Security and Privacy in the IoT Flashcards

(37 cards)

1
Q

Privacy vs. Security

What is security? What is privacy? (or its goal)

A

Security - protect the data
Privacy - protect the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Issues with the IoT systems (4)

A

Hardware heterogeneity
Limited resources
Big data generation
Need for complex data protection and access measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hierarchical IoT System (and give the 3 layers)

A
  • Application layer - Applications/Services, Operation and Management
  • Transportation later - Access Network
  • Perception layer - WSN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

“The quality or state of being secure- to be free from danger”

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A successful organization should have multiple layers of security in place: (6)

A

Physical security
Personal security
Operations security
Communications security
Network security
Information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The protection of information and its critical elements, including systems and hardware that use, store, and transmit information.

Give its necessary tools (5)

A

Information security

Necessary tools:
- policy
- awareness
- training
- education
- technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CIA TRIAD

________ - To ensure protection against unauthorized access to or use of confidential information

________ - To ensure that information and vital services are accessible for use when required

________- To ensure the accuracy and completeness of information to protect business processes

A

Confidentiality-Integrity-Availability (CIA)

  1. Confidentiality
  2. Availability
  3. Integrity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which should weigh more security or usability?

A

usability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why learn IoT security from payment industry?

IoT systems face the same problems as ___________ faced before

  • Initial design was for private point to point network the moved to _______ and later on the ______
  • Started with basic security then found the security flaws and attached more complex security requirements later
  • Low security devices from early design are still out there and used in compatible _________
A

card payment systems
- IP network; internet
- fall-back mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

model of payment ecosystem and who are involved

A

Four-Party Model

  • consumer
  • merchant
  • issuing bank
  • acquiring bank
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Simplified Authorization Flow for Card Payment

  1. The customer make a payment. Enter cardholder data into the__________ (POS, e-commerce website).
  2. The merchant sends card data to an ________ who will route data to through the payments system for processing. For e-commerce, a _______ may redirect website to the acquirer.
  3. The __________ sends the data to Payment brand.
    __________ forwards the data to the issuer.
  4. The _______ verifies and make approval. For e-commerce, a payment gateway may redirect website to the issuer (ex. Verified by ______)
  5. If the issuer agrees to fund the purchase, it will generate __________ and routes back to the card brand.
  6. Payment brand forwards the authorization code back to acquirer/processor.
  7. The acquirer/processor sends the authorization code back to the merchant.
  8. The _______ concludes the sale with the customer.
A
  1. merchant payment system
  2. acquirer/payment processor, payment gateway
  3. acquirer/processor
  4. Payment brand; issuer; VISA
  5. authorization number
  6. merchant
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

________ standard size (normally ID-1) card that has embedded integrated circuit with microprocessor

A

ISO/IEC 7810

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What can a smart card provide? (4)

A

personal identification
authentication
data storage
application processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

There are different designs or types of smart cards such as: (3)

A
  • Contact smart card - ISO/IEC 7816
  • Contactless smart card - ISO/IEC 14443
  • Hybrid
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Inside a smart card (7)

A

CPU
Security logic
Serial I/O Interface
Test Logic
ROM
RAM
EEPROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • microprocessor
  • cryptographic co-processors
  • random number generator
17
Q

Detects abnormal condition (e.g. low voltage)

A

security logic

18
Q

contacts the outside world

A

serial I/O interface

19
Q

Self-test procedure

20
Q

Basic Security Feature

Hardware (5)
Software (5)

A

Hardware
- closed package
- memory encapsulation
- fuses
- security logic (sensors)
- cryptographic co-processors and random generator

Software
- decoupling applications and operating system
- application separation (Java card)
- restricted file access
- life cycle control
- various cryptographic algorithms and protocols

21
Q

The two primary types of smart card operating systems are: (2)

A

Fixed File Structure
Dynamic Application

22
Q

What Card OS?

  • files and permissions are set in advances by the issuer
  • seldom used for payment cards
A

Fixed File Structure

23
Q

What Card OS?

  • enables developers to build, test, and deploy different card application securely
  • updates and security are able to be downloaded and dynamically changed
  • ________ and _______ are the two main OS standards
A

Dynamic Application
- MULTOS and JavaCard

24
Q
  • A standard, flexible tool box
  • a known language and an easy tool for applet developers in cards
  • requires the addition of Global Platform (or similar) to manage the card and its applets
25
* a turn key system * comes as a complete package for cards issuers, with its certification authority, language, tools and personalization process * global platform is possible
MULTOS
26
also known as a point of sale terminal, credit card terminal, EFTPOS terminal, Electronics Data Capture (EDC)
Payment terminal
27
a device which interfaces with payment cards to make electronic fund transfers
Payment terminal
28
A technical standard for smart payment cards and for payment terminals and automated teller machines (ATM)
EMV
29
The initiative for EMV was taken by _________, __________ and ______ in the 1990s (now managed by EMVCe)
Europay, Mastercard and Visa
30
support both ISO/IEC 7816 for contact cards, and standards based on ISO/IEC 14443 for contactless cards (MasterCard Contactless, Paywave, Expresspay)
EMV
31
EMV current version
4.3
32
EMV consist of four books ________ - application and independent ICC to Terminal Interface Requirements _______ - security and key management _______ - application specification _______ - cardholder, attendant, and acquirer interface requirements
Book 1 Book 2 Book 3 Book 4
33
EMV - is a highly configurable tool-kit for payment protocols, offering a choice between (3): - many of these options are parameterized
* 3 Card Authentication Methods * 5 Cardholder Verification Methods * 2 Types of Transactions
34
3 Card Authentication Methods
SDA (Static Data Authentication) DDA (Dynamic Data Authentication) CDA (Combined Data Authentication)
35
5 Cardholder Verification Methods
* **None**: No verification method is used. * **Signature**: The traditional method of signing a receipt or a payment device to verify the transaction. * **Online PIN**: A Personal Identification Number that is checked online, i.e., with the bank's servers. * **Offline unencrypted PIN**: A PIN verification that occurs on the card machine itself without encryption. * **Offline encrypted PIN**: Similar to offline unencrypted PIN, but with the added security of encryption.
36
2 Types of Transactions:
* **On-line Transactions**: Transactions that require a connection to the bank’s server to authorize. * **Off-line Transactions**: Transactions that can be authorized by the card terminal itself without immediate connection to the bank's server.
37
EMV key algorithms (2)
* 3DES - major symmetric key algorithm with 128-bit key length * AES-128 - optional