SL4 Flashcards

1
Q

What are some security improvements and enhancements in the IoT infrastructure?

A

o Penetration testing
o End-to-end encryption
o Persistent authentication
o Scalability testing
o Secure decentralised computing
o Use of AI
o Securing cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is penetration testing?

A

Penetration testing: testing to find security vulnerabilities and calculate a risk factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain blockchain based security techniques for IoT.

A

Blockchain is a distributed ledger that provides data security using a distributed and shared ledger

Each entry is tightly coupled with the previous entry using cryptographic hash keys

Example: Ethereum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is used to store transactions in the block chain?

A

Merkle tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is difficult for adversaries to tamper with the blocks in a Merkle tree in blockchain?

A

Due to the presence of cryptographic hash keys in each block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of blockchain is more suited for IoT applications?

A

Permission based blockchain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two types of blockchain?

A

Permission-less:
o No permission is needed for a user to join blockchain
o Offers decentralization and transparency
o Ex: Bitcoin, cryptocurrencies

Permissioned:
o Have a defined set of rules for blockchain participation
o Offers better scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain ML based security techniques for IoT.

A

Can be used to design intrusion detection and prevention systems

Parameters such as CPU usage, memory utilization and power consumption can be used as features to train a prediction model

Can be used to classify the network traffic in IoT into different categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 4 types of security techniques for IoT?

A

Blockchain-based

ML-based

Fog computing based

Edge computing based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are 2 ways ML based security can prevent security attacks?

A

Detecting Dos/DDos Attacks: MLP based protocols and deep learning based techniques can be used to secure IoT networks

Detecting Eavesdropping attacks: reinforcement learning can provide protection

Privacy leakage: privacy-preserving scientific computations based techniques

Digital fingerprinting: various ML techniques can overcome digital fingerprinting techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can ML based security detect DoS/DDoS attacks?

A

MLP based protocols and deep learning based techniques can be used to secure IoT networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly