Lesson 4 Flashcards

1
Q

Link-local

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

multilayer protocols

A

A protocol suite or collection that operates across multiple layers of
the OSI model, typically using encapsulation. A common example is TCP/IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DNP3

A

is a set of communications protocols used between components in process automation systems. Its main use is in utilities such as electric and water companies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

supervisory control and data acquisition (SCADA

A

An ICS unit that can operate as a
stand-alone device, be networked together with other SCADA systems, or be networked
with traditional IT systems. Most SCADA systems are designed with minimal human
interfaces. Often, they use mechanical buttons and knobs or simple LCD screen interfaces
(similar to what you might have on a business printer or a GPS navigation device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SCADA attack types

A

Network perimeter vulnerabilities
Protocol vulnerabilities throughout the Stack
Database insecurities
Session hijacking and man-in-the-middle attacks
Operating system and server weaknesses
Device and vendor backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Modbus

A

a serial communications protocol originally published by Modicon (now Schneider Electric) in 1979 for use with its programmable logic controllers (PLCs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fieldbus

A

e name of a family of industrial computer network protocols used for real-time distributed control, standardized as IEC 61158. A complex automated industrial system — such as manufacturing assembly line — usually needs a distributed control system—an organized hierarchy of controller systems—to function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

converged protocols

A

The merging of specialty or proprietary protocols with standard
protocols, such as those from the TCP/IP suite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Frequency hopping

A

The signal is rapidly switched between different frequencies within the hopping bandwidth pseudo-randomly, and the receiver knows before hand where to find the signal at any given time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Time hopping

A

the signal is transmitted in short bursts pseudo-randomly, and the receiver knows beforehand when to expect the burst.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Direct sequence

A

The digital data is directly coded at a much higher frequency. The code is generated pseudo-randomly, the receiver knows how to generate the same code, and correlates the received signal with that code to extract the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Lifi

A

light-based WiFi which uses light instead of radio waves to transmit information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Zigbee

A

An IoT equipment communication’s concept that is based on Bluetooth. Zigbee has
low power consumption, has a low throughput rate, and requires close proximity of devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

bluesnarfing

A

An attack that allows hackers to connect with your Bluetooth devices
without your knowledge and extract information from them. This form of attack can offer
attackers access to your contact lists, your data, and even your conversations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

bluesniffing

A

Eavesdropping or packet-capturing
Bluetooth communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

bluejacking

A

The process of sending messages to Bluetooth-capable
devices without the permission
of the owner/user.