Information Assurance - 4 Flashcards

1
Q
  • physical devices that are equipped with sensors, software, and internet connectivity.
  • These devices can collect and exchange data with other devices and systems over the internet or other networks.
  • In simpler terms, it’s about everyday objects becoming smart and interconnected.
A

Internet of Things (IoT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The term “Internet of Things” is coined by

A

Kevin Ashton “The Father of IoT” in 1999.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FEW APPLICATIONS OF IOT

A
  1. Building and Home automation
  2. Manufacturing
  3. Medical and Healthcare Systems
  4. Media
  5. Environmental Monitoring
  6. Infrastructure Management
  7. Energy Management
  8. Transportation
  9. Better quality of life for the Elderly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Examples of IOT

A
  1. Smart Home Devices
  2. SENSORS
  3. Wearable technologies
  4. IoT-Enabled Prosthetics
  5. Personal Medical Devices
  6. Smart Inhalers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

are electronic devices that are physically worn by individuals in order to track, analyze and transmit personal data

A

Wearable technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

These devices - such
as FitBit, Nike FuelBand,
or Withings – generally
communicate using
BlueTooth to
nearby personal
mobile devices.

A

Consumer products for health monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FOUR CATEGORIES OF NETWORKED MEDICAL DEVICES

A
  1. Consumer products for health monitoring
  2. Wearables
  3. Internally embedded medical devices
  4. Stationary medical devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

one that can drive itself from a starting point to a predetermined destination in “autopilot” mode using various in-vehicle technologies.

A

Autonomous Vehicle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a malicious attempt to exploit vulnerabilities in internet-connected devices, such as smart home devices, industrial control systems, and medical devices

A

IoT Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does an IoT attack
differ from IT attacks?

A
  1. Attack surface
  2. Diversity of devices
  3. Physical impact
  4. Legacy devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • IoT devices are often designed with limited resources and processing power.
  • So they may lack security features to protect against attacks, making them more vulnerable to attacks compared to IT.
A

Attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IoT devices often have longer lifes. Many older devices will be in use and connected. Legacy devices may not receive software updates or security patches, making them more vulnerable.

A

Legacy devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The types of IoT devices vary significantly in form factor,operating systems, and network connectivity. So standardized security measures are more complex, leaving some more vulnerable to attacks than
others.

A

Diversity of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IoT devices are often used in critical infrastructure or life-sustaining systems, such as medical devices, which means that an attack on these devices can have severe physical consequences. In contrast, most IT attacks are focused on stealing data or disrupting services.

A

Physical impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Challenges faced by IoT

A
  1. Scalability
  2. Security
  3. Technical Requirements
  4. Technological Standardization
  5. Software Complexity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IoT Attacks Examples

A
  1. The Mirai Botnet
  2. Verkada Hack
  3. Cold in Finland IoT Attack
17
Q

Common IoT
Vulnerabilities

A
  1. Weak, guessable, or hardcoded passwords
  2. Lack of secure update mechanism
  3. Insecure Networks
  4. Insecure or Outdated Components
18
Q

are among the most frequent methods attackers use to compromise IoT devices. Weak and reused passwords, which are short or easy to guess, are simple for attackers to crack, which they then use to compromise devices and launch large-scale attacks.

A

Weak, guessable, or hardcoded passwords

19
Q

make it easy for cyber criminals to exploit weaknesses in the protocols and services that run on IoT devices. Once they have exploited a network, attackers can breach confidential or sensitive data that travels between user devices and the server. Insecure networks are particularly susceptible to man-in-the-middle (MITM) attacks, which aim to steal credentials and authenticate devices as part of broader cyberattacks.

A

Insecure Networks

20
Q

Devices with insecure update processes risk installing malicious or unauthorized code, firmware, and software. Corrupt updates can compromise IoT devices, which could be critical for organizations in the energy, healthcare, and industrial sectors.

A

Lack of secure update mechanism

21
Q

The IoT ecosystem can be compromised by code and software vulnerabilities and legacy systems. Using insecure or outdated components, such as open-source code or third-party software, can present vulnerabilities that expand an organization’s attack surface.

A

Insecure or Outdated Components

22
Q

entails reviewing and restricting the access permissions of smart devices, such as limiting unnecessary access to sensitive data like contacts, thus minimizing potential privacy breaches.

A

Monitor permissions

22
Q

involves ensuring that WiFi networks are protected by strong, unique passwords and avoiding connections to unfamiliar or untrusted networks, reducing the risk of unauthorized access.

A

Use secure networks

22
Q

involves implementing network security measures, like firewalls, to shield IoT devices from attacks and block unauthorized access to hidden protocols, enhancing overall security posture.

A

Protect your devices

23
Q

regularly installing updates released by manufacturers to address known vulnerabilities and enhance security features, thus safeguarding IoT devices against potential threats.

A

Keep Firmware Updated

24
Q

involves altering usernames, passwords, and network configurations on IoT devices to prevent unauthorized access, as default settings are often exploited by attackers.

A

Change default settings

25
Q

Mitigating IOT

Vulnerabilities

A
  1. Change default settings
  2. Keep Firmware Updated
  3. Use secure networks
  4. Monitor permissions
  5. Protect your devices