Module 5 Flashcards
1
Q
iot security requirements
A
- Confidentiality
- Integrity
- Authentication
- Availability
- Authorization
- Freshness
- Forward secrecy
- Backward secrecy
2
Q
iot three domain architecture
A
- iot sensing domain
- Fog domain
- Cloud domain
3
Q
iot sensing domain
A
- made up of smart objects that can sense the environment around them
- objects expected to change location over time
- reports sensed data to fog domain
4
Q
fog domain
A
- consists of a set of fog devices that are located in areas populated by smart objects
- each fog device is allotted to a set of smart objects ,that report their data to the fog device
- performs operation on collected data like aggregation preprocessing etc
- fog devices also connected with each other as smart objects tend to change their location over time
5
Q
cloud domain
A
- composed of a large number of servers
- responsible for performing heavy computational operations on the data reported from the fog devices
6
Q
security specific to fog domain
(explain the points)
A
- authentication and trust issues
- Higher migration security risks
- higher vulnerability to DoS attacks
- privacy issues
7
Q
iot security challenges
(explain the points)
A
- Multiple technologies
- Multiple verticals
- Scalability
- Availability
- Big data
- Resource limitations
- Remote locations
- Mobility
- Delay sensitive service
8
Q
iot security issues
(explain the points)
A
- lack of visibility
- limited security integration
- open source code vulnerabilities
- poor testing
- unpatched vulnerabilities
- weak passwords
9
Q
MUD
A
- Manufacture Usage Descriptor
- aims to reduce the scope of malware injection and hijacking of over-the- air firmware updates.
- It also addresses the scenario of devices that are no longer being actively maintained by their original manufacturers
- MUD works by enabling networks to automatically permit each Iot device and send and receive only the traffic it requires to perform while blocking unauthorized communication with the device
10
Q
DICE
A
- Device Identifier Composition Engine
- key to DICE is its ability to break up the boot process for any device into layers and to combine unique secrets
- This way, if malware is present at any stage of the boot process, the device is automatically re-keyed and secrets protected by legitimate keys remain safe
11
Q
lightweight cryptography
A
has the function of enabling the application of secure encryption, even for devices with limited resources.
12
Q
the following factors on the implementation are required for lightweight topography
( to make more cards on this topic)
A
- Size
- Power
- Power consumption
- Processing speed
13
Q
key privacy issues
(explain the points)
A
- Collection, use and disclosure of IoT data
- De-identification of IoT data
- Consent 4. Capacity
- Specific 6. Informed
7.Dependency on vendors - Accountability 9. Transparency