Section 15.142 Internet of Things (IoT) Flashcards

Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources

1
Q

Internet of Things (IoT)

A

Network of physical devices with sensors, software, and connectivity

■ Enables data exchange among connected objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hub/Control System

A

Central component connecting IoT devices

The Hub Collects, processes, analyzes data, and sends commands

Can be a physical device like Amazon Echo or Google Home or it can be a software platform like an Android App

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Smart Devices

A

Everyday objects enhanced with computing and internet capabilities

■ Sense environment, process data, and perform tasks autonomously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wearables

A

Subset of smart devices worn on the body

■ Monitor health, provide real-time information, and offer hands-free interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sensors

A

Detect changes in environment, convert into data

■ Measure various parameters (temperature, motion, etc.)

■ Enable interaction and autonomous decisions in smart devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IoT Risks

Weak Default Settings

A

● Common security risk

● Default usernames/passwords are easy targets for hackers

● Changing defaults upon installation is essential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IoT Risks

Poorly Configured Network Services

A

● Devices may have vulnerabilities due to open ports, unencrypted communications

● Unnecessary services can increase attack surface

● Keeping IoT devices on a separate network is recommended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly