ITEC 100- WEEK 6

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

refers to the

network of interconnected physical devices

embedded with sensors, software, and

connectivity that allow them to collect and

exchange data.

Internet of Things (IoT)

2
New cards

refers to protecting IoT

devices and networks from cyber

threats, unauthorized access, and data

breaches.

IoT security

3
New cards

Appliances, security cameras, smart doorbells, and

voice assistants often have weak security, making

them vulnerable to cyberattacks.

Smart Home Devices

4
New cards

Cybercriminals may target IoT healthcare devices like

pacemakers, insulin pumps, and patient monitors to

disrupt services or steal sensitive health information.

Medical Equipment

5
New cards

IoT systems in manufacturing and critical

infrastructure are susceptible to attacks, leading to

operational failures, production delays, or physical

damage.

Industrial Control Systems (ICS)

6
New cards

Modern vehicles use IoT for navigation, safety, and

diagnostics. Without proper security, hackers could

gain control, posing serious safety risks.

Connected Vehicles

7
New cards

Smartwatches, fitness trackers, and other IoT-enabled

wearables collect personal health data that can be

intercepted or misused by cybercriminals.

Wearable Technology

8
New cards

Use end-to-end encryption and Public

Key Infrastructure (PKI) to protect data

and ensure secure device

authentication.

Encryption and Secure Communication

9
New cards

Implement Multi-Factor Authentication

(MFA), use strong passwords, and apply

role-based access controls.

Strong Authentication and Access Controls

10
New cards

Isolate IoT devices, deploy firewalls, and

monitor traffic to block malicious activities.

Network Segmentation and Firewall

11
New cards

Regular Updates and Patch Management

Keep devices updated with security

patches and enable automatic firmware

updates.

12
New cards

Use endpoint protection tools and monitor

IoT traffic to detect and respond to threats in

real time.

Endpoint Protection and Monitoring

13
New cards

is an automated process that

identifies security weaknesses in computers, networks,

and communication systems. It is by scanning IP

addresses for known vulnerabilities and

misconfigurations. It helps detect potential threats

that cybercriminals could exploit.

vulnerability scan

14
New cards

These identify vulnerabilities in

your external security perimeter without requiring login

credentials.

Unauthenticated Scans:

15
New cards

Using privileged access, these scans

detect weaknesses within your internal networks.

Authenticated Scans:

16
New cards

Identify weaknesses in network devices like routers,

firewalls, and switches by checking for open ports, weak passwords,

and outdated firmware.

Network Scans

17
New cards

Detect vulnerabilities in web applications,

including SQL injection, cross-site scripting (XSS), and insecure

authentication.

Web Application Scans:

18
New cards

Assess servers or workstations for missing

patches, misconfigurations, and outdated software.

Host-Based Scans:

19
New cards

Spot security issues in database systems, such as

weak encryption, insecure settings, and unpatched vulnerabilities.

Database Scans:

20
New cards

This automated process is quicker and more

affordable, allowing frequent scans to detect

newly discovered vulnerabilities.

Vulnerability Scanning

21
New cards

Conducted manually by experts, it simulates

real-world attacks. Though it takes more time

and is costlier, it offers a detailed and accurate

evaluation of security risks.

Penetration Testing