2020 Soft Exam Information Security Engineer (Second Edition) Study Summary [20]
Others
2021-01-29 03:58:35
views: null
Chapter 24 Industrial Control Safety Requirements Analysis and Safety Protection Engineering
Security Threat and Demand Analysis of Industrial Control System
- Concept and composition of industrial control system
- Composition: various control components, monitoring components, data processing and display components
- Industrial control systems are divided into: discrete manufacturing and process control
- The control system includes:
- SCADA system (data acquisition and monitoring control system)
- Function: data acquisition, parameter measurement and adjustment
- Composition: main terminal control unit (MTU), communication lines and equipment, remote terminal unit (RTU) located in the control center
- Distributed Control System (DCS)
- Process control system (PCS): real-time acquisition of state parameters for adjustment
- Programmable Logic Controller (PLC)
- Main terminal equipment (MTU)
- Remote Terminal Equipment (RTU)
- Human Machine Interface (HMI)
- Industrial Control Communication Network
- Common industrial control special protocols: OPC, Modbus, DNP3
- Network type: DCS main control network, SCADA remote network, field control level communication network
- Security Threat Analysis of Industrial Control System
- Natural disasters and environment
- Insider security threats
- Equipment functional safety failure
- Malicious code
- Network attacks
- Types of hidden dangers in industrial control systems
- Industrial control protocol security: lack of security design, no security certification, encryption, and audit
- Security vulnerabilities in industrial control system technology products
- Security vulnerabilities in basic software of industrial control system
- Algorithm security vulnerabilities in industrial control systems
- Industrial control system equipment firmware vulnerabilities
- Industrial control system equipment hardware vulnerabilities
- Industrial control system open access vulnerabilities
- Industrial Control System Supply Chain Security
- Analysis of Safety Requirements of Industrial Control System
- Two aspects of industrial control system network information security:
- Technical security requirements: secure physical environment, secure communication network, secure area boundary, secure computing environment, security management center
- Management requirements: safety management system, safety management organization, safety management personnel, safety construction management, safety operation and maintenance management
- Well-known international standards for industrial control safety: IEC62443 series, a total of 12 documents
Safety protection mechanism and technology of industrial control system
- Physical and environmental safety protection
- Video Surveillance
- Industrial host reinforcement
- Security zone and border protection
- Safe partition
- Industrial firewall
- Industrial control security isolation and information exchange system
- Identity authentication and access control
- Multi-factor authentication
- Least privilege
- Avoid using default or weak passwords
- Remote access security
- Disable high-risk services
- Security reinforcement
- VPN
- security audit
- Security reinforcement of industrial control system
- Security configuration strategy
- Identity authentication enhancement
- Mandatory access control
- Program whitelist control
- Industrial Control Security Audit
- Security audit deployment equipment
- Audit data backup
- Audit data analysis and utilization
- Malicious code prevention
- Antivirus software testing and deployment
- Anti-virus and malware intrusion management mechanism
- Major industrial control security vulnerability information acquisition and patch upgrade
- Industrial control data security
- Industrial data management methods
- Industrial data security protection measures
- Safe isolation
- Access control
- Encrypted transmission and storage
- Back up key business regularly
- Test data protection measures
- Test data protection type
- Sign a confidentiality agreement
- Recover test data
- Industrial control safety detection and response mechanism
- Industrial control network security monitoring equipment installation and use
- Industrial control security incident emergency response plan formulation and exercise
- Industrial safety management
- asset Management
- Redundant configuration
- Security software selection and management
- Configuration and patch management
- Supply Chain Management
- Fulfill responsibility
- Industrial safety typical product technology
- Technical principles and deployment of industrial control system protection products
- Industrial firewall
- In-depth analysis of network data packets, interpretation of industrial control protocols to achieve access control
- Industrial Control Encryption
- VPN, encryption machine, data encryption tool
- Industrial control user identity authentication
- Password authentication, two-factor authentication, biometric authentication
- Industrial Control Trusted Computing
- Adopt password and hardware security technology
- System security hardening
- Industrial control system physical isolation type product technical principle and deployment
- Gatekeeper
- Forward and reverse isolation device
- Industrial control security audit and monitoring product technical principles and deployment
- Industrial Control Security Audit
- Collect industrial control equipment log information, analyze system abnormal events and alert
- Industrial control intrusion detection system
- In-depth correlation analysis of data packets and system logs, based on feature or anomaly detection to discover attacking system behaviors
- Technical principles and deployment of industrial control security inspection products
- Industrial control vulnerability scanning
- Industrial control vulnerability mining
- Industrial Control Security Baseline Check
- Industrial control operation and maintenance and risk control product technical principles and deployment
- Industrial Control Fortress
- Centrally manage the operation, maintenance and audit of industrial control equipment
- Industrial Control Risk Management System
- Manage the assets, security threats, security vulnerabilities and potential security impacts of industrial control systems
Origin blog.csdn.net/weixin_39664643/article/details/109512215