IoT and OT Hacking - IoT Concepts and Attacks

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/117

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

118 Terms

1
New cards

What refers to the network of devices having IP addresses and the capability to sense, collect, and send data using embedded sensors, communication hardware and processors?

Internet of Things (IoT), also known as Internet of Everything (IoE)

2
New cards

What refers to the term thing that is used to refer to a device that is implanted on natural, human-made, or machine-made objects and has the functionality of communicating over the network?

Internet of Things (IoT), also known as Internet of Everything (IoE)

3
New cards

What IoT technology is included in the four primary systems? These systems together make communication between two endpoints possible.

IoT devices, gateway systems, data storage systems using cloud technology, and remote control using mobile apps.

4
New cards

What are sensors that are embedded in the devices sense a wide variety of information from their surroundings, including temperature, gases, location, workings of some industrial machinery, or health data of a patient referred to?

Sensing Technology

5
New cards

What are gateways that are used to bridge the gap between an IoT device (internal network) and the end-user (external network), thus allowing them to connect and communicate with each other referred to? The data collected by the sensors in the IoT device is sent to the connected user or cloud through the gateway.

IoT Gateways

6
New cards

What travels through a gateway that then collects data, arrives at the cloud, where it is stored and undergoes data analysis referred to? The processed data is then transmitted to the user, who can take certain actions based on the information received.

Cloud Server/Data Storage

7
New cards

What involves an end-user using remote controls such as mobile phones, tablets, laptops, etc. installed with a mobile app to monitor, control, retrieve data, and take a specific action on IoT devices from a remote location referred to?

Remote Control using Mobile App

8
New cards

What five layers are part of the IoT Architecture?

Application Layer, Middleware Layer, Internet Layer, Access Gateway Layer, Edge Technology Layer

9
New cards

What layer consists of all the hardware components, including sensors, radio-frequency identification (RFID) tags, readers, or other soft sensors, and the device itself? These entities are the primary part of the data sensors that are deployed in the field for monitoring or sensing various phenomena. This layer plays an important part in data collection, and in connecting devices within the network and with the server.

Edge Technology Layer

10
New cards

What layer helps to bridge the gap between two endpoints, such as a device and a client? The initial data handling also takes place in this layer. This layer carries out message routing, message identification, and subscribing.

Access Gateway Layer

11
New cards

What is a crucial layer as it serves as the main component in carrying out communication between two endpoints, such as device-to-device, device-to-cloud, device-to-gateway, or back-end data sharing?

Internet Layer

12
New cards

What is one of the most critical layers that operates in two-way mode? As the name suggests, this layer sits in the middle of the application layer and the hardware layer, thus behaving as an interface between these two layers. It is responsible for important functions such as data management, device management, and various issues like data analysis, data aggregation, data filtering, device information discovery, and access control.

Middleware Layer

13
New cards

What layer is placed at the top of the stack and is responsible for the delivery of services to the relevant users from different sectors, including building, industrial, manufacturing, automobile, security, healthcare, etc?

Application Layer

14
New cards

What short-range wireless communication is a wireless personal area network? This technology is designed to be applied in various sectors such as healthcare, security, entertainment, and fitness.

Bluetooth Low Energy (BLE)

15
New cards

What short-range wireless communication is like Wi-Fi with only two differences: the mode of communication and the speed? It is a Visible Light Communications (VLC) system that uses common household light bulbs for data transfer at a very high speed of 224 Gbps.

Light-Fidelity (Li-Fi)

16
New cards

What short-range wireless communication is a type of short-range communication that uses magnetic field induction to enable communication between two electronic devices? It is primarily used in contactless mobile payment, social networking, and the identification of documents or other products.

Near-Field Communication (NFC)

17
New cards

What short-range wireless communication are machine-readable tags that contain information about the product or item to which they are attached? It is a two-dimensional code that stores product information and can be scanned using smartphones, whereas a barcode comes in both one-dimensional (1D) and two-dimensional (2D) forms of code.

QR Codes and Barcodes:

18
New cards

What short-range wireless communication stores data in tags that are read using electromagnetic fields? It is used in many sectors including industrial, offices, companies, automobiles, pharmaceuticals, livestock, and pets.

Radio-Frequency Identification (RFID)

19
New cards

What short-range wireless communication is an IPv6-based networking protocol for IoT devices? Its main purpose is home automation so that the devices can communicate with each other on local wireless networks.

Thread

20
New cards

What short-range wireless communication is a technology that is widely used in wireless local area networking (LAN)? At present, the most common Wi-Fi standard that is used in homes or companies is 802.11n, which offers a maximum speed of 600 Mbps and a range of approximately 50 m.

Wi-Fi

21
New cards

What short-range wireless communication is used for peer-to-peer communication without the need for a wireless access point? It is used to direct devices start communication only after deciding which device will act as an access point.

Wi-Fi Direct

22
New cards

What short-range wireless communication is a low-power, short-range communication designed primarily for home automation? It provides a simple and reliable way to wirelessly monitor and control household devices like HVAC, thermostats, garages, home cinemas, etc.

Z-Wave

23
New cards

What short-range wireless communication is based on the IEEE 203.15.4 standard and is used in devices that transfer data infrequently at a low rate in a restricted area and within a range of 10–100 m?

Zig-Bee

24
New cards

What short-range wireless communication is a multicast wireless sensor network technology mainly used for short-range communication between devices related to sports and fitness sensors?

Adaptive Network Topology (ANT)

25
New cards

What medium-range wireless communication is another variant of the Wi-Fi standard; it provides an extended range, making it useful for communications in rural areas? It offers low data rates, thus reducing the power and cost of transmission.

HaLow

26
New cards

What medium-range wireless communication is a standard for mobile communication that provides enhancement to LTE, focusing on providing higher capacity in terms of data rate, extended range, efficiency, and performance?

LTE-Advanced

27
New cards

What medium-range wireless communication is an Internet protocol used for communication between smaller and low-power devices with limited processing capacity, such as various IoT devices?

IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN)

28
New cards

What medium-range wireless communication are multiplexed connections between IoT devices over the User Datagram Protocol (UDP); they provide security equivalent to SSL/TLS?

Quick UDP Internet Connections (QUICs)

29
New cards

What long-range wireless communication is a wireless telecommunication network, designed to provide long-range communications between two endpoints?

Low Power Wide Area Networking (LPWAN)

30
New cards

What long-range wireless communication is used to support applications such as mobile, industrial machine-to-machine, and secure two-way communications for IoT devices, smart cities, and healthcare applications?

Long Range Wide Area Network (LoRaWAN)

31
New cards

What long-range wireless communication is used in devices that have short battery life and need to transfer a limited amount of data?

Sigfox

32
New cards

What long-range wireless communication is used in a tiny part of the TV white space spectrum to deliver high-quality, high-power, high-coverage, and low-cost networks?

Neul

33
New cards

What long-range wireless communication is a communication protocol that is used for data transfer using small dish antennas for both broadband and narrowband data?

Very Small Aperture Terminal (VSAT)

34
New cards

What long-range wireless communication is a type of communication protocol that is used for communication over a longer distance? It is used to send high-quality data but with the drawbacks of being expensive and having high power consumption.

Cellular

35
New cards

What long-range wireless communication is an ISO standard lightweight protocol used to transmit messages for long-range wireless communication? It helps in establishing connections to remote locations, for example via satellite links.

Message Queuing Telemetry Transport (MQTT)

36
New cards

What long-range wireless communication is a variant of LoRaWAN and Sigfox that uses more enhanced physical layer technology and the spectrum used for machine-to-machine communication?

Narrowband IoT (NB-IoT)

37
New cards

What wired communication is the most commonly used type of network protocol today? It is a type of LAN (Local Area Network) that consists of a wired connection between computers in a small building, office, or campus.

Ethernet

38
New cards

What wired communication is a type of network protocol that provides high-definition videos and related content to homes over existing coaxial cables?

Multimedia over Coax Alliance (MoCA)

39
New cards

What wired communication is a type of protocol that uses electrical wires to transmit power and data from one endpoint to another? PLC is required for applications in different areas such as home automation, industrial devices, and broadband over power lines (BPL).

Power-Line Communication (PLC)

40
New cards

What OS is is a family of operating systems developed by Microsoft for embedded systems?

Windows 10 IoT

41
New cards

What OS is a free open-source OS used in IoT microcontrollers that makes low-power, battery-operated edge devices easy to deploy, secure, connect, and manage?

Amazon FreeRTOS

42
New cards

What OS is an open-source OS developed by Google for various platforms, such as embedded systems, smartphones, tablets, etc?

Fuchsia

43
New cards

What OS has fewer resource requirements and uses energy efficiently? It has the ability to run on embedded systems, actuator boards, sensors, etc.

RIOT

44
New cards

What OS is also known as Snappy, this is used in robots, drones, edge gateways, etc?

Ubuntu Core

45
New cards

What OS is mostly used for low-powered devices such as wearable devices?

ARM Mbed OS

46
New cards

What OS is used in low-power and resource-constrained devices?

Zephyr

47
New cards

What OS is used with all small, medium, and large embedded systems?

Embedded Linux

48
New cards

What OS is an open-source OS primarily developed to support 8-bit and 32-bit microcontrollers of embedded systems?

NuttX RTOS

49
New cards

What OS is primarily used in the aerospace or defense, industrial, automotive, and medical sectors?

Integrity RTOS

50
New cards

What OS supports devices that work on the BLE protocol?

Apache Mynewt

51
New cards

What OS is an open-source, Linux-based operating system designed for a wide range of devices, including smartphones, tablets, smart TVs, wearables, and IoT devices?

Tizen

52
New cards

What IoT application protocol is a web transfer protocol used to transfer messages between constrained nodes and IoT networks? This protocol is mainly used for machine-to-machine (M2M) applications such as building automation and smart energy.

Constrained Application Protocol (CoAP)

53
New cards

What IoT application protocol helps the IoT environment to move computational processing to the edge of the network, allowing smart devices and gateways to perform tasks and services from the cloud end? Moving computational services to the edge of the network improves content caching, delivery, storage, and management of the IoT.

Edge

54
New cards

What IoT application protocol is an application-layer communication protocol used for application-level communication between IoT devices; it is used for IoT device management?

Lightweight Machine-to-Machine (LWM2M)

55
New cards

What IoT application protocol is a technology used to enable faster and seamless interaction with nearby IoT devices. It reveals the list of URLs being broadcast by nearby devices with BLE beacons?

Physical Web

56
New cards

What IoT application protocol is an open technology for real-time communication used for IoT devices? This technology is used for developing interoperable devices, applications, and services for the IoT environment.

eXtensible Messaging and Presence Protocol (XMPP)

57
New cards

What IoT application protocol is a software used for communication between an M2M server and applications running on an embedded gateway? It allows IoT applications to exchange data and commands with an M2M server.

Mihini/M3DA

58
New cards

What IoT communication model is inter-connected devices that interact with each other through the Internet, but they predominantly use protocols such as ZigBee, Z-Wave or Bluetooth? It is most commonly used in smart home devices such as thermostats, light bulbs, door locks, CCTV cameras, and fridges, which transfer small data packets to each other at a low data rate. This model is also popular in communication between wearable devices.

Device-to-Device Communication Model

59
New cards

What IoT communication model has devices communicate with the cloud directly, rather than directly communicating with the client to send or receive data or commands? It uses communication protocols such as Wi-Fi or Ethernet, and sometimes uses Cellular as well.

Device-to-Cloud Communication Model

60
New cards

What IoT communication model involves the IoT device communicating with an intermediate device called a gateway, which in turn communicates with the cloud service? This gateway device could be a smartphone or a hub that is acting as an intermediate point, which also provides security features and data or protocol translation.

Device-to-Gateway Communication Model

61
New cards

What IoT communication model has protocols generally used in this mode of communication are ZigBee and Z-Wave?

Device-to-Gateway Communication Model

62
New cards

What IoT communication model extends the device-to-cloud communication type such that the data from the IoT devices can be accessed by authorized third parties? Devices upload their data onto the cloud, which is later accessed or analyzed by third parties.

Back-End Data-Sharing Communication Model

63
New cards

What are the challenges of IoT devices?

Lack of Security and Privacy, Vulnerable Web Interfaces, Legal, Regulatory, and Rights Issue, Default, Weak, and Hardcoded Credentials, Clear Text Protocols and Unnecessary Open Ports, Coding Errors (Buffer Overflow), Storage Issues, Difficult-to-Update Firmware and OS, Interoperability Standard Issues, Physical Theft and Tampering, Lack of Vendor Support for Fixing Vulnerabilities, Emerging Economy and Development Issues, Handling of Unstructured Data, Scalability, Power Consumption, Regulatory Compliance, Integration with Legacy Systems

64
New cards

What is one of the OWASP Top 10 IoT threats?

Weak, Guessable, or Hardcoded Passwords

65
New cards

What is one of the OWASP Top 10 IoT threats?

Insecure Network Services

66
New cards

What is one of the OWASP Top 10 IoT threats?

Insecure Ecosystem Interfaces

67
New cards

What is one of the OWASP Top 10 IoT threats?

Lack of Secure Update Mechanisms

68
New cards

What is one of the OWASP Top 10 IoT threats?

Use of Insecure or Outdated Components

69
New cards

What is one of the OWASP Top 10 IoT threats?

Insufficient Privacy Protection

70
New cards

What is one of the OWASP Top 10 IoT threats?

Insecure Data Transfer and Storage

71
New cards

What is one of the OWASP Top 10 IoT threats?

Lack of Device Management

72
New cards

What is one of the OWASP Top 10 IoT threats?

Insecure Default Settings

73
New cards

What is one of the OWASP Top 10 IoT threats?

Lack of Physical Hardening

74
New cards

Which one of the following is an OWASP IoT attack surface area?

Ecosystem (General)

75
New cards

Which one of the following is an OWASP IoT attack surface area?

Device Memory

76
New cards

Which one of the following is an OWASP IoT attack surface area?

Device Physical Interfaces

77
New cards

Which one of the following is an OWASP IoT attack surface area?

Device Web Interface

78
New cards

Which one of the following is an OWASP IoT attack surface area?

Device Firmware

79
New cards

Which one of the following is an OWASP IoT attack surface area?

Device Network Services

80
New cards

Which one of the following is an OWASP IoT attack surface area?

Administrative Interface

81
New cards

Which one of the following is an OWASP IoT attack surface area?

Local Data Storage

82
New cards

Which one of the following is an OWASP IoT attack surface area?

Cloud Web Interface

83
New cards

Which one of the following is an OWASP IoT attack surface area?

Third-party Backend APIs

84
New cards

Which one of the following is an OWASP IoT attack surface area?

Update Mechanism

85
New cards

Which one of the following is an OWASP IoT attack surface area?

Mobile Application

86
New cards

Which one of the following is an OWASP IoT attack surface area?

Vendor Backend APIs

87
New cards

Which one of the following is an OWASP IoT attack surface area?

Ecosystem Communication

88
New cards

Which one of the following is an OWASP IoT attack surface area?

Network Traffic

89
New cards

Which one of the following is an OWASP IoT attack surface area?

Authentication/Authorization

90
New cards

Which one of the following is an OWASP IoT attack surface area?

Privacy

91
New cards

Which one of the following is an OWASP IoT attack surface area?

Hardware (Sensors)

92
New cards

What converts the devices into an army of botnets to target a specific system or server, making it unavailable to provide services?

DDoS Attack

93
New cards

What vulnerabilities are exploited by attackers to steal confidential information such as user credentials and to perform further attacks on the target network?

Attack on HVAC Systems

94
New cards

What involves an attacker jamming and sniffing the signal to obtain the code transferred to a vehicle’s receiver; the attacker then uses it to unlock and steal the vehicle?

Rolling Code Attack

95
New cards

What involves an attacker connecting to nearby devices and exploiting the vulnerabilities of the Bluetooth protocol to compromise the device?

BlueBorne Attack

96
New cards

What involves an attacker jamming the signal between the sender and the receiver with malicious traffic that makes the two endpoints unable to communicate with each other?

Jamming Attack

97
New cards

What involves an attacker to exploit vulnerabilities in the IoT device to turn it into a backdoor and gain access to an organization’s network?

Remote Access using Backdoor

98
New cards

What involves attackers exploiting an open telnet port to obtain information that is shared between the connected devices, including their software and hardware models?

Remote Access using Telnet

99
New cards

What involves an attacker using multiple forged identities to create a strong illusion of traffic congestion, affecting communication between neighboring nodes and networks?

Sybil Attack

100
New cards

What is a malicious script is used by attackers to exploit poorly patched vulnerabilities in an IoT device?

Exploit Kits