1/22
Secure CPS, PLCs, and Embedded Systems
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
redundancy
Deploy multiple redundant channels and backup controllers to sustain operations during component failure
adaptive control
Implement control algorithms that adjust dynamically to system changes or detected threats
anomaly detection
Identify deviations from normal operational patterns via statistical models and ML
real-time response
Configure automated countermeasures that isolate affected segments or switch to backup systems
how to secure a CPS
anomaly detection
real-time response
calibrate thresholds to avoid false positives while ensuring timely threat detection
programmable logic controller (PLC)
A specialized industrial computer designed to automate and control machinery or processes in industrial environments
features of a PLC
real-time operation, resource constraints
embedded system
A specialized computer system designed to perform dedicated functions within a larger mechanical or electronic system
features of an embedded system
Dedicated functionality, Resource constraints, Real-time operations
what does a PLC do?
Continuously monitors input devices and executes pre-programmed instructions to control output devices
vulnerabilities of PLCs
Legacy code
Weak authentication
Outdated firmware
mitigations of PLC vulnerabilities
Regular firmware updates and patch management
Restrict remote access through strict network segmentation and VPNs
Use digital signatures to validate firmware integrity
vulnerabilities of embedded systems
limited processing power and memory
use of proprietary protocols
enhancements of embedded systems
Secure boot processes to verify the integrity of the system at startup
Hardened operating systems with minimal services and attack surfaces
Encryption for data stored and transmitted by embedded devices
best practices to secure PLCs
Periodic vulnerability assessments and pen testing
Establish a secure supply chain for hardware components
Role-based access control
Logging and anomaly detection
vulnerabilities of RF
Intercept wireless signals
Jamming
Spoofing
mitigations of RF vulnerabilities
Robust encryption on wireless communications
Frequency hopping or spread spectrum techniques to thwart interference
Monitor RF spectrum for anomalies
hardware threats
Physical tampering
Side-channel attacks
Reverse engineering
hardware protective measures
Tamper-evident and tamper-resistant hardware design
Physical enclosures, secure key storage
Obfuscation and code signing to protect firmware integrity
challenges of securing hardware
Balance cost, performance, and security in hardware design
Integrate physical security with cyber controls in a unified strategy
layered defense
Combine resilient control systems, tailored IDS/IPS, secure PLC/embedded system measures, and RF protections
coordination and monitoring
Continuous monitoring through SIEM, Regular audits, risk assessments, and vulnerability scanning
best practices to secure embedded systems
layered defense
coordination and monitoring
adhere to standards and frameworks