This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Bingo: IoT Security

| See more in IT Security

IoT Security

tionatomlinson
By
Created Date 02.12.24
Last Updated 02.13.24
Viewed 5 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit

Would you like to build your own game?

It's easy!

Go to the GameBuilder and get started!

Topics of this game:
  • technology that uses processors with different processing capabilities and power requirements
  • types of communication ports
  • a lightweight Linux version used primarily in mobile devices
  • the ability to execute malicious commands on a system remotely
  • Infected software is copied to IoT systems and added to a botnet using malicious software
  • this has very tight limits on power, memory and processing cycles
  • A protocol to be used for testing and debugging
  • This can communicate with a monitoring system and/or an operator by using an embedded microprocessor
  • A product that contains a computing system designed for a specific purpose
  • For developing applications on a system other than the PC.
  • Provides a set of programs that can be executed from the command line.
  • The programmer did not account for the size of the input that a user might enter.
  • Old attacks are used that target exploits that have yet to be addressed with a patch.
  • Easily found and used to access a device.
  • When an attacker goes through a process that grants him complete control of a device.
  • This is run to execute malicious commands on a system.
  • users should be granted the minimum amount of access required to perform their work function.
  • based on the sender and receiver of a message knowing and using the same secret key.
  • Which two scripting languages are designed to be executed directly under an operating system?
  • Which two CPU types are based on the Reduced Instruction Set Computing architecture?
  • Type of access control model uses access control lists to allow users to control access to their own data.
  • Which two pieces of information are needed to search for an IoT device in the FCC ID database?
  • Involves using more than one kind of processor with different capabilities.
  • mode in case the system encounters a problem when starting up.
  • is easy to modify because it is generally stored in a text format.