Internet of Things Edit
A snapshot is "an instant in time."
A snapshot is
|“||[a] copy of what a computer's memory (primary storage, specific registers, etc.) contains at a specific point in time. Like a photograph. A snapshot can be used to catch intruders by recording information that the hacker may erase before the attack is completed or repelled.||”|
Overview (Internet of Things) Edit
Basic properties, assumptions, and general statements about snapshot include:
- a. Because a NoT is a distributed system, different events, data transfers, and computations occur at different snapshots.
- b. Snapshots may be aligned to a clock synchronized within their own network. . . . A global clock may be too burdensome for sensor networks that operate in the wild. Others, however, argue in favor of a global clock. . . .
- c. Data, without some "agreed upon" time stamping mechanism, is of limited or reduced value.
- d. NoTs may affect business performance — sensing, communicating, and computing can speed-up or slow-down a NoT's workflow and therefore affect the "perceived" performance of the environment it operates in or controls.
- e. Snapshots maybe tampered with, making it unclear when events actually occurred, not by changing time (which is not possible), but by changing the recorded time at which an event in the workflow is generated, or computation is performed. . . .
- f. Malicious latency to induce delays, are possible and will affect when decision triggers are able to execute.
- g. Reliability and performance of a NoT may be highly based on (e) and (f).
- ↑ NIST Special Publication 800-183, at 17.
- ↑ Information Technology Security Handbook, Annex 1, Glossary.
- "Overview" section: NIST Special Publication 800-183, at 17.