Explain the security implications of embedded and specialized systems Flashcards

1
Q

Embedded systems

A

Raspberry Pi
Field-programmable gate array (FPGA)
Arduino

A computer system that is designed to perform a specific, dedicated function, such as a microcontroller in a medical drip or components in a control system managing a water treatment plant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Raspberry Pi

A

The Raspberry Pi is a low cost, credit-card sized computer that plugs into a computer monitor or TV, and uses a standard keyboard and mouse. It is a capable little device that enables people of all ages to explore computing, and to learn how to program in languages like Scratch and Python. It’s capable of doing everything you’d expect a desktop computer to do, from browsing the internet and playing high-definition video, to making spreadsheets, word-processing, and playing games.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Field-programmable gate array (FPGA)

A

A field-programmable gate array (FPGA) is an integrated circuit designed to be configured by a customer or a designer after manufacturing – hence the term field-programmable. The FPGA configuration is generally specified using a hardware description language (HDL), similar to that used for an application-specific integrated circuit (ASIC). Circuit diagrams were previously used to specify the configuration, but this is increasingly rare due to the advent of electronic design automation tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Arduino

A

The main difference between them is: Arduino is microcontroller board, while Raspberry Pi is a microprocessor based mini computer (SBC). The Microcontroller on the Arduino board contains the CPU, RAM and ROM. All the additional hardware on Arduino Board is for power supply, programming and IO Connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Supervisory control and data acquisition (SCADA)/industrial control system (ICS)

A
Facilities
Industrial
Manufacturing
Energy
Logistics

A type of industrial control system that manages large-scale, multiple-site devices and equipment spread over geographically large areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Facilities

A

Facilities refers to site and building management systems, typically operating automated heating, ventilation, and air conditioning (HVAC), lighting, and security systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Industrial

A

Industrial can refer specifically to the process of mining and refining raw materials, involving hazardous high heat and pressure furnaces, presses, centrifuges, pumps, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Manufacturing

A

Fabrication and manufacturing refer to creating components and assembling them into products. Embedded systems are used to control automated production systems, such as forges, mills, and assembly lines. These systems must work to extremely high precisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Energy

A

Energy refers to power generation and distribution. More widely, utilities includes water/sewage and transportation networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Logistics

A

Logistics refers to moving things from where they were made or assembled to where they need to be, either within a factory or for distribution to customers. Embedded technology is used in control of automated transport and lift systems plus sensors for component tracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Internet of Things (IoT)

A
Sensors
Smart devices
Wearables
Facility automation
Weak defaults

Devices that can report state and configuration data and be remotely managed over IP networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sensors

A

Sensors—IoT devices need to measure all kinds of things, including temperature, light levels, humidity, pressure, proximity, motion, gas/chemicals/smoke, heart/breathing rates, and so on. These are implemented as thermocouples/thermistors, infrared detectors, inductive, photoelectric, and capacitative cells, accelerometers, gyroscopes, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Smart devices

A

Smart devices—IoT endpoints implement the function, such as a smart lightbulb or a video entryphone that you can operate remotely. These devices implement compute, storage, and network functions that are all potentially vulnerable to exploits. Most smart devices use a Linux or Android kernel. Because they’re effectively running mini-computers, smart devices are vulnerable to some of the standard attacks associated with web applications and network functions. Integrated peripherals such as cameras or microphones could be compromised to facilitate surveillance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wearables

A

Wearables—some IoT devices are designed as personal accessories, such as smart watches, bracelets and pendant fitness monitors, and eyeglasses. Current competing technologies are based on FitBit, Android Wear OS, Samsung’s Tizen OS, and Apple iOS, each with their own separate app ecosystems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Facility automation

A

Components and protocols that facilitate the centralized configuration and monitoring of mechanical and electrical systems within offices and data centers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Weak defaults

A

When they are designed for residential use, IoT devices can suffer from weak defaults. They may be configured to “work” with a minimum of configuration effort. There may be recommended steps to secure the device that the customer never takes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Specialized

A

Medical systems
Vehicles
Aircraft
Smart meters

There are also specialized systems installed within office networks, such as printer and Voice over IP (VoIP) equipment. These systems must not be overlooked by security monitoring procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Medical systems

A

Medical devices represent an array of systems potentially vulnerable to a wide range of attacks. It is important to recognize that use of these devices is not confined to hospitals and clinics but includes portable devices such as cardiac monitors/defibrillators and insulin pumps. As well as unsecure communication protocols, many of the control systems for these devices run on unsupported versions of operating systems (such as Windows XP) because the costs of updating the software to work with newer OS versions is high and disruptive to patient services. Some of the goals of attacks on medical devices and services are as follows:

Use compromised devices to pivot to networks storing medical data with the aim of stealing protected health information (PHI).
Hold medical units ransom by threatening to disrupt services.
Kill or injure patients (or threaten to do so) by tampering with dosage levels or device settings.

19
Q

Vehicles

A

Automobiles and unmanned aerial vehicles (UAV), or drones, contain sophisticated electronics to control engine and power systems, braking and landing, and suspension/stability. Modern vehicles are increasingly likely to have navigation and entertainment systems, plus driver-assist or even driverless features, where the vehicle’s automated systems can take control of steering and braking. The locking, alarm, and engine immobilizer mechanisms are also likely to be part of the same system. Each of these subsystems is implemented as an electronic control unit (ECU), connected via one or more controller area network (CAN) serial communications buses.

20
Q

Aircraft

A
21
Q

Smart meters

A

A utility meter that can submit readings to the supplier without user intervention.

22
Q

Voice over IP (VoIP)

A

Types of embedded systems are used to implement both Voice over IP (VoIP) endpoints and media gateways. Endpoints can be individual handsets or conferencing units. A media gateway might use a separate firmware/OS to implement integration with telephone and cellular networks.

23
Q

Heating, ventilation, air conditioning (HVAC)

A
24
Q

Drones

A

See Vehicles

25
Q

Multifunction printer (MFP)

A

Any device that performs more than one function, but typically print devices that can also scan and fax.

26
Q

Real-time operating system (RTOS)

A

A type of OS that prioritizes deterministic execution of operations to ensure consistent response for time-critical tasks.

27
Q

Surveillance systems

A

A physical access control system (PACS) is a network of monitored locks, intruder alarms, and video surveillance. A PACS can either be implemented as part of a building automation system or a separate system in its own right. Gaining physical access to premises, or even just access to video monitoring systems, gives an adversary many opportunities to develop additional attacks. As with building automation, a PACS is likely to be installed and maintained by an external supplier.

28
Q

System on chip (SoC)

A

A processor that integrates the platform functionality of multiple logical controllers onto a single chip.

29
Q

Communication considerations

A
5G
Narrow-band
Baseband radio
Subscriber identity module (SIM) cards
Zigbee
30
Q

5G

A
31
Q

Narrow-band

A

Narrowband-IoT (NB-IoT)—this refers to a low-power version of the Long Term Evolution (LTE) or 4G cellular standard. The signal occupies less bandwidth than regular cellular. This means that data rates are limited (20-100 kbps), but most sensors need to send small packets with low latency, rather than making large data transfers. Narrowband also has greater penetrating power, making it more suitable for use in inaccessible locations, such as tunnels or deep within buildings, where ordinary cellular connectivity would be impossible.

32
Q

Baseband radio

A

The chip and firmware in a smartphone that acts as a cellular modem.

33
Q

Subscriber identity module (SIM) cards

A

A small chip card that identifies the user and phone number of a mobile device, via an International Mobile Subscriber Identity (ISMI).

34
Q

Zigbee

A

Low-power wireless communications open source protocol used primarily for home automation. ZigBee uses radio frequencies in the 2.4 GHz band and a mesh topology.

35
Q

Constraints

A
Power
Compute
Network
Crypto
Inability to patch
Authentication
Range
Cost
Implied trust
36
Q

Power

A

Many embedded devices are battery-powered, and may need to run for years without having to replace the cells. This means that processing must be kept to the minimum possible level.

37
Q

Compute

A
38
Q

Network

A

Minimizing compute functions also has an impact on choices for network connectivity. The Wi-Fi and 4G/5G standards developed for use with computer and smartphone networking use power-hungry antennas to maximize data rates and range, plus processing to encrypt the communications. Networks for embedded systems emphasize power-efficient transfer of small amounts of data with a high degree of reliability and low latency.

39
Q

Crypto

A

they need to use cryptoprocessors to ensure confidentiality, integrity, and availability. This is prompting the development of ciphers that do not require such large processing resources.

40
Q

Inability to patch

A

Many embedded systems require manual updates, which are perceived as too time-consuming for a security department with other priorities to perform.

41
Q

Authentication

A

The lack of compute resources means that embedded systems are not well-matched to the cryptographic identification and authentication technologies that are widely used on computer networks. As embedded systems become more accessible via those networks, however, they need to use cryptoprocessors to ensure confidentiality, integrity, and availability. This is prompting the development of ciphers that do not require such large processing resources.

42
Q

Range

A

Minimizing compute functions also has an impact on choices for network connectivity. The Wi-Fi and 4G/5G standards developed for use with computer and smartphone networking use power-hungry antennas to maximize data rates and range, plus processing to encrypt the communications. Networks for embedded systems emphasize power-efficient transfer of small amounts of data with a high degree of reliability and low latency.

43
Q

Cost

A

Cost is an important factor. As devices may be used in large numbers and are designed for fairly predictable processing workloads, there is no obvious reason to over-provision compute resources and the price per unit can be driven as low as possible.

44
Q

Implied trust

A

On PC hardware, a root of trust is established at the hardware level by a TPM. Without this explicit trust anchor, a network has to use an implied trust model. Implied trust means that every device that has been added to the network is trusted, on the assumption that it was added and continues to be operated by a legitimate administrator.