1/49
Vocabulary flashcards related to Internet of Things lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Privacy
Rights to control personal information and how it’s used.
Security
How personal information is protected.
Authentication
IoT devices connecting to the network create a trust relationship, based on validated identity.
IoT Security Risks
Sensitive information leaking through unauthorized manipulation within interconnected devices.
IoT Vulnerability
Lack of security increases the risk of your personal information leaking while the data is collected and transmitted to the IoT device.
IoT Challenges - Unpredictable Behavior
Due to the complex interactions and dependencies between IoT devices.
IoT Challenges - Device Similarity
Many IoT devices are produced with similar hardware and software, making them vulnerable to widespread attacks.
IoT Challenges - Problematic Deployment
Deploying and managing a large number of IoT devices can be complex and challenging.
IoT Challenges - Long Device Life and Expired Support
IoT devices often have long lifespans, but software and security updates may expire, leaving them vulnerable.
IoT Challenges - No Upgrade Support
Many IoT devices lack the ability to receive security updates.
IoT Challenges - Poor or No Transparency
Lack of visibility into the security practices of IoT device manufacturers.
IoT Challenges - No Alerts
Users may not be alerted to security breaches or vulnerabilities.
IoT Vulnerabilities - Limited Computational Abilities
Restricts ability to implement complex security measures.
IoT Vulnerabilities - Heterogeneous Transmission Technology
Different communication protocols create security challenges.
Cyber Security Method - Something the user is
Biometrics (eye scanner, facial recognition).
Cyber Security Method - Something the user has
ID Card, Access Control Token, Proximity Reader.
Cyber Security Method - Something the user does
Signature Recognition, Speech Recognition.
Cyber Security Method - Something the user knows
Passwords, passphrases.
Authorization
Trust relationship based on authentication and authorization of a device to determine what information can be accessed and shared.
Network Enforced Policy
Controls all elements that route and transport endpoint traffic securely over the network.
Secure Analytics: Visibility and Control
Provides reconnaissance, threat detection, and threat mitigation.
White Hat Hackers
Paid by companies to test security, aiming to protect data.
Personally Identifiable Information (PII)
Data that can be used to identify, contact, or locate an individual.
Sensitive Personal Information (SPI)
Data that can be used to identify, contact, or locate an individual.
Good Actors
Legitimate companies with permission to use collected data for business improvements.
General Data Protection Regulation (GDPR)
EU regulation to force corporations to respect data privacy.
Black Hat Hackers
Hackers who maliciously access data for various nefarious reasons.
Outside Perimeter Security
On-premise security officers, fences, gates, video surveillance, alarms.
Inside Perimeter Security
Video surveillance, motion detectors, security traps, biometric access sensors.
Forged Emails
Emails easily forged to look legitimate, often containing links to malicious sites or malware.
Malicious Web Pages
Malicious web pages can be easily made to look like a bank or financial institution website.
Compromised Hotspot
Attackers will often deploy fake Wi-Fi hotspots to lure users. Because the attacker has access to all the information exchanged via the compromised hotspot, users connected to that hotspot are at risk.
Internet of Medical Things (IoMT)
Connected ecosystem of medical devices, equipment, sensors, and software applications.
Wearable Medical IOT
Smart wearable devices used for healthcare purposes.
Clinical Grade Wearables
Wearable device that is built to express clinical purposes for patients, and that is mostly prescribed by doctors
Medical IOT at Home
Medical systems used for remote patient monitoring and emergency responses.
Community-Based Healthcare IOT
Connected systems engaging a community for patients or healthcare system support.
Administrative Healthcare IOT
Connected healthcare systems used by administrators in medical facilities.
Clinical Mobility
The use of mobile devices in hospitals to improve service delivery.
Automation
Self-driven process reducing, then eventually eliminating, the need for human intervention.
Big Data
The information that connected devices gather over time.
AI (Artificial Intelligence)
Uses algorithms to analyze data created by IoT devices.
Smart Home Automation
Voice commands to control lights, locks, thermostats, appliances, etc.
Smart Buildings
Using technology to automate building processes for efficient lighting, energy, and security.
Industrial Internet of Things (IIoT)
Network of manufacturing devices and sensors connected by secure communications.
Smart Cities
Cities that use digital technology to make their city a better place to live.
Smart Grid
A more reliable and efficient way to distribute electricity: allows for two-way communication between the utility facilities and the consumers.
Automated Driving Systems (ADS)
Systems that can handle the whole task of driving when we do not want to, or cannot do it ourselves.
Aircraft Auto-pilot
A complex collection of systems automates a plane’s operations.
Health & Well-being
One of IoT's Application in Healthcare