ISA62443 IC32 Test Preparation

0.0(0)
studied byStudied by 18 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/245

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

246 Terms

1
New cards

OPC

- Object Linking and Embedding (OLE) for Process Control
- 1996 by Industrial Automation Task Force
- Based on Microsoft DCOM, OLE, COM technologies
- OPC Foundation (https://opcfoundation.org)

2
New cards

OSI Layer 5 Protocols

Protocols:
- NetBIOS
- Network File System (NFS)
- Remote Procedure Call (RPC)
- Secure Shell (SSH, SSH-2)
- Session Initiation Protocol (SIP)
- Structured Query Language (SQL)

3
New cards

Software Development Security Assurance Activities

1) SDLA - Security Development Lifecycle Assessment
2) FSA - Functional Security Assessment
3) SRT - System Robustness Testing (e.g., Pen Test, Scan for Virus, etc.)

4
New cards

What is Detection in Depth?

- Alarms
- Logs
- Detection Methods (e.g, IDS, IPS, Firewalls, Patch mgmt, AV)
- Detect missing devices

5
New cards

445

Active Directory / File Shares Port

6
New cards

Business Continuity Program should include:

- Recovery Objectives
- Potential interruptions & the Recovery procedures
- Schedule or Test part or all of recovery procedures

7
New cards

Environmental Conditions that can affect IACS integrity

- Particulates
- Liquids
- Vibration
- Gases
- Radiation
- EMI (Electromagnetic interference)

8
New cards

External Connections

All external connections (e.g., power, communications, etc.) shall be adequately protected from tampering or damage.

9
New cards

Firewall Policy ACL Rule

- Source IP
- Destination IP
- Source Port (TCP or UDP)-
Destination Port (TCP or UDP)
- State of TCP "ACK" Bit
- Direction of Packet Flow

10
New cards

FR-6 Timely Response to Events (TRE)

> Audit log accessibility
> Continuous monitoring

11
New cards

Internet Assigned Numbers Authority (www.iana.org)

IANA

12
New cards

Industrial Automation & Control System

Collection of:
- personnel
- hardware
- software
- policies
Involved in operations of industrial processes ... affect or influence safe, secure reliable operations.

13
New cards

IPv4 Private Addresses

- 10.0.0.0 to 10.255.255.255 (16,777,216 addresses)
- 172.16.0.0 to 172.31.255.255 (1,048,576 addresses)
- 192.168.0.0 to 192.168.255.255 (65,536 addresses)

14
New cards

IPv4 vs IPv6 sizes

IPv4 = 32 bits
IPv6 = 128 bits

15
New cards

OPC Classic

- Aka OPC DA, OPC DCOM
- Dynamically assigns TCP Ports (Firewall problem)
- Don't know in advance of ports
- Can't define firewall rules

16
New cards

OSI Layer 3

- Network Layer
- Routable Protocols = IPv4, IPv6, IPX (Novelle), ICMP, IGMP, IPSec
- Routing Protocols = RIP(Router Info Protocol), OSPF, BGP

17
New cards

Port 2222

Ethernet/IP, Implicit Messaging, UDP

18
New cards

RCMP Harmonized Threat & Risk Assessment

TRA-1

19
New cards

Types of Assets

- Physical Assets
- Logical Assets
- Human Assets

20
New cards

Define Methodology for Identifying Risks

What is the first step in the High-Level Risk Assessment?

21
New cards

Chain of custody

Maintaining a high degree of confidence regarding the integrity of evidence requires a(n):

22
New cards

Business needs

Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of:

23
New cards

Address Resolution Protocol

Resolves IP Addresses to MAC Addresses

24
New cards

Asymmetric key encryption is used to securely obtain symmetric keys

In practical applications:

25
New cards

At the perimeter, to allow for effective internal monitoring

Where should an organization's network terminate virtual private network (VPN) tunnels?

26
New cards

Attack Vectors

- Software Bugs- Malware/Malicious Software
- Unauthorized Physical Access
- Unauthorized Network Access
- Abuse (e.g., Disgruntled Employee)
- Misuse (i.e, human error)

27
New cards

Authenticator

Required to prove identity:
- tokens
- symmetric keys
- private keys
- biometrics
- passwords
- physical keys
- key cards

28
New cards

Basic Risk Assessment Process

1. Assess initial risk
2. Implement risk mitigation measures
3. Assess residual risk

29
New cards

Boundary Protection Devices

- Proxies
- Gateways
- Routers
- Firewalls
- Data Diodes
- Guards
- Encrypted
- Tunnels

30
New cards

Channels

Specific communication links established within a communications conduit.Can be trusted or untrusted.

31
New cards

Classes of Cryptography

- Block
- Stream

32
New cards

Classes of Firewalls

- Packet Filter
- Stateful Inspection
- Application Proxy

33
New cards

Common Criteria

IEC 15408

34
New cards

Common Forms of Threats

- Accidental
- Non-validated changes

35
New cards

Common Industrial Protocol (CIP)

- Formerly Control & Information Protocol
- Rockwell Automation (IEC-16658)
- OpenDevice Net Vendors Association (ODVA)

36
New cards

Common Industrial Protocols (CIPs)

- DeviceNet
- ControlNet
- Ethernet/IP (IP = Industrial protocol)

37
New cards

Compensating Countermeasures

- Component Level - Physical
- Component Level - Logical
- Control System/Zone Level

38
New cards

Conduit

Logical grouping of communications channels connecting 2 or more zones - share common security requirements.

39
New cards

Conduit Characteristics

- Security Policies
- Asset Inventory
- Access Requirements & Controls
- Threats & Vulnerabilities
- Consequences of Security Breach
- Authorized Technologies
- Change Management
- Connected Zones ** (Distinguish between Conduit and Zone)

40
New cards

Consists of two or more security zones

A segmented network:

41
New cards

Core business functions

Outsourcing poses the greatest risk to an organization when it involves:

42
New cards

CSMS

Cyber Security Management System

43
New cards

CSMS Scope Includes...

- Business Perspective (Corporations, Business Units, Geographical Regions, Sites)
- Archtectural Perspective (Connections to suppliers, customers, etc.)

44
New cards

Definition of Conduit

A particular type of security zone that groups communications that can be logically organized into a grouping of information flows WITHIN and EXTERNAL to a Zone.
- Can be trusted or untrustedCan be physical or logical
- No such thing as "subconduits"

45
New cards

Detailed procedures

A business continuity plan (BCP) is not complete unless it includes:

46
New cards

Device Decision Basis

- Switch = MAC Addresses
- Router = IP Addresses
- Firewall = Port #
- Application Proxy
== Stateful Inspection
== Deep Inspection
== Application Protocols (FTP, HTTP, etc.)
== Data Payload

47
New cards

DOD Model (aka TCP/IP Model)

> Application == (Application, Presentation, Session of OSI)
> Transport == (Transport of OSI)
> Internet == (Network of OSI)
> Network Access (or Link) == (Data Link and Physical of OSI)
> TCP/IP Comes in A TIN (Mnemonic)

48
New cards

EAL

Evaluation Assurance Level (Common Criteria)

49
New cards

Elements of a CSMS

1) Risk Analysis
2) Addressing Risk with CSMS
3) Monitoring and Improving the CSMS

50
New cards

Emergent

An interoperability error is what type of vulnerability?

51
New cards

Eradication

During which phase of the six-phase incident response model is the root cause determined?

52
New cards

Essential Function Definition

Function or capability that is required to maintain health, safety, environment, availability for equipment under control.

53
New cards

Ethernet/IP

- Implicit Messaging - UDP - Port 2222
- Explicit Messaging - TCP - Port 44818

54
New cards

Examples of compensating countermeasures

- User ID
- Password Strength Enforcement
- Signature Validity Checking
- Security Event Correlation
- Device Decommissioning

55
New cards

External Time Sources

GPS
GLONASS - Global Navigation Satellite System
Galileo

56
New cards

File Transfer Protocol (FTP) Ports

20 - Default Data
21 - Control

57
New cards

Firecall

Method to provide emergency access to a secure control system (e.g., onetime password or onetime user ID)

58
New cards

Firewall Architecture by Security Level

#1 - Paired Firewalls
#2 - Firewall with DMZ
#3 - Firewall
#4 - Router or Layer 3 Switch with ACLs
#5 - Dual-Homed Computer

59
New cards

Firewall Can and Cannot Do:

Can Do:
- Manage Traffic
- Prevent Unwanted Access
Cannot Do:
- Inspect Traffic that doe1s NOT pass through them

60
New cards

Foundational Requirements (FR)

1) Identification and Authentication Control (IAC)
2) Use Control (UC)
3) System Integrity (SI)
4) Data Confidentiality (DC)
5) Restricted Data Flow (RDF)
6) Timely Response to Events (TRE)
7) Resource Availability (RA)

61
New cards

FR-1 Identification and Authentication Control (IAC)

> Human user identification and authentication
> S/W processes and device identification and authentication
> Account management
> Identified management
> Authenticator management
> Wireless access management
> Password strength
> PKI certificates
> Strength of Public Key authentication Authenticator feedback Unsuccessful login attempts System use notification Access via untrusted networks

62
New cards

FR-2 Use Control (UC)

> Authentication enforcement
> Wireless use control
> Use control for portable and mobile devices
> Mobile code (Java, PDF, etc.)
> Session lock
> Remote session termination
> Concurrent session control
> Auditable events
> Audit storage capacity
> Response to audit processing failures
> Timestamps
> Non-repudiation

63
New cards

FR-3 System Integrity (SI)

> Communication integrity
> Malicious code protection
> Security functionality verification
> S/W and information integrity
> Input validation
> Deterministic output
> Error handling
> Session integrity
> Protection of audit information

64
New cards

FR-4 Data Confidentiality (DC)

> Information confidentiality
> Information persistence (purge shared memory)
> Use of cryptography

65
New cards

FR-5 Restricted Data Flow (RDF)

> Network segmentation
> Zone boundary protection* General purpose person-to-person communication restrictions (e.g., email, facebook, etc.)
> Application partitioning

66
New cards

FR-7 - Resource Availability includes:

> DoS Protection
> Resource Management (Prevent Resource Exhaustion)
> Control System Backup
> Control System Recovery & Reconstitution
> Emergency Power
> Network and Security Config Settings
> Least Functionality
> Control system component inventory

67
New cards

FSA

Functional Security Assessment

68
New cards

Gateways

- Layer 7 Device
- Connect two completely different network systems
- Protocol Converter = Gateway

69
New cards

Heuristic

What kind of anti-malware program evaluates system processes based on their observed behaviors?

70
New cards

High Level Data Link Control (HLDC)

- High-Level Data Link Control (HDLC) is a bit-oriented code-transparent synchronous data link layer protocol developed by the International Organization for Standardization (ISO).
- Connection and Conectionless orientations

71
New cards

Homogeneous

Updates in cloud-computing environments can be rolled out quickly because the environment is:

72
New cards

HSE

Health, Safety, Environmental

73
New cards

IACS includes:

Control systems used in manufacturing and processing plants and facilities, building environmental control systems, geographically dispersed operations such as utilities (i.e., electricity, gas and water), pipelines and petroleum production and distribution facilities, and other industries and applications such as transportation networks, that use automated or remotely controlled or monitored assets.

74
New cards

ICS Firewall Vendors

- Tofino/Belden
- Hirschman Eagle/Belden*
- Phoenix Contact mGuard*
- Moxa EDR-8xx and 9xx Switches
- Secure Crossing Zenwall Line
- Siemens Scalance S*
= same software

75
New cards

ICS Threat-Based Risk Assessment Model

1) Characterize the Product or System
2) Identify Critical Assets and Consequences
3) Identify Threats
4) Analyze Threats

76
New cards

IEC 15408

Common Criteria

77
New cards

IEC 61508

SAFETY (SIL)"Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems"

78
New cards

IGMP

Internet Group Management Protocol(OSI Layer 3)

79
New cards

Incident Response Program

> Classification of Incidents
> Contingency Planning
> Response Actions (Do Nothing to System Shutdown)
> Recovery Actions

80
New cards

Insecure protocols could result in a compromise of privileged user credentials

Virtual systems should be managed using a dedicated virtual local area network (VLAN) because:

81
New cards

Internal Threats

- 80% of events
- Inappropriate Behavior
- Security Accident (e.g., NMAP scan)
- Disgruntled employee

82
New cards

Intrusion Detection Issues

- False Positives
- Deployment & Ops Costs
- Only Effective Against Known Vulnerabilities
- Limited Signatures for ICS
- Don't work with encrypted services

83
New cards

IPSec

- Tunnel Mode (Payload and header encrypted)
- Encapsulation or Transport Mode (only payload is encrypted)
Protocols = Authentication Header (AH) and Encapsulating Security Payload (ESP)
Resides at Network Layer (Layer 3 next to IP)

84
New cards

IPv4 Address Dissection

147.10.24.16
147.10 = Network
.24 = Subnet
.16 = Host

85
New cards

IPv4 Loopback

127.xxx.xxx.xxx

86
New cards

ISA 99 Four Layers

1. General
2. Policies & Procedures
3. Systems
4. Components

87
New cards

ISASecure Supplier Device Approval Process

Includes Integrated Threat Analysis (ITA)
1) Functional Security Assessment (FSA)
2) Communication Robustness Test (CRT)
3) Software Development Security Assurance (SDSA) Audit

88
New cards

ISMS

Information Security Management System(ISO 27001)

89
New cards

Key Components of Business Rationale

- Prioritized Business Consequences
- Prioritized Threats
- Estimated Annual Business Impact
- Cost of Human Effort & Consequences

90
New cards

Local Area Network (LAN)

> Limited distance <10 KM
> Usually within single facility
> Names: Supervisory Networks, DCS Highways, PLC Highways, Fieldbuses, Device Networks

91
New cards

Linking the Oil and Gas Industry to Improve Cybersecurity

LOGIIC

92
New cards

LOGIIC SIS Project

- Greater integration may introduce greater risk
- Default configurations are not secure
- Defense in Depth reduces risk
- Clear guidance is needed

93
New cards

Loss of Essential Functions

- Loss of protection
- Loss of control
- Loss of view

94
New cards

Malicious code

Under the US-CERT model for incident categorization, a CAT-3 incident refers to which of the following?

95
New cards

Malicious Code Protection Techniques

- Black/white lists- Removable media control
- Sandbox techniques- No Execute (NX) bit
- Data Execution Prevention
- ASLR - Address Space Layout Randomization
- Stack corruption detection
- Mandatory Access Control (MAC)

96
New cards

Mobile Code

- Java
- Java Script
- Active X
- PDF (Portable Document Format)
- Postscript
- Shockwave movies
- Flash
- VBScript

97
New cards

Modbus

- 1979 by Modicon (Now Schneider)
- Open Standard / Royalty Free
- Most widely used protocol (>7 M nodes)
- Modbus Org since 2004 (www.modbus.org)
- Master-Slave Architecture

98
New cards

Modbus TCP Port

502 port

99
New cards

MSUS

Microsoft Server Update Service

100
New cards

Network Security Technologies

- Devices (Switch, Router, Firewall, Data Diodes)
- Architectures (Segmentation)
- Cryptography (VPN, Hashes, Secure Passwords)
- IDS (Network and Host)- IPS