Embeded Systems Flashcards

1
Q

RTOS real time operating system

A

This is an embedded system closed loop component, RTOS defines the way the system works. May become outdated, often patches are not available, iOS strongly incentive using open source OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Active side channel

A

This is attack for embedded system, uses a voltage glitch on the power supply, to cause a program malfunction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SCADA supervisory control and data acquisition

A

Refers to centralized industry control systems (ICS), monitor complex systems spread over large areas (electrify, gas, water). Threats include cyberattacks politically motivated. VULNS: outdated OS, authentication mechanisms, limited monitoring, limited maintenance windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Raspberry pi

A

Is a series of small, single-board Linux embedded systems developed by Raspberry PI foundation to promote teaching of basic computer science

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SSH secure shell

A

Cryptographic telnet replacement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ICS industry control systems

A

Are embedded systems that monitor and control industrial process that exists in the physical world. Are either data - driven or operated remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

System on a chip (SOC)

A

Which is microprocessor or microcontroller with advanced peripherals such as WIFI. Closed loop component for embedded systems. Chips are inexpensive and profit margin slim. Little incentive to maintain/update firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Steppingstone

A

Embedded systems attack, embedded systems a HVAC systems, printers, and camera systems are often connected to a network and unmanaged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Embedded system

A

Is an electronic product that contains a microprocessor and software designed to perform a specific task. Can be fixed or programmable , network attack for this systems exploits the protocol of authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Memory BUS

A

Attack for embedded systems -physically connecting to the hardware and reading the content of memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Weak authentication

A

Embedded systems attack, using default administrator passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly