Internet of Things Vocabulary

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards related to Internet of Things lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

Privacy

Rights to control personal information and how it’s used.

2
New cards

Security

How personal information is protected.

3
New cards

Authentication

IoT devices connecting to the network create a trust relationship, based on validated identity.

4
New cards

IoT Security Risks

Sensitive information leaking through unauthorized manipulation within interconnected devices.

5
New cards

IoT Vulnerability

Lack of security increases the risk of your personal information leaking while the data is collected and transmitted to the IoT device.

6
New cards

IoT Challenges - Unpredictable Behavior

Due to the complex interactions and dependencies between IoT devices.

7
New cards

IoT Challenges - Device Similarity

Many IoT devices are produced with similar hardware and software, making them vulnerable to widespread attacks.

8
New cards

IoT Challenges - Problematic Deployment

Deploying and managing a large number of IoT devices can be complex and challenging.

9
New cards

IoT Challenges - Long Device Life and Expired Support

IoT devices often have long lifespans, but software and security updates may expire, leaving them vulnerable.

10
New cards

IoT Challenges - No Upgrade Support

Many IoT devices lack the ability to receive security updates.

11
New cards

IoT Challenges - Poor or No Transparency

Lack of visibility into the security practices of IoT device manufacturers.

12
New cards

IoT Challenges - No Alerts

Users may not be alerted to security breaches or vulnerabilities.

13
New cards

IoT Vulnerabilities - Limited Computational Abilities

Restricts ability to implement complex security measures.

14
New cards

IoT Vulnerabilities - Heterogeneous Transmission Technology

Different communication protocols create security challenges.

15
New cards

Cyber Security Method - Something the user is

Biometrics (eye scanner, facial recognition).

16
New cards

Cyber Security Method - Something the user has

ID Card, Access Control Token, Proximity Reader.

17
New cards

Cyber Security Method - Something the user does

Signature Recognition, Speech Recognition.

18
New cards

Cyber Security Method - Something the user knows

Passwords, passphrases.

19
New cards

Authorization

Trust relationship based on authentication and authorization of a device to determine what information can be accessed and shared.

20
New cards

Network Enforced Policy

Controls all elements that route and transport endpoint traffic securely over the network.

21
New cards

Secure Analytics: Visibility and Control

Provides reconnaissance, threat detection, and threat mitigation.

22
New cards

White Hat Hackers

Paid by companies to test security, aiming to protect data.

23
New cards

Personally Identifiable Information (PII)

Data that can be used to identify, contact, or locate an individual.

24
New cards

Sensitive Personal Information (SPI)

Data that can be used to identify, contact, or locate an individual.

25
New cards

Good Actors

Legitimate companies with permission to use collected data for business improvements.

26
New cards

General Data Protection Regulation (GDPR)

EU regulation to force corporations to respect data privacy.

27
New cards

Black Hat Hackers

Hackers who maliciously access data for various nefarious reasons.

28
New cards

Outside Perimeter Security

On-premise security officers, fences, gates, video surveillance, alarms.

29
New cards

Inside Perimeter Security

Video surveillance, motion detectors, security traps, biometric access sensors.

30
New cards

Forged Emails

Emails easily forged to look legitimate, often containing links to malicious sites or malware.

31
New cards

Malicious Web Pages

Malicious web pages can be easily made to look like a bank or financial institution website.

32
New cards

Compromised Hotspot

Attackers will often deploy fake Wi-Fi hotspots to lure users. Because the attacker has access to all the information exchanged via the compromised hotspot, users connected to that hotspot are at risk.

33
New cards

Internet of Medical Things (IoMT)

Connected ecosystem of medical devices, equipment, sensors, and software applications.

34
New cards

Wearable Medical IOT

Smart wearable devices used for healthcare purposes.

35
New cards

Clinical Grade Wearables

Wearable device that is built to express clinical purposes for patients, and that is mostly prescribed by doctors

36
New cards

Medical IOT at Home

Medical systems used for remote patient monitoring and emergency responses.

37
New cards

Community-Based Healthcare IOT

Connected systems engaging a community for patients or healthcare system support.

38
New cards

Administrative Healthcare IOT

Connected healthcare systems used by administrators in medical facilities.

39
New cards

Clinical Mobility

The use of mobile devices in hospitals to improve service delivery.

40
New cards

Automation

Self-driven process reducing, then eventually eliminating, the need for human intervention.

41
New cards

Big Data

The information that connected devices gather over time.

42
New cards

AI (Artificial Intelligence)

Uses algorithms to analyze data created by IoT devices.

43
New cards

Smart Home Automation

Voice commands to control lights, locks, thermostats, appliances, etc.

44
New cards

Smart Buildings

Using technology to automate building processes for efficient lighting, energy, and security.

45
New cards

Industrial Internet of Things (IIoT)

Network of manufacturing devices and sensors connected by secure communications.

46
New cards

Smart Cities

Cities that use digital technology to make their city a better place to live.

47
New cards

Smart Grid

A more reliable and efficient way to distribute electricity: allows for two-way communication between the utility facilities and the consumers.

48
New cards

Automated Driving Systems (ADS)

Systems that can handle the whole task of driving when we do not want to, or cannot do it ourselves.

49
New cards

Aircraft Auto-pilot

A complex collection of systems automates a plane’s operations.

50
New cards

Health & Well-being

One of IoT's Application in Healthcare