Chapter 21 Quiz: OT/ICS/SCADA Security¶
Test your knowledge of industrial control system security, the Purdue model, OT-specific protocols, and incident response in operational environments.
Questions¶
1. What is the most fundamental security difference between IT networks and OT networks that shapes every design decision in industrial cybersecurity?
- A) OT networks use older hardware that cannot run modern encryption
- B) In OT environments, availability and safety are the primary concerns — a security control that causes downtime or interferes with process control can be more catastrophic than a cyber intrusion
- C) OT networks are always air-gapped and do not require security controls
- D) OT devices use proprietary protocols that are inherently secure
Answer
B — In OT environments, availability and safety are the primary concerns — a security control that causes downtime or interferes with process control can be more catastrophic than a cyber intrusion
The CIA triad is inverted in OT: Availability → Integrity → Confidentiality. Rebooting a firewall during a chemical process or patching a PLC mid-operation can cause equipment damage, personnel injury, or environmental harm. This is why traditional IT security controls (frequent patching, active scanning, endpoint agents) must be adapted or avoided in OT contexts.
2. In the Purdue Enterprise Reference Architecture (PERA), which level contains Distributed Control Systems (DCS) and SCADA servers that directly control physical processes?
- A) Level 0 — Physical Process (sensors and actuators)
- B) Level 1 — Basic Control (PLCs, RTUs)
- C) Level 2 — Area Supervisory Control (DCS, SCADA HMI)
- D) Level 3 — Site Operations (Manufacturing Execution Systems)
Answer
C — Level 2 — Area Supervisory Control (DCS, SCADA HMI)
The Purdue model: Level 0 (physical devices: sensors, actuators), Level 1 (PLCs/RTUs executing control logic), Level 2 (SCADA/DCS supervisory systems with HMIs), Level 3 (site operations: MES, historians), DMZ, Level 4 (enterprise IT). Level 2 is particularly critical as it bridges real-time process control and operational visibility.
3. Modbus TCP uses function code 06 (Write Single Register). From a security perspective, what makes this dangerous in an unprotected OT network?
- A) Function code 06 can be used to exfiltrate configuration data
- B) Modbus has no authentication or authorization — any device on the network can issue function code 06 to write values to any register on any Modbus-speaking device, directly manipulating physical setpoints
- C) Modbus TCP encrypts write operations with a weak cipher
- D) Function code 06 triggers automatic firmware updates on PLCs
Answer
B — Modbus has no authentication or authorization — any device on the network can issue function code 06 to write values to any register on any Modbus-speaking device, directly manipulating physical setpoints
Modbus was designed in 1979 for isolated serial networks. It has no built-in authentication, encryption, or authorization. In a networked environment, any system that can reach a Modbus-speaking device can read sensor values or write control setpoints. This was exploited in the Triton/TRISIS attack against Safety Instrumented Systems and is a fundamental protocol-level risk in legacy OT environments.
4. Stuxnet specifically targeted Siemens S7-315 and S7-417 PLCs used in uranium enrichment centrifuges. What was Stuxnet's primary technique for causing physical damage while evading detection?
- A) Encrypting the PLC firmware and demanding ransom
- B) Overwriting centrifuge control logic to vary rotor speeds beyond safe limits while simultaneously feeding false "normal operation" readings to the monitoring HMI
- C) Deleting historian data to hide the attack
- D) Exploiting a Modbus vulnerability to disable safety interlocks
Answer
B — Overwriting centrifuge control logic to vary rotor speeds beyond safe limits while simultaneously feeding false "normal operation" readings to the monitoring HMI
Stuxnet's genius was its dual nature: it corrupted the PLC control programs to physically stress centrifuges (causing mechanical failures over months) while intercepting process monitoring systems and replaying recorded "normal" values to operators. This caused physical destruction that appeared to be normal equipment wear, delaying detection for over a year. It remains the canonical example of a cyber-physical attack.
5. ISA/IEC 62443 is the international standard for industrial cybersecurity. What does the concept of "Security Level" (SL) in ISA/IEC 62443-3-3 represent?
- A) The encryption strength applied to OT network traffic
- B) A measure of the robustness of security controls against increasing levels of attack capability — from SL 1 (casual/unintentional violation) to SL 4 (state-sponsored, highly sophisticated attack)
- C) The classification of OT zones based on network location
- D) The vendor certification level for ICS security products
Answer
B — A measure of the robustness of security controls against increasing levels of attack capability — from SL 1 (casual/unintentional violation) to SL 4 (state-sponsored, highly sophisticated attack)
ISA/IEC 62443-3-3 defines Security Levels 1–4 based on attacker capability, motivation, and resources. SL 1 protects against accidental/unintentional incidents; SL 2 against intentional violation with simple means; SL 3 against sophisticated means; SL 4 against state-level actors with extended resources. Organizations assess their "Target SL" based on consequence analysis and implement corresponding controls.
6. A safety engineer describes a Safety Instrumented System (SIS) as "the last line of defense." What is the security implication of an attacker gaining write access to SIS logic, as demonstrated by the Triton/TRISIS malware?
- A) The attacker can exfiltrate process data from the SIS historian
- B) The attacker can disable or manipulate the safety shutdown logic, allowing physical processes to operate in dangerous conditions without automatic shutdown — potentially causing catastrophic safety incidents
- C) The attacker can encrypt the SIS configuration for ransom
- D) The attacker gains access to enterprise IT through the SIS network connection
Answer
B — The attacker can disable or manipulate the safety shutdown logic, allowing physical processes to operate in dangerous conditions without automatic shutdown — potentially causing catastrophic safety incidents
Triton (2017, targeting a Saudi petrochemical plant) targeted Schneider Electric Triconex Safety Instrumented Systems. By disabling the SIS, attackers could have allowed the plant to operate past safe operating limits without automatic emergency shutdown. The explicit goal was to cause physical destruction and potential casualties — the most severe consequence in OT security.
7. Active vulnerability scanning (e.g., running Nessus against OT assets) is generally discouraged in live OT environments. What is the specific technical reason for this concern?
- A) Nessus cannot parse Modbus or DNP3 protocols
- B) Many legacy PLCs and RTUs have limited TCP/IP stacks that crash or lock up when they receive unexpected or rapid probe packets, potentially disrupting physical processes
- C) Active scanning reveals the OT network topology to external attackers
- D) Scanning generates excessive log volume that overwhelms the OT historian
Answer
B — Many legacy PLCs and RTUs have limited TCP/IP stacks that crash or lock up when they receive unexpected or rapid probe packets, potentially disrupting physical processes
Unlike enterprise servers, PLCs often run on microcontrollers with minimal networking stacks designed for deterministic industrial protocols. Sending port scans, SYN floods (even inadvertent from aggressive scanners), or unexpected TCP sessions can cause watchdog timeouts, buffer overflows in the networking stack, or complete controller resets — stopping physical processes. Passive monitoring (network tap + protocol analysis) is the safe alternative.
8. What is the recommended OT network architecture principle for connecting OT networks to enterprise IT networks, per both ICS-CERT guidance and ISA/IEC 62443?
- A) Direct Layer 2 bridging with VLANs to separate traffic
- B) An industrial DMZ (IDMZ) with unidirectional data diodes or dual firewalls from different vendors, allowing data to flow from OT to IT but not the reverse
- C) Full network isolation with no connectivity whatsoever
- D) Site-to-site VPN tunnels encrypted with AES-256
Answer
B — An industrial DMZ (IDMZ) with unidirectional data diodes or dual firewalls from different vendors, allowing data to flow from OT to IT but not the reverse
The IDMZ pattern places jump servers, historian mirrors, and file-transfer intermediaries in a DMZ between OT and IT networks. Data diodes (hardware-enforced unidirectional channels) or dual firewalls from different vendors (defense in depth against vendor-specific vulnerabilities) allow OT data to reach business systems for reporting without creating a bidirectional attack path from enterprise IT into OT.
9. DNP3 (Distributed Network Protocol 3) is widely used in water and electric utility SCADA systems. Which specific security feature was added in DNP3 Secure Authentication (SA) v5 to address the protocol's original design gap?
- A) Traffic encryption using TLS 1.3
- B) Challenge-response authentication that requires devices to prove identity before accepting control commands, preventing unauthenticated command injection
- C) Rate limiting to prevent flooding attacks
- D) Digital signatures on all historian data records
Answer
B — Challenge-response authentication that requires devices to prove identity before accepting control commands, preventing unauthenticated command injection
Original DNP3 (like Modbus) had no authentication, allowing any device to send control commands to RTUs. DNP3 SA v5 added HMAC-based challenge-response authentication: before a master station's command is accepted by an outstation, the outstation challenges the master to prove it knows a shared key. This specifically addresses the "unauthenticated command injection" attack vector used in attacks on electrical grids.
10. During OT incident response, a responder wants to collect forensic evidence from a running PLC. What constraint makes this fundamentally different from collecting memory forensics from a Windows server?
- A) PLCs do not have file systems and therefore cannot be forensically imaged
- B) Stopping or rebooting a PLC for forensic purposes may halt physical processes, cause equipment damage, or create safety hazards — forcing responders to develop non-disruptive collection methods such as network traffic capture and logic ladder program backups
- C) PLCs encrypt all internal memory by default
- D) OT forensic tools do not support Modbus or DNP3 protocols
Answer
B — Stopping or rebooting a PLC for forensic purposes may halt physical processes, cause equipment damage, or create safety hazards — forcing responders to develop non-disruptive collection methods such as network traffic capture and logic ladder program backups
In OT incident response, the first priority is maintaining safe process operation. Unlike IT systems where taking a server offline for forensics is disruptive-but-recoverable, halting a PLC mid-process can cause uncontrolled equipment states, product loss, or physical hazards. Responders instead use network-passive collection (taps), read-only PLC logic backups, and historian analysis to investigate while the process continues running.
Scoring¶
| Score | Performance |
|---|---|
| 9–10 | Expert — OT/ICS/SCADA security concepts fully internalized |
| 7–8 | Proficient — Ready to contribute to OT security assessments or incident response |
| 5–6 | Developing — Review Chapter 21 Purdue model and OT protocol sections |
| <5 | Foundational — Re-read Chapter 21 before proceeding |
Return to Chapter 21 | Next: Chapter 22