1/17
Vocabulary flashcards covering key IoT concepts and security best practices from the lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Internet of Things (IoT)
Global network of appliances and personal devices equipped with sensors, software, and network connectivity to report state and configuration data.
IoT device
Any device that connects to a network as part of the Internet of Things, including sensors, controllers, wearables, and smart devices.
Hub/Control System
Central point of communication for IoT devices; supports multiple protocols (e.g., Z‑Wave, Zigbee) beyond Wi‑Fi and Bluetooth.
Smart Device
IoT endpoint that connects to a hub to perform automation or functions (e.g., smart light bulb, smart thermostat, video doorbell).
Wearable
IoT device designed to be worn, such as smart watches, fitness trackers, smart glasses.
Sensor
IoT component that measures data (temperature, light, motion, humidity, heart rate, etc.).
Z‑Wave
Low‑power wireless protocol used by many IoT devices to communicate with a hub.
Zigbee
Low‑power wireless protocol used by many IoT devices to communicate with a hub.
IP Video System
IoT devices for remote video monitoring and collaboration; require appropriate QoS and bandwidth considerations.
QoS (Quality of Service)
Guarantees for network performance needed by real‑time IoT services like IP video.
VLAN
Virtual LAN used to segment networks, isolating IoT devices from the business production network.
Physical Access Control System
Systems like proximity readers, access controllers, cameras, and biometric readers that authenticate over IP and should be on a separate, well‑protected network.
Scientific and Industrial Equipment IoT
IoT devices found in hospitals, factories, and laboratories; historically unconnected but now IP networked; high patching risk.
Default Credentials
Default usernames and passwords that must be changed before production to prevent easy unauthorized access.
Encryption
Use of encryption protocols to protect data transmitted by IoT devices.
Patch Vulnerabilities
Apply vendor patches to fix IoT vulnerabilities; may leave residual risk if no patch is available.
Test and Evaluation / Penetration Testing
Test IoT devices on a lab or test network and perform security evaluations before connecting to production.
Separate IoT Network (Segregation)
Place IoT devices on their own physical or logical network (e.g., VLAN/subnet) to prevent interference or compromise of the production network.