IOT_CHFI Flashcards
CHFI certificate
Access Gateway Layer
This layer helps bridge the gap between two end points, such as a device and a client. The very first data handling also takes place in this layer. It carries out message routing, message identification, and subscription.
Android wear pair device
- Enable developer options on the smartwatch
application
Validation of the inputted string, AuthN, AuthZ, no automatic security updates, default passwords
Cloud
Improper authentication, no encryption for storage and communications, insecure web interface
complications.db
Contains complications display information
cross-site request forgery (XSRF)
is a type of attack in which a malicious web site, blog, instant message, or program causes a user’s web browser to behave abnormally on a trusted site for which the user is authenticated at that moment.
Cross-Site Scripting (XSS)
is a type of attack on web applications, using which an attacker can inject malicious code into the application to obtain unauthorized access to the web application.
Data API
This API helps the data sync with the smartphone; once synced, the data is automatically transferred among the two devices
DataStore.db
Contains to-do lists and shopping lists that are acquired using the todos API from cloud services and client centric applications.
DDoS attack on IoT device steps
- Attacker gains remote access to vulnerable devices
DDoS attack
attack is a type of attack where multiple infected systems are used to pound a single online system or service, thereby making the server useless, slow, and unavailable for a legitimate user for a short period of time.
Edge Technology Layer
This layer consists of all the hardware components, including sensors, radio-frequency identification (RFID) tags, readers, or other soft sensors, and the device itself. These entities are the primary part of the data sensors that are deployed in the field for monitoring or sensing various phenomena. This layer plays an important part in data collection, and in connecting devices within the network and with the server.
Forged Malicious Device
Attackers replace authentic IoT devices with malicious devices if they have physical access to the network.
GPS connections
help determine the physical location of a smartwatch. A smartwatch can obtain satellite signals and help determine the exact location of the user of that watch.
gservices.db
Contains information related to Google Service Frameworks for Android.