Networking 2.4 - services provided by network hosts Flashcards
Internet of Things (IoT) characteristics (4)
1 Incorporates remote sensors
2 Powers home automation and wearable technology
3 Collects and analyzes data using Wi-Fi, Bluetooth, and cloud computing
4 Gains on-board computing power from microcontrollers
* A frequent use for IoT is to automate climate control and security systems, which means devices must detect temperature, light levels, and movement. An Internet of Things (IoT) device is a “smart” device with an embedded microcontroller and connectivity features. The purpose of IoT is to add automation, data collection, and remote control capabilities to physical objects like doorbells, cameras, speakers, appliances, houses, and cars. IoT has rapidly expanded past the consumer market to find uses in industry, healthcare, and transportation as well. A networked IoT technology consists of four main components:
Sensing Technology: Sensors integrated in the devices gather data from their environment, such as temperature, gases, location, the operation of some industrial machines, or human biometric data.
IoT Gateways: Gateways bridge the gap between IoT devices (internal network) and end users (external network). The gateway sends the data acquired by the sensors in the IoT device to the connected user or the cloud.
Cloud Server/Data Storage: The gathered data comes in the cloud after passing via the gateway, where it is stored and subjected to data analysis. The user receives the processed data through an application UI and has the option to take various actions based on the resulting data.
Mobile App: The end user monitors, controls, retrieves data, and takes a particular action on IoT devices from a remote location using remote controls such as mobile phones, tablets, computers, and other devices that have a mobile app loaded.
IoT devices use a number of different protocols to communicate, including:
Bluetooth Low Energy (BLE)
Light-Fidelity (Li-Fi)
Near Field Communication (NFC)
QR codes and barcodes
Radio Frequency Identification (RFID)
Thread
Wi-Fi and Wi-Fi Direct
Z-wave
ZigBee
ANT
Supervisory Control and Data Acquisition (SCADA) characteristics
1 Incorporates remote sensors
2 Governs critical infrastructure like utilities, transportation, and water treatment
3 Collects and analyzes data using field units, HMIs, and microprocessors
* legacy *
SCADA is designed to collect field data, transmit it to a centralized location, and display it to an operator through a human-readable interface. SCADA is a system of software and hardware elements that allows organizations to control automated processes locally or at remote locations; to monitor, gather, and process data; to directly interact with devices like sensors or valves; and to record events into a log file.
SCADA is part of the larger category of industrial control systems (ICS), which is a combination of electrical and mechanical components that act together to monitor, control, and safely execute an industrial process in an area like mining, utilities, manufacturing, or transportation.
The main components of SCADA are field instrumentation (including sensors), field controllers, human-machine interfaces (HMIs), a network connection, and a means of aggregating the collected data, whether remotely or on-premises. Microprocessors in the field instruments convert the sensor input into usable data.
A major weakness of both IoT devices and SCADA is that neither was designed to …
accommodate secure networking, easy firmware updates, or regular security patching. These are typically after-market considerations handled by third-party applications, not the device or component manufacturers. ICS began as highly specialized hardware and software that ran in physically secured locations without network connections. As IT evolved, legacy ICS systems had new IT capabilities layered on top to provide remote monitoring or “smart” automation. Because ICS components have extremely long lifecycles (decades instead of years), they did not anticipate modern cyber security concerns. For that reason, SCADA and IoT systems are targeted by unique cyber attacks.
If you are unable to access a website using its fully qualified domain name (FQDN), but you can browse the same website using its IP address, then the ________ server is down
Domain Name System (DNS) server for the website is down. A DNS server provides name resolution over the Internet and allows you to use an FQDN instead of an IP address.
Internet appliances include (6)
1 UTM - Unified Threat Management
2 IDS - Intrusion Detection System
3 IPS devices - Intrusion Prevention system
4 spam gateways - examine/filter all incoming mail
5 load balancers - ensure that servers do not become overburdened
6 proxy server - forwards requests & caches web data
DNS is NOT an appliance
UTM
Unified Threat Management (UTM) devices are Internet appliances. They provide a single point on the network from which multiple security functions are managed. This single point of presence is in contrast to several independent software and devices, such as antivirus, antispam, firewall, IDS, and IPS.
UTM
An intrusion detection system (IDS) is an Internet appliance. It typically sits outside the network and watches packets coming through the network and sets off an alarm if a packet (or series of packets) contains something that violates a defined set of rules.
IPS
An intrusion prevention system (IPS) is an Internet appliance that sits inline in the network. While it performs many of the same duties as an IDS, an IPS also prevents the offending traffic instead of just detecting it.
Spam gateways
are installed behind a firewall and examine all incoming mail to filter out email that is likely to be fraudulent or a phishing email. These gateways can help minimize the risks that spam can pose to organizations.
Load balancers
are a used by organizations to ensure that servers do not become overburdened from their workload and go down, causing loss of availability. Multiple servers participate in a load-balanced solution, thereby distributing the load.
A proxy server
acts as an intermediary between an endpoint device, such as a computer, and another server from which a user or client is requesting a service. The proxy server may exist in a firewall server or on a separate server, which forwards requests through the firewall. A proxy server caches web data and images.
A web server
hosts web pages, web services, and web applications.
A Dynamic Host Configuration Protocol (DHCP) server
is responsible for the assignment of IP addresses. IP addresses may be assigned at random (dynamically) or by permanent assignment (static) based on a pool of available addresses.
The Domain Name System (DNS)
server maintains the mapping of the relationship between the name of a domain (www.whatever.com) and the corresponding IP address where the domain is hosted. Like a telephone directory or an address book.
File server (also referred to as fileshare server)
makes documents, spreadsheets, and other files available over the network