This is an old revision of the document!


Questions on the chapter

  1. Name three aspects of information security
  2. What is the information security risk?
  3. What is the information security threat?
  4. What is the information vulnerability?
  5. List the vulnerabilities of web-interfaces in IoT 
  6. List the vulnerabilities of authentication in IoT 
  7. List the vulnerabilities in network services in IoT 
  8. List the methods of countering the vulnerabilities of web interfaces in IoT
  9. List methods of countering the vulnerabilities of authentication in IoT
  10. List methods of countering the vulnerabilities in network services in IoT
  11. Name three methods of malware detection 
  12. What is the signature-based detection technique?
  13. What is the behavior-based detection technique?
  14. What is the WirelessHART?
  15. What is the 6LoWPAN?
  16. What general ways of improving IoT privacy do you know?
  17. What is the inventory attack speaking of IoT threats?
  18. What is the linkage threat speaking of IoT?
  19. What is the profiling threat speaking of IoT?
  20. What difficulties arise during authentication in IoT?
en/iot-open/security_and_privacy_in_iot_ume/questions_on_the_chapter.1521008382.txt.gz · Last modified: (external edit)
CC Attribution-Share Alike 4.0 International
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0