Professional Documents
Culture Documents
Select one:
A.
control
B.
monitor
C.
manipulate
D.
Connect
ANs –D
connect
Q2
Select one:
A.
Confidentiality, Integrity, Availability, Security, Authority, Privacy
B.
Confidentiality, Integrity, Availability, Security, Authenticity, Authority
C.
Confidentiality, Integrity, Availability, Security, Authenticity, Privacy
D.
Confidentiality, Integrity, Availability, Nonrepudiation, Authenticity, Privacy
Ans -B
Q3
Security in a RFID system must focus on these aspects: control access to the information,
__________, confidence and trust.
Select one:
A.
control access to the system
B.
encryption
C.
using symmetry keys
D.
network security
Ans –A
Q4
Select one:
A.
no password
B.
insecure firmware
C.
no network security
D.
insecure bootstrapping
Ans –c
Q5
Attack trees are conceptual diagrams showing how an asset, or target, might be
attacked. The main components are in the tree are ______________________.
Select one:
A.
activities
B.
targets
C.
threads
D.
attacks
Ans -D
Q6
Select one:
A.
Short
B.
Thin
C.
Long
D.
Flat
Ans –c
Q7
Select one:
A.
A bingo number
B.
Scramble information
C.
Using one key to encode and decode information to preserve the confidentiality
D.
To protect the confidentiality of the information from eavesdroppers
Ans –c
Q8
Select one:
A.
Newly generated keys
B.
Securely remove cryptography keys from memory
C.
Securely remove encryption keys from the computer hard disks
D.
Making copies of keys and storing them in other secure locations
Ans –c
Q9
Select one:
A.
Transport Layer Security, AES algorithm with 256-bit length keys, Using Great Computing
Mode, SHA384 to be used as the hashing algorithm
B.
Transport Layer Security, AES algorithm with 256-bit length keys, Using Galois Counter
Mode, SHA384 to be used as the hashing algorithm
C.
Transport Layer Security, AES algorithm with 256-bit length keys, Using Great Computing
Mode, SHA384 to be used as the encryption algorithm
D.
Transport Layer Security, AES algorithm with 256-bit length keys, Using Galois Counter
Mode, SHA384 to be used as the encryption algorithm
Ans –A
Q10
Select one:
A.
Decryptions
B.
Hacking
C.
Impersonation
D.
Attacking
Ans -c
Q11
Discuss the Layered Application architecture of IoT networks, list and discuss any four (4)
of the IoT security challenges with examples. You can upload your diagram.
They might be secure at buy yet become weak when programmers observe new security
issues or bugs.
In the event that they are not fixed with ordinary updates, the IoT gadgets become
uncovered after some time.
Q12
Considering the system shown in Figure-1 shown, discuss the privacy challenges in this
IoT system and what mechanisms/approaches should be deployed for securing
credentials.
Figure-1: Connected Vehicles and Infrastructure
IoMT (Internet of Medical Things), and unmanaged associated gadgets in medical services, retail,
and assembling as well as life sciences.It uncovers a shocking number of weaknesses and dangers
across an amazingly different arrangement of associated objects.
Organizations are confronting an indispensable IoT abilities hole that is keeping them from taking
advantage of new open doors without limit, As it's beyond the realm of possibilities 100% of the
time to enlist new gifts, the choice is to depend in existing groups.
In general network safety procedure should intend to safeguard three center points of support that
support associated gadgets and administrations:
Secrecy,
Uprightness,
Accessibility.
Guaranteeing that the objectives of the three security support points are met is an issue of
appropriate security by plan.
By executing the proposed security choices like gadget and confirmation the executives
arrangements, in view of encryption strategies, with the master information activated as soon as
possible potential, organizations can forestall unapproved admittance to information, gadgets, and
programming.
Q13
Discuss the process of SSL/TLS in details with an example (hint: using the message flow
diagram). You can upload your message flow diagram.
SSL/TLS utilizes both deviated and symmetric encryption to safeguard the privacy and
uprightness of information on the way. Uneven encryption is utilized to lay out a solid
meeting between a client and a server, and symmetric encryption is utilized to trade
information inside the got meeting.
A site should have a SSL/TLS authentication for their web server/area name to utilize
SSL/TLS encryption. When introduced, the testament empowers the client and server to
safely arrange the degree of encryption in the accompanying advances:
Identity and Access Management is one the key security implementations in IoT. Discuss
the main functionality of IAM and its lifecycle in details. You can upload your diagram.
(IAM) guarantees that the ideal individuals and occupation jobs in your association
(characters) can get to the apparatuses they need to go about their responsibilities.
Personality the executives and access frameworks empower your association to oversee
worker applications without signing into each application as a head. Character and
access the executives frameworks empower your association to deal with a scope of
personalities including individuals, programming, and equipment like advanced
mechanics and IoT gadgets.
Security. Conventional security frequently has one weak spot - the secret phrase.
Assuming a client's secret phrase is penetrated - or more awful yet, the email address for
their secret word recuperations - your association becomes helpless against assault. IAM
administrations thin the weak spots and screens them with instruments to get botches
when they're made.
Usefulness. When you sign on to your fundamental IAM entrance, your worker no longer
needs to stress over having the right secret phrase or right access level to play out their
obligations. Not exclusively does each representative gain admittance to the ideal set-up
of instruments for their work, their entrance can be overseen collectively or job rather
than independently, decreasing the responsibility on your IT experts.
IAM affirms that the client, programming, or equipment is who they say they are by
confirming their qualifications against an information base. IAM cloud character
instruments are safer and adaptable than customary username and secret phrase
arrangements.
Character access the executives frameworks award just the fitting degree of access.
Rather than a username and secret word permitting admittance to a whole
programming suite, IAM takes into consideration slender cuts of admittance to be
divided, for example supervisor, watcher, and analyst in a substance the board
framework.
Q15
Answer
Customary methodology
A ton of homesteads have been in similar state for quite a long time. A few ranchers
have not rolled out any huge improvements since they didn't see the point in doing that.
Others needed more assets. Subsequently, the condition of many ranches is not exactly
good according to a specialized point of view. Be that as it may, for the individuals who
need to stay in business, neither of these contentions will work.
Land constraints
There is an enormous issue with land access in the U.S. Farmland expansion rates went
up by just about 150% from 2004 to 2018. Simultaneously, understudy obligation
continued to develop, so potential ranchers either couldn't bear to get into the business
or the people who were at that point in it couldn't get an advance and gain significant
headway. Some industry insiders guarantee that land constraints and challenges with
acquiring land are the principle justification for why youngsters battle with entering the
cultivating business. In addition, when one doesn't claim the land, the possibilities of the
rancher being prepared to contribute and work on the condition of the homestead are a
lot of lower.
Exorbitant costs
As indicated by this report, north of 40% surprisingly on the planet work in the agrifood
area. This remembers 66% of all populace for helpless nations. Furthermore the issue is
that their experience regularly has a great deal of restrictions of its own.
In examination, the circumstance in the U.S. is very unique. Around 30% of American
ranchers set off for college, and about portion of them really graduated with a degree.
Nonetheless, as a result of the costs on training and costs that a homestead would
require, many need to settle on a decision between seeking after schooling or going into
cultivating. All things being equal, a few ranchers likewise figure out how to go to post-
graduate projects
In the case of something works today, it doesn't imply that it will be as productive
tomorrow. This connects with the cultivating approaches as well
2. What were the different technological solutions deployed and what did it allow
them to do?
Distributed computing is one application that ranchers can use to more readily oversee
crops and their business through its application called programming as-a-administration
(Saas). In this area, fire up firms are creating business applications that are explicitly
useful to the rural area. A portion of these applications are with the end goal that
ranchers can make spending plans and functional timetables according to creation plans.
The cultivating explicit programming is accessible, through which labor force the board
can turn out to be more effective.
Portable Technology
Portable innovation is changing the manner in which observing and assessment is being
done. How has customarily been managed pencil and paper should now be possible
through cell phones and tablets. There are applications that are explicitly intended for
field groups to gather information.
It's likewise the most savvy method for giving information access in the field.
The innovation utilized for agrarian following and security is called Radio Frequency
Identification RFID. For instance, domesticated animals can be followed utilizing 'animals
following labels' furnished with RFID. This can be useful in following dairy cattle
consistently, and can likewise be utilized for wellbeing checking, and keeping an
information base of the wellbeing history of every creature. Also, during crop shipments,
particularly affirmed natural harvests, utilizing this innovation helps in eliminating
forging/sullied food shipments through its security labeling.
Information investigation is one instrument that is being used for accuracy farming. This
is called 'savvy cultivating', which is currently being applied by numerous agri-
organizations to reduce expenses and increment yields. This is the manner by which it
works: Farm workplaces gather a lot of data about crop yields, compost applications, soil
planning, weather conditions, and animal wellbeing.
Deeply
3. What were the benefits and outcomes of the new ways of farming?
Answer
Q16
Smart power frameworks reach out past savvy networks and meters to coordinate numerous
energy sources and types, creation and conveyance foundation, and working cycles and working
cases. Keeping these frameworks moving along as expected and ceaselessly requires secure
associations with convey the advantages they are intended for - further developed strength, more
noteworthy proficiency, lower cost and natural maintainability.
Energy the executives utilizing IoT is expanding, and with it, the obligation to involving IoT for energy
proficiency to help ecological manageability. As worldwide energy request develops, so do the issues
related with expanded utilization, maturing framework development, rising end expenses and
purchaser assumptions about energy accessibility.
With IoT-empowered shrewd power arrangements and assets, you can associate practical energy
resources and coordinate them with your current IT foundation to further develop energy
productivity and energy conveyance. IoT power the executives empowers various maintainability
rehearses, for example, simple admittance to constant machine data and purchaser data. These
practices assist you with using sound judgment about influence dissemination while assisting your
clients with setting aside energy and set aside money.
2. Discuss the security goals for your design. [5
marks]