What is the overall purpose of responding to attacks on industrial networks?
To minimize the consequences of an attack and restore normal operation.
Which main response measures are listed at the start of Chapter 7?
Incident response, network forensics, contextualization, and recovery.
What is incident response in the context of industrial security?
The process by which an organization prepares for and handles a security incident such as a cyberattack.
What does incident response include besides handling the attack itself?
It also includes managing the fallout and consequences of the incident.
What is the overarching goal of responding to a security incident in industrial networks?
Return to normal operation as quickly as possible.
Why is quick return to normal operation especially important in industrial networks?
Because availability is one of the most important security goals in industrial environments.
Why should organizations generally not try to evict an incident immediately?
Immediate eviction can destroy evidence and make forensic analysis harder.
Why can immediate eviction be strategically harmful?
Because additional hidden layers of the incident may still be present in the system.
Why should systems generally not be powered down immediately during an incident?
Because volatile and valuable forensic data could be lost.
What should be analyzed before altering the state of compromised systems?
All available system and component logs should be analyzed.
Why should disk images be cloned before deeper investigation?
To preserve the original state for later forensic analysis.
Why might reverse engineering malware be necessary during incident response?
To understand what the malware does, how it entered the system, and what damage it may have caused.
What is a security incident?
An occurrence of a security-related event that violates or threatens to violate security policies, acceptable use policies, or standard security practices.
What is a general incident?
An occurrence of an event.
What makes a security incident different from a normal event?
It is security-related and involves an actual or imminent policy violation or threat.
Give an example of a security incident in an industrial network.
Executing malicious code on a system.
Give another example of a security incident in an industrial network.
Impaired or disrupted availability of industrial systems or equipment.
What industrial-program changes are explicitly named as security incidents?
Unauthorized changes to a PLC or HMI program.
What equipment-related example is named as a security incident?
Loss or theft of equipment storing process-related data.
Which network-wide attack is explicitly listed as a security incident example?
A distributed denial-of-service attack.
What operations-related example of a security incident is given?
Interference with the proper operation of industrial systems.
What login-related example is given as a possible security incident?
Excessive failed login attempts.
What undesirable human reaction often appears early during a security incident according to the lecture?
Disorientation and actionism.
What harmful question often appears too early during a security incident?
The question of guilt or who is to blame.