Chapter 9 - IoT Flashcards

1
Q

What is IoT ?

A

A collection of devices using sensors, software, storage and electronics to collect, analyze, store and share data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 components of IoT ?

A

Sensing Technology, IoT gateways, The Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vehicle Ad Hoc Network (VANET)

A

Communications networks used by our vehicles. Allows for Vehicle- to-vehicle data exchange (V2V)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IoT OS - RIOT OS

A

It can run on embedded systems, actuator boards, and sensors, uses energy efficiently, and has very small resource requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IoT OS - ARM Mbed OS

A

This is mostly used on wearables and other devices that are low-powered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IoT OS - RealSense OS X

A

Intel’s depth sensing version, this is mostly found in cameras and other sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IoT OS - Nucleus RTOS

A

This is primarily used in aerospace, medical, and industrial applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IoT OS - Brillo

A

An Android-based OS, this is generally found in thermostats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IoT OS - Contiki

A

This is another OS madefor low-power devices; however, it is found mostly in street lighting and sound monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IoT OS - Zephyr

A

This is another option for low powered devices and devices without many resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IoT OS - Ubuntu Core

A

This is used in robots and drones, and is also known as “snappy”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IoT OS - Integrity RTOS

A

This is primarily found in aerospace and medical, defense, industrial, and automotive sectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IoT OS - Apache Mynewt

A

Devices using Bluetooth Low Energy Protocol make use of this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IoT Methods for Communicating

A

Device to Device (IoT to IoT) - Device to Cloud (Directly to cloud) - Device to Gateway (Gateway first then cloud) - Back-End Data Sharing (Device to cloud, but adds parties to collect data).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IoT Architecture - Edge Technology Layer

A

Consists of sensors, RFID tags, readers and the devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IoT Architecture - Access Gateway Layer

A

First data handling, message identification and routing

17
Q

IoT Architecture - Internet Layer

A

Crucial layer which serves as main component to allow communication

18
Q

IoT Architecture - Middleware Layer

A

Sits between application and hardware; handles data and device management, data analysis and aggregation.

19
Q

IoT Architecture - Application Layer

A

Responsible for delivery of services and data to the user

20
Q

IoT Attack - Sybil Attack

A

Uses multiple forged identities to create the illusion of traffic

21
Q

IoT Attack - HVAC Attacks

A

attacks on HVAC systems

22
Q

IoT Attack - Rolling Code

A

The ability to jam a key fob’s communications, steal the code and then create a subsequent code.

23
Q

IoT Attack - BlueBorne

A

Attacks against Bluetooth devices

24
Q

What is the IoT Hacking Methodology ?

A
  1. Information Gathering 2. Vulnerability Scanning. 3. Launch Attacks 4. Gaining Access. 5. Maintaining Access
25
Q

Foren6

A

Tool for IoT traffic sniffing

26
Q

RIoT

A

IoT Vuln scanner

27
Q

beSTORM

A

Vulnerability scanner

28
Q

IoTsploit

A

IoT Vuln scanner

29
Q

IoT Inspector

A

IoT Vuln scanner

30
Q

Firmalyzer

A

IoT Attack tool

31
Q

KillerBee

A

IoT Attack tool

32
Q

JTAGulator

A

IoT Attack tool

33
Q

Attify

A

IoT Attack tool