Chapter 9 Securing Dedicated Systems Flashcards

1
Q

What are some characteristics of desktop computers?

A

Desktop computers offer the flexibility to run different operating systems and are expandable with the ability to add or remove components such as memory and storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an embedded system?

A

An embedded system is a specialized computer system with fixed hardware, a specialized use, and a specific operating system designed for a particular purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some examples of embedded systems?

A

Examples of embedded systems include Raspberry Pi, industrial control systems (ICS), supervisory control and data acquisition (SCADA) systems, Internet of Things (IoT) devices, medical systems, in-vehicle computing systems, drones, smart meters, surveillance systems, VoIP phones, and mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the significance of real-time operating systems in industrial control systems (ICS) and SCADA systems?

A

Industrial control systems and SCADA systems often use real-time operating systems designed to handle real-time processing and respond to events in a timely manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some unique security considerations for IoT devices?

A

IoT devices can connect to the Internet, making them susceptible to security vulnerabilities and attacks. Security measures should be implemented to protect against unauthorized access and ensure the privacy and integrity of data transmitted by these devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does voice over IP (VoIP) relate to embedded systems?

A

VoIP phones, which use IP networks to transmit voice calls, are considered embedded systems. They have CPUs, RAM, operating systems, and security considerations specific to VoIP technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What distinguishes mobile systems in terms of security?

A

Mobile systems, such as laptops, tablets, and smartphones, are considered embedded systems with the added characteristic of mobility. They have fixed hardware, specific operating systems, and unique security concerns related to their portability and connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are industrial control systems (ICS) and what industries use them?

A

Industrial control systems are specialized computers used in various industries such as manufacturing, water treatment plants, and power grid utilities. They are responsible for controlling and monitoring physical processes and equipment in these industries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a programmable logic controller (PLC)?

A

A programmable logic controller (PLC) is an industrial control system device with an IP address and various ports used to connect sensors, robotic machinery, actuators, and other equipment. It plays a crucial role in controlling and monitoring physical processes in industrial environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why are industrial control systems a potential security concern?

A

Industrial control systems, including PLCs, are connected to networks and have the potential to be targeted by attackers. Compromising these systems can have serious consequences as they control physical equipment and processes in critical infrastructures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What security measures should be taken to protect industrial control systems?

A

Security measures for industrial control systems include applying firmware updates to address vulnerabilities, ensuring the security of monitoring stations that interact with the systems, implementing network isolation to limit exposure to external networks, and considering the use of lightweight operating systems specifically designed for industrial control applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is supervisory control and data acquisition (SCADA) and how does it relate to industrial control systems?

A

SCADA refers to a collection of industrial control system devices that focus on specific tasks such as monitoring and controlling processes in manufacturing, water treatment plants, power grids, and other industries. SCADA systems can be dispersed over a wide area network and often include a central supervisory station that retrieves data from multiple PLCs located in remote areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of a supervisory control and data acquisition (SCADA) master station?

A

The SCADA master station serves as a central control and monitoring point for industrial processes. It collects data from various PLCs and provides real-time information on the status and performance of equipment and processes in industrial environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Internet of Things (IoT) and what does it encompass?

A

The IoT refers to interconnected devices that can transmit data over the internet, including laptops, smartphones, smartwatches, baby monitors, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some security considerations for IoT devices?

A

Security concerns include default credentials, lack of firmware updates, and vulnerability to malware. To mitigate risks, apply updates, change default credentials, use secure protocols, and secure interacting devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Can you explain the security implications of IoT devices and the need for network isolation?

A

IoT devices can be vulnerable to attacks, compromising user privacy. Network isolation is essential to protect other networks by placing IoT devices on separate VLANs and implementing firewall rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Zigbee, and how does it relate to IoT security?

A

Zigbee is a protocol for smart home wireless networking. It provides inherent security measures like encryption. However, vulnerabilities can still exist, so updating firmware, securing devices, and network isolation are important for IoT security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is GPS?

A

GPS is a satellite navigation system that tracks objects based on coordinates to determine their location on Earth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is infrared?

A

Infrared is a legacy wireless technology that requires line-of-sight communication and was commonly used for interconnecting devices in the past.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is cellular communication?

A

Cellular communication enables phone calls, texting, and data transmission over the cellular network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are Wi-Fi and Bluetooth?

A

Wi-Fi and Bluetooth are wireless communication technologies that use radio waves for data transfer between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is NFC?

A

NFC (Near Field Communication) is a short-range wireless technology used for tasks like mobile payments and data exchange between devices in close proximity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Wi-Fi Direct?

A

Wi-Fi Direct allows devices to establish a peer-to-peer connection over Wi-Fi without the need for an access point or internet connectivity.

24
Q

What is mobile device tethering?

A

Mobile device tethering enables sharing the internet connection of one device with other devices in the local vicinity.

25
Q

What are some security considerations for wireless connectivity?

A

Security considerations include disabling unnecessary services, updating firmware, and avoiding malicious hotspots.

26
Q

What are the constraints related to CPU power in mobile devices?

A

Mobile devices have limited CPU power, which can affect cryptographic operations and computational tasks.

27
Q

How does elliptic curve cryptography (ECC) address the CPU power constraint?

A

ECC uses smaller encryption keys than RSA, resulting in less computational overhead and better performance on mobile devices.

28
Q

What is a constraint related to battery life in mobile devices?

A

Battery life is limited, and performing computationally intensive tasks can drain the battery quickly.

29
Q

What is the limited transmission range constraint in mobile devices?

A

Mobile devices have shorter wireless range compared to devices connected to wired networks.

30
Q

What is the term for gaining full access to an Android phone, and why might someone do it?

A

Gaining full access to an Android phone is called rooting, and it allows users to customize firmware, run apps with elevated privileges, or install alternative operating systems.

31
Q

What is the equivalent term for gaining full access to an Apple iOS device?

A

Gaining full access to an Apple iOS device is called jailbreaking, and it serves similar purposes as rooting in Android.

32
Q

Why do organizations often prohibit rooting or jailbreaking of mobile devices?

A

Rooting or jailbreaking a device can pose security risks, as it grants unrestricted access, making the device vulnerable to malware or unauthorized actions.

33
Q

What are some constraints related to IoT devices in terms of firmware updates and default settings?

A

Some IoT devices may not receive firmware updates or allow changes to default settings, limiting their security and customization options.

34
Q

How can organizations address security concerns with mobile devices?

A

Upgrading the device or isolating it on a separate VLAN can help mitigate security risks and enforce organizational standards.

35
Q

What are the different methods of provisioning mobile devices in the enterprise?

A

The different methods are Bring Your Own Device (BYOD), Choose Your Own Device (CYOD), and Corporate Owned, Personally Enabled (COPE).

36
Q

What is the purpose of device partitioning on a mobile device?

A

Device partitioning creates a logical boundary between personal and corporate data, allowing for centralized management and selective wiping in case of loss or theft.

37
Q

What is the role of a SIM card in a mobile device?

A

A SIM card authenticates the device to the cellular network and contains subscriber information, such as the data plan and contact information.

38
Q

What is carrier unlock, and how does it relate to SIM cards?

A

Carrier unlock allows a device to be used with a different cellular provider by using the same SIM card, provided it is supported by both the carrier and the device.

39
Q

How can organizations harden mobile devices and reduce the attack surface?

A

Organizations can disable unnecessary components, enforce policies through Mobile Device Management (MDM) solutions, prevent side loading, enable strong authentication, and encrypt the device and external storage.

40
Q

What is Mobile Device Management (MDM), and what functions does it provide?

A

MDM is software that allows centralized management of mobile devices, providing functions such as policy enforcement, remote wiping, firewall configuration, app deployment, and virus updates.

41
Q

What are some recommended security measures for hardening an Android smartphone?

A

Enabling strong authentication (facial recognition, fingerprint scan), enabling find my phone/mobile, restricting installation of unknown apps, and encrypting external SD cards.

42
Q

What is a hardware security module (HSM) in the context of mobile devices?

A

A hardware security module is a micro SD card used in high-security environments to store cryptographic secrets and perform cryptographic operations, offloading them from the device’s built-in capabilities.

43
Q

How does physical security relate to cybersecurity?

A

Physical security is closely related to cybersecurity because physical access to hardware and devices can provide opportunities for malicious actors to compromise data and systems

44
Q

What are some examples of physical security measures?

A

Physical security measures include controlled access to facilities, visitor logs, reception area security, robot sentries, building security

45
Q

How can hardware key loggers pose a security risk?

A

Hardware key loggers can be used by malicious actors to capture keystrokes entered on a keyboard, including sensitive information such as passwords and usernames.

46
Q

What is the purpose of access control vestibules or mantraps?

A

Access control vestibules, also known as mantraps, are security mechanisms that require individuals to pass through two sets of doors. The inner door only opens when the outer door is closed successfully, preventing unauthorized access and preventing tailgating (when someone follows closely behind an authorized person to gain entry).

47
Q

What is the concept of air gapping in cybersecurity?

A

Air gapping refers to the practice of physically isolating a network from other networks, both wired and wireless. An air-gapped network has no connections to external networks, providing a higher level of security.

48
Q

What does the hardware key logger do?

A

The hardware key logger captures keystrokes entered on a keyboard.

49
Q

How can an attacker gain access to the captured keystrokes?

A

The attacker can connect to the key logger’s Wi-Fi network and view the captured keystrokes through a web page.

50
Q

Why is physical security important in protecting digital assets?

A

Physical security helps prevent unauthorized access to devices and protects against physical compromises, such as the installation of key loggers.

51
Q

What measures can be taken to enhance physical security?

A

Implementing visitor logs, reception area security, locked equipment racks, and access control measures can enhance physical security.

52
Q

What role does physical security play in conjunction with cybersecurity?

A

Physical security complements cybersecurity measures to ensure comprehensive protection of digital assets and mitigate potential threats.

53
Q

Why is airflow management important in physical security?

A

Airflow management is important in physical security because it helps regulate the temperature of equipment in server rooms or data centers, preventing overheating and ensuring optimal performance.

54
Q

How can airflow be controlled in server rooms or data centers?

A

Airflow can be controlled by keeping incoming cool air separate from warm air being exhausted. This can be achieved through the use of containment panels or curtains, blanking panels, and proper ventilation systems.

55
Q

What are the consequences of inadequate airflow management?

A

Inadequate airflow management can lead to equipment overheating, CPU throttling, performance degradation, and even system shutdowns, resulting in a loss of availability and potential security risks.

56
Q

How do hot and cold aisles contribute to airflow management?

A

Hot and cold aisles help maintain airflow separation by ensuring that cool air is directed towards equipment intake fans (cold aisle) and warm air is contained and exhausted away from the equipment (hot aisle).

57
Q

Why is monitoring environmental factors important in physical security?

A

Monitoring temperature, pressure, humidity, noise, and other environmental factors is crucial to detect potential issues, such as overheating, and take preventive actions before they lead to equipment failure or security breaches.