What are the three main parts of Chapter 6?
Network Monitoring, Industrial Intrusion Detection, and Honeypots.
What is the main goal of detective measures in industrial networks?
To identify activities that indicate an attack or policy violation.
Why are detective measures needed even when preventive measures exist?
Because segmentation, firewalls, and other preventive controls cannot stop every attack.
What are the two main monitoring concepts emphasized early in Chapter 6?
Exception reporting and anomaly detection.
What is exception reporting in industrial security monitoring?
It identifies and reports security-policy violations in a zone or conduit.
What is an example of exception reporting in a zone?
A user, system, or application interacts with devices outside the operational parameters defined for the zone or conduit.
What is anomaly detection in industrial monitoring?
It identifies suspicious patterns that deviate from expected behavior patterns.
What does anomaly detection rely on?
It relies on establishing an invariant baseline of operational behavior and detecting deviations from it.
What is a key quality requirement for anomaly-detection algorithms?
They should have low false-positive rates.
Why are anomaly-detection algorithms often statistical?
Because they compare current observations against learned normal behavior.
What is a log?
A record of events that occur in a computer system.
What should good log data reveal?
Security-relevant information about what happened, when, where, who initiated it, which parameters were used, what the result was, and who reported it.
What does ‘what happened’ mean in good log data?
The event type and category.
What does ‘when it happened’ mean in good log data?
The event timestamp.
What does ‘where it happened’ mean in good log data?
The affected system, host, or process.
What does ‘who initiated the action’ mean in good log data?
The responsible user, IP address, or other origin identifier.
What does ‘what parameters were used’ mean in log data?
Details such as an HTTP request, command arguments, or protocol fields.
What does ‘what the result was’ mean in log data?
The outcome, such as success, failure, or access denied.
What does ‘who reported the action’ mean in log data?
The component that produced the log message, such as a firewall or SSH daemon.
Why are logs important for industrial security?
They provide evidence and context for detecting, understanding, and later investigating incidents.
What are the three deployment approaches for network monitoring shown in the lecture?
Inline deployment, network taps, and switch spanning ports.
What is inline network monitoring?
A monitor is placed directly in the traffic path so all monitored traffic passes through it.
Why is inline network monitoring uncommon?
Because it makes connectivity dependent on monitor health and is usually used only when other options are not possible.
Why is inline monitoring often only a temporary or emergency solution?
Because it introduces operational risk by putting the monitor directly into the communication path.