Module 5 Flashcards

1
Q

iot security requirements

A
  1. Confidentiality
  2. Integrity
  3. Authentication
  4. Availability
  5. Authorization
  6. Freshness
  7. Forward secrecy
  8. Backward secrecy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

iot three domain architecture

A
  1. iot sensing domain
  2. Fog domain
  3. Cloud domain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

iot sensing domain

A
  1. made up of smart objects that can sense the environment around them
  2. objects expected to change location over time
  3. reports sensed data to fog domain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

fog domain

A
  1. consists of a set of fog devices that are located in areas populated by smart objects
  2. each fog device is allotted to a set of smart objects ,that report their data to the fog device
  3. performs operation on collected data like aggregation preprocessing etc
  4. fog devices also connected with each other as smart objects tend to change their location over time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

cloud domain

A
  1. composed of a large number of servers
  2. responsible for performing heavy computational operations on the data reported from the fog devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

security specific to fog domain
(explain the points)

A
  1. authentication and trust issues
  2. Higher migration security risks
  3. higher vulnerability to DoS attacks
  4. privacy issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

iot security challenges
(explain the points)

A
  1. Multiple technologies
  2. Multiple verticals
  3. Scalability
  4. Availability
  5. Big data
  6. Resource limitations
  7. Remote locations
  8. Mobility
  9. Delay sensitive service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

iot security issues
(explain the points)

A
  1. lack of visibility
  2. limited security integration
  3. open source code vulnerabilities
  4. poor testing
  5. unpatched vulnerabilities
  6. weak passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MUD

A
  1. Manufacture Usage Descriptor
  2. aims to reduce the scope of malware injection and hijacking of over-the- air firmware updates.
  3. It also addresses the scenario of devices that are no longer being actively maintained by their original manufacturers
  4. MUD works by enabling networks to automatically permit each Iot device and send and receive only the traffic it requires to perform while blocking unauthorized communication with the device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DICE

A
  1. Device Identifier Composition Engine
  2. key to DICE is its ability to break up the boot process for any device into layers and to combine unique secrets
  3. This way, if malware is present at any stage of the boot process, the device is automatically re-keyed and secrets protected by legitimate keys remain safe
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

lightweight cryptography

A

has the function of enabling the application of secure encryption, even for devices with limited resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the following factors on the implementation are required for lightweight topography
( to make more cards on this topic)

A
  1. Size
  2. Power
  3. Power consumption
  4. Processing speed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

key privacy issues
(explain the points)

A
  1. Collection, use and disclosure of IoT data
  2. De-identification of IoT data
  3. Consent 4. Capacity
  4. Specific 6. Informed
    7.Dependency on vendors
  5. Accountability 9. Transparency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly