SL3 Flashcards

1
Q

What security issues is the application layer vulnerable to?

A

data theft and privacy issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which IoT layer is more prone to data thefts?

A

Application layer (service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the security attacks possible in the application layer? (5 attacks)

A

Data theft attacks: iot applications deal with large amounts of critical and private data

Access control attacks: once the access is compromised, the IoT application is vulnerable

Service interruption attacks: deprive legitimate users from using the services by artificially making the servers or network too busy to respond

Malicious code injection attacks: can infect the IoT applications with malicious self propagating attacks and then obtain or tamper with confidential data

Sniffing attacks: monitor the network traffic in IoT applications mainly targeting unencrypted communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the solutions to the application layer security attacks?

A

Data theft attacks: data encryption, data isolation, robust user and network authentication, and privacy management

Access control attacks: secure authorization access and multi-layered identification and authentication control
Malicious code injection attacks: reliable firewall, malicious code detection and other defensive mechanisms

Sniffing attacks: lightweight but effective encryption algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

________ are interconnected devices that could be infected with malicious software acting as bots

A

Botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 4 components of Mirai?

A

Bot: device that is infected and is used to infect

Command and control server: used to manage DDoS attacks

Loader: used in dissemination of bots targeting different hardware platforms

Report server: used to keep track of infected devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 7 steps of Mirai botnet operation and communication?

A
  • Brute-force attack
  • Forwards device characteristics to the report server
  • Checks status of target victims and infected
  • Infect command with vulnerable devices
  • Malicious binary is downloaded and executed
  • Attack is launched against a target server
  • Bot instances will start attacking the target server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some of Mirai’s signatures?

A
  • Exchanging keep-alive messages
  • Generating attack traffic
  • Downloading a specific type of binary code
  • Sending reports that generate distinctive patterns
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What other IoT botnets emerged after Mirai?

A

Lua Botnet: targeted Linux-based cable modems using ARM CPUs and an encrypted C&C communication channel

Hajime: Similar to Mirai but relies on fully distributed communications

Bashlite: targets Linux based systems and launches DDoS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly