Section 2.6 Security Implications of Embedded and Specialized systems Flashcards
What do you call computing systems that are embedded within another larger system with a dedicated function?
Embedded systems
What concept involves having a single chip, or circuit, that contains all the major components of a computing system, including the microprocessor, memory, network interfaces, power management and more?
System on Chip (SoC)
What do you call OS installed on a chip to provide low latency responses upon input?
Real-Time OS (RTOS)
What do you call a type of programmable chip that allows programmers to reconfigure the hardware itself to accommodate new software functionality in a more agile manner?
Field-Programmable Gate Array (FPGA)
What is a popular embedded system used for the education and maker communities as well as anywhere that needs a low cost reasonably powered system?
Raspberry Pi
What is a simple microcontroller often used in conjunction with Raspberry Pi or other small single computers to provide control to a physical system?
Arduino
What does one program repeatedly and is meant to be very simple?
Arduino
What used as a full fledged computer is suitable for providing the control software for a physical system?
Raspberry Pi
What are systems used to integrate specialized software with physical devices?
Industrial Control Systems (ICS)
What system is a subset of an ICS that is used to control utilities, automated systems and machinery of all sorts, usually using an IP-based network to do so?
Supervisory Control and Data Acquisitions (SCADA)
A key consideration of SCADA systems is that they should what?
They should never be connected to the internet
With IoT devices we must be aware of what 3 things?
- data being processed
- 3rd party apps & social media links
- privacy settings
What kind of systems use a variety of non-traditional network technologies and computing systems?
Specialized systems
What kind of systems provide the ability to replace “plain old telephone service” with an integrated phone system that runs over the same network as all the other data services?
Voice over Internet Protocol (VoIP) systems
What kind of systems are network connected to provide the ability to remotely monitor and regulate temperatures?
HVAC systems
Because a drone is just a flying robot with embedded computing technology it is able to do what 3 things?
- collect data
- jam signals
- capture video
What incorporates within a single device printing capabilities, scanning, copying, and faxing functions?
Multifunction printer (MFP)
What systems should have their security considered because if breached it could allow an outsider to spy on the home, take sensitive photos, and know when it is occupied?
Home Surveillance systems
A _______ system is often used to control utilities, automated systems, and machinery of all sorts?
SCADA
What kind of system is both hardware and software combined in a single device?
Embedded system
What is a credit card sized computer that allows you to run programming languages such as python or scratch? Can be plugged into a monitor or computer and typically run with relatively low power draw.
Raspberry Pi
What is an array of programmable logic blocks, designed to be configured by customer or designer after manufacturing?
Field-Programmable Gate Array (FPGA)
What is an open-source programmable microprocessor/microcontroller? It can read inputs, such as light on a sensor, or an activity such as turning on LED, publishing something online, or activating a motor.
Arduino
What do you call an Operating system that’s designed to work on a very deterministic schedule? This means that the hardware and software of this device is able to operate with very specific scheduling.
RTOS
Because scale of IoT endpoint counts on 5G is exponentially greater, ___________ is a concern.
DDoS
Examples of _________ include security Radio-Frequency Identification (RFID) or keyless vehicle entry products.
Narrow Band
What uses the modulation of light intensity to transmit data? (Uses LED) Can safely function in areas otherwise susceptible to electromagnetic interference.
Light Fidelity (LiFi)
What do you call a short-range wireless PAN technology developed to support automation, machine-to-machine communication, remote control and monitoring of IoT devices?
Zigbee (PAN)
What is the functional order of security controls?
Deterrence, Denial, Detection, and Delay
What is the concept of protecting a company’s data with a series of protective layers?
Defense in Depth