Important definitions and terminologies used in Internet of Things Security
A
- Access control in Internet of Things Security
- Access in Internet of Things Security
- Advanced Encryption Standard (AES) in Internet of Things Security
- Advanced Persistent Threat (APT) in Internet of Things Security
- Air Gap in Internet of Things Security
- Alert in Internet of Things Security
- API management in Internet of Things Security
- API security in Internet of Things Security
- Application Programming Interface (API) in Internet of Things Security
- Application security in Internet of Things Security
- Artificial intelligence (AI) security in Internet of Things Security
- Asset in Internet of Things Security
- Asset management in Internet of Things Security
- Attack Surface in Internet of Things Security
- Authentication and authorization in Internet of Things Security
- Authentication in Internet of Things Security
B
- Backhaul in Internet of Things Security
- Behavior Monitoring in Internet of Things Security
- Big Data in Internet of Things Security
- Biometric authentication in Internet of Things Security
- Blockchain in Internet of Things Security
- Bluetooth Low Energy (BLE) in Internet of Things Security
- Bluetooth security in Internet of Things Security
- Bot in Internet of Things Security
- Bot mitigation in Internet of Things Security
- Botnet in Internet of Things Security
C
- Certificate authority (CA) in Internet of Things Security
- Cloud Computing in Internet of Things Security
- Cloud security in Internet of Things Security
- Code signing in Internet of Things Security
- Container security in Internet of Things Security
- Context-aware access control in Internet of Things Security
- Converged networks in Internet of Things Security
- Credential management in Internet of Things Security
- Cross-site scripting (XSS) in Internet of Things Security
- Cryptographic Algorithm in Internet of Things Security
- Cyber Kill Chain in Internet of Things Security
- Cyber Operations in Internet of Things Security
- Cyber Threat in Internet of Things Security
- Cyber Threat Intelligence (CTI) in Internet of Things Security
- Cyber-physical security in Internet of Things Security
- Cybersecurity in Internet of Things Security
- Cyberspace in Internet of Things Security
D
- Data Aggregation in Internet of Things Security
- Data Breach in Internet of Things Security
- Data encryption in Internet of Things Security
- Data integrity in Internet of Things Security
- Data loss prevention (DLP) in Internet of Things Security
- Data privacy in Internet of Things Security
- Data protection in Internet of Things Security
- Database security in Internet of Things Security
- Decryption in Internet of Things Security
- Denial of Service (DoS) in Internet of Things Security
- Denial-of-service (DoS) in Internet of Things Security
- Device authentication in Internet of Things Security
- Device fingerprinting in Internet of Things Security
- Digital certificates in Internet of Things Security
- Digital Forensics in Internet of Things Security
- Digital Signature in Internet of Things Security
- Distributed Denial of Service (DDoS) in Internet of Things Security
- Distributed denial-of-service (DDoS) in Internet of Things Security
- DNS Hijacking in Internet of Things Security
E
- Edge computing security in Internet of Things Security
- Electronic Signature in Internet of Things Security
- Email security in Internet of Things Security
- Embedded device security in Internet of Things Security
- Embedded Software in Internet of Things Security
- Encryption in Internet of Things Security
- Encryption key management in Internet of Things Security
- Endpoint security in Internet of Things Security
- Exploit in Internet of Things Security
- Exploitation Analysis in Internet of Things Security
F
- Failure (System Failure) in Internet of Things Security
- Fileless Malware in Internet of Things Security
- Firewall in Internet of Things Security
- Firmware Over-the-Air (FOTA) in Internet of Things Security
- Firmware security in Internet of Things Security
- Firmware update management in Internet of Things Security
- Forensics in Internet of Things Security
- Fraud detection in Internet of Things Security
G
- Gateway in Internet of Things Security
- Gateway security in Internet of Things Security
- General Packet Radio Service (GPRS) in Internet of Things Security
H
- Hacker in Internet of Things Security
- Hacktivism in Internet of Things Security
- Hardware security in Internet of Things Security
- Hash Value in Internet of Things Security
- Hashing in Internet of Things Security
- Home automation security in Internet of Things Security
- Hypervisor security in Internet of Things Security
I
- Identity and access management (IAM) in Internet of Things Security
- Incident management in Internet of Things Security
- Incident response in Internet of Things Security
- Industrial control systems (ICS) security in Internet of Things Security
- Industrial IoT (IIoT) in Internet of Things Security
- Industrial, Scientific, and Medical (ISM) Band in Internet of Things Security
- Insecure deserialization in Internet of Things Security
- Internet security in Internet of Things Security
- Intrusion detection in Internet of Things Security
- Intrusion prevention in Internet of Things Security
- IoT botnet prevention in Internet of Things Security
- IoT device discovery in Internet of Things Security
- IoT device monitoring in Internet of Things Security
- IoT platform security in Internet of Things Security
- IoT protocol security in Internet of Things Security
- IoT security framework in Internet of Things Security
- IP security (IPsec) in Internet of Things Security
- IT/OT convergence in Internet of Things Security
K
- Kernel-level security in Internet of Things Security
- Key management in Internet of Things Security
L
- Link Budget in Internet of Things Security
- LoRa Protocol (LoRaWAN) in Internet of Things Security
- Low-Power Wide Area (LPWA) in Internet of Things Security
- Low-Power Wireless Sensor Network in Internet of Things Security
- LTE-M in Internet of Things Security
M
- Machine learning security in Internet of Things Security
- Machine to Machine (M2M) in Internet of Things Security
- Malware in Internet of Things Security
- Managed security services in Internet of Things Security
- Media Access Control (MAC) in Internet of Things Security
- Micro-segmentation in Internet of Things Security
- Mobile device management (MDM) in Internet of Things Security
- Mote in Internet of Things Security
- Multifactor authentication (MFA) in Internet of Things Security
N
- NB-IoT in Internet of Things Security
- Near-Field Communication (NFC) in Internet of Things Security
- Network security in Internet of Things Security
- Network segmentation in Internet of Things Security
O
- OAuth in Internet of Things Security
- Open Web Application Security Project (OWASP) in Internet of Things Security
- Operational technology (OT) security in Internet of Things Security
P
- Password management in Internet of Things Security
- Patch management in Internet of Things Security
- Penetration testing in Internet of Things Security
- Phishing in Internet of Things Security
- Physical access control in Internet of Things Security
- Physical security in Internet of Things Security
- Privacy-by-design in Internet of Things Security
- Public Key Cryptography (PKC) in Internet of Things Security
- Public key infrastructure (PKI) in Internet of Things Security
Q
- Quality of Service (QoS) in Internet of Things Security
- Quantum security in Internet of Things Security
R
- Radio Frequency Identification (RFID) in Internet of Things Security
- Radiofrequency (RF) in Internet of Things Security
- Ransomware in Internet of Things Security
- Real-time security monitoring in Internet of Things Security
- Remote access security in Internet of Things Security
- Remote device wipe in Internet of Things Security
- Repeater in Internet of Things Security
- RF Geolocation in Internet of Things Security
- Risk assessment in Internet of Things Security
- Role-based access control (RBAC) in Internet of Things Security
S
- Secure boot in Internet of Things Security
- Secure chip design in Internet of Things Security
- Secure coding guidelines in Internet of Things Security
- Secure coding practices in Internet of Things Security
- Secure communication protocols in Internet of Things Security
- Secure development lifecycle (SDL) in Internet of Things Security
- Secure enclave in Internet of Things Security
- Secure enclave processor in Internet of Things Security
- Secure file transfer in Internet of Things Security
- Secure firmware update in Internet of Things Security
- Secure IoT gateway in Internet of Things Security
- Secure key storage in Internet of Things Security
- Secure processor in Internet of Things Security
- Secure storage in Internet of Things Security
- Security analytics in Internet of Things Security
- Security assessment in Internet of Things Security
- Security automation in Internet of Things Security
- Security by obscurity in Internet of Things Security
- Security information and event management (SIEM) in Internet of Things Security
- Security operations center (SOC) in Internet of Things Security
- Security policies and procedures in Internet of Things Security
- Security risk management in Internet of Things Security
- Security testing in Internet of Things Security
- Sensor security in Internet of Things Security
- Separation of duties in Internet of Things Security
- Smart home security in Internet of Things Security
- Smart Meter in Internet of Things Security
- Software-Defined Network (SDN) in Internet of Things Security
- Software-defined networking (SDN) security in Internet of Things Security
- Software-defined perimeter (SDP) in Internet of Things Security
- Structure Attenuation in Internet of Things Security
- Supply chain risk management in Internet of Things Security
- Supply chain security in Internet of Things Security
T
- Threat intelligence in Internet of Things Security
- Threat modeling in Internet of Things Security
- Tokenization in Internet of Things Security
- Transmission Control Protocol/Internet Protocol (TCP/IP) in Internet of Things Security
- Transport Layer Security (TLS) in Internet of Things Security
- Trusted execution environment (TEE) in Internet of Things Security
- Trusted platform module (TPM) in Internet of Things Security
- Two-factor authentication (2FA) in Internet of Things Security
- Two-man rule in Internet of Things Security
U
- Ultra-Wide Band (UWB) in Internet of Things Security
- Unified threat management (UTM) in Internet of Things Security
- User behavior analytics (UBA) in Internet of Things Security
V
- Virtual private network (VPN) in Internet of Things Security
- Virtualization security in Internet of Things Security
- Vulnerability management in Internet of Things Security
W
- Web application firewall (WAF) in Internet of Things Security
- Wireless security in Internet of Things Security
- WPA3 in Internet of Things Security
Z
- Zero-day vulnerability in Internet of Things Security
- Zero-trust security in Internet of Things Security
- ZigBee/Z-Wave in Internet of Things Security
Others
- 6LoWPAN in Internet of Things Security