A security engineer is concerned about the threat of side-channel attacks. The company experienced a past attack that degraded parts of a SCADA system, causing a fluctuation to 20,000rpm from its normal operating range. As a result, the part deteriorated more quickly than the mean time to failure. A further investigation revealed the attacker was able to determine the acceptable rpm range, and the malware would then fluctuate the rpm until the part failed. Which of the following solutions would be BEST to prevent a side-channel attack in the future?
The correct answer is: B. Air gapping important ICS and machines
Side-channel attacks exploit indirect information leaks from systems (e.g., timing, power consumption, or electromagnetic emissions) to infer sensitive data or disrupt operations. In this scenario, the attacker was able to determine the acceptable rpm range of a SCADA (Supervisory Control and Data Acquisition) system, likely through indirect observation or by compromising the system.
Air gapping, which involves isolating critical systems from any network connectivity (including the internet and other external networks), is the most effective defense against side-channel attacks targeting Industrial Control Systems (ICS) or SCADA environments. It ensures that attackers cannot remotely access or gather data from these critical systems.
Why the other options are incorrect:
Installing online hardware sensors:
Implementing a HIDS (Host-based Intrusion Detection System):
Installing a SIEM agent on the endpoint:
No Payment Cards Needed
Discover a range of courses designed to provide you with the knowledge and skills needed to excel in your chosen field.
You don’t need one month to study and pass your test.
With Prepsaret, it takes you a few days to grasp all the concepts needed to pass your exams