Week 9 Flashcards

1
Q

CPS Security Requirements

A

Securing CPS is complex; key requirements include:

Privacy,

Resiliency,

Dependability,

Interaction and coordination,

Operational security (OpSec),

System hardening;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CPS Security Challenges

A

Adoption of security measures has benefits but may impact CPS.

Reduced performance, higher power consumption, transmission delay, higher cost, compatibility issues, operational security delay.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CPS Security Solution

A

CPS systems are categorized based on criticality:

Safety Critical, Mission Critical, Business Critical, and Security Critical.

Main security solutions encompass cryptographic and non-cryptographic approaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality - Cryptographic

A

Security measures include encompression to reduce overhead, ultra-lightweight block ciphers for hardware efficiency, and solutions like bump-in-the-wire (BITW) for legacy devices.

Various integrity solutions, such as SIEM, TAIGA, SSU, and watermarking, are also implemented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrity - Cryptographic

A

Security measures, including SIEM, TAIGA, SSU, and watermarking, focus on preventing physical or logical modifications of real-time data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication - Cryptographic

A

Homomorphic Encryption is employed to prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Intrusion Detection - Non-cryptographic

A

Intrusion Detection Systems (IDS) play a crucial role in detecting abnormal behavior in the network.

They can be physical or cyber-based, employing signature-based or anomaly-based approaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Honeypots & Deception - Non-cryptographic

A

Honeypots and deception techniques are utilized as decoys to hide and protect systems.

MITM and DOS attack defenses are implemented, and anomaly detection leverages digital twin models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Physical Security

A

Rudimentary steps for physical security include measures such as remote site protection, access control, monitoring, locks, deterrence, and detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attack Detection

A

Watermarking,
false data injection (fuzzing),
anomaly detection (digital twin models).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Anomaly Detection

A

Anomaly detection relies on a simplified digital twin model to identify deviations in the expected behavior of a physical system, serving as an indicator of potential attacks on sensor data or actuators.

However, accurate modeling can be challenging, leading to occasional false alarms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Watermarking

A

Multiplicative Watermarking: Modifies sensor outputs with a watermark, allowing tamper detection and data integrity verification.

Additive Watermarking: Introduces a watermark to sensor outputs, facilitating tamper detection and ensuring data integrity during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

False Data Injection

A

Fault Injection (Fuzzing): Stress-tests emulated PLCs for non-destructive vulnerability detection, utilizing AI for automated test data generation.

Industrial Control Protocol Fuzzing: Addresses the complexity of proprietary communication protocols using AI to automatically generate test data, as seen in tools like ICPFuzzer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly