Week 6 - CPS Challenges Flashcards

1
Q

Challenges

A
  1. Interoperability
  2. Predictability
  3. Reliability
  4. Sustainability
  5. Dependability
  6. Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Interoperability

A

Ensuring systems adhere to standard designs and open specifications for improved compatibility, scalability, diversity, and efficiency.

Interoperable systems allow components to work together, exchange information, and provide services seamlessly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Predictability

A

Achieving predictability in terms of the system’s state, behavior, and functionality.

Precise timing, such as Precision Timing (PreT), is a key challenge in this area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Reliability

A

Ensuring the system performs its functionality correctly.

Components of reliability include robustness, validity, and maintainability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sustainability

A

Establishing adaptive, resilient, and reconfigurable systems capable of functioning without compromising requirements.

Sustainable systems should be long-lasting, self-healing, and able to dynamically evolve.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dependability

A

Building trustworthy systems that are highly available to legitimate users while maintaining service integrity.

Key attributes of dependable systems include reliability, maintainability, availability, and safety/integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security

A

Ensuring system security through the use of software and hardware to meet the required CIA (Confidentiality, Integrity, Availability).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security (Adversary Model)

A

Considerations regarding adversaries in an adversary model:

Adversary assumptions: identify potential attacker.

Adversary goals: identify attackers objectives,

Adversary capabilities: assess attackers expertise, knowledge, tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security (IT vs. CPS/OT)

A

Fundamental differences between IT security and CPS security:

CPS security prioritizes availability as the most critical aspect, while IT systems emphasize confidentiality.

CPS uses static configurations (not in the enterprise zone) compared to IT systems that use DHCP in their protocol.

IT systems require frequent updates and patches, while CPS systems experience infrequent updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Countermeasure

A

Actions taken to offset an attack.

Understanding attacker’s intentions and attack consequences.

Designing new attack detection and resilient algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Prevention

A

Developing security schemes for the CPS infrastructure.

Implementing regulations, standards, and best practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Detection and Recovery

A

Detecting and recovering from attacks, especially when prevention fails.

CPS uses both network traffic and physical process monitoring.

Training human operators or intelligent agents for attack detection and recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Resilience

A

Designing CPS systems that can survive attacks.

Implementing redundancy.

Separation of privilege.

Using control loops (interruptible by humans in case of disturbance).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Deterrence

A

Discouraging attacks through the fear of consequences.

Enforcing legislation.

Law enforcement.

International collaboration for tracking cybercrimes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Keeping CPS Secure

A

Safety
Protection
Reliability
Robust Control
Safety vs Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Safety

A

Consider the likelihood of failures and their consequences while designing safety requirements (or SIS).

Safety Instrumented Systems (SIS) are dedicated safety monitoring systems independent of the main control system.

SIS ensures a safe shutdown or predefined safe state in case of hardware malfunctions, even as simple as a pressure relief valve in boilers.

SIS implements one or more Safety Instrumented Functions (SIF) composed of sensors, logic solvers, and physical elements, often with varying safety integrity levels (SIL).

17
Q

Safety (Purpose of SIS)

A

SIS serves three main purposes:

Automatically take an industrial process to a safe state when specified conditions are violated.

Permit a process to proceed safely when specified conditions allow (permissive functions).

Take action to mitigate the consequences of an industrial hazard.

18
Q

Safety (Hazard Mitigation Layers)

A

Mitigating hazards through a layered approach:

Basic low-priority alarms sent to a monitoring station.

Activation of SIS systems.

Mitigation safeguards like physical protection systems (e.g., dikes).

Organizational response protocols for plant emergency response and evacuation.

19
Q

Defense-in-depth Strategy (DDS)

A

Refers to a cybersecurity approach that
uses multiple layers of security for holistic protection. A layered defense
helps security organizations reduce vulnerabilities, contain threats, and
mitigate risk

It is a holistic ICS security posture by stacking defenses, or in other
words, by creating multiple layers of backup security controls that cover
and overlap each other. Therefore, in defense-in-depth approach, if a
bad actor breaches one layer of defense, they might be contained by
the next layer

20
Q

Physical Security - DDS

A

Limit physical access to authorized personnel using locks, gates, key cards, and biometrics.

Implement policies, procedures, and technology to escort and track visitors.

21
Q

Network Security - DDS

A

Create security zones through network segmentation, switches, routers, VLANs, and firewall rules.

Implement AAA (Authentication, Authorization, and Accounting) and intrusion detection and prevention systems.

22
Q

Computer Security - DDS

A

Apply patch management, anti-malware software, and remove unused applications/protocols/services.

Protect physical and logical ports, and restrict access to unused communication ports.

23
Q

Control DIversity - DDS

A

Use diverse control mechanisms to protect against various threats.

Implement security policies on downloads, file attachments, and limit user privileges.

24
Q

Vendor Diversity - DDS

A

Use different security vendors for various devices and network components.

Reduce the risk of missing a particular malware by diversifying security vendors.

25
Q

Application Security - DDS

A

Prevent unauthorized interactions with programs and services.

Implement authentication, authorization, and auditing, keeping applications free from vulnerabilities.

26
Q

Device Security - DDS

A

Focus on the AIC triad of ICS Devices (Availability, Integrity, and Confidentiality).

Prioritize availability in ICS and implement device patching, hardening, access restrictions, and device lifecycle management.

27
Q

Safety vs Security

A

Adding new security defenses may raise safety concerns.

Example: A power plant shutdown occurred when a computer rebooted after a patch.

Software updates and patching might violate safety certifications.

Restricting unauthorized access to a CPS may hinder first responders during emergencies.

For instance, paramedics might need access to a medical device that prevents unauthorized connections.

Security solutions should consider CPS safety when implementing new security mechanisms.