Lecture 9 - What are Some IOT Vulnerabilities (Extraction from Main Set) Flashcards

1
Q

Deficient physical security

A
  • Unauthorized physical access possible
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Improper Encryption

A
  • Resource limitations of IoT affects encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Inadequate authentication

A
  • Simple authentication due to limited processingpower and energy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Insufficient energy harvesting

A
  • Stored energy can be drained by an attacker by legitimate or corrupt messages.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Unnecessary open ports

A
  • IoT devices have unnecessarily open ports while running vulnerable services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Insufficient Access control

A
  • IoT devices in conjunction with their cloud management solutions do not force a password of sufficient complexity
  • Default user credentials not forced to change
  • Most of the users have elevated permissions and can be misused.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Improper patch management capabilities

A
  • Manufacturers either do not recurrently maintain security patches or do not have in place automated patch-update mechanisms.
  • Moreover, even available update mechanisms lack integrity guarantees, rendering them susceptible to being maliciously modified
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Weak programming practices

A
  • IoT manufacturers release firmware with known vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Insufficient audit mechanisms

A
  • IoT devices lack thorough logging procedures, rendering it possible to conceal IoT-generated malicious activities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly