Term
| What is critical infrastructure |
|
Definition
| Assets / Resources critical to the continued stability of ac ountry |
|
|
Term
| The European union deals with CI through which org |
|
Definition
| EPCIP - European Critical infrastructure protection |
|
|
Term
| The EPCIP proposed a list of what? |
|
Definition
| European critical infrastructures (ECI) |
|
|
Term
| What was each ECI designed to have? |
|
Definition
| An OSP - Operation security plan |
|
|
Term
| In the USA what protect CI |
|
Definition
| Critical infrastructure protection program |
|
|
Term
| In the UK who handles CI? |
|
Definition
| The centre for protection of national infrastructure |
|
|
Term
| Which department handles the comms? |
|
Definition
| Dept for business, innovation and skills |
|
|
Term
| Which dept controls the ambulance service? |
|
Definition
|
|
Term
| Which dept controls the fire dept? |
|
Definition
| Department for communities and local govt |
|
|
Term
| Which dept handles the maritime and coastguard agency |
|
Definition
|
|
Term
| Which dept handles the police |
|
Definition
|
|
Term
| Which dept handles energy |
|
Definition
| Dept for energy and climate change |
|
|
Term
| Which dept handles finance |
|
Definition
|
|
Term
|
Definition
| Department for environment, food and rural affairs and food standards agency |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Department for environment, Food & Rural Affairs |
|
|
Term
| What are the 6 criteria for protection measures set out by the EPCIP |
|
Definition
| Affordable, Sustainable, Reliable, Proportionate, Interoperable and Take into account privacy concerns |
|
|
Term
| What are the three major threat sources? |
|
Definition
|
|
Term
| Give the 4 layers of Stuxnet attack |
|
Definition
Initially via removable media Moves internlly via private network devices Infects SCADA project files Infect PLC Hardware |
|
|
Term
|
Definition
|
|
Term
| What does stuxnet target? |
|
Definition
| SCADA management software |
|
|
Term
| Stuxnet uses digitally signed what? |
|
Definition
| drivers for rootkit drivers |
|
|
Term
| What are the UKs listed CNI areas? (9) |
|
Definition
Communications Emergency services Energy Finance Food Government Health Transport Water |
|
|
Term
| List the three threats to CI as defined in the UK |
|
Definition
|
|
Term
| What are the requirements for EPCIP protection measures (6) |
|
Definition
Affordable; Sustainable; Reliable; Proportionate; interoperable; Privacy concerns |
|
|
Term
| How does the “Stuxnet” worm operate? |
|
Definition
Initially via removable media
Moves internally via private network devices
Infects SCADA project files
Infect PLC hardware |
|
|
Term
| List 3 key features of Stuxnet |
|
Definition
Used 4 zero-day attacks against Windows
Digitally signed drivers (stolen) for rootkit drivers
Targeted specific SCADA management software |
|
|
Term
| How does the Code Red worm function? |
|
Definition
Uses buffer overflow on IIS DOS on whitehouse if current date is between 1st and 19th – generate IPS if date = 20-28th, DOS whitehouse |
|
|
Term
| How did code red eventually fail? |
|
Definition
|
|
Term
| How did the NIMDA worm propagate? |
|
Definition
Directory traversal & code red backdoors Email Installed extra backdoors |
|
|