Information Technology /Cyber-Security: Embedded Operating Systems
Cyber-Security: Embedded Operating Systems
This deck covers key concepts and questions related to embedded operating systems in the context of cyber-security, including vulnerabilities, types of embedded OS, and security practices.
Most printers now have only TCP/IP enabled and don’t allow default administrator passwords, so they’re inherently more secure. True or False?
False
Tap or swipe ↕ to flip
Swipe ←→Navigate
SSpeak
FFocus
1/30
Key Terms
Term
Definition
Most printers now have only TCP/IP enabled and don’t allow default administrator passwords, so they’re inherently more secure. True or False?
False
What type of malicious code could be installed in a system’s flash memory to allow an attacker to access the system at a later date?
BIOS-Based Rootkit
Which one of the following, if compromised might allow attackers the ability to gain complete access to network resources?
Router
Originally, which of the following was used to perform routing and switching before specialized hardware was developed?
General Purpose Computers
*nix embedded OSs are most likely to be found on which of the following devices?
Servers
What open-source embedded OS is found in many space systems because it supports processors designed specifically to operate in space?
QNX
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
Most printers now have only TCP/IP enabled and don’t allow default administrator passwords, so they’re inherently more secure. True or False? | False |
What type of malicious code could be installed in a system’s flash memory to allow an attacker to access the system at a later date? | BIOS-Based Rootkit |
Which one of the following, if compromised might allow attackers the ability to gain complete access to network resources? | Router |
Originally, which of the following was used to perform routing and switching before specialized hardware was developed? | General Purpose Computers |
*nix embedded OSs are most likely to be found on which of the following devices? | Servers |
What open-source embedded OS is found in many space systems because it supports processors designed specifically to operate in space? | QNX |
An embedded OS must be developed specifically for use with embedded systems. True or False? | False |
The lack of familiar interface, such as CD/DVD-ROM drives, contributes to the difficulty of updating embedded OSs. True or False? | False |
SCADA systems controlling critical infrastructure are usually separated from the Internet by which of the following? | Air Gap |
Both general-purpose and embedded OSs use drives to interface with hardware devices. | True |
Wind River produces an open-source Linux OS for embedded systems and an OS microkernel extension called which of the following? | RTEMS |
VxWorks is widely used embedded real-time OS developed by Microsoft. | False |
Multifunction devices (MFDs) are rarely which of the following? | Scanned for vulnerabilities |
Which of the following is an advantage of Windows CE over other Windows embedded OSs? | Its source code is available to the public |
Windows 10 IoT provides the full Windows API and can perform many of the same tasks that the desktop version can. | False |
Which of the following can be a small program developed specifically for use with embedded systems, or a stripped-down version of an OS commonly used on general-purpose computers? | Embedded OS |
Cell phone vulnerabilities make it possible for attackers to do which of the following? | Clone your phone to make illegal long-distance phone callls. |
Embedded OSs on routers are susceptible to which following? | Password-guessing attacks |
Which of the following can be small program developed specifically for use with embedded systems, or a stripped-down version of an OS commonly used on general-purpose computers? | Embedded OS |
If the time and money required to compromise an embedded system exceeds the value of the system’s information, a security tester might recommend not fixing the vulnerability. True or False? | True |
A common vulnerability of routers and other network devices with built-in Web management interfaces is which of the following? | Authentication vulnerability |
Which of the following is a specialized type of embedded OS that is typically used in devices such as programmable thermostats, appliance controls, and even spacecraft? | RTOS |
Which of the following systems should be used when equipment monitoring and automation is critical? | SCADA |
SCADA systems are used for which of the following? | Monitoring equipment in large-scale industries |
One reason that some vendors of embedded OSs are using open-source software more is that the cost of developing and patching an OS is shared by the entire-source community. True or False? | True |
Some vendors of embedded OSs are using which of the following types of software, so the cost of developing and patching an OS is shared by the entire community? | Open-Source |
What type of embedded OS is certified to run multiple levels of classification; such as unclassified, secret, and top secret, on the same CPU without leakage between levels? | MILS |
Embedded OSs are usually designed to be small and efficient so they do not have some of the functions that general-purpose OSs have. | True |
Which of the following is a major challenge of securing embedded OSs? | Patching |
A device that performs more than one function, such as printing and faxing is called which of the following? | MFD |