Lesson 4 Flashcards
(16 cards)
Link-local
multilayer protocols
A protocol suite or collection that operates across multiple layers of
the OSI model, typically using encapsulation. A common example is TCP/IP.
DNP3
is a set of communications protocols used between components in process automation systems. Its main use is in utilities such as electric and water companies.
supervisory control and data acquisition (SCADA
An ICS unit that can operate as a
stand-alone device, be networked together with other SCADA systems, or be networked
with traditional IT systems. Most SCADA systems are designed with minimal human
interfaces. Often, they use mechanical buttons and knobs or simple LCD screen interfaces
(similar to what you might have on a business printer or a GPS navigation device)
SCADA attack types
Network perimeter vulnerabilities
Protocol vulnerabilities throughout the Stack
Database insecurities
Session hijacking and man-in-the-middle attacks
Operating system and server weaknesses
Device and vendor backdoors
Modbus
a serial communications protocol originally published by Modicon (now Schneider Electric) in 1979 for use with its programmable logic controllers (PLCs).
Fieldbus
e name of a family of industrial computer network protocols used for real-time distributed control, standardized as IEC 61158. A complex automated industrial system — such as manufacturing assembly line — usually needs a distributed control system—an organized hierarchy of controller systems—to function
converged protocols
The merging of specialty or proprietary protocols with standard
protocols, such as those from the TCP/IP suite.
Frequency hopping
The signal is rapidly switched between different frequencies within the hopping bandwidth pseudo-randomly, and the receiver knows before hand where to find the signal at any given time.
Time hopping
the signal is transmitted in short bursts pseudo-randomly, and the receiver knows beforehand when to expect the burst.
Direct sequence
The digital data is directly coded at a much higher frequency. The code is generated pseudo-randomly, the receiver knows how to generate the same code, and correlates the received signal with that code to extract the data.
Lifi
light-based WiFi which uses light instead of radio waves to transmit information.
Zigbee
An IoT equipment communication’s concept that is based on Bluetooth. Zigbee has
low power consumption, has a low throughput rate, and requires close proximity of devices.
bluesnarfing
An attack that allows hackers to connect with your Bluetooth devices
without your knowledge and extract information from them. This form of attack can offer
attackers access to your contact lists, your data, and even your conversations.
bluesniffing
Eavesdropping or packet-capturing
Bluetooth communications.
bluejacking
The process of sending messages to Bluetooth-capable
devices without the permission
of the owner/user.