Security Architecture: IoT and SCADA Flashcards

1
Q

What are IoT architectures: security implications?

A

An IoT architecture refers to the pieces that comprise IoT networking systems, including sensors, actuators, cloud services, protocols, and layers. The security implications of an IoT architectural model are significant, as the proliferation of connected devices introduces a larger attack surface and potential vulnerabilities. (IoT running on IPv6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can we apply security measures to IoT to make it robust?

A

It’s important to ensure robust security measures such as encryption, authentication, access controls, and regular software updates to help:

Safeguard sensitive data.

Protect against unauthorized access.

Prevent malicious actors from exploiting IoT devices to compromise the overall system and user privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why are ICS and SCADA so important in securing it?

A

Industrial Control System (ICS) and SCADA architectural models are of utmost concern, as these systems control critical infrastructure and industrial processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the potential consequences of Security Breaches in ICS and SCADA?

A

The potential consequences of security breaches in these environments can be severe and include:

Production disruptions

Physical harm

Environmental damage

It’s critical to have stringent security measures, network segmentation, air-gapping, and continuous monitoring to defend against cyber threats and unauthorized access for these architectures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are RTOS and their security implications?

A

RTOS architectures: security implications

The security implications of a Real-Time Operating System (RTOS) architectural model are paramount, as these systems often are used in safety-critical applications and devices. Vulnerabilities or exploits in an RTOS can lead to:

Real-time performance degradation.

Loss of control.

Life-threatening consequences.

It’s critical that you have rigorous security testing, memory protection, and secure coding practices to ensure the integrity and reliability of a RTOS system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why are Embedded system architectures need to be secure?

A

These can be critical because of the constrained resources and limited processing capabilities of these devices. Vulnerabilities in embedded systems can lead to:

Unauthorized access.

Data breaches.

Potential exploitation of connected networks.

It’s important to have robust security measures, secure boot procedures, and regular firmware updates to mitigate risks and protect against cyber threats with these systems.

Embedded systems are found in IoT and SCADA and are mostly insecure when it comes to the use for the general public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly