Week 12 Flashcards

1
Q

Internet of Things

A

Internet of Things (IoT) - any computing device with the ability to transfer data over a network

Low cost sensors, computing, and communication put embedded smarts in all sorts of devices so that these products can communicate with one another for data collection, analysis, and collective action

IoT is a network of dedicated physical objects (things) containing embedded technology for communicating and sensing or interacting with their own internal states or the external environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Interactions within an IoT system

A

Interactions within an IoT system
(1) things with networked sensors (at rest –> active)
(2) data stores (data, videos, test, models/analysis)
(3) analytic engineers (human/machine learning, sensors/cloud)

things with networked sensors -> report states (internal states/external status –> data stores

data stores –> iterate (models/analyses) –> analytic engines

analytic engines –> feedback and control (commands and requests) –> things with networked sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Business benefits of IoT

A

Business benefits of IoT
- increase productivity
- automate process
- optimize value chain
- improve customer experience
- create new business models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IoT device risks

A

IoT device risks:
- outdated software or firmware
- lack of encryption to protect transmitted data
- weak authentication requirements
- default administrative passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IoT device risk mitigations

A

IoT device risk mitigations:
- where possible, contract equipment from known viable and reputable manufacturers or IoT service providers
- ensure the existence of an appropriate update frequency for device software/firmware
- implement appropriate encryption and end-point security
- change default administration passwords from manufacture to a password that complies with organizational IT policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IoT data storage risks

A

IoT data storage risks:
- IoT stored in the cloud may not be adequately protected when managed by an IoT service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IoT data storage risk mitigations

A

IoT data storage risk mitigations:
- business should specify security and protection requirements
- service provider should agree to specific requirements for cloud security in a contractual agreement
- service provider should provide a third-party assurance report on their cloud security and if needed privacy and compliance with contractual obligations
- consider leverage edge computing to process the IoT data on a local device to eliminate the amount of sensitive data being transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IoT data breach risks

A

IoT data breach risks:
- the IoT data breached may include personally identifiable information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IoT data breach risk mitigation strategies

A

IoT data breach risk mitigation strategies:
- generally, stored data should be encrypted with personally identifiable information stripped out in order to minimize the impact of information theft resulting from a data breach
- if personally identifiable information is required to be collected and stored, ensure compliance with local privacy laws such as the Personal Information Protection and Electronic Documents Act (PIPEDA)
- Prepare a data breach response plan that should include steps to: contain the breach, evaluate the risks as a result of the breach, notify impacted persons, prevent future incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IoT network risks

A

IoT network risks:
- network infrastructure may not support bandwidth demands from IoT devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IoT network risk mitigations

A

IoT network risk mitigations
- Each IoT devices will utilize a portion of available bandwidth on the network. As more devices are added to the IoT network, businesses must ensure adequate bandwidth is available to support communication between these devices and critical applications. Otherwise, network downtime may reduce employee productivity or provide a negative customer experience
- edge computing moves the processing of data generated by IoT devices from the cloud back to the device, thereby reducing bandwidth demands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IoT employee risks

A

IoT employee risks:
- employees may gain unauthorized access of IoT devices through personals mobile devices
- employees may gain unauthorized physical access to IoT devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IoT employee risk mitigations

A

IoT employee risk mitigations
- create a separate private network for IoT devices that are not shares with the network accessible by employee devices
- ensure passwords for IoT devices are secure by changing them from manufacturer defaults to forms that meet organizational IT policies

  • review IoT devices periodically to ensure order casing has not been tampered with
  • place IoT devices in locations where access controls are secure and limited to authorized individuals
  • review logs for IoT devices periodically and investigate those where the device has gone offline. Typically, to maliciously tamper an IoT device would require bringing it offline and rebooting it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly