Lesson 11: Deploying Secure Host, Mobile, and Embedded Systems Flashcards

1
Q

Common Criteria (CC)

A
  • secure systems design is usually guided by some sort of framework
  • an ISO standard (ISO 15408) defining security frameworks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trusted OS (TOS)

A
  • an OS that meets the criteria for a Common Criteria OS Protection Profile can be described as a Trusted OS (TOS)
  • Trusted OS provides:
    • Trusted Computing Base (TCB)—the kernel and associated hardware and processes must be designed to support the enforcement of a security policy (an access control model). This means it should be tamper-resistant, resistant to vulnerabilities, and not able to be bypassed (it provides complete mediation between users and resources).
  • Security features—such as support for multilevel security (Mandatory Access Control). A problem for many OSes is the means of restricting root or Administrator access to classified data. The process for patching security vulnerabilities is also critical.
  • Assurance—such as secure design principles, availability of code reviews and audits, and so on
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trusted Computing Group

A
  • consortium of companies, including Microsoft®, Intel®, AMD, HP®, Cisco®, and Juniper®, set up to develop technologies to improve the security of computing systems
  • one of the major initiatives of the group was the development of the Trusted Platform Module (TPM)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

hardware Root of Trust (RoT) or trust anchor

A
  • a secure subsystem that is able to provide attestation (declare something to be true)
  • example:
  • when a computer joins a network, it might submit a report to the Network Access Control (NAC) server declaring, “My operating system files have not been replaced with malicious versions.”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

endorsement key

A
  • each TPM microprocessor is hard-coded with a unique, unchangeable RSA private key (the endorsement key)
  • endorsement key is used to create various other types of subkeys used in key storage, signature, and encryption operations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

supply chain

A

end-to-end process of supplying, manufacturing, distributing, and finally releasing goods and services to a customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Basic Input/Output System (BIOS)

A
  • provides industry standard program code that operates the essential components of the PC and ensures that the design of each manufacturer’s motherboard is PC compatible
  • newer motherboards use a different kind of firmware called Unified Extensible Firmware Interface (UEFI)
  • UEFI provides support for 64-bit CPU operation at boot, a full GUI and mouse operation at boot, and better boot security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

secure boot

A
  • a security system offered by UEFI
  • designed to prevent a computer from being hijacked by a malicious OS
  • under secure boot, UEFI is configured with digital certificates from valid OS vendors
  • system firmware checks the operating system boot loader using the stored certificate to ensure that it has been digitally signed by the OS vendor
  • this prevents a boot loader that has been modified by malware (or an OS installed without authorization) from being used
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Full Disk Encryption (FDE)

A
  • means that the entire contents of the drive (or volume), including system files and folders, are encrypted
  • drive encryption allays this security concern by making the contents of the drive accessible only in combination with the correct encryption key
  • FDE requires the secure storage of the key used to encrypt the drive contents
  • one of the drawbacks of FDE is that, because the OS performs the cryptographic operations, performance takes a hit | this issue is mitigated by Self-Encrypting Drives (SED), where the cryptographic operations are performed by the drive controller. The SED uses a Media Encryption Key (MEK) to encrypt data and stores the MEK securely by encrypting it with a Key Encryption Key (KEK), generated from the user password
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Electromagnetic Interference (EMI)

A
  • the effect unwanted electromagnetic energy has on electronic equipment
  • computers installed in “noisy” EMI environments, such as factory floors and power plants, often need shielding from EMI
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Electromagnetic Pulse (EMP)

A
  • very powerful but short duration wave with the potential to destroy any type of electronic equipment. Electrostatic Discharge (ESD) can be classified as EMP
  • possible to build EMP generators and deploy them with the intent of performing a DoS attack against a computer system
  • risk of EMP cyber weapons being used by terrorists or hostile nation state actors or that a particularly strong solar storm could cause EMP effects
  • an EMP cyber weapon is a nuclear or conventional explosive device designed to explode in the upper atmosphere in such a way that it causes widespread EMP effects across a wide area below the explosion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

external storage devices

A
  • USB flash drives (and potentially any other type of firmware), presents adversaries with an incredible toolkit
  • firmware can be reprogrammed to make the device look like another device class, such as a keyboard. In this case, it could then be used to inject a series of keystrokes upon an attachment or work as a keylogger
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

mousejacking

A
  • hackers can use radio transmitters to inject commands and keystrokes or read input
  • principal security exploit of wireless input devices is snooping
  • attack principally works because while keyboard input is often encrypted, mouse input is not, and the vulnerable devices can be tricked into accepting keyboard input via the mouse controller
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Multifunction Devices (MFD)

A
  • printers or more generally Multifunction Devices (MFD), with fax and scan capabilities, represent a powerful pivot point on an enterprise network:
  • Interfaces and code are not always kept as secure as OS code, making them potentially more vulnerable to compromise.
  • An adversary can snoop on and copy highly confidential data in cleartext.
  • The hard disk is a useful means of staging data for exfiltration.
  • Network connectivity might bridge user and administrative network segments and allow wider network penetration.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wi-Fi-enabled MicroSD Cards

A

Wi-Fi-enabled MicroSD card can connect to a host Wi-Fi network to transfer images stored on the card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

digital cameras

A
  • may be equipped with Wi-Fi and cellular data adapters to allow connection to the Internet and posting of images directly to social media sites
  • geotagging
  • flash media storage used by a camera may also be infected with malware or used for data exfiltration, so cameras should be treated like any other removable USB storage and their connection to enterprise hosts subjected to access controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

weak or misconfigured security configurations

A
  • may leave administrative access protected with a default account or password that is publicly available, sensitive ports open to the Internet, or any number of other such weaknesses
  • many breaches have taken place in recent years over exactly these sorts of security vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

default configurations

A
  • means that the default installation is (theoretically) secure but minimal
  • any options or services must explicitly be enabled by the installer
  • not the case for older devices and software though; these would often be shipped with all the “bells and whistles” activated to make set up easier
  • when installing any new device or software, you must use a security policy to determine the strongest possible configuration, and not just leave it to the default
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

hardening

A
  • process of putting an operating system or application in a secure configuration is called hardening
  • hardening is implemented to conform with the security requirements in a defined security policy
  • need for hardening must be balanced against the access requirements and usability in a particular situation
  • checklist shows the sort of steps that are required to harden the OS of a workstation PC
    1. Remove (or disable) devices that have no authorized function. These could include a legacy modem or floppy disk or standard optical disk drives, USB ports, and so on.
  1. Test and install OS and application patches and driver/firmware updates (when they have been tested for network compatibility) according to a regular maintenance schedule. Patches for critical security vulnerabilities may need to be installed outside the regular schedule.
  2. Uninstall all but the necessary network protocols.
  3. Uninstall or disable services that are not necessary (such as local web server or file and print sharing) and remove or secure any shared folders.
  4. Enforce Access Control Lists on resources, such as local system files and folders, shared files and folders, and printers.
  5. Restrict user accounts so that they have least privilege over the workstation (especially in terms of installing software or devices).
  6. Secure the local administrator or root account by renaming it and applying a strong password.
  7. Disable default user and group accounts (such as the Guest account in Windows) and verify the permissions of system accounts and groups (removing the Everyone group from a folder’s ACL, for instance).
  8. Install anti-virus software (or malware protection software) and configure it to receive virus definition updates regularly.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

host software baselining

A

an OS functioning in any given role, there will usually be a fairly standard series of steps to follow to apply a secure configuration to allow the OS and applications software to execute that role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

least functionality

A
  • essential principle is of least functionality; that a system should run only the protocols and services required by legitimate users and no more
  • reduces the potential attack surface
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

interfaces

A

interfaces provide a connection to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

services

A

provide a library of functions for different types of applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

application service ports

A

allow client software to connect to applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

network servers

A

much of the same procedure applies to network servers, network appliances (switches and routers), and web applications, only more so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Server Core

A

excludes most of the familiar shell tools, such as File Explorer and MMCs. Server Core also only supports a limited number of roles, including AD DS, file/print, IIS, Hyper-V®, DHCP, and DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Administrative Templates

A

custom Registry settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Resultant Set of Policies (RSoP)

A

system of inheritance determines the Resultant Set of Policies (RSoP) that apply to a particular computer or user. GPOs can be set to override or block policy inheritance where necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

network appliances

A
  • access points, switches, routers, and firewalls
  • special case for hardening:
  • often restricted to ensuring that the device is patched and appropriately configured
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

kiosk

A
  • computer terminal deployed to a public environment
  • wide range of uses, such as providing ATM services or airport check-in, as well as informational kiosks used in shopping centers, art galleries, and museums
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

baseline deviation reporting

A
  • means testing the actual configuration of clients and servers to ensure that they are patched and that their configuration settings match the baseline template
  • Windows networks, the Microsoft Baseline Security Analyzer (MBSA) tool was popularly used to validate the security configuration. MBSA can also be used to scan for weak passwords. MBSA and other Microsoft reporting tools have now been replaced by the Security Compliance Toolkit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

execution control

A
  • process of determining what additional software may be installed on a client or server beyond its baseline. Execution control to prevent the use of unauthorized software can be implemented as either an application whitelist or a blacklist:
  • Whitelist control means that nothing can run if it is not on the approved whitelist.
  • Blacklist control means that anything not on the prohibited blacklist can run.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

unauthorized software

A
  • if unauthorized software is found installed and/or running on a host, it should normally be removed. You will also want to investigate how the software was allowed to be installed or executed:
  • Place the host system and software in a sandbox before analyzing its running state.
  • Check event logs and browsing history to determine the source of the unauthorized software.
  • Conduct an anti-malware scan to determine if the software is known to be malicious.
  • Verify user privileges and access controls on the host system to re-secure permissions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

No Execute (NX)

A
  • No Execute (NX) technology are more resilient against so-called buffer overflow attack, where the virus tricks another program into executing it when the other program thinks it is just processing some data, because they prevent areas in memory marked for data storage from executing code (running a new program)
  • Intel calls this feature Execute Disable (XD); in Windows, it is referred to as Data Execution Prevention (DEP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Address Space Layout Randomization (ASLR)

A

aims to frustrate attacks by making the exact position of a function or reference in system memory difficult for an attacker to predict and exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

data execution prevention

A

one issue is that applications might not work with these DEP security features enabled. In later versions of Windows, it is not possible for applications to ignore these settings, unless the administrator configures an override. If users are trying to run packages that do not support DEP-like technologies, you will need to investigate whether an exception should be made for that software. In Windows 10, this is configured via the Exploit protection pages in the Windows Security settings app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

patch management

A
  • two approaches to applying updates:
  • Apply all the latest patches to ensure the system is as secure as possible against attacks targeting flaws in the software.
  • Only apply a patch if it solves a particular problem being experienced.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

updates

A

widely released fixes for bugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

critical updates

A

critical updates address performance problems while security updates address vulnerabilities and can be rated by severity (critical, important, moderate, or low)

40
Q

definition updates

A

definition updates for software such as malware scanners and junk mail filters and driver updates for hardware devices

41
Q

Hotfixes

A

patches supplied in response to specific customer troubleshooting requests. With additional testing, these may later be developed into public release updates

42
Q

Feature packs

A

add new functionality to the software

43
Q

Service packs and update rollups

A

form a collection of updates and hotfixes that can be applied in one package

44
Q

Windows Update

A

patches, driver updates, and service packs for Windows (and other Microsoft software) can be installed using the Windows Update client

45
Q

update server

A
  • network with a lot of computers, it can make more sense to deploy an update server
  • update server for Windows networks is called Windows Server Update Services (WSUS)
46
Q

distributions

A

distribution contains the Linux kernel plus any other software packages the distribution vendor or sponsor considers appropriate

47
Q

software repository

A

copies of these packages (including any updates) will be posted to a software repository

48
Q

end of life system

A

one that is no longer supported by its developer or vendor. End of life systems no longer receive security updates and so represent a critical vulnerability if any remain in active use.

49
Q

abandonware

A

possible for both open source and commercial projects to be abandoned; if a company continues to rely on such abandonware, it will have to assume development responsibility for it

50
Q

vendor support

A

many instances of applications and devices (peripheral devices especially) that remain on sale with serious known vulnerabilities in firmware or drivers and no prospect of vendor support for a fix. The problem is also noticeable in consumer-grade networking appliances and in the Internet of Things (IoT)

51
Q

mobile devices

A

mobile devices have replaced computers for many email and diary management tasks and are integral to accessing many other business processes and cloud-based applications. A mobile device deployment model describes the way employees are provided with mobile devices and applications.

52
Q

device deployment models

A
  • Bring Your Own Device (BYOD)—the mobile device is owned by the employee
  • Corporate Owned, Business Only (COBO)—the device is the property of the company and may only be used for company business
  • Corporate Owned, Personally-Enabled (COPE)—the device is chosen and supplied by the company and remains its property. The employee may use it to access personal email and social media accounts and for personal web browsing (subject to whatever acceptable use policies are in force)
  • Choose Your Own Device (CYOD)—much the same as COPE but the employee is given a choice of device from a list
53
Q

Mobile Device Management (MDM)

A

a class of management software designed to apply security policies to the use of mobile devices in the enterprise. This software can be used to manage enterprise-owned devices as well as Bring Your Own Device (BYOD)

54
Q

Network Access Control (NAC)

A

management software logs the use of a device on the network and determines whether to allow it to connect or not, based on administrator-set parameters. When the device is enrolled with the management software, it can be configured with policies to allow or restrict use of apps, corporate data, and built-in functions, such as a video camera or microphone

55
Q

iOS

A
  • operating system for Apple’s iPhone® smartphone and iPad® tablet. Apple® makes new versions freely available, though older hardware devices may not support all the features of a new version (or may not be supported at all)
  • on iOS, what would be called programs on a PC are described as apps
  • iOS, Android apps operate within a sandbox
56
Q

Android

A
  • a smartphone/tablet OS developed by the Open Handset Alliance (primarily driven by Google). Unlike iOS, it is an open source OS, based on Linux®. This means that there is more scope for hardware vendors, such as Asus, HTC, LG, Samsung, and Sony, to produce vendor-specific versions. The app model is also more relaxed, with apps available from both Google Play™ (Android Market) and third-party sites, such as Amazon’s app store
  • iOS, Android apps operate within a sandbox
57
Q

Personal Area Network (PAN)

A
  • Wi-Fi can be used to establish a Personal Area Network (PAN)
  • most PANs enable connectivity between a mobile device and peripherals, but ad hoc (or peer-to-peer) networks between mobile devices or between mobile devices and other computing devices can also be established
58
Q

ANT & ANT+

A

ANT protocol and its associated product standard ANT+ have seen widespread use in communicating health and fitness sensor data between devices. As with any communication protocol, Bluetooth and ANT have potential vulnerabilities, but other significant risks come from the device being connected to. A peripheral device with malicious firmware can be used to launch highly effective attacks. This type of risk has a low likelihood, as the resources required to craft such malicious peripherals are demanding

59
Q

Wi-Fi Direct

A
  • peer-to-peer connections can also be established using Wi-Fi Direct, though in this case, one of the devices actually functions as a soft access point
  • infrared signaling has been used for PAN in the past (IrDA), but the use of infrared in modern smartphones and wearable technology focuses on two other uses:
    • IR blaster—this allows the device to interact with an IR receiver and operate a device such as a TV or HVAC monitor as though it were the remote control handset

• IR sensor—these are used as proximity sensors (to detect when a smartphone is being held to the ear, for instance) and to measure health information (such as heart rate and blood oxygen levels)

60
Q

Near Field Communications (NFC) chip

A
  • allows a mobile device to make payments via contactless point-of-sale (PoS) machines
  • three major mobile wallet apps: Apple Pay®, Google Pay™ (formerly Android Pay), and Samsung Pay
61
Q

USB On The Go (OTG)

A
  • USB OTG allows a port to function either as a host or as a device
  • example, a port on a smartphone might operate as a device when connected to a PC, but as a host when connected to a keyboard or external hard drive. The extra pin communicates which mode the port is in
62
Q

Wideband Global SATCOM (WGS)

A

system aims to expand the bandwidth available to military communications satellites for use by North American and Australian defense forces

63
Q

Satellite communications (SATCOM)

A

some businesses have to establish telecommunications in extremely remote areas or (in the case of military forces) use a communications system that is wholly owned and managed

64
Q

screen lock

A
  • majority of smartphones and tablets are single-user devices. Access control can be implemented by configuring a screen lock that can only be bypassed using the correct password, PIN, or swipe pattern
  • many devices now support biometric authentication, usually as a fingerprint reader but sometimes using facial or voice recognition
  • screen lock can also be configured with a lockout policy. This means that if an incorrect passcode is entered, the device locks for a set period
  • context-aware authentication, newer authentication models, allow users to disable screen locks when the device detects that it is in a trusted location, such as the home. Conversely, an enterprise may seek more stringent access controls to prevent misuse of a device
65
Q

remote wipe

A

another possibility is for the phone to support a remote wipe or kill switch. This means that if the handset is stolen it can be set to the factory defaults or cleared of any personal data (sanitization)

66
Q

full device encryption

A
  • all but the early versions of mobile device OSes for smartphones and tablets provide full device encryption. In iOS 5 (and higher), there are various levels of encryption
  • All user data on the device is always encrypted but the key is stored on the device. This is primarily used as a means of wiping the device. The OS just needs to delete the key to make the data inaccessible rather than wiping each storage location
  • Email data and any apps using the “Data Protection” option are subject to a second round of encryption using a key derived from and protected by the user’s passcode (if this is configured)
67
Q

application management

A

EMM software can be used for application management. When the device is joined to the corporate network through enrollment with the EMM software, it can be configured into a corporate “workspace” mode in which only a certain number of whitelisted applications can run.

68
Q

Android Application Package (apk) file

A

Android allows third-party or bespoke programs to be installed directly via an Android Application Package (apk) file, giving users and businesses the flexibility to directly install apps (sideload) without going through the storefront interface. MDM software often has the capability to block unapproved app sources

69
Q

rooting

A

this term is associated with Android devices. Some vendors provide authorized mechanisms for users to access the root account on their device. For some devices, it is necessary to exploit a vulnerability or use custom firmware

70
Q

jailbreaking

A

iOS is more restrictive than Android so the term “jailbreaking” became popular for exploits that enabled the user to obtain root privileges, sideload apps, change or add carriers, and customize the interface. iOS jailbreaking is accomplished by booting the device with a patched kernel. For most exploits, this can only be done when the device is attached to a computer when it boots (tethered jailbreak)

71
Q

carrier unlocking

A

for either iOS or Android, this means removing the restrictions that lock a device to a single carrier

72
Q

data ownership

A

how can rights over corporate data be asserted on a device that does not belong to the corporation?

73
Q

privacy

A

how can the corporation inspect and manage a BYOD without intruding on private data and device usage?

74
Q

storage segmentation

A

when the device is used on the enterprise network, a corporate workspace with a defined selection of apps and a separate storage container is created (storage segmentation)

75
Q

content management

A

content management system tags corporate or confidential data and prevents it from being shared or copied to unauthorized media or channels, such as non-corporate email systems or cloud storage services

76
Q

Geofencing

A

practice of creating a virtual boundary based on real-world geography. Geofencing can be a useful tool with respect to controlling the use of camera or video functions. This involves disabling cameras on mobile devices when they are in areas that should not allow photographs or video according to policy

77
Q

GPS tagging

A

process of adding geographical identification metadata, such as the latitude and longitude where the device was located at the time, to media such as photographs, SMS messages, video, and so on

78
Q

Short Message Service (SMS) and Multimedia Message Service (MMS)

A
  • operated by the cellular network providers

- allow transmission of text messages and binary files

79
Q

push notifications

A

store services (such as Apple Push Notification Service and Google Cloud to Device Messaging) that an app or website can use to display an alert on a mobile device. Users can choose to disable notifications for an app, but otherwise the app developer can target notifications to some or all users with that app installed. Developers need to take care to properly secure the account and services used to send push notifications. There have been examples in the past of these accounts being hacked and used to send fake communications

80
Q

baseband update

A

modifies the firmware of the radio modem used for cellular, Wi-Fi, Bluetooth, NFC, and GPS connectivity

81
Q

radio firmware

A

the radio firmware in a mobile device contains an operating system that is separate from the end-user operating system (for example, Android or iOS). The modem uses its own baseband processor and memory, which boots a Realtime Operating System (RTOS). An RTOS is often used for time-sensitive embedded controllers, of the sort required for the modulation and frequency shifts that underpin radio-based connectivity.

82
Q

Over The Air (OTA)

A

updates are usually pushed to the handset by the device vendor, often as part of OS upgrades. The updates can be delivered wirelessly, either through a Wi-Fi network or the data connection, referred to as Over The Air (OTA)

83
Q

embedded system

A
  • a complete computer system that is designed to perform a specific, dedicated function. These systems can be as contained as a microcontroller in an intravenous drip-rate meter or as large and complex as an industrial control system managing a water treatment plant. Embedded systems are typically static environments
  • A PC is a dynamic environment. The user can add or remove programs and data files, install new hardware components, and upgrade the operating system. A static environment does not allow or require such frequent changes
  • embedded systems are normally based on firmware running on a Programmable Logic Controller (PLC)
84
Q

System on a Chip (SoC)

A
  • a design where all of these processors, controllers, and devices are provided on a single processor die (or chip). This type of packaging saves space and is usually power efficient and so is very commonly used with embedded systems
  • these systems often use differently engineered platforms called Real Time Operating Systems (RTOS)
85
Q

Supervisory Control and Data Acquisition (SCADA) systems

A

components of large-scale, multiple-site Industrial Control Systems (ICS) deployed to monitor and manage industrial-, infrastructure-, and facility-based processes. SCADA systems run as software on ordinary computers gathering data from and managing plant devices and equipment with embedded PLCs, referred to as field devices

86
Q

medical devices

A
  • represent an array of systems potentially vulnerable to a wide range of attacks
  • devices is not confined to hospitals and clinics but includes portable devices such as cardiac monitors/ defibrillators and insulin pumps. As well as unsecure communication protocols, many of the control systems for these devices run on unsupported versions of operating systems (such as Windows XP) because the costs of updating the software to work with newer OS versions is high and disruptive to patient services
  • goals of attacks on medical devices and services are as follows:
    • Use compromised devices to pivot to networks storing medical data with the aim of stealing Protected Health Information (PHI).
  • Hold medical units ransom by threatening to disrupt services.
  • Kill or injure patients (or threaten to do so) by tampering with dosage levels or device settings.
87
Q

Multifunction Devices (MFD)

A

most modern print devices, scanners, and fax machines have hard drives and sophisticated firmware, allowing their use without attachment to a computer and over a network. Often these print/scan/fax functions are performed by single devices, referred to as Multifunction Devices (MFD)

88
Q

motor vehicles

A

use a substantial amount of electronics, all of which can potentially have vulnerabilities that could be exploitable. As well as computer systems to control the vehicle’s engine, steering, and brakes, there may be embedded systems for in-vehicle entertainment and for navigation (sat-nav), using Global Positioning Systems (GPS). Some vehicles are now also fitted with a “black box,” or event data recorder, that can log the car’s telemetry (acceleration, braking, and position).

89
Q

Unmanned Aerial Vehicles (UAV)

A

another rapidly developing sector is that of Unmanned Aerial Vehicles (UAV). This sector ranges from full-size fixed wing aircraft to much smaller multi-rotor hover drones. As with other vehicle systems, there is the potential to use the communications channels to interfere with the drone, potentially causing it to crash or go off course

90
Q

smart devices

A
  • such as smart TVs, are home appliances with integrated computer functionality (apps, storage, and networking)
  • home automation technology makes heating, lighting, alarms, and appliances all controllable through a computer and network interface. Smart devices and home automation might be managed through a hub device with voice control functionality
  • home automation products often use vendor-specific software and networking protocols. As with embedded devices, security features can be poorly documented, and patch management/security response processes of vendors can be inadequate
91
Q

wearable technology devices

A

computing functionality is being added to wearable items, such as smart watches, bracelets and pendant fitness monitors, and eyeglasses. Smartwatches have risen in popularity in recent years. Current competing technologies are based on FitBit, Android Wear OS, Samsung’s Tizen OS, and Apple iOS, each with their own separate app ecosystems.

Most wearable technology uses Bluetooth to pair with a smartphone, though some may be capable of Wi-Fi communications, too.

92
Q

network segmentation

A
  • one of the core principles of network security
  • network access for static environments should only be required for applying firmware updates and management controls from the host software to the devices and for reporting status and diagnostic information from the devices back to the host software. This control network should be separated from the corporate network using firewalls and VLANs
93
Q

application firewalls

A

these are firewalls designed to protect specific applications and devices, such as a SCADA

94
Q

wrappers

A
  • one way of increasing the security of data in transit for embedded systems is through the use of wrappers
  • wrapper usually includes a header, which precedes the encapsulated data, and a trailer, which follows it. An excellent example of wrappers used for security with IPSec run in tunnel mode, wherein the entire original packet, including the data and the AH, ESP, TCP/UDP, and IP headers are all encapsulated
95
Q

firmware version control

A
  • process of patch management for static and embedded environments
  • for many embedded systems and static environments, it is far more of a challenge:
  • Many embedded systems use low-cost firmware chips and the vendor never produces updates to fix security problems or only produces updates for a relatively short product cycle (while the device could remain in operational use for much longer).
  • Many embedded systems require manual updates, which are perceived as too time-consuming for a security department with other priorities to perform.