2.6 Explain the security implications of embedded and specialized systems. (Page 10). Flashcards
Any form of computing component added to an existing mechanical or electrical system for the purpose of providing automation and/or monitoring.
EMBEDDED SYSTEMS
A 64-bit microcontroller or a single-board computer. These types of microcontrollers provide a small form-factor computer that can be used to add computer control and monitoring to almost anything. It includes a CPU, RAM, video, peripheral support (via USB), and some include onboard networking. It includes its own custom OS, but dozens of alternative OSs can be installed as a replacement.
Rasberry Pi (EMBEDDED SYSTEMS)
A flexible computing device intended to be programmed by the end user or customer. FPGAs are often used as embedded devices in a wide range of products, including industrial control systems (ICS).
(Page 197).
Field-programmable gate array (FPGA) (EMBEDDED SYSTEMS)
An open-source hardware and software organization that creates single-board 8-bit microcontrollers for building digital devices. It has limited RAM, a single USB port, and I/O pins for controlling additional electronics (such as servo motors or LED lights), and does not include an OS. Instead, it can execute C++ programs specifically written to its limited instruction set. While Raspberry Pi is a miniature computer, It is a much simpler device.
Arudino (EMBEDDED SYSTEMS)
A type of industrial control system (ICS). An ICS is a form of computer-management device that controls industrial processes and machines.
SYSTEM CONTROL AND DATA ACQUISITION (SCADA) / INDUSTRIAL CONTROL SYSTEM (ICS)
These benefit from ICS/SCADA automation and monitoring by allowing the systems to manage door locks, control lighting, adjust temperature and humidity, and more.
Facilities/ Buildings (SCADA/ICS)
These organizations often using ICS to automate and oversee large complex operations, such as oil refineries, waste management plants, cruise ships, and more.
Industrial (SCADA/ICS)
These organizations often implement ICS solutions to automate and oversee their operations.
Manufacturing (SCADA/ICS)
SCADA and ICS can be deployed to monitor and manage energy consumption to reduce cost and optimize capabilities and performance of managed systems.
Energy (SCADA/ICS)
SCADA and ICS can be beneficial to site managers by easing the burden of logistics by automating operations and maintaining logging and monitoring of events across the entirety of the enterprise IT/IS or industrial/manufacturing area.
Logistics (SCADA/ICS)
A new subcategory or maybe even a new class of devices connected to the Internet to provide automation, remote control, or AI processing to traditional or new appliances or devices in a home or office setting.
INTERNET OF THINGS (IoT)
A common IoT device deployed in a business environment that can measure just about anything, including temperature, humidity, light levels, dust particles, movement, acceleration, and air/liquid flow. They can be linked with cyberphysical systems to automatically adjust or alter operations based on the sensor’s measurements such as turning on the A/C when the temperature rises above a threshold.
Sensors (IoT)
A mobile device that offers the user a plethora of customization options, typically through installing apps, and may take advantage of on-device or in-the-cloud artificial intelligence (AI) processing.
Smart Device (IoT)
Offshoots of smart devices and IoT devices that are specifically designed to be worn by an individual. The most common examples of these are smart watches and fitness trackers.
Wearables (IoT)
These include smart thermostats, ovens, refrigerators, garage doors, doorbells, door locks, and security cameras. These IoT devices may offer automation or scheduling of various mundane, tedious, or inconvenient activities, such as managing the household heating and cooling systems, adding groceries to an online shopping list, automatically opening or unlocking doors as you approach, recording visitors to your home, and cooking dinner so it is ready just as you arrive home from work.
Facility automation devices (IoT)
Often this element of IoT devices will be insecure. Always evaluate the setting and configuration options of new products and make changes that optimize security and support business functions. This is especially relevant to default passwords, which must always be changed and verified.
Weak defaults (IoT)
This type of equipment is anything designed for one specific purpose, to be used by a specific type of organization, or to perform a specific function.
SPECIALIZED