7 - 4: Embedded Systems Security Flashcards

1
Q

Industrial Control Systems

A

Computer systems that monitor and control industrial production and operation, including energy and manufacturing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ICS deployments

A

Building, workflow, and process automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why are ICSs good hacker targets?

A

Attacks have dramatic implications, systems are often not well-secured, less likely to be patched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ICS types

A

Supervisory Control and Data Acquisition, Distributed Control Systems, Programmable Logic Controllers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SCADA

A

Provide remote monitoring of infrastructure, remote telemetry and sensors, reporting and control back to central system, multiple weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DCS

A

Focuses on controlling processes, sensors and feedback for control, multiple weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PLC

A

Handles specialized input and output, uninterrupted processing, connected to a human-machine interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Modbus protocol

A

A serial interface common in PLCs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Internet of Things

A

Everything has an IP address and it’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IoT challenges

A

Hard to update them as they have no interface, connected to the same network as everything else, often connect back to cloud services for Command and Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Securing smart devices

A

NEVER EVER USE A DEFAULT PASSWORD EVER EVER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Networking smart devices

A

Segment them from each other similar to having an isolated network DMZ. Segmentation is the most effective security control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Firmware version control

A

A method for applying updates to networked devices in an orderly way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Wrappers

A

Monitors input and output to embedded devices to restrict only allowed traffic, effective when patching is not feasible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Embedded systems

A

Smaller computer systems contained within other mechanical or technical systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Systems on a Chip

A

Entire embedded computer systems to perform specific functions on a single chip

17
Q

Field-programmable gate arrays

A

Chips that allow dynamic reprogramming

18
Q

Real-time operating systems

A

Computing source for IoT devices

19
Q

Controller Area Network Bus

A

Simple technology for facilitating on-device communications

20
Q

Challenges for embedded systems

A

Limited power, limited computing capability, limited network capacity

21
Q

Cellular communication

A

Provides internet access in lieu of having a networking device

22
Q

Subscriber Identity Module

A

A SIM card, which allows a device to authenticate to the service provider’s network. Also available as digital cards.

23
Q

ZigBee / Z-wave

A

Standards for short-range network communication

24
Q

Radio Frequency

A

Narrow or base band frequencies allow for longer range communication

25
Q

Satellites

A

Can beam the internet to further locations