Shared Flashcard Set

Details

Industrial Final Glossar
scada
54
Computer Networking
Undergraduate 2
06/13/2013

Additional Computer Networking Flashcards

 


 

Cards

Term
Advanced Persistent Threat
Definition
A class of threat designed to infiltrate a network, remain through evasion and propagaion techniques. Typically used to esablish and maintain an external command and control channel through which the attacker can continuously exfiltrate data.
Term
Asset
Definition
Any device used within an industrial network
Term
Attack Surfface
Definition
The collectively exposed portions of that system or asset. A large ___ means that there are many exposed areas that an attack could target, while a small ____ means that the target is relatively small.
Term
Backchannel
Definition
Communications channel that is hidden to avoid detection. also used in reference to hidden or covert communications occuring back towards the orginating sender, that is, malware hidden in the return traffic of a bidirectional communication.
Term
CFAT
Definition

Chimical Facility Anti-Terrorism Standard.

 

Established by homeland security to protect the manufacture, storage and distribution of potentially hasardous chemicals.

Term
Compensating Controls
Definition
typically used within regulatory standards or guidelines to indicate when an alternative method that those typically addressed but the standard or guideline
Term
Control Center
Definition
Operations center, typically consist of SCADA and HMI systems that provide interaction with industrial/automated processes.
Term
Correlated Event
Definition
A larger pattern match consisting of two or more regular logs or events, as detected by an event correlation system.
Term
Critical Cyber Asset
Definition
an asset that is itself responsible for performing a critical function, or directly impacts an asset that performs a critical function. Heavily used within NERC reliability standards for Critical Infrastructure Protection
Term
Critical Digital Asset
Definition
A digitally connected asset that is itelf responsible for performing a critical function, or directly impacts an asset that performs a critical function. Heavily used within MRC regulations and guideance documents.
Term
Critical Infrastructure
Definition

Any infrastructure whose disruption could have server impact on a nation or societ.

 

In the US, it is defined by the Homeland Security Presidential Directive Seven as: Aggriculture and Food, Banking and Finacne, Chemical,  COmmercial Facilities, Critical Manufacturing, Dams, Defense Industrial Base, Drinking Water and Water Treatment Systems, Emergency Services, Energy, Government Facilities, Infomration Technology, National Monuments and Icons, Nuclear Reactors Materials and waste, Postal and Shipping, Public Health and Healthcare, Telecommunications, and TransportationSystems.

Term
Cyber Asset
Definition
An asset that is connected to a routable network, that is, a Host.
Term
Data Diode
Definition
a "one way" data communication device, often consisiting of a physical-layer unidirectional limitation. Using only one half of a fiber optic "transmit/receive" pair would enforce unidirectional communication at the physical layer while proper configuration of a network firewall oculd logically enforce unidirectional communication at the network layer.
Term
Database Activety Monitor (DAM)
Definition

Includes SQL, DML, and others. It May be network or host based. network-based transaction by decoding and interpreting network traffic, while host-based provide system-level auditing directly from the server.

 

Can be used for indications of malicious intent (SQL Injections), Fraud (eg the manipulation of stored data) and/or as a means of logging data access for systems that do not or cannot produce auditable logs.

Term
Deep Packet Inspection (DPI)
Definition
inspecting all the way down to application layer (layer 7) of the OSI model. That is, past datalink, network or session headers to inspect all the way into the payload of the packet. This is used by most IDS/IPS, newer firewalls, and other security devices.
Term
Distributed Control System
Definition
An Industrial Control System deployed and controlled in a distributed manner, such that various distributed control systems or processes are controllled individually.
Term
Electronic Security Perimeter
Definition
Refers to the demarcation point between a secured enclave, such as a control system, and a less trusted network, such as a business network. It typically includes the devices, such as firewalls, IDS, IPS, Industrial Protocal Filters, Application Monitors, and similar devices that secure the demarcation points.
Term
Enclave
Definition
A logical grouping of assets, systems and/or services that defines and contains one or more funcitonal gorups. They represent network "zones" that can be used to isolate certain funciont in order to more effectively secure them.
Term
Enumeration
Definition
The process of identifying valid identities of devices and users in a network; typically as an intial step in a network attack process. It allows an attacker to identify valid systems and/or accounts that can then be targetd for exploitsation or compromise.
Term
Finger
Definition
A command that is a network tool that provides detailedn information about a user
Term
Functional Code
Definition
Various numeric identifiers used within industrial network protocols for command and control purposes.
Term
HIDS
Definition
Host Intrusion Detection System
Term
HIPS
Definition
Host Intrusion Prevention System
Term

Homeland Security Presidential Directive Seven

(HSPD-7)

Definition
Homeland Security defines 18 critical infrastructures within the US.
Term
Identity Access Management
Definition
The process of magain user identities and user accounts, as well as related user access and authentication activities within a network; and a category of products designed to centralize and automate those funcions.
Term
IED - Intelligent Electronic Device
Definition
An elctronic component - such as a regulator, circuit control, etc... that has a microprocessor and is able to communicate, typically digitally using fielbus, rel-time etherent or other industrial protocols
Term
Industrial Control System (ICS)
Definition
Devices, network, and controls used to operate and/or automate an industrial process
Term
Inter Control Center Protocl (ICCP)
Definition
Real-time industrial network protocol designed for wide area intercommunication between two or more control centers. It is an internationally recognized standard published by the Internation Elctrotechnical Commineion (IEC)
Term
Internation Elctrotechnical Commision (IEC)
Definition
Internation standards orginization that develops standards for the purposes of consensus and conformity among international technology developers, vendors and users.
Term
Internation Standards Orginization
Definition
A network of standards orginization from over 160 countries, which develops and publishes atandards covering a wide range of topics.
Term
Lightweight Directory Access Protocol (LDAP)
Definition
standard which defines a standard process for accessing and utilized network-based directories. It is used by a variety of directories and Identity Access Management (IAM) systems.
Term
Master Station
Definition
Controlling asset or host involoved in an industrial protocol communication session. It is typically responsible for timing synchronization, and command and control aspects of an industrial network protocol.
Term
Modbus
Definition
A Protocol used for intercommunication between industrial control assets. Modbus is a flexible Master/Slave command and control protocol available in several variants.
Term
NEI - The Nuclear Energy Institue
Definition
an Orginization that is dedicated to and governed by the US Nuclear Utlity companies
Term
Network Access Control (NAC)
Definition
provides measures of controlling access to the network, using technologies such as 802.1x (port network access control) to require authentication for a network port to be enabled, or orther access control methods.
Term
North American Electric Reliability Corporation
Definition
An orginization that develops and evforces reliability standards for and monitors the activities of the bulk electric power grid in North America
Term
Nuclear Regulatory COmmision
Definition
a five member presidentially appointed commisision responsible for the save use of radioactive materials.
Term
OSSIM
Definition
Open Source Security Information Management
Term
Outstation
Definition
The DNP3 slave or remote device. The term is also used more generically as a remote SCADA system, typically interconected with central SCADA systems by a WAN
Term
Profibus
Definition
An industrial field bus protocol
Term
Profinet
Definition
An implementation of Profibus designed to operate in relatime over ethernet
Term
Project Aurora
Definition
A research project that demonstrated how a cyber attack could result in the explosion of a generator.
Term
Risk Based Performance Standards - RBPS
Definition
reccomendations for meeting the security controls required by the Chemical Facility Anti-Terrorism Standard (CFATS)
Term
Red Network
Definition
Refers to a trusted network. When discussing unidirection communication in critical networks, traffic is typically only allowed outward.
Term
Remote Terminal Unit (RTU)
Definition
A device combining remote communication capabilities with programmable loginc for the control of processes in remote locations
Term
SECROS III
Definition
latest version of Serial Real-time COmmunications System
Term
Set Points
Definition
defined values signifying a target metric against which programmable logic can operate.
Term
Situational Awareness
Definition
A state of awareness within a network in order to identify and respond to network-based attacks.
Term
Smart-Listing
Definition
A term referring to the use of both black listing and white listing with a centralized intelligence system such as a SIEM
Term
Stuxnet
Definition
AN advanced cyber attack against an industrial control system, consisting of multiple zero-day exploits used for the delivery of malware that then targeted and infected specific industrial controls for the purposes of sabotaging an automated process. Widely regarded as the first cyber attack to specfically target an ICS
Term
Supervisory Control and Data Acquisition
Definition
Revers to the systems and networks that communicate with industrial control systems to provide data to operators for supervisory purposes, as well as control capabiliteis for process management.
Term
Technical Feasibility/Technical Feasibility Exception (TFE)
Definition
used to indicate where a requried control can be reasonably implemented. Where the implementation of a required control is not technically feasibl.
Term
Zone
Definition
A Logical boundary or enclave containing assets of like function and/or criticality, for the purposes of facilitating the security of common systems and services
Supporting users have an ad free experience!