IA 2 - UNIT 1 and 5 Flashcards

1
Q

refers to extremely large and complex datasets that are difficult to process and analyze using traditional data processing tools and techniques.

A

Big Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key Characteristics of Big Data

A
  1. volume
  2. velocity
  3. veracity
  4. variety
  5. value
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Refers to the massive amount of data generated every second from various sources, such as social media, sensors, transactions, and machines. Big data involves handling datasets that range from terabytes to petabytes and beyond

A

Volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describes the speed at which data is generated and processed. With big data, information is produced rapidly and continuously, requiring real-time or near-real-time processing to derive actionable insights.

A

Velocity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Refers to the diversity of data types, including structured (like databases), unstructured (like text, images, or video), and semi-
structured data (such as JSON or XML files). Big data involves dealing with this variety of formats from different sources.

A

Variety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Refers to the uncertainty or quality of the data, as big data can sometimes be incomplete, inaccurate, or inconsistent.

A

Veracity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Highlights the importance of extracting meaningful and valuable insights from big data.

A

Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • The vast array of physical objects equipped with sensors and software that enable them to interact with little human intervention by collecting and exchanging data via a network.
  • includes the many “smart,” computer-like devices so commonplace today, which can connect with the Internet or interact via wireless networks
A

iot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Benefits of IoT in the Society

A
  1. improved efficiency
  2. better health outcomes
  3. environmental benefits
  4. enhanced convinience
  5. enhanced safety and security
  6. new business opportunities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What impact will IoT have in
the economy

A
  1. job creation
  2. new business models
  3. cost savings
  4. increased productivity
  5. improved customer experience
  6. new revenue streams
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Security in
IoT

A
  1. Device Authentication and Authorization
  2. Data Encryption
  3. Secure Firmware and Software Updates
  4. Network Security
  5. data integrity and verification
  6. privacy protection
  7. resilience and redundancy
  8. user education and awareness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

One of the first steps to secure IoT systems is to make
sure only approved devices and users can connect to
the network. Using strong ways to verify identities, like
multi-factor authenticatio
n and unique device IDs,
helps block unauthorized access.

A

Device Authentication and Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

crucial for protecting information both while it is being sent and when it is stored. IoT devices often send sensitive data, and encrypting this data makes sure that even if someone intercepts it, they cannot read it.

A

data enctyption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Regular updates are essential for keeping IoT devices secure. However, updates can be risky if not done safely. Using secure update methods, like digitally signed firmware and over-the-air (OTA) updates, ensures that only approved updates are installed, protecting devices from harmful software.

A

Secure Firmware
and Software
Updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IoT devices are usually part of larger networks, so
keeping the network secure is crucial for overall IoT
security. Using firewalls, intrusion detection systems
(IDS), and intrusion prevention systems (IPS)
helps
monitor and protect the network from threats.

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Making sure the data collected and sent by IoT devices
is accurate and unchanged
is very important. Using
techniques like cryptographic hashing can verify that
data hasn’t been altered.

A

Data Integrity
and Verification

17
Q

IoT devices often collect a lot of personal data, so
protecting privacy is very important. Companies must
follow data privacy laws like GDPR or CCPA and only
collect necessary data.

A

Privacy Protection

18
Q

IoT systems should be built to handle failures and
attacks.
Creating resilience through backups and
failover systems ensures that important services keep
running even during security issues.

A

Resilience and
Redundancy

19
Q

Teaching users about IoT security and safe practices is
crucial.
Users need to know the risks and how to set
up and use their devices securely.

A

User Education
and Awareness

20
Q

12 common iot security concerns

A
  1. Poor vulnerability testing
  2. Unpatched vulnerabilities
  3. Default passwords and weak authentication
  4. Outdated firmware and software
  5. Poor device management and visibility
  6. Limited security integration
  7. Legacy assets
  8. Remote work
  9. Overwhelming data volume
  10. Data privacy concerns
  11. Complex Environments
  12. APIs as entry points for attacks
21
Q

Examples of
IoT Hacking and
Vulnerabilities

A
  1. The Mirai Botnet (aka Dyn Attack)
  2. The Hackable Cardiac Devices from St. Jude
  3. The Owlet WiFi Baby Heart Monitor Vulnerabilities
  4. The TRENDnet Webcam Hack
  5. The Jeep Hack
22
Q

Implementing
IoT Security in
3 Steps

A
  1. DEVICE DISCOVERY
  2. RISK ANALYSIS
  3. MONITOR, PROTECT, ENFORCE
22
Q

The first step in securing IoT is identifying the devices connected to your network, which typically uses a device identification and discovery tool to automate three critical IoT security functions:

A

DEVICE DISCOVERY

23
Q

Once all IoT devices are identified, the next step is to conduct a thorough risk analysis, which assesses the vulnerabilities and potential threats associated with each device and its communication channels.

A

RISK ANALYSIS

23
Q

The final step involves actively monitoring the IoT environment, applying protective measures, and enforcing security policies to maintain a secure posture over time

A

MONITOR, PROTECT, ENFORCE