3.5 Explain the security implications of embedded systems. Flashcards

1
Q

SCADA/ICS

A

Supervisory Control and Data Acquisition (SCADA) is a special system used in industrial environments (e.g., a manufacturing plant) to monitor operations. Physical security is an important part of your security in such an environment, as any tampering with any of the SCADA components can cause the monitoring and alarms to malfunction. Industrial control system (ICS) refers generally to any system that monitors or controls industrial equipment, including SCADA systems.

Stuxnet provides a great example of the need to protect
embedded systems, such as SCADA systems. Stuxnet is a computer worm designed to attack a specific embedded system used in one of Iran’s nuclear enrichment facilities. It caused centrifuges to spin fast enough to tear themselves apart and some reports indicated it destroyed as many as 20 percent of these centrifuges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Smart Devices/IoT

A

Be aware of smart devices and the type of information they contain, and any vulnerabilities that may exist with the device due to the nature of the embedded system. This includes wireless capabilities, Bluetooth, cameras, and electronics of the device. The Internet of Things (IoT) is the term used to describe how all these devices are connected and exchange information. This includes wearable technology (such as GPS watches) and home automation systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Smart Devices/IoT - Wearable Technology

A

Wearable technology has exploded in recent years. It includes any device you can wear or have implanted. These devices can then be used to interact with other devices, such as a smartphone. As an example, Fitbit has manufactured a range of products that you can wear to monitor your health and fitness. Combined with an app on their smartphone, people can gain insight into how well they’re doing on their goals.

Most veterinarians recommend implanting microchips in pets. Animal shelters routinely look for these and if found, they can help return the pets to their owners. Some can even be used to open some pet doors. The company Dangerous Things sells a similar device for people that can reportedly be injected into your hand at the tattoo parlor. Once injected, you can program it to open some smart locks or control your cell phone. Be careful, though. Dangerous Things warns “Use of this device is strictly at your own risk.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Smart Devices/IoT - Home Automation

A

Home automation includes Internet-connected devices, such as wireless thermostats, lighting, coffee makers, and more. These devices typically connect to the home’s network, which gives them Internet access.

This allows people to access or control these devices from the Internet, even when they aren’t home. Camera systems often include Internet-connected cameras. These cameras can be within a home automation system or supporting physical security goals for an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HVAC

A

The HVAC system has an embedded computer system to sense and control the temperature of the environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SoC

A

A system-on-chip (SoC) is essentially a computer system on a computer chip that is embedded into boards. SoCs can contain a wealth of functionality, including CPUs, GPUs, and wireless modules. An example of a device that uses an SoC is Raspberry Pi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RTOS

A

A real-time operating system (RTOS) is an operating system found on an embedded system that is designed to process data as it arrives at the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Printers/MFDs

A

Printers and multifunction devices (MFDs; a device that functions as a printer, fax, and scanner) have a number of embedded components to be aware of. For example, they have memory to store information, some printers have hard drives that potentially store print jobs (which could contain sensitive information), and many printers are web servers as well, which makes them easily exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Camera Systems

A

Camera systems today contain embedded systems. As with printers, you should be aware of the electronic elements in the camera systems, but you should also be aware of systems that contain cameras. Also note that many cameras are connected to a central server that could control the camera and/or is where the cameras send their data to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Special Purpose (Medical Devices/Vehicles/Aircraft/UAV)

A

There are a number of special-purpose systems that contain embedded systems, including medical devices, vehicles, and aircraft/UAV systems. Each of these systems should be evaluated for vulnerabilities.

Some control dedicated tasks, such as ensuring each engine cylinder fires at exactly the right time. Others control much more complex tasks, such as automatically parallel parking a car. Select the option and take your hands off the wheel. The car will park itself, within the space, and without hitting anything.

While these systems aren’t necessarily accessible via the Internet, many autos now include Internet access via satellite communications. Manufacturers could decide to integrate all the embedded systems in an automobile, making them all accessible via the Internet.

Aircraft and unmanned aerial vehicles (UAVs) include embedded systems. Hobbyists use small UAVs to take pictures remotely. Other organizations such as the military include sophisticated embedded systems for reconnaissance and to deliver weapons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly