systems (CPS)

A

Systems that integrate physical processes with computational elements to monitor and control physical devices and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hierarchical Architecture

A

An architecture that organizes components in layers, each with specific functions and responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

API (Application Programming Interface)

A

A set of rules and protocols for building and interacting with software applications, facilitating data exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Event Streams

A

Continuous flows of data generated by devices or applications that can be processed in real-time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data Integration

A

The process of combining data from different sources to provide a unified view for analysis and reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ISA-95

A

A standard for developing an automated interface between enterprise and control systems, often used in manufacturing.

19
Q

SCADA (Supervisory Control and Data Acquisition)

A

A system used for controlling industrial processes and gathering real-time data from remote locations.

20
Q

Cloud Computing

A

Delivery of computing services over the internet, including storage, processing, and networking.

21
Q

Edge Computing

A

Processing data near the source of data generation to reduce latency and bandwidth use.

22
Q

Data Collectors

A

Tools or systems that gather data from various sources for processing and analysis.

23
Q

Cybersecurity

A

The practice of protecting systems, networks, and programs from digital attacks.

24
Q

Ransomware

A

A type of malicious software that encrypts a user’s files and demands payment for the decryption key.

25
Q

Malware

A

Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.

26
Q

Trust Zones

A

Segregated areas within a network that provide different levels of access and security for resources.

27
Q

Event Brokers

A

Middleware that manages and routes events between producers and consumers in an event-driven architecture.

28
Q

Data Auto Discovery

A

Automated identification and cataloging of data sources within an organization.

29
Q

Machine Learning (ML)

A

A subset of artificial intelligence that enables systems to learn and improve from experience without explicit programming.

30
Q

Digital Twins

A

Virtual replicas of physical systems used for simulation, analysis, and optimization.

31
Q

Secure Connection

A

A protected link established between devices or networks to ensure data integrity and confidentiality.

32
Q

Transport Protocols

A

Protocols used to transfer data across a network, ensuring delivery and error checking.

33
Q

Management Protocols

A

Protocols that facilitate the management and monitoring of devices and applications.

34
Q

Control Protocols

A

Protocols that enable commands and control messages to be sent between devices or systems.

35
Q

Fragmented Data

A

Data that is scattered across various systems and formats, making it difficult to analyze and utilize effectively.

36
Q

Real-Time Data

A

Information that is delivered immediately after collection, allowing for timely processing and decision-making.

37
Q

Data Flows

A

The movement of data between systems, applications, and devices within an architecture.

38
Q

Data Hierarchy

A

The organization of data in a structured manner, often reflecting relationships and dependencies between data elements.

39
Q

Cyber-Physical Security

A

Security measures specifically designed to protect the intersection of cyber and physical systems.

40
Q

Asset Discovery

A

The process of identifying and cataloging all assets within an organization’s IT and OT environments.

41
Q

Legacy Systems

A

Older computer systems or applications that may no longer be efficient or supported but are still in use.

42
Q

Interconnected Systems

A

Systems that are linked together, allowing for data and information sharing across different platforms and environments.

43
Q

Technical Professionals

A

Individuals with expertise in technology and engineering, responsible for implementing and managing IT and OT solutions.