Week 6 - CPS Challenges Flashcards
Challenges
- Interoperability
- Predictability
- Reliability
- Sustainability
- Dependability
- Security
Interoperability
Ensuring systems adhere to standard designs and open specifications for improved compatibility, scalability, diversity, and efficiency.
Interoperable systems allow components to work together, exchange information, and provide services seamlessly.
Predictability
Achieving predictability in terms of the system’s state, behavior, and functionality.
Precise timing, such as Precision Timing (PreT), is a key challenge in this area.
Reliability
Ensuring the system performs its functionality correctly.
Components of reliability include robustness, validity, and maintainability.
Sustainability
Establishing adaptive, resilient, and reconfigurable systems capable of functioning without compromising requirements.
Sustainable systems should be long-lasting, self-healing, and able to dynamically evolve.
Dependability
Building trustworthy systems that are highly available to legitimate users while maintaining service integrity.
Key attributes of dependable systems include reliability, maintainability, availability, and safety/integrity.
Security
Ensuring system security through the use of software and hardware to meet the required CIA (Confidentiality, Integrity, Availability).
Security (Adversary Model)
Considerations regarding adversaries in an adversary model:
Adversary assumptions: identify potential attacker.
Adversary goals: identify attackers objectives,
Adversary capabilities: assess attackers expertise, knowledge, tools.
Security (IT vs. CPS/OT)
Fundamental differences between IT security and CPS security:
CPS security prioritizes availability as the most critical aspect, while IT systems emphasize confidentiality.
CPS uses static configurations (not in the enterprise zone) compared to IT systems that use DHCP in their protocol.
IT systems require frequent updates and patches, while CPS systems experience infrequent updates.
Countermeasure
Actions taken to offset an attack.
Understanding attacker’s intentions and attack consequences.
Designing new attack detection and resilient algorithms.
Prevention
Developing security schemes for the CPS infrastructure.
Implementing regulations, standards, and best practices.
Detection and Recovery
Detecting and recovering from attacks, especially when prevention fails.
CPS uses both network traffic and physical process monitoring.
Training human operators or intelligent agents for attack detection and recovery.
Resilience
Designing CPS systems that can survive attacks.
Implementing redundancy.
Separation of privilege.
Using control loops (interruptible by humans in case of disturbance).
Deterrence
Discouraging attacks through the fear of consequences.
Enforcing legislation.
Law enforcement.
International collaboration for tracking cybercrimes.
Keeping CPS Secure
Safety
Protection
Reliability
Robust Control
Safety vs Security