IoT and OT Hacking Flashcards
In IoT, what is the Internet Layer?
The Internet Layer serves as the main component in carrying out communication between two endpoints, such as device-to-device, device-to-cloud, device-to-gateway, or back-end data sharing
In IoT, what is the Access Gateway Layer?
This layer helps to bridge the gap between two endpoints, such as a device and a client. The initial data handling also takes place in this layer. This layer carries out message routing, message identification, and subscribing
In IoT, what is the Middleware Layer?
The Middleware Layer is one of the most critical layers that operates in two-way mode. It is responsible for important functions such as data management, device management, and various issues like data analysis, data aggregation, data filtering, device information discovery, and access control
In IoT, what is the Edge Technology Layer?
This layer consists of all the hardware components, including sensors, radio-frequency identification (RFID) tags, readers, or other soft sensors, and the device itself
What is Contiki?
Contiki is an operating system used in low-power wireless devices such as street lighting, sound monitoring systems, etc
Which of the following protocols is used to enable fast and seamless interaction with nearby IoT devices and reveals the list of URLs being broadcasted by nearby devices with BLE beacons?
- LWM2M
- CoAP
- XMPP
- Physical Web
Physical Web - Physical Web is a technology used to enable faster and seamless interaction with nearby IoT devices. It reveals the list of URLs being broadcast by nearby devices with BLE beacons
What is CoAP?
Constrained Application Protocol (CoAP) is a web transfer protocol used to transfer messages between constrained nodes and IoT networks. This protocol is mainly used for machine-to-machine (M2M) applications such as building automation and smart energy
What is XMPP?
eXtensible Messaging and Presence Protocol (XMPP) is an open technology for real-time communication used for IoT devices. This technology is used for developing interoperable devices, applications, and services for the IoT environment
What is LWM2M?
Lightweight Machine-to-Machine (LWM2M) is an application-layer communication protocol used for application-level communication between IoT devices; it is used for IoT device management.
In IoT, what is the Back-End Data-Sharing Communication Model?
The Back-End Data-Sharing communication model extends the device-to-cloud communication type such that the data from the IoT devices can be accessed by authorized third parties. Here, devices upload their data onto the cloud, which is later accessed or analyzed by third parties.
In IoT, what are the effects of an insecure web interface?
Insecure web interface occurs when certain issues with the web interface arise, such as weak credentials, lack of account lockout mechanism and account enumeration. These issues can result in a loss of data, loss of privacy, lack of accountability, denial of access and even complete device access takeover
In IoT, what are the effects of insecure network interfaces?
Insecure network services are prone to various attacks like buffer overflow attacks, which cause a denial-of-service scenario, thus leaving the device inaccessible to the user
What is a Sybil Attack?
An attacker uses multiple forged identities to create a strong illusion of traffic congestion, affecting communication between neighboring nodes and networks
In IoT, what are the effects of insecure data transfer and storage?
Lack of encryption and access control of data that is in transit or at rest may result in leakage of sensitive information to malicious users.
In IoT, what are the effects of Insecure Ecosystem Interfaces?
Insecure ecosystem interfaces such as web, backend API, mobile, and cloud interfaces outside the device lead to compromised security of the device and its components