Lecture 2 - The Inner Workings Flashcards

1
Q

What is Kosinski, M., Stillwell, D., & Graepel, T. (2013) about

A

This article argues that easily accessible digital records of behavior (in this study Facebook likes) can be used to automatically and accurately predict a range of highly sensitive personal attributes that people would typically assume to be private.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Youm, H. Y. (2017) about?

A

The internet of things (IoT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 5 stages of IoT device lifecycle are identified in:

A
  1. Design and development
  2. Testing and debugging
  3. Deployment,
  4. Management
  5. Decommissioning of IoT devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the General IoT topology

A

A generic IoT topology includes:
- Data acquisition from a sensor or device
- Data aggregations through a gateway
- Data analysis in a private or public cloud
v

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a sensor network?

A

Sensor networks are the most essential components of the IoT. They include sensors and actuators. The sensors collect data which then is processed and decisions are made. The actuators make the decided actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Ubiquitous Sensor Network?

A

The Ubiquitous Sensor Network (USN) is defined as an intelligent information infrastructure of advanced e-Life society. It delivers user-oriented information and provides knowledge services to anyone anytime, anywhere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the Security and Privacy needs that need to be addressed in IoT

A
  • At the lowest level, the hardware layer should ensure security and privacy during collecting and temporary storage within the device.
  • Secure protocols need to ensure communication is well protected.
  • Once the data is received, application level protection needs to be in place to monitor and control whoever can see or use the data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the various threats in a IoT device

A
  1. Cloning of things
    a. During the manufacturing process of a thing, an untrusted manufacturer can easily clone the physical characteristics, firmware/software, or security configuration of the thing.
  2. Malicious substitutions of things
    a. During the installation of a thing, a genuine thing may be substituted with a similar variant of lower quality without being detected.
  3. Eavesdropping attack
    a. During the commissioning of a thing into a network, it may be possible to eavesdropping on keying materials, security parameters, or configuration settings.
  4. Man-in-the-middle attack
    a. A third party is able to eavesdrop on or sit in between the two communicating entities during the execution of a protocol.
  5. Firmware Replacement attack
    a. Replacing software by malicious software during the operation or maintenance phase.
  6. Extraction of security parameters
    a. An attempt to extract security information such as keys (e.g., device’s key, private-key, group key) from this.
  7. Routing attack
    a. Routing information in IoT can be spoofed, altered, or replayed, in order to create routing loops, attract/repel network traffic, extend/shorten source routes, etc.
  8. Privacy threat
    a. The typical privacy threats to the users may include the tracking of a thing’s location and usage.
  9. Denial-of-Service attack (DoS)
    a. Attackers can continuously send requests to the specific things so as to deplete their resources.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Privacy?

A

the right of an entity (normally a person), acting in its own behalf, to determine the degree to which it will interact with its environment, including the degree to which the entity is willing to share its personal information with others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 6 requirements of IoT?

A
  1. Communication security
    a. Privacy-related content of data can be protected during data transmission or transfer in IoT
  2. Data management security
    a. Data can be protected when storing or processing data in IoT.
  3. Service provision security
    a. Unauthorized access to service and fraudulent service provision can be prohibited and privacy information related to IoT users can be protected.
  4. Integration of security policies and techniques
    a. The ability to integrate different security policies and techniques is required, so as to ensure a consistent security control over the variety of devices and user networks in IoT.
  5. Mutual authentication and authorization
    a. Before a device (or an IoT user) can access the IoT, mutual authentication and authorization between the device (or the IoT user) and IoT is required to be performed according to predefined security policies.
  6. Security audit
    a. Any data access or attempt to access IoT applications are required to be fully transparent, traceable and reproducible.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 5 security functions of IoT devices?

A
  1. Secure booting
    a. During booting, the authenticity and integrity of the software and applications on the device is verified using cryptographically generated digital signatures.
  2. Access control
    a. Should limit the privileges of device components and applications so they access only the resources they need to do their jobs.
  3. Device authentication
    a. The device should authenticate itself prior to receiving or transmitting data.
  4. Firewalling and IPS (intrusion protection system)
    a. Firewall or deep packet inspection capability to control traffic that is destined to terminate at the device.
  5. Updates and patches
    a. Operators need to roll out patches, and devices need to authenticate them, in a way that does not consume bandwidth or impair the functional safety of the device.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Conclusion of Youm, H. Y. (2017)

A

Conclusion
International standardization developing groups are striving to develop standards to address security and privacy issues for IoT.
IoT has entered a phase of mass usage and it could not acceptable that 70% of IoT devices have major security vulnerabilities.
In the case where IoT devices would be used for dozens of years without upgrade or update, it may be impossible to protect IoT devices itself against new upcoming threats or vulnerabilities.
- These security measures to prevent these new threats should be employed in the IoT devices
Since IoT device users have usually no knowledge of security technology, their default security setting should be employed to address this challenge.
It is noted that many security holes are created during developing, since a developer is not so interested in security compared with developer of general-purpose computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Zhou 2011 about?

A

We mainly adopted the Unified Theory of Acceptance and Use of Technology (UTAUT) that argues that four factors determine user adoptation:
1. Performance expectancy
2. Effort expectancy
3. Social influence
4. Facilitating conditions
Additionally, flow theory is used in the analysis.
- Flow represents a holistic sensation that people feel when they act with total involvement. In this research, we measured flow with two factors: perceived enjoyment and attention focus

Users’ continuance usage is critical to the success of mobile Internet.
The results indicate that perceived enjoyment has strong effects on satisfaction and continuance usage. In addition, performance expectancy also affects continuance usage.
- Thus mobile service providers need to consider perspectives of both user performance and experience in order to facilitate mobile Internet continuance usage.
v

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Circuit switching and packet switching?

A

o This entailed parts of the message being put in multiple packets that could be send seperately. This meant that if one packet didn’t send, the entire message didn’t have to be send again, as the rest of the packets did arrive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who is Joseph Licklider and what are his idea’s?

A
  1. Combination of hardware and software
  2. Interaction between man and machine
    a. Computers could be used for repetitive tasks, while asking the questions and interpreting the outcomes was up to the people.
  3. Network of people
    a. Everyone has different knowledge to bring to the table and so a network of people can be used to tackle problems regarding the network. It would be a combined effort, everyone has something to add.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is ARPANET?

A

ARPANET was the first wide-area packet-switched network with distributed control and one of the first networks to implement the TCP/IP protocol suite.
- Three aspects
o Formulating technological problems and solutions.
o Sense of relevance of community of users.
o Open architecture of system.
- However, the tech wasn’t very user friendly, as you needed computer science knowledge to actually use the early versions of tech like email.

17
Q

What is TCP/IP?

A

In 1983 TCP/IP was implemented in ARPANET, used to organize the set of communication protocols to facilitate world wide communication. TCP/IP provides end-to-end data communication specifying how data should be packetized, addressed, transmitted, routed, and received

18
Q

What is Tim Berners-Lee invention?

A

In 1989 Tim Berners-Lee proposed the World Wide Web, an information system enabling documents and other web resources to be accessed over the Internet.
- The World Wide Web was much more user friendly than ARPANET, as people without a computer science degree could more easily interact with it.

19
Q

What is the difference between the Web and the Net?

A
  • Web = the hyperlinks, the videos and documents that might be found.
  • Net = the cables and the technology behind the web.
    o To ensure fast communications, we need undersea cables connecting different parts of the world.
20
Q

What is Platform Society?

A

Platform Society refers to a society in which social and economic traffic is increasingly channeled by a (corporate) global online platform ecosystem that is driven by algorithms and fueled by data

21
Q

What are the Pro’s and Con’s of the internet?

A

The internet has pro’s and cons:
- Pros:
o Faster services
o Connectivity
o Availability of information
- Cons
o Privacy
o Accumulation of data
o Dark web

22
Q

What are the 4 layers of TCP/IP models?

A

o Application layer - providing process-to-process data exchange for applications
 Consists of networked applications connected to the World Wide Web.
 Standardizes communication and depends upon the underlying transport layer protocols to establish host-to-host data transfer channels and manage the data exchange in a client server networking model.
o Transport layer - handling host-to-host communication
 Get at the destination as soon as possible, concerned with speed and a delivery check.
 Is constricted by its window size, the amount of receive data (in bytes) that can be buffered during a connection.
 Matching limitations of network
o Internetwork layer - providing internetworking between independent networks, so how do we get the packets to the final destination
 Router to router pathfinder
 ‘Best guess’ approach.
 More specific as you move along different hops.
 Deals with infrastructure problems.
o Link layer - containing communication methods for data that remains within a single network segment (link)
 Encodes information
 ‘Local’ data transmission
 Provides information on the order of data transmission
* The receiver needs to know in which order to put the packets.
 CSMA/CD
* Sent information can clash with different information along the route, if this happens it needs to be send again

23
Q

What is IoT

A

Internet of Things is the connection of more and more devices to the internet.
- The IoT describes physical objects (or groups of such objects) with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
- But this also brings issues of security and privacy.

24
Q

What is the Cambridge Analytica Case?

A

Cambridge Analytica does target advertising facilitated by the MyPersonality project: Can someones personality be predicted by someones Facebook likes? After Cambridge Analytica collected the data they employed Machine learning can create machine learning. algorithms to predict things about you, thus also what kind of ads you would like.

25
Q

What is Machine Learning?

A

Machine Learning = using computers to detect patterns in data and using these patterns to create algorithms
- These algorithms can be used to make predictions on new data.
- The algorithms can be tested and trained.
o By comparing training data and test data, the difference between the two can decide the accuracy of the algorithm.`

26
Q

What are the consequences of machine learning?

A
  • Anything you do online is tracked, collected and stored.
    o And just because you don’t (actively) share data, doesn’t mean your friends don’t either. And just because you don’t (actively) share data, doesn’t mean your friends don’t either.
    o Algorithms allow for prediction of hidden information
    o Targeted advertising.