Chapter 6 - Mobile and Embedded Device Security Flashcards

1
Q

What is an RTOS?

A

Real-Time Operation System - A specifically designed OS tuned for a SoC in an embedded or specialized system, it is to accommodate very high volumes of data very quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a SoC?

A

System on a Chip - an integrated circuit that combines all the essential components of a computer system, like the CPU, memory, input/output ports, and sometimes even a GPU, onto a single chip (Raspberry Pi)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a SCADA?

A

Supervisory Control And Data Acquisition - Systems help maintain efficiency and provide information on issues to help reduce downtime - Controls multiple ICSs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an ICS?

A

Industrial Control Systems - collect, monitor, and process real-time data so that machines can directly control devices such as valves, pumps, and motors without the need for human intervention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to harden a SCADA and ICSs?

A

-ID all connections to the SCADA network
-Disconnecting the connections that are unnecessary
-Test
-Define Roles
-Identify security requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is SecDevOps?

A

Process of integrating secure development best practices & methodologies into an application software development & deployment processes using the agile model
- Automation whenever possible
- Continuous modifications through the process with provision to roll back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Dead Code?

A

Is a section of an application that executes but performs no meaningful function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an Embedded System?

A

It is 1) computer hardware and software contained within a larger system 2) that is designed for a specific function.
-Fully functional computers integrated into a single chip
-Designed for a specific function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does COPE mean?

A

Corporate Owned, Personally Enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does CYOD mean?

A

Choose Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Process Spawning Control?

A

Uses a vulnerable application to spawn executable files on the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is System Tampering?

A

Uses the vulnerability in an application to modify sensitive areas of the OS such as the Microsoft Windows registry keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the agile model in app development?

A

An Incremental approach, works in small modules, at the end of each cycle the project’s priorities are evaluated as tests are being run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the waterfall model in app development?

A

A Sequential design process where quality assurance occurs after the application has been tested and before going to production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is static code analysis?

A

Review code line by line for errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is dynamic code analysis?

A

Runtime Verification - Security testing preformed after the source code is compiled and when all components are integrated and running
-(code analysis tools use a process called fuzzing)

17
Q

What is the fuzzing process?

A

Provides random input to a program in an attempt to trigger exceptions, such as memory corruption, program crashes, or security breaches - an advantage of it, is that it produces a record of what input triggered the exception so it can be reproduced to track down the problem within the code.

18
Q

What is OTA?

A

Over-the-Air, usually security updates that go to mobile devices

19
Q

What is Celluar?

A

Coverage area for a cellular telephony network divided into cells MTSO (Mobile Telecommunication Switching Office) that controls the transmitters in a cellular network

20
Q

What is MTSO?

A

Mobile Telecommunication Switching Office - controls the transmitters in a cellular network

21
Q

What is VDI?

A

Virtual Desktop Infrastructure - Stores sensitive data and apps on a remote server

22
Q

What is are limited updates?

A

Patches & updates are distributed through firmware Over-the-Air (OTA) updates

23
Q

What is unauthorized recording?

A

Infecting a device with malware, a threat actor can spy on an unsuspecting victim & record conversations or video could pose as “legit” programs

24
Q

What is Geofencing?

A

Restricting an app’s use to a location

25
Q

What is Tethering?

A

Share internet connection

26
Q

What is Jailbreaking a device?

27
Q

What is Rooting a device?

28
Q

What is containerization?

A

Separating storage into business& personal “containers”

29
Q

What is MCM?

A

Mobile Content Management - Creation, editing, and modification of digital content multiple employees

30
Q

What is an UEM?

A

Unified Endpoint Management - All MDM, MAM, and MCM together

31
Q

What is a Raspberry Pi?

A

Low cost, credit card size computer motherboard

32
Q

What is a FPGA?

A

Field-Programmable Gate Array - A hardware “chip” that can be programed by the user to carry out one or more logical operations

33
Q

What is an IoT?

A

Internet of Things - Is connecting any device to the Internet for the purpose of sending & receiving data to be acted upon (low resilience)

34
Q

What is an executable files attack?

A

Trick the vulnerable app to create or modify executable files