Chapter 13 - 01 - Understand IoT Devices, Application Areas, and Communication Models - 01_ocred.pdf

Full Transcript

Certified Cybersecurity Technician loT and OT Security Exam 212-82 Module Flow ‘Ry Understand IoT Devices, Application Areas, and Communication Models Understand Models IoT Discuss the Security in IoT-enabled Environments Devices, - Understand OT Concepts, Devices, and Protocols Application Areas, a...

Certified Cybersecurity Technician loT and OT Security Exam 212-82 Module Flow ‘Ry Understand IoT Devices, Application Areas, and Communication Models Understand Models IoT Discuss the Security in IoT-enabled Environments Devices, - Understand OT Concepts, Devices, and Protocols Application Areas, and Discuss the Security in OT-enabled Environments Communication The objective of this section is to understand loT devices and areas where 10T devices can be used in an enterprise. Module 13 Page 1553 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician 10T and OT Security Exam 212-82 What is IoT? Q Internet of Things (loT), also known as Internet of Everything (loE), refers to the network of devices having IP addresses and the capability to sense, collect, and send data using embedded sensors, communication hardware and processors O In loT, the term thing is used to refer to a device that is implanted on natural, human-made, or machine-made objects and has the functionality of communicating over the network Industrial Devices -~ Manufacturing ( ‘> Transportation @( ------ Tools “ C:::jz“:p @( ,........w o Devices Q) Healthcare Devices F’ w":::‘ / """" P. T, Y. {@ Drugs K\ Wearable Devices Wearable EB ™vs S N ’... —~ (‘) (!> \ o - — @ @ - fi."‘ ('5.~ Energy )@) ‘._. ' @ P Monitoring Thermostat Home Devices Copyright © by PYTig What Y EC i, All Rights Reser B Rep! Strictly y Prohibited is IoT? The Internet of Things (IoT), also known as the Internet of Everything (loE), refers to computing devices that are web-enabled and have the capability of sensing, collecting, and sending data using sensors, and the communication hardware and processors that are embedded within the device. In the 10T, a “thing” refers to a device that is implanted in a natural, human-made, or machine-made object and has the functionality of communicating over a network. The loT utilizes existing emerging technology for sensing, networking, and robotics, therefore allowing the user to achieve deeper analysis, automation, and integration within a system. With the increase in the networking capabilities of machines and everyday appliances used in different sectors like offices, homes, industry, transportation, buildings, and wearable devices, they open up a world of opportunities for the betterment of business and customer satisfaction. Some of the key features of the IoT are connectivity, sensors, artificial intelligence, small devices, and active engagement. Module 13 Page 1554 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Exam 212-82 Certified Cybersecurity Technician loT and OT Security Industrial Devices Wearable Devices Smart Watch Manufacturing Transportation (-.... fl Wearable g s ) \ IoT Health Checkup Devices @ Healthcare Devices fi. b Drugs )@ Monitoring Thermostat @ Energy Home Devices Figure 13.1: lllustration of IoT devices Module 13 Page 1555 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician loT and OT Security Exam 212-82 Why Organizations are Opting for IoT-enabled Environments 10T devices work on a , offering connectivity for anyone at anytime, for anything, and from any place ' v' Outdoors and indoors v’ Daytime v' Night ¥ ¥ On the move Indoor (away from the PC) v" Outdoor ¥ At the PC v Between PCs ¥" Human to human (H2H), without using a PC Connect any place v" Human to things (H2T), using generic equipment ¥" Things to things (T2T) Why Organizations are Opting for IoT-enabled Environments Organizations are opting for loT-enabled environments because loT devices work on a three- dimensional plane and provide connectivity for anyone at any time, for anything, and from any place. 10T devices facilitate connection to various objects; examples include Human-to-Thing (H2T) interactions using generic equipment, Thing-to-Thing (T2T) interactions between PCs, and Human-to-Human (H2H) interactions without using a PC. The user can connect to loT devices at any place regardless of whether they are on the move, indoor (away from PC), outdoor, or at the PC. The working mechanism of IoT devices on the three-dimensional plane allows the user to continuously monitor their business, resolve concerns instantly, increase the efficiency of the business, enhance the growth of the organization, increase security, etc. Some key features of loT are connectivity, sensors, artificial intelligence, small devices, and active engagement. loT technology includes four primary systems: |oT devices, gateway systems, data storage systems based on the cloud, and remote control using mobile apps. These systems together enable communication between two endpoints. Discussed below are some of the important components of 10T technology that play an essential role in the working of an loT device. = Sensing technology: Sensors embedded in devices acquire a wide variety of information from the surroundings such as the temperature, gases, location, working of industrial machines, and health data of a patient. = |oT gateways: Gateways communicate with each are used to bridge the gap between an loT device (internal network) and the end user (external network), thereby allowing them to connect and other. The data collected by the sensors in 10T devices are collected and sent to the concerned user or cloud through the gateway. Module 13 Page 1556 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 1oT and OT Security = Cloud server/data storage: The collected data, after traveling through the gateway, arrives at the cloud, where it is stored and subjected to data analysis. The processed data is then transmitted to the user, who takes actions based on the information received. = Remote control using mobile apps: The end user utilizes remote control devices such as mobile phones, tablets, and laptops installed with a mobile app to monitor, control, retrieve data from, and take actions on loT devices from a remote location. Example: 1. A smart security system is integrated with a gateway, which in turn helps connect the 2. The data storage in the cloud includes the information of every device connected to the device to the Internet and cloud infrastructure. network. The information includes the device IDs, the present status of the devices, who accessed the devices, and how many times they accessed the devices. It also includes information such as for how long the device was accessed the last time. 3. The connection with the cloud server is established through web services. 4. The user on the other side, who has the required app to access a device remotely on their mobile phone, interacts with the app and, in turn, with the device. Before accessing the device, they are asked to authenticate themselves. If the submitted credentials match those saved in the cloud, the user obtains access. Otherwise, access is denied, ensuring security. The cloud server identifies the device’s ID and sends a request associated with that device using gateways. 5. If the security system recording footage senses any unusual activity, then it sends an alert to the cloud through the gateway, which matches the device’s ID and the user associated with it. Finally, the end user receives an alert. Module 13 Page 1557 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited.

Use Quizgecko on...
Browser
Browser