0% found this document useful (0 votes)
35 views14 pages

Cie 3 Iot PDF

A Raspberry Pi is a compact, affordable single-board computer designed for educational purposes and various DIY projects, utilizing ARM-based processors and supporting multiple operating systems, primarily Raspberry Pi OS. Common challenges in OT security include legacy systems, insecure operational protocols, and device insecurities, which can expose critical infrastructure to cyber threats. The document also outlines a four-layered IoT architecture for smart cities, security measures in process control hierarchies, and details on the DS18B20 temperature sensor and formal risk analysis frameworks.

Uploaded by

surajshukla1177
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views14 pages

Cie 3 Iot PDF

A Raspberry Pi is a compact, affordable single-board computer designed for educational purposes and various DIY projects, utilizing ARM-based processors and supporting multiple operating systems, primarily Raspberry Pi OS. Common challenges in OT security include legacy systems, insecure operational protocols, and device insecurities, which can expose critical infrastructure to cyber threats. The document also outlines a four-layered IoT architecture for smart cities, security measures in process control hierarchies, and details on the DS18B20 temperature sensor and formal risk analysis frameworks.

Uploaded by

surajshukla1177
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

1. Discuss in detail What is a raspberry pi? What OS does Raspberry Pi use?

Ans 1. A Raspberry Pi is a small, affordable, single-board computer developed by the Raspberry Pi


Foundation, a UK-based charity organization. It was created to promote the teaching of basic computer
science and programming in schools and developing countries, but it has since gained widespread
popularity for various hobbyist and DIY projects, as well as in commercial applications.
Here's a detailed breakdown:
Hardware:
Single-board Design: The Raspberry Pi is built on a single printed circuit board. It integrates the CPU,
GPU, RAM, and other essential components onto this board.
Processor: Raspberry Pi models typically use ARM-based processors. These processors are energy-
efficient and well-suited for embedded systems like the Raspberry Pi.
I/O Ports: Raspberry Pi boards come with a variety of ports for connecting peripherals such as USB,
HDMI, Ethernet, audio, camera, and GPIO (General Purpose Input/Output) pins for interfacing with
electronic components and sensors.
Power: They are powered via a micro USB or USB-C port, depending on the model.
Form Factor: Raspberry Pi boards are small, about the size of a credit card, making them easily portable
and suitable for embedding into various projects.
Operating System:
The Raspberry Pi supports various operating systems, but the most popular one is:
Raspberry Pi OS (formerly Raspbian): This is the official operating system for Raspberry Pi. It is a
Debian-based Linux distribution optimized for the Raspberry Pi hardware. Raspberry Pi OS comes pre-
installed with essential software and tools for programming, web browsing, productivity tasks, and
more.
Other operating systems compatible with Raspberry Pi include Ubuntu, Fedora, Arch Linux ARM, and
even Windows 10 IoT Core.
Uses:
Raspberry Pi finds application in a wide range of projects, including:
Education: Teaching programming, electronics, and computer science in schools.
DIY Projects: Building home automation systems, media centers, retro gaming consoles, weather
stations, and more.
Prototyping: Rapid prototyping of hardware projects and IoT (Internet of Things) applications.
Commercial Products: : Some companies use Raspberry Pi as the basis for commercial products due
to its low cost and versatility.

2. What are the common challenges in OT security?


Ans 2. Common Challenges in OT Security
The security challenges faced in IoT are by no means new and are not limited to specific industrial
environments. The following sections discuss some of the common challenges faced in IoT.
Erosion of Network Architecture
There is a wide variety in secured network designs within and across different industries. For
example, power utilities have a strong history of leveraging modern technologies for operational
activities, and in North America there are regulatory requirements in place from regulatory
authorities, such as North American Electric Reliability Corporation’s (NERC’s) Critical
Infrastructure Protection (CIP)
Pervasive Legacy Systems
Due to the static nature and long lifecycles of equipment in industrial environments, many
operational systems may be deemed legacy systems. For example, in a power utility environment,
it is not uncommon to have racks of old mechanical equipment still operating alongside modern
intelligent electronic devices (IEDs). In many cases, legacy components are not restricted to
isolated network segments but have now been consolidated into the IT operational environment.
From a security perspective, this is potentially dangerous as many devices may have historical
vulnerabilities or weaknesses that have not been patched and updated, or it may be that patches are
not even available due to the age of the equipment.
Insecure Operational Protocols
The structure and operation of most of these protocols is often publicly available. While they may
have been originated by a private firm, for the sake of interoperability, they are typically published
for others to implement. Thus, it becomes a relatively simple matter to compromise the protocols
themselves and introduce malicious actors that may use them to compromise control systems for
either reconnaissance or attack purposes that could lead to undesirable impacts in normal system
operation.
Device Insecurity
Beyond the communications protocols that are used and the installation base of legacy systems,
control and communication elements themselves have a history of vulnerabilities.
To understand the nature of the device insecurity, it is important to review the history of what
vulnerabilities were discovered and what types of devices were affected. A review of the time
period 2000 to 2010 reveals that the bulk of discoveries were at the higher levels of the operational
network, including control systems trusted to operate plants, transmission systems, oil pipelines,
or whatever critical function is in use.

3. With diagram, explain a four layered smart city Iot architecture.


Ans 3.

Smart City IoT Infrastructure Overview:


A smart city IoT infrastructure comprises four layers: Street Layer (Perception), City Layer (Network),
Data Centre Layer, and Services Layer (Applications).
Data flows from street devices to the city network layer and then to the data centre layer for
aggregation and processing.
Street Layer:
Sensors detect and measure events in the physical world, such as parking events, lighting conditions,
traffic flow, and air quality.
Various sensors, including magnetic sensors, lighting controllers, video cameras with analytics, and air
quality sensors, are deployed for different smart city use cases.
City Layer:
Above the street layer, the city layer deploys network routers and switches to aggregate data from
sensors into a single transport network.
It must support multiple protocols for various IoT applications and ensure reliable packet delivery for
resiliency.
Data Centre Layer:
Data from sensors is sent to the data centre for processing and correlation, generating meaningful
insights and trends.
Cloud infrastructure offers scalable storage and computing power, enabling flexible data processing
and management.
Services Layer and Data Usage:
The services layer delivers applications and services to stakeholders based on processed data,
addressing specific use cases such as parking availability, traffic management, and public
transportation.
Data visualization tailored to different users' needs enhances user experience and facilitates decision-
making for city operators, citizens, and enforcement officers.

4. Explain security between Levels and Zones in the Process Control Hierarchy Model.

Ans 4. Security Measures between Levels and Zones:

1. Network Segmentation:
• Segmenting the network into distinct zones limits the scope of
potential cyberattacks and reduces the impact of security breaches.
2. Access Controls:
• Implementing role-based access controls (RBAC) ensures that only
authorized personnel can access specific resources and perform
predefined actions within each level and zone.
3. Encryption:
• Encrypting communication channels between levels and zones protects
data confidentiality and integrity, preventing eavesdropping and
tampering by unauthorized parties.
4. Intrusion Detection and Prevention:
• Deploying IDS/IPS systems helps detect and mitigate cyber threats in
real-time, safeguarding critical assets and ensuring continuous
operation of industrial processes.
5. Authentication Mechanisms:
• Using strong authentication mechanisms, such as multi-factor
authentication (MFA) and digital certificates, verifies the identity of
users and devices accessing control systems.
6. Security Policies and Procedures:
• Establishing and enforcing security policies and procedures ensures
consistent security practices across all levels and zones, fostering a
culture of cybersecurity awareness and compliance.

Secured Network Infrastructure and Assets Given that networks, compute, or operational elements in
a typical IoT or industrial system have likely been in place for many years and given that the physical
layout largely defines the operational process, this phased approach to introducing modern network
security begins with very modest, non-intrusive steps.

Normal network discovery processes can be highly problematic for older networking equipment. In
fact, the discovery process in pursuit of improved safety, security, and operational state can result in
degradation of all three.
• Deployment of Dedicated Security Appliances:
The goal is to enhance security within the network by providing visibility, safety, and security for traffic.
Visibility is crucial for understanding application and communication behavior, achieved through deep
packet inspection (DPI) technologies like IDS/IPS.
IDS/IPS can detect various traffic types, identify applications, uncover obfuscated communications,
detect exploits targeting vulnerabilities, and passively identify network assets.
Passive OS identification and OUI in MAC addresses contribute to asset inventory expansion without
intrusive probing.
• Higher-Order Policy Convergence and Network Monitoring:
Convergence involves integrating security across operational boundaries and coordinating security
efforts between IT and OT environments.
Many new networking and computing technologies originate from the IT space, and mature security
practices and tools are more prevalent there.
Advanced enterprise-wide security practices related to access control, threat detection, and other
mechanisms can benefit OT security.
Areas requiring coordination across IT and OT environments include remote access and threat
detection.
Coordination of access control policies from remote initiators across Internet-facing security layers,
through the core network, to industrial demarcation points is valuable.
Utilizing common access controls and operational conditions enhances and protects network assets
better than ad hoc methods.
Modern access policy tools leverage location information, participant device security stance, user
identity, and access target attributes for effective access control.

5. Discuss with example, the fundamentals of Arduino Programming.


Ans 5.
6. Write a note on DS18B20 temperature sensor in detail.
Ans 6. The DS18B20 temperature sensor is a popular and versatile digital thermometer manufactured
by Maxim Integrated. It is widely used in various applications due to its accuracy, simplicity, and digital
interface. Here's a detailed note on the DS18B20 temperature sensor:

Overview:
Manufacturer: Maxim Integrated.
Type: Digital temperature sensor with 1-Wire interface.
Measurement Range: Typically -55°C to +125°C (-67°F to +257°F).
Accuracy: ±0.5°C (-10°C to +85°C), ±2°C (-55°C to +125°C).
Resolution: Configurable from 9 to 12 bits (0.5°C to 0.0625°C resolution).
Features:
Digital Interface: The DS18B20 communicates with the host microcontroller via a 1-Wire interface,
requiring only a single data line and ground connection.
Unique Serial Number: Each DS18B20 sensor is factory-calibrated and comes with a unique 64-bit
serial number, allowing multiple sensors to be connected to the same bus without conflicts.
Wide Temperature Range: The sensor is capable of measuring temperatures ranging from -55°C to
+125°C, making it suitable for a wide range of applications, including industrial, automotive, and
consumer electronics.
High Accuracy: With ±0.5°C accuracy within the range of -10°C to +85°C, the DS18B20 provides reliable
temperature measurements for precise monitoring and control applications.
Configurable Resolution: The resolution of the temperature readings can be adjusted from 9 to 12 bits,
allowing users to balance measurement accuracy and conversion time according to their specific
requirements.
Parasite Power Mode: The DS18B20 supports a parasite power mode, where it can derive power from
the data line, eliminating the need for an external power supply in certain applications.
Working Principle:
The DS18B20 converts temperature measurements into digital data using an internal analog-to-digital
converter (ADC).
Communication with the sensor occurs over the 1-Wire bus, where the microcontroller initiates
temperature conversion and reads the digital temperature data.
The sensor's unique serial number ensures that each sensor can be individually addressed on the bus,
allowing for easy integration of multiple sensors into a single system.
Applications:
Temperature Monitoring and Control: Used in industrial automation, HVAC systems, and
environmental monitoring to measure and regulate temperatures.
Weather Stations: Integrated into weather monitoring systems and meteorological instruments for
measuring outdoor temperatures.
Medical Devices: Employed in medical equipment such as thermometers and incubators for accurate
temperature measurement.
Food and Beverage Industry: Utilized in food processing and storage facilities to monitor temperatures
and ensure food safety.
Consumer Electronics: Embedded in gadgets like digital thermometers, smart home devices, and
wearable technology for temperature sensing applications.

• Pin1 (Ground): This pin is used to connect to the GND terminal of the circuit
• Pin2 (Vcc): This pin is used to give the power to the sensor which ranges from
3.3V or 5V
• Pin3 (Data): The data pin supplies the temperature value, which can
communicate with the help of 1-wire method.

7. Explain Formal Risk Analysis Structures and its frameworks.


Ans 7. The key for any industrial environment is that it needs to address security holistically and not
justfocus on technology. It must include people and processes, and it should include all the vendor
ecosystem components that make up a control system. OCTAVE OCTAVE (Operationally Critical
Threat, Asset and Vulnerability Evaluation) has undergone multiple iterations. The version this
section focuses on is OCTAVE Allegro, which is intended tobe a lightweight and less burdensome
process to implement. Allegro assumes that a robust securityteam is not on standby or immediately
at the ready to initiate a comprehensive security review. This approach and the assumptions it makes
are quite appropriate, given that many operational technology areas are similarly lacking in
securityfocused human assets. What it offers in terms of discipline and largely unconstrained
breadth, however, is offset by its lack of security specificity. There is an assumption that beyond
these steps are seemingly means of identifying specific mitigations that can be mapped to the
threats and risks exposed during the analysis process. FAIR FAIR (Factor Analysis of Information Risk)
is a technical standard for risk definition from The Open Group. While information security is the
focus, much as it is for OCTAVE, FAIR has clearapplications within operational technology. Like
OCTAVE, it also allows for nonmalicious actorsas a potential cause for harm, but it goes to greater
lengths to emphasize the point. For many operational groups, it is a welcome acknowledgement of
existing contingency planning. Unlike with OCTAVE, there is a significant emphasis on naming, with
risk taxonomy definition as a veryspecific target. FAIR places emphasis on both unambiguous
definitions and the idea that risk and associated attributes are measurable. Measurable, quantifiable
metrics are a key area of emphasis,which should lend itself well to an operational world with a
richness of operational data. At its base, FAIR has a definition of risk as the probable frequency and
probable magnitude of loss. With this definition, a clear hierarchy of sub-elements emerges, with
one side of the taxonomy focused on frequency and the other on magnitude. Loss even frequency is
the result of a threat agent acting on an asset with a resulting loss to the organization. This happens
with a given frequency called the threat event frequency (TEF), in which a specified time window
becomes a probability. There are multiple sub-attributes that define frequency of events, all of which
can be understood with some form of measurable metric. Threat event frequencies are applied to a
vulnerability. Vulnerability here is not necessarily some compute asset weakness, but is more broadly
defined as the probability that the targeted asset will fail as a result of the actions applied. There are
further sub-attributes here as well.

You might also like