Fandom

The IT Law Wiki

Snapshot

32,181pages on
this wiki
Add New Page
Talk0 Share

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.

Definitions Edit

Internet of Things Edit

A snapshot is "an instant in time."[1]

Storage Edit

A snapshot is

[a] copy of what a computer's memory (primary storage, specific registers, etc.) contains at a specific point in time. Like a photograph. A snapshot can be used to catch intruders by recording information that the hacker may erase before the attack is completed or repelled.[2]

Overview (Internet of Things) Edit

Basic properties, assumptions, and general statements about snapshot include:

a. Because a NoT is a distributed system, different events, data transfers, and computations occur at different snapshots.
b. Snapshots may be aligned to a clock synchronized within their own network. . . . A global clock may be too burdensome for sensor networks that operate in the wild. Others, however, argue in favor of a global clock. . . .
c. Data, without some "agreed upon" time stamping mechanism, is of limited or reduced value.
d. NoTs may affect business performance — sensing, communicating, and computing can speed-up or slow-down a NoT's workflow and therefore affect the "perceived" performance of the environment it operates in or controls.
e. Snapshots maybe tampered with, making it unclear when events actually occurred, not by changing time (which is not possible), but by changing the recorded time at which an event in the workflow is generated, or computation is performed. . . .
f. Malicious latency to induce delays, are possible and will affect when decision triggers are able to execute.
g. Reliability and performance of a NoT may be highly based on (e) and (f).

References Edit

  1. NIST Special Publication 800-183, at 17.
  2. Information Technology Security Handbook, Annex 1, Glossary.

Source Edit

Also on Fandom

Random Wiki