Lecture1 - IoT Security Challenges and Attacks
15 Questions
4 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary role of a controller in an IoT system?

  • To store data long-term for backup purposes
  • To detect environmental changes like temperature
  • To collect data from sensors and enable connectivity (correct)
  • To transform input data into physical action
  • Which of the following best describes a fundamental challenge in IoT security?

  • The inherent lack of critical device protections such as strong passwords (correct)
  • The complexity of updating operating systems on IoT devices
  • The use of advanced encryption standards across all devices
  • The implementation of strong passwords on all devices
  • What action does an actuator perform in an IoT system?

  • It connects devices to the internet
  • It receives data and converts it into physical movement (correct)
  • It collects temperature data from sensors
  • It manages network connections among devices
  • What consequence arises from IoT devices lacking segmented networks?

    <p>Greater risk of widespread attacks across the network</p> Signup and view all the answers

    Why are IoT devices increasingly targeted by threat actors?

    <p>Because they are frequently interconnected and lack basic protections</p> Signup and view all the answers

    What is the first step in the anatomy of an IoT attack?

    <p>Gain access</p> Signup and view all the answers

    Which device type is primarily targeted by the Mirai botnet?

    <p>CCTV cameras</p> Signup and view all the answers

    What is a major issue with IoT devices that makes them susceptible to attacks like those from the Mirai botnet?

    <p>Default login information</p> Signup and view all the answers

    How are the Information Technology (IT) and Operational Technology (OT) domains characterized in organizations?

    <p>IT focuses on cloud devices while OT pertains to industrial control systems</p> Signup and view all the answers

    What does the action 'sudo kill -9 20160' typically indicate in the context of IoT security?

    <p>It forcibly terminates a running process</p> Signup and view all the answers

    What major growth in IoT devices is projected for 2030?

    <p>50 billion IoT devices are projected to be connected to the internet by 2030.</p> Signup and view all the answers

    What is one benefit for businesses using IoT devices?

    <p>Businesses can streamline production and target marketing to specific audiences.</p> Signup and view all the answers

    Identify one type of IoT device found in smart homes.

    <p>Smart doorbells are a common type of IoT device used in smart homes.</p> Signup and view all the answers

    What role do sensors and actuators play in IoT systems?

    <p>Sensors collect data while actuators perform actions based on that data.</p> Signup and view all the answers

    Why is IoT security a significant challenge?

    <p>The challenge arises from the presence of unsecured connected devices.</p> Signup and view all the answers

    Study Notes

    IoT Security Challenges

    • IoT devices are increasingly being compromised due to lack of device security practices, including strong passwords, up-to-date operating systems, and segmented networks.
    • IoT devices are targets for a wide range of attacks.

    Anatomy of an IoT Attack

    • The steps of an IoT attack include:
      • Scanning for vulnerabilities
      • Gathering information
      • Gaining access
      • Delivering the attack
      • Maintaining access
      • Deleting evidence

    Research IoT Attack

    • 2014: Germany
    • 2008: Poland
    • 2018: Global
    • 2015: Ukraine
    • 2017: Global
    • 2000: Australia
    • 2016: U.S.
    • 2010: Iran

    DDoS attack with Botnet – Mirai Botnet

    • Mirai targets IoT devices using default login information.
    • CCTV cameras are a primary target for Mirai.
    • Mirai employs a brute force dictionary attack with a list of common usernames and passwords including:
      • root/default
      • root/1111
      • root/54321

    IT and OT in the Manufacturing Sector

    • There are two distinct networking domains in organizations:
      • Information Technology (IT)
        • Includes devices in the data center, cloud, BYOD, and thousands of sensors and actuators in the field.
      • Operational Technology (OT)
        • Primarily focuses on industrial automation and control systems.

    The Growth of IoT Devices

    • The connection of millions of smart devices and sensors to the internet is known as the Internet of Things (IoT).
    • These devices collect and share data for use and evaluation by businesses, cities, governments, hospitals, and individuals.
    • The growth of IoT is driven by cheap processors and wireless networks.
    • IoT devices are becoming more prevalent, with an estimated 38.6 billion devices connected to the internet by 2025 and 50 billion by 2030.
    • 1/3 of these devices will be computers, smartphones, tablets, and smart TVs.
    • 2/3 will be sensors, actuators, and newly invented intelligent devices.

    Benefits of Connecting Devices

    • The IoT offers numerous benefits to various organizations:
      • Businesses:
        • Access to more information for streamlined production, targeted marketing and advertising, and reduced losses.
      • Retailers:
        • Enhanced target marketing and product management.
      • Governments:
        • Monitoring environmental issues, targeted funding for social issues, and informed control of power output.
      • Cities:
        • Control traffic patterns, monitor and control garbage and recycling, and promote sustainability efforts.

    How IoT Devices are Connected to the Network

    • Sensors:
      • Connected to networks via wired Ethernet connections or wireless connections (Bluetooth LE, Zigbee, or LoRa) to a controller.
    • Controllers:
      • Collect data from sensors and provide network or internet connectivity.
    • Actuators:
      • Take electrical input and transform it into physical action (e.g., turning on an air conditioner).

    Sample IoT Topology

    • Scenario:
      • A sensor detects excess heat in a room.
      • The sensor sends the temperature reading to the controller.
      • The controller sends the data to an actuator.
      • The actuator turns on the air conditioner to cool the room.

    The Promise of IoT

    • The widespread adoption of IoT devices is expanding the opportunities for threat actors to compromise networks.
    • The lack of security practices in IoT devices, such as strong passwords, up-to-date operating systems, and segmented networks, makes them vulnerable to attacks.

    What is the Internet of Things (IoT)?

    • Billions of smart devices and sensors are connected to the internet.
    • Devices collect and share data for businesses, governments, hospitals, and individuals, to use and evaluate.
    • By 2025, 38.6 billion IoT devices will be connected to the internet.
    • By 2030, 50 billion IoT devices will be connected to the internet.
    • 190 million new connected devices are added to the internet every month.
    • 1/3 of the new devices are computers, smartphones, tablets, and smart TVs.
    • 2/3 of the new devices are sensors, actuators, and intelligent devices like smart doorbells, traffic lights, and pacemakers.

    Benefits of Connecting Devices to the Internet

    • Businesses: More information to streamline production, target marketing, and advertising.
    • Retailers: More targeted marketing, reduced losses, and manage in-store product types.
    • Manufacturing: Improves efficiency and productivity of manufacturing processes and operations.
    • Governments: Monitor environmental issues, target funding for social issues, and control power output.
    • Cities: Control traffic patterns, monitor garbage and recycling.
    • Individuals: Improved fitness and health benefits, better home and family security, and lower costs.

    IoT Security Challenges

    • Unsecured Connected Things: IoT Devices are vulnerable to attacks, such as malware, due to lack of strong passwords, up-to-date operating systems, and segmented networks.
    • Anatomy of an IoT Attack: The six steps in an IoT attack are: Scan for vulnerability, gather information, gain access, deliver attack, maintain access, and delete evidence.
    • Mirai Botnet: Mirai is a malware that targets IoT devices with default login information. CCTV cameras are often targets. Mirai uses brute force dictionary attack to run through a list of default username/passwords such as "root/default", "root/1111", and "root/54321", to compromise devices.

    IoT Security Model

    • IT (Information Technology) includes devices in the data center, in the cloud, bring your own device (BYOD), and sensors and actuators in the field.
    • OT (Operational Technology) includes industrial control systems, supervisory control and data acquisition systems, and devices that connect to these systems.
    • CT (Consumer Technology) includes connected devices in the home, wearable technology, smart cars, and more.

    Smart Home Use Case

    • Connected devices in the home like lights, thermostats, security systems, and appliances.
    • These devices can be remotely monitored and controlled using Bluetooth connections to a phone and cellular data/Wi-Fi connections to the internet and cloud.

    Healthcare Use Case

    • As many as 20 medical devices can be found in a single hospital room.
    • IoT provides functionalities to connected medical devices for monitoring, therapeutic device control, and data analysis.
    • Security vulnerabilities exist in devices such as drug infusion pumps, insulin pumps, Bluetooth-enabled defibrillators, refrigeration units, and pacemakers.
    • In 2017, the FDA approved a software update to patch a security flaw in radio frequency-enabled implantable cardiac pacemakers, affecting an estimated 465,000 devices.
    • Risks include manipulation, interruption, or disabling of medical devices, potentially resulting in patient injury or death.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    IoT Security Lecture 1 PDF

    Description

    Explore the challenges and methodologies involved in IoT security, including the anatomy of an IoT attack and notable cases like the Mirai botnet. This quiz covers the spectrum of threats facing IoT devices and how they are exploited through various attack vectors. Test your knowledge of IoT security practices and historical attacks on devices!

    More Like This

    IoT Security Quiz
    5 questions

    IoT Security Quiz

    ReputableSerpentine avatar
    ReputableSerpentine
    IoT Security and Hacking Quiz
    10 questions
    Use Quizgecko on...
    Browser
    Browser