7.7 Embedded Systems

Ace your homework & exams now with Quizwiz!

Industrial Control Systems (ICS)

A collective term used to describe different types of control systems and associated instrumentation, which include the devices, systems, networks, and controls used to operate and/or automate industrial processes.

Smart devices are attractive targets for cyber criminals because they typically have minimal security and are not protected with anti-malware software. This makes it easier to exploit these types of devices and perpetrate attacks. Many smart devices can be utilized to conduct a single coordinated attack. What is this type of attack usually called?

A highly distributed attack

Supervisory Control and Data Acquisition (SCADA)

An industrial computer system that monitors and controls a process.

Why do attackers prefer to conduct distributed network attacks in static environments? (select two)

Devices tend to employ much weaker security than traditional network devices. Devices are, typically, more difficult to monitor than traditional network devices.

You manage the information systems for a large co-location data center. Networked environmental controls are used to manage the temperature within the data center. These controls use embedded smart technology that allows them to be managed over an internet connection using a mobile device app. You are concerned about the security of these devices. What can you do to increase their security posture? (select two)

Install the latest firmware updates from the device manufacturer. Verify that your network's existing security infrastructure is working properly.

You manage the information systems for a large manufacturing firm. Supervisory control and data acquisition (SCADA) devices are used on the manufacturing floor to manager your organization's automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (select two)

Install the latest firmware updates from the device manufacturer. Verify that your network's existing security infrastructure is working properly.

You notice a growing number of devices, such as environmental control systems and wearable devices, are connecting to your network. These devices, known as smart devices, are sending and receiving data via wireless network connections. Which of the following labels applies to this growing ecosystem of smart devices?

Internet of things

Internet of Things (IoT)

The network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect, collect, and exchange data through the internet.


Related study sets

Econ 2020: chapter 12: growth theory

View Set

Chapter 2- Addressing Diversity of Older Adults

View Set

HRM Final Exam - Chapters 3, 7-11, 14 & 15

View Set

Senen Torres Mental Health Presentation Notes and Quiz Question Assignment

View Set

Maternal Deprivation - Effects of Institutionalisation (Romanian Orphanage Studies)

View Set

POLS 1100 Quiz 3: Civil Liberties

View Set

Ch. 6: Entrepreneurship and Starting a Small Business - Intro. to Business

View Set

Organization of the Marine Corps

View Set