Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
45 Cards in this Set
- Front
- Back
- 3rd side (hint)
Industrial systems |
System of machines such as an assembly line at a manufacturing plant |
|
|
Internet of Things (IoT) |
When industrial systems use Internet for connectivity. Connects objects that are not used as computers to the internet |
Thermostat, refrigerator, security lighting |
|
Industrial control system |
Group of networked computers used to manage a physical system of industrial processes |
|
|
Single facility Physical system |
Type of industrial/physical system. Examples: power plant, sewage plant, water filtration plant |
Think plants |
|
ICS Components |
Contain same types that a LAN or WAN would use, including workstations, printers, routers, cabling, switches |
|
|
SCADA |
Supervisory Control and Data Acquisition - system responsible for obtaining real-time data from the physical system and presenting data to humans. Includes software, servers, and communication channels |
|
|
RTU |
Remote Terminal Units - devices installed at key locations in the industrial system. Sense attributes of the physical system, convert analog data to digital data. Example: an RTU might sense temperature, water depth, humidity, speed. |
Considered a field device |
|
PLC |
Programmable Logic Controller - small dedicated (meaning specific task) computer capable of converting analog to digital data. Can control machinery, works in real time, critical point of a physical system. Example: dishwasher PLC senses water temperature |
|
|
Fieldbus |
Communication channel between a PLC and an RTU when both devices are seperate |
|
|
HMI |
Human-machine Interface - computers (hardware and software) that people monitor to manage a physical system |
|
|
Acquisitions server |
Also called an I/O Server. Collects and stores raw data; connected to field devices from which it receives raw data and passes the data to other servers. |
|
|
Control server |
Supervisory computer which can control the physical system; also called the master terminal unit (MTU) or the SCADA Server. |
|
|
Historian |
Centralized database of collected and analyzed data and control activities. The data is analyzed to recognize trends in the physical system. |
|
|
Two methods an ICS uses to control physical system |
Open looped system and Closed loop system. |
|
|
Open loop system |
Also called open network. Makes decisions based on predetermined expectations, events, and past history of the system. Doesn't have any regard to what the system is currently doing. Controller --> Actuator --> Process (disturbance) |
|
|
Actuator |
Any device in an ICS that is motorized and can control the physical system |
|
|
Closed loop system |
Also called a closed network; makes decisions on real-time data. Controller --> Actuator --> Process (disturbance) --> Sensor Input --> Back to Controller |
|
|
How can you help keep an ICS network secure? |
-inventory connections to ICS/SCADA network, disconnect unnecessarys -segment ICS network from corporate network -isolate network by using a DMZ, use firewalls in between networks -completely disconnect ICS network from the internet -implement strict firewall rules, IDS, and physical security (guards/officers -deploy redundancy where appropriate (devices not used but needed in case a similar device fails) |
|
|
How can you help secure an ICS network? Part 2. |
-strictly control access to the network with encryption -protect historian with a DMZ, or put a backup historian in a DMZ for corporate use -place a Faraday cage around wifi hotspots -keep documentation of all configuration management |
|
|
Asset management |
Monitoring and maintaining of all assets that make up the ICS network. This includes keeping inventory of all components |
|
|
Asset management |
Monitoring and maintaining of all assets that make up the ICS network. This includes keeping inventory of all components |
|
|
Business documents |
RFP MOU SOW SLA MSA MLA |
|
|
RFP |
Request for Proposal - request to vendors to submit a proposal for a product or service your company wants to buy. |
|
|
MOU |
Memorandum of Understanding - documents intentions of two or more parties to enter a binding agreement, or contract. Usually not legally binding, does not grant extensive rights to one party, no legal recourse |
|
|
SOW |
Statement of Work - documents in detail the work that must be completed for a particular project. Can be enforced in a court of law (legally binding) |
|
|
SLA |
Service-level Agreement - legally binding contract, defines in plain language the aspects of a service provided to a customer, such as an ISP |
|
|
MSA |
Master service agreement - contract that defines the terms of future contracts between parties, such as payment terms |
|
|
MLA |
Master License Agreement - grants license from creator such as a software producer to a third party for purposes of marketing the product to consumers. |
|
|
Software changes |
Patch Upgrade Rollback |
|
|
Patch |
Correction, improvement, or enhancement to software. Corrects bugs, adds minor enhancements, or closes vulnerabilities. |
|
|
Upgrade |
Software upgrade is a major change to software that enhances functionality and features, while also correcting bugs amd vulnerabilities. When applied, it is called a driver update. |
|
|
Rollback |
Software rollback, also called back leveling or downgrading, reverts to a previous software version after a patch or upgrade attempt |
|
|
Cipher locks |
Physical or electronic lock that requires a code to open the door. Controls access in and out of a room, controlling access times, logging who comes in and out, etc. |
|
|
Access badges |
Also called smart cards, can be programmed to allow the owner access to some, but not all, rooms in a building. |
|
|
Proximity cards |
Badges that don't need to come in physical contact with the proximity reader in order to be detected. Can even be concealed in a wall Typical range of about 5-10cm |
|
|
Passive cards |
Similar to NFC tags, they collect power from the readers power field in order to transmit data. |
|
|
Active cards |
Contain internal lithium batteries and provide for greater range (up to 150m), which makes active cards ideal for long-range applications such as security gates or tollbooths |
|
|
Biometrics |
More expensive physical security solutions that involves biorecognition access, which a device scans an individuals unique physical characteristic (aka biometrics) |
|
|
Mantrap |
Type of security that uses two doors on either side of a small entryway or hallway, where the first for must close before the second one can open. A seperate form of Identification might be required for each door. Both doors could become locked in order to detain an intruder |
|
|
AIT |
Advanced imaging technology - uses millimeter wave scanners that emit radio waves (similar to cell phones) to indicate areas of concern on an individual to security personnel. |
|
|
CCTV |
Closed-circuit TV - video surveillance systems used to monitor activity in secured rooms such as data centers or computer rooms |
|
|
What is done with the footage obtained by CCTV? |
It's contained within a seperate, secured segment of the network Saved for a period of time in case it's needed later |
|
|
Disaster recovery |
Process of restoring your critical functionality and data after an outage that affects more than one system |
|
|
eDiscovery (electronic discovery) |
Reveals information about ESI, electronically stored information, or active data, contained on a computers hard drive and storage media. |
|
|
Computer forensics |
Process of investigating deeper into a computer's data to discover hidden data. This hidden data could be deleted files or file fragments, and also reveals who accessed the data and when. |
|