katong CAN bus chuchu Flashcards

1
Q

The principle of ____________ means that each user and each task should be given only the minimum level of access—or privileges—necessary to perform its function. This minimizes the risk of malicious activity or damage if an account or process is compromised.

  • It aids in forensic analysis since it is useful to log activities to track who did what.
A

Principle: Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examples of roles that might be assigned privileges in a system (3)

A

“User,” “Administrator,” and “Factory”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Common Mistakes in Least Privilege Principle (3)

A
  • Make a common task high privilege
  • Give everyone the same password
  • Make risky operations too easy (no confirmation)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False (and why)

Encryption Equal Security

A

False

  • Encryption provides secrecy, but integrity is also required.
  • Export controls may be invoked due to encryption.
  • Security requirements (for firmware distribution):
    • Symmetric key encryption of firmware is a bad idea.
    • Public key encryption of firmware addresses secrecy
    • Secure signature (Public Key Digest) works well
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • Deploy security patches due to possible vulnerabilities in your code or third-party code (like libraries, OS, communications).
  • Good practices for secure updates include:
    • A bootloader that performs updates with a two-stage process.
    • Bootloader checks image public key signatures.
    • Consider limited date ranges for key validity.
    • Consider hard-coding repository IP addresses.
A

Secure Update Principles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • attempts to attack system to look for problems
A

Penetration Testing (“pen test”)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

other cybersecurity approaches (4)

A
  • intrusion detection
  • monitoring black hat sites
  • using honeypot systems
  • offering bug bounties (to encourage people to report vulnerabilities)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

two categories of code analysis and list two general code quality tools mentioned for code analysis

A

Static and dynamic code analysis
- Coverity and PC-Lint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

potential problem with code analysis tools

A

False positives, which are warnings that are not actual vulnerabilities, can be a significant issue with code analysis tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___________ is a security-oriented review of source code, where others inspect the code to find and fix potential vulnerabilities before they can be exploited.

Provide an example.

A

Peer review

The Cert C 98 Coding Standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Mitigation and Validation
* Good Practices (6)
* Pitfalls (2)

A

Good practices
- encourage strong but usable passwords
- use fine-grain permissions
- be careful storing password information
- respect limitations of firewall approaches
- use secure update and secure boot
- use more than just penetration testing

Pitfalls:
- thinking security is easy
- using intuition instead of doing your homework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does CAN in CAN bus stand for?
Who developed the CAN bus and when?

A

Controller Area Network.
The CAN bus was developed by Bosch in the 1980s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List at least three characteristics of the CAN bus.

A
  • Supports broadcast and multicast communication
  • low cost
  • deterministic resolution of the contention
  • priority-based arbitration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What industries use the CAN bus standard?

A

Automotive, but also in automation, factory control, avionics, and medical equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

physical connection used by the CAN bus

A

Simple, two differential (copper) wire connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

maximum speed of data transmission on the CAN bus

A

Up to 1 Mb/s

17
Q

Does the CAN bus have error detection capability?

A

Yes, it has error detection and signaling.

18
Q

What components make up a CAN-based system?

A

Application software
middleware
device drivers
RTOS (Real-Time Operating System)
TX and RX buffers
firmware.

19
Q

What does the MAC in CAN standard MAC protocol stand for?

A

Medium Access Control.

20
Q

Describe the message format in the CAN protocol

A

It has a fixed format with limited size.

21
Q

Does the CAN bus require configuration information for communication?

A

No, CAN communication does not require node configuration information.

22
Q

characteristics of CAN communication (4)

A

Flexibility: Nodes can be added to or removed from the CAN network at any time without needing to change the network configuration, offering great flexibility.

Message Delivery and Routing: The CAN protocol uses an IDENTIFIER field in each message to define the content and route the message accordingly.

Multicast: CAN allows all messages to be received by all nodes that are programmed to filter and accept messages based on their IDs.

Data Consistency: A message is either accepted by all nodes or by none, ensuring that all nodes have the same data view.

23
Q

CAN bus frame types (4)

A

Data Frame
Remote Frame
Error Frame
Overload Frame

24
Q

carries regular data

A

Data Frame

25
Q

used to request the transmission of a DATA FRAMA with the same ID

A

Remote Frame

26
Q

transmitter by any unit detecting a bus error

A

Error Frame

27
Q

Used to force a time interval in between frame transmissions

A

Overload Frame

28
Q

What initiates the start of a CAN data frame?

A

A dominant start of frame (SOF) bit.

29
Q

How many bits are in the identifier for a standard CAN message?

A

11 bits, or 29 bits in version 2.0.

30
Q

What is the RTR bit’s role in a CAN message?

A

It stands for Remote Transmission Request. It is dominant for request frames and recessive for data frames.

31
Q

What is the size range for the data field in a CAN message?

A

0 to 8 bytes.

32
Q

What does the CRC field in a CAN message consist of?

A

15 CRC bits plus one CRC delimiter bit.

33
Q

What are the ACK bits used for in CAN communication?

A

They are used for acknowledging the receipt and validity of a message after a successful CRC check.

34
Q

What signifies the end of a CAN frame?

A

Seven recessive bits known as the End Of Frame (EOF).

35
Q
A