L15: Secure CPS, PLCs, and Embedded Systems

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/22

flashcard set

Earn XP

Description and Tags

Secure CPS, PLCs, and Embedded Systems

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

redundancy

Deploy multiple redundant channels and backup controllers to sustain operations during component failure

2
New cards

adaptive control

Implement control algorithms that adjust dynamically to system changes or detected threats

3
New cards

anomaly detection

Identify deviations from normal operational patterns via statistical models and ML

4
New cards

real-time response

Configure automated countermeasures that isolate affected segments or switch to backup systems

5
New cards

how to secure a CPS

  • anomaly detection

  • real-time response

  • calibrate thresholds to avoid false positives while ensuring timely threat detection

6
New cards

programmable logic controller (PLC)

A specialized industrial computer designed to automate and control machinery or processes in industrial environments

7
New cards

features of a PLC

real-time operation, resource constraints

8
New cards

embedded system

A specialized computer system designed to perform dedicated functions within a larger mechanical or electronic system

9
New cards

features of an embedded system

Dedicated functionality, Resource constraints, Real-time operations

10
New cards

what does a PLC do?

Continuously monitors input devices and executes pre-programmed instructions to control output devices

11
New cards

vulnerabilities of PLCs

  • Legacy code

  • Weak authentication

  • Outdated firmware

12
New cards

mitigations of PLC vulnerabilities

  • Regular firmware updates and patch management

  • Restrict remote access through strict network segmentation and VPNs

  • Use digital signatures to validate firmware integrity

13
New cards

vulnerabilities of embedded systems

  • limited processing power and memory

  • use of proprietary protocols

14
New cards

enhancements of embedded systems

  • Secure boot processes to verify the integrity of the system at startup

  • Hardened operating systems with minimal services and attack surfaces

  • Encryption for data stored and transmitted by embedded devices

15
New cards

best practices to secure PLCs

  • Periodic vulnerability assessments and pen testing

  • Establish a secure supply chain for hardware components

  • Role-based access control

  • Logging and anomaly detection

16
New cards

vulnerabilities of RF

  • Intercept wireless signals

  • Jamming

  • Spoofing

17
New cards

mitigations of RF vulnerabilities

  • Robust encryption on wireless communications

  • Frequency hopping or spread spectrum techniques to thwart interference

  • Monitor RF spectrum for anomalies

18
New cards

hardware threats

  • Physical tampering

  • Side-channel attacks

  • Reverse engineering

19
New cards

hardware protective measures

  • Tamper-evident and tamper-resistant hardware design

  • Physical enclosures, secure key storage

  • Obfuscation and code signing to protect firmware integrity

20
New cards

challenges of securing hardware

  • Balance cost, performance, and security in hardware design

  • Integrate physical security with cyber controls in a unified strategy

21
New cards

layered defense

Combine resilient control systems, tailored IDS/IPS, secure PLC/embedded system measures, and RF protections

22
New cards

coordination and monitoring

Continuous monitoring through SIEM, Regular audits, risk assessments, and vulnerability scanning

23
New cards

best practices to secure embedded systems

  • layered defense

  • coordination and monitoring

  • adhere to standards and frameworks