embedded_security_extended_flashcards - embedded_security_extended_flashcards

1
Q

Embedded Security

A

Implementation of protective mechanisms to ensure confidentiality, integrity, and availability of embedded systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threats to Embedded Systems

A

Common threats include malware, side-channel attacks, buffer overflows, supply chain attacks, and hardware trojans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Secure Boot

A

Ensures only trusted software runs on an embedded device by verifying digital signatures during the boot process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hardware Root of Trust (RoT)

A

A secure hardware foundation providing cryptographic functionalities like secure key storage and firmware validation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Secure Firmware Updates

A

Firmware updates that are authenticated and encrypted to prevent unauthorized modifications and mitigate vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Side-Channel Attacks

A

Attacks exploiting indirect data leaks such as power consumption, electromagnetic emissions, or timing information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trusted Execution Environment (TEE)

A

A secure area of a processor that runs security-critical code separately from the main OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptographic Hardware Modules

A

Dedicated hardware components like TPM and HSM for cryptographic operations and secure key storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Secure Element (SE)

A

A tamper-resistant microcontroller that securely hosts applications and sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Supply Chain Attacks

A

Exploiting vulnerabilities in the manufacturing and distribution chain to compromise embedded systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Buffer Overflow Attacks

A

Exploiting memory vulnerabilities by overwriting adjacent memory areas to execute malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

JTAG and Debug Port Security

A

Restricting access to debug interfaces like JTAG to prevent unauthorized access to embedded systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Physical Security Attacks

A

Attacks involving direct access to hardware, such as probing memory chips and reverse engineering components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Firmware Encryption

A

Encrypting firmware to prevent reverse engineering and unauthorized modifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Code Obfuscation

A

Transforming code into a less human-readable format to deter reverse engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hardware Security Modules (HSM)

A

Dedicated security devices that manage and protect cryptographic keys and operations.

17
Q

Hardware-Based Random Number Generation

A

Using dedicated hardware to generate secure and unpredictable random numbers for cryptography.

18
Q

Tamper Detection and Response

A

Mechanisms that detect physical tampering and take actions such as wiping sensitive data.

19
Q

Secure Key Storage

A

Storing cryptographic keys in a secure and isolated manner to prevent unauthorized access.

20
Q

Two-Factor Authentication (2FA) in Embedded Devices

A

Adding an additional layer of authentication for device access or operations.

21
Q

Remote Attestation

A

Verifying the integrity of a device’s software and hardware remotely to ensure trustworthiness.

22
Q

Secure Communication Protocols

A

Using TLS, DTLS, or IPsec to protect data transmitted between embedded systems and networks.

23
Q

IoT Security Standards

A

Frameworks like NIST IoT Security, IEC 62443, and ISO 27001 to ensure secure embedded system development.

24
Q

Zero Trust Architecture for Embedded Systems

A

Implementing the principle of ‘never trust, always verify’ to minimize attack surfaces.

25
Q

Post-Quantum Cryptography for Embedded Systems

A

Future-proofing embedded security by adopting cryptographic algorithms resilient to quantum attacks.

26
Q

Fault Injection Attacks

A

Introducing environmental disturbances like voltage spikes or laser pulses to manipulate embedded system behavior.

27
Q

Authentication Mechanisms for Embedded Devices

A

Techniques such as biometric authentication, hardware tokens, and digital certificates.

28
Q

Secure Software Development Lifecycle (SDLC)

A

Integrating security into every phase of embedded system development.

29
Q

Patch Management in Embedded Systems

A

Ensuring timely updates and security patches to mitigate vulnerabilities in embedded software.

30
Q

Embedded AI Security

A

Protecting AI-driven embedded systems from adversarial attacks and data manipulation.

31
Q

Defensive Cyber Operations

A

Passive and active cyberspace operations intended to preserve the ability to utilize friendly cyberspace capabilities and protect data, networks, net-centric capabilities, and other designated systems

32
Q

SPARTA

A

A space specific cybersecurity matrix intended to provide unclassified information to space professionals about how spacecraft may be compromised via cyber means. The matrix defines and categorizes commonly identified activities that contribute to spacecraft compromises.

33
Q

TTP

A

Tactic, Technique, and Procedures

34
Q

MITRE ATT&CK

A

A knowledge base of adversary tactics and techniques based on real-world observations. Used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.

35
Q

Defense in Depth

A

The application of multiple countermeasures in a layered or stepwise manner to achieve security objectives. The methodology involves layering heterogeneous security technologies in the common attack vectors to ensure that attacks missed by one technology are caught by another.