Definition of a sensor
device that detects change in the environment
A network is a collection of 2 or more computers or devices that share information between them
1 example of a bad password
and
1 example of a good password
12345
1_LOV3_p1zz@
Mention 2 providers of cloud services
- Amazon Web Services (AWS)
- Microsoft Azure - Oracle - IBM
- Google Cloud Platform (GCP)
where can a PLC be found?
Production lines
Amusement parks
What is a Communication Protocol?
set of rules that guide how data is transmitted and received between devices in a network
Key Factors in Network Evaluation
(at least 3)
- Performance: speed, throughput, latency, etc.
- Reliability: stability, resilience
- Compliance: policies related to data privacy
- Security - Scalability - Compatibility:
- Cost - User Experience - Future-proofing
What to do and
what NOT to do when using
Public Wi-Fi ?
- Use HTTPS websites - enable Firewall
- use a VPN - verify network authenticity
- avoid sensitive activities: shopping, banking
What is Artificial Intelligence
technology that enables computers and machines to simulate human intelligence
What is a Human-Machine Interface (HMI)
interface that allows users to monitor and control a system.
What is an Embedded system?
combination of hardware and software designed for a specific function
- task-specific
- high-efficiency
- highly reliable and stable
Mention 3 different types of Networks
- LAN (Local Area Network)
- WAN (Wide Area Network)
- Cloud Network
- VPN (Virtual Private Network)
Mention 3 authentication methods
- Passwords - Biometric authentication
- Token - Multi-factor authentication
- PIN (Personal Identification Number)
- Knowledge-based Authentication (KBA)
Explain Mobile Device Management
software and security policies to protecting data and content on mobile devices.
includes: monitor data, troubleshoot problems, and even delete the data
PLCs and RTUs can be programmed in what language
Ladder Logic or Structured Text (ST)
What is a Cyber-Physical System (CPS)?
Physical components connected by a computer, to monitor and control a physical process through digital algorithm
explain MAC address
unique hardware static address or physical adress, used to identify devices on a network
How does Symmetric encryption works
it utilizes a single key for encryption and decryption.
Mention 3 different types of clouds
- Public cloud - Private cloud
- Hybrid cloud - Community Cloud
- Multi-Cloud
Differences between PLC and RTU
RTUs are mainly for remote locations and can stand more extreme enviroments
PLCs need more power
Explain Moore´s Law
The number of transistors (switches that control the flow of electricity) on a microchip would double approximately every two years.
Name the layers of the OSI Model in the right order
1. Physical Layer 2. Data-Link Layer
3. Network Layer 4. Transport Layer
5. Session Layer 6. Presentation Layer
7. Application Layer
Explain Bluejacking
When attackers send unsolicited messages or files to nearby devices for spam or phishing purposes.
Explain one of these
- IaaS - PaaS - SaaS
- IaaS (Infrastructure as a Service): rent servers or virtual machines
- PaaS (Platform as a Service): environment typically for application development (web or mobile apps)
- SaaS (Software as a Service): software applications
Main components of a SCADA system
basic explanation how this components work together.
SCADA Station / Central Control Room
PLC/RTU HMI
Sensors & Actuators