Module 5 Simulation Labs | ITE-249-02 5.1 & 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

1. Which of the following spectrums are used by wireless networks? [Choose all that apply] 1.2 GHz 2.4 GHz 5 GHz 3.6 GHz

2.4 GHz 5 GHz Wi-Fi or wireless networks allow mobile devices to connect and move around. When there is no cellular connectivity, these devices can connect with a wireless network and use Internet services. There are different types of wireless networks that use the 2.4 to 5 GHz spectrum. Each type of wireless network also offers a different speed. Wireless networks do not use the 1.2 GHz and 3.6 GHz spectrums.

2. What is the maximum distance supported by Bluetooth 5.x? 20 feet 100 feet 200 feet 50 feet

200 feet

Real-time Operating System (RTOS):

A Real-Time Operating System (RTOS) supports real-time applications that require instant results to their requests. Certain applications cannot use the buffer to store their requests for later. They need instant responses. Such applications are designed to work with the RTOS, which immediately processes the data without buffering the requests. Examples of such applications include: • Air Traffic Control Systems • Networked Multimedia Systems • Command Control Systems • Military systems • Automobiles Just like any other system, RTOS is prone to vulnerabilities including: • Remote code execution • Insecure permissions • Privilege escalation • Denial of Service (DoS) • Buffer overflow Most of these vulnerabilities can cause information leakage within RTOS.

System-on-Chip (SoC):

A System-on-Chip (SoC), as the name suggests, is a complete system on an integrated circuit (IC), which includes various chips and circuitry. These are required for the system to function. Normally, SoC would include: • CPU • Input and output ports • Memory Examples of SOC are: • Smartphones • Cameras • Tablets An SoC might be vulnerable to: • Information leakage • Physical tampering • Side-channel attacks • Reverse engineering • Buffer issues

5.2 Mobile Security Solutions Cellular:

A cellular network is the type of network that provides network and data services to mobile devices. In this context, data services are the amount of data that a mobile device can consume while using the Internet or its services, such as audio and video. A cellular network makes use of the telephony circuits that are divided into cells. A cellular network covers a large area, such as a country. The cells within the cellular network are designed to cover a specific location within the larger area. Even though 3G is now almost obsolete, several cellular service providers are still being used for backward connectivity. While 4G is the current cellular standard, 5G is the next version, but it is not standardized yet.

Drones:

A drone is an uncrewed aerial vehicle (UAV) that is remotely controlled through sensors and GPS. It is a small aerial vehicle that is used for various purposes, such as surveillance. A drone works with two different signals: rising and downlink signals. The drone receives rising signals. The rising signals can be in the form of radio command or GPS signals. An attacker can replace the rising signal with lure signals, thereby take control of the drone. The drone sends downlink signals to communicate back with the controller. The signals may contain the flight information or data transmission, both of which can be intercepted by an attacker. Neither the downlink nor the rising signals are encrypted, making the drone susceptible to compromise.

Hotspot:

A hotspot is sharing a mobile connection with other mobile devices, such as mobile phones and tablets. You can also connect a laptop and even a desktop if it has a wireless network adapter. A hotspot is generally enabled when you are on the move or do not have any other connecting methods to the Internet. Often, you can find hotspots in hotels and airports. It is important to note that when a mobile phone has hotspot enabled, its Internet data package is being used. You can exhaust the Internet data package by downloading large files. It also drains the battery of the mobile phone that has hotspot enabled. Smartphones have hotspot capability, but you need to have an Internet data package to share an Internet connection using a hotspot. When you enable a hotspot, you can use various features that may be available on your phone. For example, you can limit the number of users or even the daily data limit. Other than this, you can also set the hotspot to turn off automatically after it is idle for a certain time, such as 10 minutes.

Point-to-Point

A point-to-point connection is made between two devices. These devices can be two mobile devices. An example of a point-to-point connection is a telephone call, which one person makes to another person. In this type of connection, there is a dedicated link that is established between two devices. The bandwidth of the connection can be consumed by both the devices that are connected to it. One end acts as a sender, and the other end acts as a receiver.

3. Which of the following features of Mobile Device Management (MDM) can be used by an organization? [Choose all that apply] Geofencing Encryption Remote Wipe Remote Location Password enforcement

All the above.

3. Which type of sensors can be included in an Internet of Things (IoT) device? [Choose all that apply] Temperature Accelerometer Acceleration Gyro Humidity

All the above. An IoT device is hardware that can collect data and communicate the data to other devices over the Internet. Each IoT device has an IP address that can be used for communication as well as remote monitoring and controlling. In other words, anything that uses a sensor and has the capability of autonomous computing can be assigned an IP address and configured as a smart device.

5. Which of the following types of attacks are possible on the building automation systems - the building's heating, ventilation and air conditioning (HVAC) systems? [Choose all that apply] Cross-site scripting Authentication bypass Hardcoded secrets Buffer overflow Path traversal

All the above. Heating, Ventilation, Air Conditioning (HVAC) The building automation systems are automation methods that manage the building's heating, ventilation and air conditioning (HVAC). These systems are designed to increase efficiency in managing HVAC, reduce cost, and reduce human dependency. Components of a building automation system include sensors, controllers, output devices, communication protocols, and terminal interface. Each component is controlled either by firmware or software. Building automation systems are prone to vulnerabilities similar to other automation or software systems. For example, most of the building automation system vulnerabilities are common with Web applications. This is because the building automation systems are commonly managed by a Web application or a mobile app. Common vulnerabilities afflicting building automation systems include: • Buffer overflow • Hardcoded secrets • Device misconfigurations • Cross-site scripting • Path traversal • Arbitrary file deletion • Authentication bypass

4. Which of the following digital features are included in vehicles? [Choose all that apply] GPS Bluetooth Near Field Communication USB

All the above. Vehicles these days are equipped with several digital features, such as USB, GPS, and Bluetooth. Hackers can exploit the security vulnerabilities related to these digital features to attack a vehicle. As a result, the more the digital features in a vehicle, the more susceptible it is to such attacks. For example, if the hacker breaks into the vehicle's GPS, it may add rogue navigation points and maps. Moreover, every vehicle has chips and embedded applications. If these applications are not patched, then they can also be exploited.

2. Which of the following vulnerabilities can exist in System control and Data Acquisition (SCADA)? [Choose all that apply] Weak passwords Unmonitored system Inadequate input validation Poor update management

All the above. • Unmonitored systems: SCADA systems are typically unmonitored. There is no active or continuous monitoring for suspicious activities. This makes it difficult to detect an attack when it takes place. • Passwords: SCADA systems have built-in authentication to enable configuration and modification. However, human negligence towards protection measures can lead to compromise of the systems. For example, system administrators might use simple passwords or share passwords, leading to system security issues. • Poor updates management: SCADA systems need to be updated with the latest firmware and software from time to time. However, missing updates or inherent vulnerabilities in the updates can prove to be an open-door for the attackers. • Inadequate input validation: SCADA systems may need some user inputs. SCADA systems should be built to validate these inputs thoroughly. Insufficient validation can allow attackers to execute arbitrary code. For example, an earlier version of the open-architecture WebAccess/SCADA system from Advantech did not validate the user input and was compromised.

Bluetooth

Bluetooth is a wireless protocol that has a limited range. An older version of Bluetooth, up to 4.2, can connect to other Bluetooth devices within the 32-feet or 10 meters range. However, the recent version, which is 5.x, can connect to devices even 200 feet or 60 meters. Bluetooth uses the 2.4 GHz frequency band, which is the same as used by some wireless networks. Nowadays, several devices have Bluetooth features. For example, there are printers, tablets, watches, and headphones or earplugs that have Bluetooth capability. You need to pair two Bluetooth devices for them to communicate with each other. Let's consider the example of two mobile devices. The first one finds the second Bluetooth device and initiates the pairing. The first mobile device then sends a pairing request and a key that the second mobile device needs to accept. Once the second mobile device accepts the pairing, the pairing process is complete. The second mobile device, while pairing, can choose to share contacts and call history with the first mobile device.

System Control and Data Acquisition (SCADA)/Industrial Control System (ICS) Cont'd:

Components of a SCADA system that can be a target for the attacker: • Human Machine Interfaces (HMIs): SCADA system uses these interfaces to present data to the users after collecting it from various sensors. If not secured properly, they can be a target for the attackers. • Mobile and Web Applications: SCADA systems can be accessed using a mobile device or a Web application. The attackers can exploit any vulnerabilities in the accessed devices. • Protocols: SCADA systems use various protocols, such as Modbus and Profinet. These protocols lack a strong security mechanism. Data traveling over these protocols can be intercepted and altered by malicious players.

1. Which of the following are examples of embedded systems? [Choose all that apply] Digital Cameras Digital Watches Automobiles Printers Automatic Teller Machine (ATM)

Digital Cameras Digital Watches Automobiles Printers Automatic Teller Machine (ATM) (All the above)

Custom Firmware:

Each mobile device comes with a firmware that has certain functionality. However, you may want to install a custom firmware that gives you additional privileges. Even though it cannot be confirmed that a custom firmware may work. Even if it works with a specific mobile device, several security loopholes can make the mobile device vulnerable. Such firmware updates should be stopped with applications, such as MDM.

Embedded System:

Embedded systems are devices that contain a central processing unit (CPU) of their own. This CPU runs an operating system and some applications to perform certain specialized functions. Examples of embedded systems include: • Automatic Teller Machine (ATM) • Printers • Digital watches • Digital cameras • Automobiles

Rooting/Jailbreaking:

Every Android and iOS device has certain operating system controls limiting its users' capabilities to perform certain functions. A user can install, update, or delete apps, but the users cannot perform operating system level tweaking or modifications. For example, a user cannot unofficially upgrade the operating system or undelete files that have been deleted. For such tasks, the user needs to have root-level permissions. Rooting or jailbreaking is removing or bypassing the operating system's security controls, which can either be Android or iOS. In the Android world, this process is known as rooting. In the iOS world, this process is known as jailbreaking. The fundamental concept for both remains the same, which is to remove or bypass the security controls to gain root-level privileges. However, with MDM, you can block rooting or jailbreaking.

Global Positioning System (GPS):

GPS is a global navigation satellite-based system. Even though it can have varied uses, such as time synchronization, it is mainly used for navigation and location tracking. Google Maps uses GPS to provide the exact location that you look for. GPS is commonly used nowadays. For example, several different car models are equipped with GPS systems that helps the person navigate to a specific location.

Infrared:

Infrared is a type of radiant energy that is not visible to humans. However, a receiving device with an infrared port receives the infrared and performs a designated action. For example, a TV remote has infrared that is used to perform certain actions on the TV. You can turn on, change channels, increase and decrease volume, and even turn off the TV. The receiving device must be in clear sight to receive inputs from an infrared device. A solid wall or object will make the infrared light bounce back, and the receiving device will not receive the signal. For example, if someone stands in front of the TV and you try to change the channel, you cannot do it. This is because the infrared signals are being bounced back. Some of the mobile devices also have infrared capability.

Firmware Over-the-air (OTA) Updates:

Like any electronic device, such as laptops or cameras, mobile devices also have a firmware. When you purchase a mobile device, it would have a specific version of the firmware. However, a few months later, the vendor may release another firmware that needs to be updated on the mobile device. The vendor pushes the update to the user's devices, which is done through an automatic method. The user may choose to perform this task manually. Automatic or manual methods can be configured in the settings of the mobile device. OTA refers to cellular updates. OTA cannot be performed if you disable mobile data or are not connected to a wireless network.

Near-field Communication (NFC):

Near-field Communication (NFC) is a method to establish connectivity within limited proximity, which is about 3.9 inches or 10 cm. Both devices need to have NFS capability. When both the devices are brought within said proximity, the connection is established. Then, both mobile devices can share pictures, contacts, and other data with each other. Other than mobile devices, other devices in the market use NFC. For example, instead of swapping your credit card in shopping malls, it is flashed within the proximity of the credit card machine. A connection is established, and then the amount is charged to the credit card. However, both the credit card and the credit card machine need to have NFC capabilities.

4. Which of the following Unified Endpoint Management (UEM) features can help an IT administrator manage and administer IT assets? [Choose all that apply] Operating system deployment License Management User provisioning Remote management Software deployment

Operating system deployment License Management Remote management Software deployment

Radio Frequency Identification (RFID):

RFID is used for identifying tags that are attached to different objects. For example, RFID tags can be found on hardware devices in an organization. The tags help the administrator track these devices. RFID is a contactless technology that uses radio waves to identify the tags attached to different objects. There are two types of RFID tags. The first type is the one that has its own power source and is known as active tags. The second type uses the RFID energy that is sent to them for identification. This type uses this energy to charge itself. An example of RFID can be found in security systems that authenticate users with a smart card without touching them. When a user needs to enter a door that is protected by a security lock, the user simply flashes the smart card in front of the security lock, and if authenticated, the user is given access.

Raspberry Pi and Arduino

Raspberry Pi and Arduino are small electronic-boards used to automate certain tasks or even configure home automation. Both these boards are prone to attacks, such as password attack, man-in-the-middle attack, ARP cache poisoning, Cross Site Scripting (XSS), and Sniffing. Vulnerabilities can be due to these boards or even the devices or the communication protocols of the devices. For example, if these boards are automated to use Near Field Communication (NFC) for unlocking a door, the attacker can break this system and have access to the door. You may also develop or use a Web interface to manage your devices through these boards. The Web interface can also be prone to attacks if not secured properly. Moreover, a device interacting with another device or server on the Internet might attract hackers and malware.

System Control and Data Acquisition (SCADA)/Industrial Control System (ICS): Supervisory Control and Data Acquisition (SCADA) systems are known as the industrial control systems (ICS). These systems acquire data from specified points in an industrial process and use it to control the industrial process and machinery. An example of SCADA systems application is the energy domain, where SCADA systems manage electricity distribution over a large geographical area.

SCADA systems present inherent vulnerabilities that have been exploited, and SCADA systems have been attacked multiple times across the world. Common vulnerabilities of SCADA systems include: • Unmonitored systems: SCADA systems are typically unmonitored. There is no active or continuous monitoring for suspicious activities. This makes it difficult to detect an attack when it takes place. • Passwords: SCADA systems have built-in authentication to enable configuration and modification. However, human negligence towards protection measures can lead to compromise of the systems. For example, system administrators might use simple passwords or share passwords, leading to system security issues. • Poor updates management: SCADA systems need to be updated with the latest firmware and software from time to time. However, missing updates or inherent vulnerabilities in the updates can prove to be an open-door for the attackers. • Inadequate input validation: SCADA systems may need some user inputs. SCADA systems should be built to validate these inputs thoroughly. Insufficient validation can allow attackers to execute arbitrary code. For example, an earlier version of the open-architecture WebAccess/SCADA system from Advantech did not validate the user input and was compromised.

Short Message Service (SMS)/Multimedia Message Service (MMS)/Rich Communication Services (RCS):

Since the initial invention of the mobile device, SMS has been a part of it. Even today, SMS is still available over a cellular network. It is a limited service that allows you to send a message of 160 words. You can only send texts in SMS. MMS and RCS are advanced versions of SMS. MMS allows you to send photos, audio files, and contact files. There is no character limit in MMS, but there is a message size limit, which is 300 KB. Unlike SMS, which is a feature found in all mobile devices, MMS must be supported by the mobile device. RCS is an advanced version of MMS. RCS supports photos, audio files, videos, location information, emojis. RCS is widely used by organizations to share information, such as product delivery alerts. It is wise for organizations to put a policy that stops the misuse of SMS/MMS/RCS.

Surveillance Systems:

Surveillance systems, such as CCTV cameras, are usually installed to safeguard physical access to premises and devices. While safeguarding the physical access, these systems might introduce software vulnerabilities of their own that can lead to network attacks. For example, an organization has IP-based cameras connected to the local network. Exploiting any vulnerability in the CCTV camera can provide the attacker a foothold into the network. In this case, the cameras work as a backdoor for the attacker. To ensure that surveillance systems do not become the soft spot for a network attacker, be cautious about: 1. Are there any vulnerabilities in the surveillance systems, which can be exploited? 2. If yes, what is the impact of such exploitation?

WiFi Direct/Ad Hoc:

The administrator controls infrastructure mode and all the traffic that passes through an access point. In the Wi-Fi Direct mode, devices can communicate directly with each other without an access point. For example, you need to configure a small wireless network in which devices can connect and authenticate using a PIN. You need to configure Wi-Fi Direct method in this scenario because the devices do not need an access point to communicate. In the ad hoc mode, devices connect in a mesh network as a group of peers. In this mode, the devices need an access point to communicate with each other.

Heating, Ventilation, Air Conditioning (HVAC)

The building automation systems are automation methods that manage the building's heating, ventilation and air conditioning (HVAC). These systems are designed to increase efficiency in managing HVAC, reduce cost, and reduce human dependency. Components of a building automation system include sensors, controllers, output devices, communication protocols, and terminal interface. Each component is controlled either by firmware or software. Building automation systems are prone to vulnerabilities similar to other automation or software systems. For example, most of the building automation system vulnerabilities are common with Web applications. This is because the building automation systems are commonly managed by a Web application or a mobile app. Common vulnerabilities afflicting building automation systems include: • Buffer overflow • Hardcoded secrets • Device misconfigurations • Cross-site scripting • Path traversal • Arbitrary file deletion • Authentication bypass

5. Which of the following method is used in sideloading? USB Wireless Bluetooth Mobile network

USB

USB:

USB has been around for several years. Just like any other technology, it has also gone through several upgrades. Most of the devices have a Type-A connector. Then, mobile devices had a mini-USB port. Later, the mini-USB port was upgraded to micro-USB. Of lately, several mobile devices use a Type-C connector. Other than the connectors, the USB transfer speeds also evolved with the versions. Here are some key versions: • USB 1.x - 12 Mbps • USB 2.0 - 480 Mbps • USB 3.0 - 5.0 Gbps • USB 3.1 - 10 Gbps • USB 3.2 - 20 Gbps

Point-to-Multipoint:

Unlike point-to-point, there is one sender and multiple receivers in point-to-multipoint. The bandwidth is shared between these devices that are connected to this type of connection. One of the devices acts as a sender, and the remaining devices act as receivers.

USB On The Go (OTG):

When a mobile device can connect and read data from a USB drive without a desktop or laptop, this method is called USB OTG. In this method, you directly connect the USB with the device, such as a mobile phone, with a microUSB or Type-C port. The USB devices, such as a USB drive, have a Type-A or full-size USB connector. Therefore, you need either a microUSB or Type-C USB converter. However, it depends on the mobile device that you have. Many USB drives have dual-face, which means a Type-A connector, and another side is typically a microUSB connector. These are specifically designed to work with mobile devices that have microUSB ports.

Tethering:

When you connect your mobile phone to your laptop or desktop via a USB cable and share the mobile Internet connection, this method is called tethering. The mobile device needs to have USB tethering capability. When you enable this feature and connect the mobile to the laptop via the USB cable, it connects to the Internet. In Windows 10, you get a Connected status, which is shown as Network.

Wi-Fi:

Wi-Fi or wireless networks allow mobile devices to connect and move around. When there is no cellular connectivity, these devices can connect with a wireless network and use Internet services. There are different types of wireless networks that use the 2.4 to 5 GHz spectrum. Each type of wireless network also offers a different speed. Note: Types of wireless networks are covered in detail in the Implementing Wireless Security Configurations module.


संबंधित स्टडी सेट्स

Unit Five - Heat of Vaporization & Heat of Fusion & Chemical Properties

View Set

Unit 2: The Rise of Industrialization, Urbanization, and Immigration

View Set

Chapter 17 and 21 APES Questions

View Set

Arkansas Life and Insurance Examination

View Set

World of the Beatles, Unit 3 multiple choice

View Set

Ch 49: Concepts of Care for Patients with Inflammatory Intestinal Disorders

View Set

Series 65 Unit 7 Checkpoint Exam

View Set