Quiz 1: Securing IoT

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

On-body device (wearable)

Measure physiological signals of the body

2
New cards

Accelerometer

Measures device acceleration along 3 axis, X, Y, and Z (part of on-body device)

3
New cards

Gyroscope

Measures rate at which a device rotates around a spatial axis (part of on-body device)

4
New cards

Activity detection

Algorithms that use sensor readings to determine human activities (lifting, weights, sleep quality, etc.)

5
New cards

Confidentiality, integrity, availability

CIA stands for…

6
New cards

Spoofing, tampering, repudiation, info disclosure, DoS, elevation of privilege

STRIDE stands for…

7
New cards

LINDDUNN

Linking, Identifying, Non-repudiation, Detecting, Data Disclosure,
Unawareness, and Non-compliance

8
New cards

Confidentiality

Protecting information from unauthorized access.

9
New cards

Integrity

Data has not been modified by an unauthorized user.

10
New cards

Availability

Information is accessible when needed.

11
New cards

physical boundaries

Wireless communications lack natural ____ ____.

12
New cards

2.4 GHz

Bluetooth frequency (Bluetooth Low Energy, BLE)

13
New cards

Frequency/band

Range of radio frequencies used to transmit data

14
New cards

True

Every country is in-charge of the spectrum allocation; Licensed and Unlicensed (900Mhz, 2.4GHz, 5GHz in the US)

15
New cards

Channels

Frequency is divided into…

16
New cards

The same channel

Devices need to be on ____ ____ ____ in order to communicate.

17
New cards

2 MHz

Each BLE channel is __ ___ apart.

18
New cards

Modulation

The process of changing a signal to transmit useful data; digital data (bits) are encoded into analog signals suitable for transmission over wireless channels.

19
New cards

Modulation

Devices need to have the same _____ technique to communicate..

20
New cards

Demodulation

Converting a signal back into bits.

21
New cards

Gaussian Frequency-Shift Keying (GFSK)

BLE modulation is…

22
New cards

Eavesdropping attack

Signals can be sent or received by anybody in possession of radio and knows the channel and modulation used; passive attack

23
New cards

False; weakens

True or False: Wireless signal strengthens as it propagates through matter (e.g. walls, windows, etc.)

24
New cards

True

True or False: Wireless communications depends on making the signal intelligible over the noise floor. Signal-to-noise ratio (SNR) is an indicator of performance. Higher SNR have better performance.

25
New cards

True

True or False: Factors such as noise, transmission power, etc. affect signal-to-noise ration (SNR)

26
New cards

Impersonation attack

Adversary pretends to be someone else, and convinces device to connect to it; active attack; may rely on combining with other attacks to pull off

27
New cards

Man in the middle (MITM)

Similar to impersonation attack, but general include forwarding behavior between entities; can be used for more than just obtaining data

28
New cards

Background of developers, privacy policy (what data is being collected, who is it shared with, etc..), language used in privacy policy (are there contradictions? unclear or ambiguous statements? downplay or modify the emphasis of certain sentences?), readability, does the app use 3rd party libraries?

Things to analyze to protect personal data