ISA62443 IC32 Test Preparation

studied byStudied by 18 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 245

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

246 Terms

1

OPC

- Object Linking and Embedding (OLE) for Process Control
- 1996 by Industrial Automation Task Force
- Based on Microsoft DCOM, OLE, COM technologies
- OPC Foundation (https://opcfoundation.org)

New cards
2

OSI Layer 5 Protocols

Protocols:
- NetBIOS
- Network File System (NFS)
- Remote Procedure Call (RPC)
- Secure Shell (SSH, SSH-2)
- Session Initiation Protocol (SIP)
- Structured Query Language (SQL)

New cards
3

Software Development Security Assurance Activities

1) SDLA - Security Development Lifecycle Assessment
2) FSA - Functional Security Assessment
3) SRT - System Robustness Testing (e.g., Pen Test, Scan for Virus, etc.)

New cards
4

What is Detection in Depth?

- Alarms
- Logs
- Detection Methods (e.g, IDS, IPS, Firewalls, Patch mgmt, AV)
- Detect missing devices

New cards
5

445

Active Directory / File Shares Port

New cards
6

Business Continuity Program should include:

- Recovery Objectives
- Potential interruptions & the Recovery procedures
- Schedule or Test part or all of recovery procedures

New cards
7

Environmental Conditions that can affect IACS integrity

- Particulates
- Liquids
- Vibration
- Gases
- Radiation
- EMI (Electromagnetic interference)

New cards
8

External Connections

All external connections (e.g., power, communications, etc.) shall be adequately protected from tampering or damage.

New cards
9

Firewall Policy ACL Rule

- Source IP
- Destination IP
- Source Port (TCP or UDP)-
Destination Port (TCP or UDP)
- State of TCP "ACK" Bit
- Direction of Packet Flow

New cards
10

FR-6 Timely Response to Events (TRE)

> Audit log accessibility
> Continuous monitoring

New cards
11

Internet Assigned Numbers Authority (www.iana.org)

IANA

New cards
12

Industrial Automation & Control System

Collection of:
- personnel
- hardware
- software
- policies
Involved in operations of industrial processes ... affect or influence safe, secure reliable operations.

New cards
13

IPv4 Private Addresses

- 10.0.0.0 to 10.255.255.255 (16,777,216 addresses)
- 172.16.0.0 to 172.31.255.255 (1,048,576 addresses)
- 192.168.0.0 to 192.168.255.255 (65,536 addresses)

New cards
14

IPv4 vs IPv6 sizes

IPv4 = 32 bits
IPv6 = 128 bits

New cards
15

OPC Classic

- Aka OPC DA, OPC DCOM
- Dynamically assigns TCP Ports (Firewall problem)
- Don't know in advance of ports
- Can't define firewall rules

New cards
16

OSI Layer 3

- Network Layer
- Routable Protocols = IPv4, IPv6, IPX (Novelle), ICMP, IGMP, IPSec
- Routing Protocols = RIP(Router Info Protocol), OSPF, BGP

New cards
17

Port 2222

Ethernet/IP, Implicit Messaging, UDP

New cards
18

RCMP Harmonized Threat & Risk Assessment

TRA-1

New cards
19

Types of Assets

- Physical Assets
- Logical Assets
- Human Assets

New cards
20

Define Methodology for Identifying Risks

What is the first step in the High-Level Risk Assessment?

New cards
21

Chain of custody

Maintaining a high degree of confidence regarding the integrity of evidence requires a(n):

New cards
22

Business needs

Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of:

New cards
23

Address Resolution Protocol

Resolves IP Addresses to MAC Addresses

New cards
24

Asymmetric key encryption is used to securely obtain symmetric keys

In practical applications:

New cards
25

At the perimeter, to allow for effective internal monitoring

Where should an organization's network terminate virtual private network (VPN) tunnels?

New cards
26

Attack Vectors

- Software Bugs- Malware/Malicious Software
- Unauthorized Physical Access
- Unauthorized Network Access
- Abuse (e.g., Disgruntled Employee)
- Misuse (i.e, human error)

New cards
27

Authenticator

Required to prove identity:
- tokens
- symmetric keys
- private keys
- biometrics
- passwords
- physical keys
- key cards

New cards
28

Basic Risk Assessment Process

1. Assess initial risk
2. Implement risk mitigation measures
3. Assess residual risk

New cards
29

Boundary Protection Devices

- Proxies
- Gateways
- Routers
- Firewalls
- Data Diodes
- Guards
- Encrypted
- Tunnels

New cards
30

Channels

Specific communication links established within a communications conduit.Can be trusted or untrusted.

New cards
31

Classes of Cryptography

- Block
- Stream

New cards
32

Classes of Firewalls

- Packet Filter
- Stateful Inspection
- Application Proxy

New cards
33

Common Criteria

IEC 15408

New cards
34

Common Forms of Threats

- Accidental
- Non-validated changes

New cards
35

Common Industrial Protocol (CIP)

- Formerly Control & Information Protocol
- Rockwell Automation (IEC-16658)
- OpenDevice Net Vendors Association (ODVA)

New cards
36

Common Industrial Protocols (CIPs)

- DeviceNet
- ControlNet
- Ethernet/IP (IP = Industrial protocol)

New cards
37

Compensating Countermeasures

- Component Level - Physical
- Component Level - Logical
- Control System/Zone Level

New cards
38

Conduit

Logical grouping of communications channels connecting 2 or more zones - share common security requirements.

New cards
39

Conduit Characteristics

- Security Policies
- Asset Inventory
- Access Requirements & Controls
- Threats & Vulnerabilities
- Consequences of Security Breach
- Authorized Technologies
- Change Management
- Connected Zones ** (Distinguish between Conduit and Zone)

New cards
40

Consists of two or more security zones

A segmented network:

New cards
41

Core business functions

Outsourcing poses the greatest risk to an organization when it involves:

New cards
42

CSMS

Cyber Security Management System

New cards
43

CSMS Scope Includes...

- Business Perspective (Corporations, Business Units, Geographical Regions, Sites)
- Archtectural Perspective (Connections to suppliers, customers, etc.)

New cards
44

Definition of Conduit

A particular type of security zone that groups communications that can be logically organized into a grouping of information flows WITHIN and EXTERNAL to a Zone.
- Can be trusted or untrustedCan be physical or logical
- No such thing as "subconduits"

New cards
45

Detailed procedures

A business continuity plan (BCP) is not complete unless it includes:

New cards
46

Device Decision Basis

- Switch = MAC Addresses
- Router = IP Addresses
- Firewall = Port #
- Application Proxy
== Stateful Inspection
== Deep Inspection
== Application Protocols (FTP, HTTP, etc.)
== Data Payload

New cards
47

DOD Model (aka TCP/IP Model)

> Application == (Application, Presentation, Session of OSI)
> Transport == (Transport of OSI)
> Internet == (Network of OSI)
> Network Access (or Link) == (Data Link and Physical of OSI)
> TCP/IP Comes in A TIN (Mnemonic)

New cards
48

EAL

Evaluation Assurance Level (Common Criteria)

New cards
49

Elements of a CSMS

1) Risk Analysis
2) Addressing Risk with CSMS
3) Monitoring and Improving the CSMS

New cards
50

Emergent

An interoperability error is what type of vulnerability?

New cards
51

Eradication

During which phase of the six-phase incident response model is the root cause determined?

New cards
52

Essential Function Definition

Function or capability that is required to maintain health, safety, environment, availability for equipment under control.

New cards
53

Ethernet/IP

- Implicit Messaging - UDP - Port 2222
- Explicit Messaging - TCP - Port 44818

New cards
54

Examples of compensating countermeasures

- User ID
- Password Strength Enforcement
- Signature Validity Checking
- Security Event Correlation
- Device Decommissioning

New cards
55

External Time Sources

GPS
GLONASS - Global Navigation Satellite System
Galileo

New cards
56

File Transfer Protocol (FTP) Ports

20 - Default Data
21 - Control

New cards
57

Firecall

Method to provide emergency access to a secure control system (e.g., onetime password or onetime user ID)

New cards
58

Firewall Architecture by Security Level

#1 - Paired Firewalls
#2 - Firewall with DMZ
#3 - Firewall
#4 - Router or Layer 3 Switch with ACLs
#5 - Dual-Homed Computer

New cards
59

Firewall Can and Cannot Do:

Can Do:
- Manage Traffic
- Prevent Unwanted Access
Cannot Do:
- Inspect Traffic that doe1s NOT pass through them

New cards
60

Foundational Requirements (FR)

1) Identification and Authentication Control (IAC)
2) Use Control (UC)
3) System Integrity (SI)
4) Data Confidentiality (DC)
5) Restricted Data Flow (RDF)
6) Timely Response to Events (TRE)
7) Resource Availability (RA)

New cards
61

FR-1 Identification and Authentication Control (IAC)

> Human user identification and authentication
> S/W processes and device identification and authentication
> Account management
> Identified management
> Authenticator management
> Wireless access management
> Password strength
> PKI certificates
> Strength of Public Key authentication Authenticator feedback Unsuccessful login attempts System use notification Access via untrusted networks

New cards
62

FR-2 Use Control (UC)

> Authentication enforcement
> Wireless use control
> Use control for portable and mobile devices
> Mobile code (Java, PDF, etc.)
> Session lock
> Remote session termination
> Concurrent session control
> Auditable events
> Audit storage capacity
> Response to audit processing failures
> Timestamps
> Non-repudiation

New cards
63

FR-3 System Integrity (SI)

> Communication integrity
> Malicious code protection
> Security functionality verification
> S/W and information integrity
> Input validation
> Deterministic output
> Error handling
> Session integrity
> Protection of audit information

New cards
64

FR-4 Data Confidentiality (DC)

> Information confidentiality
> Information persistence (purge shared memory)
> Use of cryptography

New cards
65

FR-5 Restricted Data Flow (RDF)

> Network segmentation
> Zone boundary protection* General purpose person-to-person communication restrictions (e.g., email, facebook, etc.)
> Application partitioning

New cards
66

FR-7 - Resource Availability includes:

> DoS Protection
> Resource Management (Prevent Resource Exhaustion)
> Control System Backup
> Control System Recovery & Reconstitution
> Emergency Power
> Network and Security Config Settings
> Least Functionality
> Control system component inventory

New cards
67

FSA

Functional Security Assessment

New cards
68

Gateways

- Layer 7 Device
- Connect two completely different network systems
- Protocol Converter = Gateway

New cards
69

Heuristic

What kind of anti-malware program evaluates system processes based on their observed behaviors?

New cards
70

High Level Data Link Control (HLDC)

- High-Level Data Link Control (HDLC) is a bit-oriented code-transparent synchronous data link layer protocol developed by the International Organization for Standardization (ISO).
- Connection and Conectionless orientations

New cards
71

Homogeneous

Updates in cloud-computing environments can be rolled out quickly because the environment is:

New cards
72

HSE

Health, Safety, Environmental

New cards
73

IACS includes:

Control systems used in manufacturing and processing plants and facilities, building environmental control systems, geographically dispersed operations such as utilities (i.e., electricity, gas and water), pipelines and petroleum production and distribution facilities, and other industries and applications such as transportation networks, that use automated or remotely controlled or monitored assets.

New cards
74

ICS Firewall Vendors

- Tofino/Belden
- Hirschman Eagle/Belden*
- Phoenix Contact mGuard*
- Moxa EDR-8xx and 9xx Switches
- Secure Crossing Zenwall Line
- Siemens Scalance S*
= same software

New cards
75

ICS Threat-Based Risk Assessment Model

1) Characterize the Product or System
2) Identify Critical Assets and Consequences
3) Identify Threats
4) Analyze Threats

New cards
76

IEC 15408

Common Criteria

New cards
77

IEC 61508

SAFETY (SIL)"Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems"

New cards
78

IGMP

Internet Group Management Protocol(OSI Layer 3)

New cards
79

Incident Response Program

> Classification of Incidents
> Contingency Planning
> Response Actions (Do Nothing to System Shutdown)
> Recovery Actions

New cards
80

Insecure protocols could result in a compromise of privileged user credentials

Virtual systems should be managed using a dedicated virtual local area network (VLAN) because:

New cards
81

Internal Threats

- 80% of events
- Inappropriate Behavior
- Security Accident (e.g., NMAP scan)
- Disgruntled employee

New cards
82

Intrusion Detection Issues

- False Positives
- Deployment & Ops Costs
- Only Effective Against Known Vulnerabilities
- Limited Signatures for ICS
- Don't work with encrypted services

New cards
83

IPSec

- Tunnel Mode (Payload and header encrypted)
- Encapsulation or Transport Mode (only payload is encrypted)
Protocols = Authentication Header (AH) and Encapsulating Security Payload (ESP)
Resides at Network Layer (Layer 3 next to IP)

New cards
84

IPv4 Address Dissection

147.10.24.16
147.10 = Network
.24 = Subnet
.16 = Host

New cards
85

IPv4 Loopback

127.xxx.xxx.xxx

New cards
86

ISA 99 Four Layers

1. General
2. Policies & Procedures
3. Systems
4. Components

New cards
87

ISASecure Supplier Device Approval Process

Includes Integrated Threat Analysis (ITA)
1) Functional Security Assessment (FSA)
2) Communication Robustness Test (CRT)
3) Software Development Security Assurance (SDSA) Audit

New cards
88

ISMS

Information Security Management System(ISO 27001)

New cards
89

Key Components of Business Rationale

- Prioritized Business Consequences
- Prioritized Threats
- Estimated Annual Business Impact
- Cost of Human Effort & Consequences

New cards
90

Local Area Network (LAN)

> Limited distance <10 KM
> Usually within single facility
> Names: Supervisory Networks, DCS Highways, PLC Highways, Fieldbuses, Device Networks

New cards
91

Linking the Oil and Gas Industry to Improve Cybersecurity

LOGIIC

New cards
92

LOGIIC SIS Project

- Greater integration may introduce greater risk
- Default configurations are not secure
- Defense in Depth reduces risk
- Clear guidance is needed

New cards
93

Loss of Essential Functions

- Loss of protection
- Loss of control
- Loss of view

New cards
94

Malicious code

Under the US-CERT model for incident categorization, a CAT-3 incident refers to which of the following?

New cards
95

Malicious Code Protection Techniques

- Black/white lists- Removable media control
- Sandbox techniques- No Execute (NX) bit
- Data Execution Prevention
- ASLR - Address Space Layout Randomization
- Stack corruption detection
- Mandatory Access Control (MAC)

New cards
96

Mobile Code

- Java
- Java Script
- Active X
- PDF (Portable Document Format)
- Postscript
- Shockwave movies
- Flash
- VBScript

New cards
97

Modbus

- 1979 by Modicon (Now Schneider)
- Open Standard / Royalty Free
- Most widely used protocol (>7 M nodes)
- Modbus Org since 2004 (www.modbus.org)
- Master-Slave Architecture

New cards
98

Modbus TCP Port

502 port

New cards
99

MSUS

Microsoft Server Update Service

New cards
100

Network Security Technologies

- Devices (Switch, Router, Firewall, Data Diodes)
- Architectures (Segmentation)
- Cryptography (VPN, Hashes, Secure Passwords)
- IDS (Network and Host)- IPS

New cards
robot