SY202 HW08: Industrial Control Systems and Cyber Security Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/21

flashcard set

Earn XP

Description and Tags

Flashcards based on the SY202 HW08 lecture notes about Industrial Control Systems and Cyber Security.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

22 Terms

1
New cards

T/F: Industrial Control Systems integrate IT systems to regulate physical processes.

True. Industrial Control Systems integrate IT systems to regulate physical processes.

2
New cards

Which of the following is NOT a consideration when operating ICS?

None of the above (i.e., all choices should be taken into consideration)

3
New cards

In the 3-tier model, which zone is the less frequently updated?

Field Zone

4
New cards

In the 3-tier model, which zone has the least amount of cyber security measures?

Field Zone

5
New cards

In which zone are you most likely to find PLCs?

Field Zone

6
New cards

In which zone are you most likely to find Engineering Workstations and Human-Machine Interfaces?

Control Zone

7
New cards

T/F: SCADA systems are physically constrained to a single site.

False. SCADA systems are often geographically dispersed, unlike systems constrained to a single site.

8
New cards

Which pillar of cyber security is less relevant for control systems?

Confidentiality

9
New cards

T/F: A cyber attack campaign starts by gathering publicly available information.

True. Gathering publicly available information is a typical first step in a cyber attack.

10
New cards

Which is NOT a good resilient control measure to increase cyber security in an ICS?

Add remote access to the network for trouble shooting purposes

11
New cards

T/F: Transmission delays, data losses, and cyber attacks are cyber threats to Networked Control Systems.

True. Transmission delays, data losses, and cyber attacks are examples of cyber threats.

12
New cards

T/F: State-awareness refers to the ability of the control system to safely operate despite cyber threats.

False. State-awareness refers to the ability of the control system to safely operate and maintain a good performance despite the presence of any cyber threat.

13
New cards

Jamming or blocking a sensor signal is an example of what type of attack?

Denial of Service Attack

14
New cards

T/F: Controllers, sensors, and communication systems are part of the surface of attack of Industrial Control Systems.

True. Controllers, sensors, and communication systems are part of the surface of attack of Industrial Control Systems.

15
New cards

T/F: Sharing information among sensors, actuators, and controllers makes NCS difficult to hack.

False. Sharing information makes NCS easier to hack.

16
New cards

Stuxnet was an example of what type of attack?

Deceptive Attack

17
New cards

T/F: There is ABSOLUTELY no way of making a NCS 100% secured against intruders.

True. There is ABSOLUTELY no way of making a NCS 100% secured against intruders.

18
New cards

T/F: The ICS Cyber Kill Chain is divided in two stages.

True.The ICS Cyber Kill Chain is divided in two stages.

19
New cards

T/F: Encryption can increase the integrity of data while degrading availability.

True. Encryption can increase the integrity of data in a control system at the expense of degrading availability of data.

20
New cards

T/F: Denial of Service attacks are easier to execute but also easier to detect.

True. Denial of Service attacks are, in general, easier to EXECUTE. However, they are also easier to DETECT.

21
New cards

Which stage of the ICS Cyber Kill Chain contains any cyber intruder action that causes intentional physical harm?

Stage 2 of ICS Cyber Kill Chain

22
New cards

T/F: Redundancy is a good cyber security measure.

True. Having redundancy on your system is an example of a good cyber security measure.