Internet of Things Security Glossary

Important definitions and terminologies used in Internet of Things Security

A

  • Access control in Internet of Things Security
  • Access in Internet of Things Security
  • Advanced Encryption Standard (AES) in Internet of Things Security
  • Advanced Persistent Threat (APT) in Internet of Things Security
  • Air Gap in Internet of Things Security
  • Alert in Internet of Things Security
  • API management in Internet of Things Security
  • API security in Internet of Things Security
  • Application Programming Interface (API) in Internet of Things Security
  • Application security in Internet of Things Security
  • Artificial intelligence (AI) security in Internet of Things Security
  • Asset in Internet of Things Security
  • Asset management in Internet of Things Security
  • Attack Surface in Internet of Things Security
  • Authentication and authorization in Internet of Things Security
  • Authentication in Internet of Things Security

B

  • Backhaul in Internet of Things Security
  • Behavior Monitoring in Internet of Things Security
  • Big Data in Internet of Things Security
  • Biometric authentication in Internet of Things Security
  • Blockchain in Internet of Things Security
  • Bluetooth Low Energy (BLE) in Internet of Things Security
  • Bluetooth security in Internet of Things Security
  • Bot in Internet of Things Security
  • Bot mitigation in Internet of Things Security
  • Botnet in Internet of Things Security

C

  • Certificate authority (CA) in Internet of Things Security
  • Cloud Computing in Internet of Things Security
  • Cloud security in Internet of Things Security
  • Code signing in Internet of Things Security
  • Container security in Internet of Things Security
  • Context-aware access control in Internet of Things Security
  • Converged networks in Internet of Things Security
  • Credential management in Internet of Things Security
  • Cross-site scripting (XSS) in Internet of Things Security
  • Cryptographic Algorithm in Internet of Things Security
  • Cyber Kill Chain in Internet of Things Security
  • Cyber Operations in Internet of Things Security
  • Cyber Threat in Internet of Things Security
  • Cyber Threat Intelligence (CTI) in Internet of Things Security
  • Cyber-physical security in Internet of Things Security
  • Cybersecurity in Internet of Things Security
  • Cyberspace in Internet of Things Security

D

  • Data Aggregation in Internet of Things Security
  • Data Breach in Internet of Things Security
  • Data encryption in Internet of Things Security
  • Data integrity in Internet of Things Security
  • Data loss prevention (DLP) in Internet of Things Security
  • Data privacy in Internet of Things Security
  • Data protection in Internet of Things Security
  • Database security in Internet of Things Security
  • Decryption in Internet of Things Security
  • Denial of Service (DoS) in Internet of Things Security
  • Denial-of-service (DoS) in Internet of Things Security
  • Device authentication in Internet of Things Security
  • Device fingerprinting in Internet of Things Security
  • Digital certificates in Internet of Things Security
  • Digital Forensics in Internet of Things Security
  • Digital Signature in Internet of Things Security
  • Distributed Denial of Service (DDoS) in Internet of Things Security
  • Distributed denial-of-service (DDoS) in Internet of Things Security
  • DNS Hijacking in Internet of Things Security

E

  • Edge computing security in Internet of Things Security
  • Electronic Signature in Internet of Things Security
  • Email security in Internet of Things Security
  • Embedded device security in Internet of Things Security
  • Embedded Software in Internet of Things Security
  • Encryption in Internet of Things Security
  • Encryption key management in Internet of Things Security
  • Endpoint security in Internet of Things Security
  • Exploit in Internet of Things Security
  • Exploitation Analysis in Internet of Things Security

F

  • Failure (System Failure) in Internet of Things Security
  • Fileless Malware in Internet of Things Security
  • Firewall in Internet of Things Security
  • Firmware Over-the-Air (FOTA) in Internet of Things Security
  • Firmware security in Internet of Things Security
  • Firmware update management in Internet of Things Security
  • Forensics in Internet of Things Security
  • Fraud detection in Internet of Things Security

G

  • Gateway in Internet of Things Security
  • Gateway security in Internet of Things Security
  • General Packet Radio Service (GPRS) in Internet of Things Security

H

  • Hacker in Internet of Things Security
  • Hacktivism in Internet of Things Security
  • Hardware security in Internet of Things Security
  • Hash Value in Internet of Things Security
  • Hashing in Internet of Things Security
  • Home automation security in Internet of Things Security
  • Hypervisor security in Internet of Things Security

I

  • Identity and access management (IAM) in Internet of Things Security
  • Incident management in Internet of Things Security
  • Incident response in Internet of Things Security
  • Industrial control systems (ICS) security in Internet of Things Security
  • Industrial IoT (IIoT) in Internet of Things Security
  • Industrial, Scientific, and Medical (ISM) Band in Internet of Things Security
  • Insecure deserialization in Internet of Things Security
  • Internet security in Internet of Things Security
  • Intrusion detection in Internet of Things Security
  • Intrusion prevention in Internet of Things Security
  • IoT botnet prevention in Internet of Things Security
  • IoT device discovery in Internet of Things Security
  • IoT device monitoring in Internet of Things Security
  • IoT platform security in Internet of Things Security
  • IoT protocol security in Internet of Things Security
  • IoT security framework in Internet of Things Security
  • IP security (IPsec) in Internet of Things Security
  • IT/OT convergence in Internet of Things Security

K

  • Kernel-level security in Internet of Things Security
  • Key management in Internet of Things Security

L

  • Link Budget in Internet of Things Security
  • LoRa Protocol (LoRaWAN) in Internet of Things Security
  • Low-Power Wide Area (LPWA) in Internet of Things Security
  • Low-Power Wireless Sensor Network in Internet of Things Security
  • LTE-M in Internet of Things Security

M

  • Machine learning security in Internet of Things Security
  • Machine to Machine (M2M) in Internet of Things Security
  • Malware in Internet of Things Security
  • Managed security services in Internet of Things Security
  • Media Access Control (MAC) in Internet of Things Security
  • Micro-segmentation in Internet of Things Security
  • Mobile device management (MDM) in Internet of Things Security
  • Mote in Internet of Things Security
  • Multifactor authentication (MFA) in Internet of Things Security

N

  • NB-IoT in Internet of Things Security
  • Near-Field Communication (NFC) in Internet of Things Security
  • Network security in Internet of Things Security
  • Network segmentation in Internet of Things Security

O

  • OAuth in Internet of Things Security
  • Open Web Application Security Project (OWASP) in Internet of Things Security
  • Operational technology (OT) security in Internet of Things Security

P

  • Password management in Internet of Things Security
  • Patch management in Internet of Things Security
  • Penetration testing in Internet of Things Security
  • Phishing in Internet of Things Security
  • Physical access control in Internet of Things Security
  • Physical security in Internet of Things Security
  • Privacy-by-design in Internet of Things Security
  • Public Key Cryptography (PKC) in Internet of Things Security
  • Public key infrastructure (PKI) in Internet of Things Security

Q

  • Quality of Service (QoS) in Internet of Things Security
  • Quantum security in Internet of Things Security

R

  • Radio Frequency Identification (RFID) in Internet of Things Security
  • Radiofrequency (RF) in Internet of Things Security
  • Ransomware in Internet of Things Security
  • Real-time security monitoring in Internet of Things Security
  • Remote access security in Internet of Things Security
  • Remote device wipe in Internet of Things Security
  • Repeater in Internet of Things Security
  • RF Geolocation in Internet of Things Security
  • Risk assessment in Internet of Things Security
  • Role-based access control (RBAC) in Internet of Things Security

S

  • Secure boot in Internet of Things Security
  • Secure chip design in Internet of Things Security
  • Secure coding guidelines in Internet of Things Security
  • Secure coding practices in Internet of Things Security
  • Secure communication protocols in Internet of Things Security
  • Secure development lifecycle (SDL) in Internet of Things Security
  • Secure enclave in Internet of Things Security
  • Secure enclave processor in Internet of Things Security
  • Secure file transfer in Internet of Things Security
  • Secure firmware update in Internet of Things Security
  • Secure IoT gateway in Internet of Things Security
  • Secure key storage in Internet of Things Security
  • Secure processor in Internet of Things Security
  • Secure storage in Internet of Things Security
  • Security analytics in Internet of Things Security
  • Security assessment in Internet of Things Security
  • Security automation in Internet of Things Security
  • Security by obscurity in Internet of Things Security
  • Security information and event management (SIEM) in Internet of Things Security
  • Security operations center (SOC) in Internet of Things Security
  • Security policies and procedures in Internet of Things Security
  • Security risk management in Internet of Things Security
  • Security testing in Internet of Things Security
  • Sensor security in Internet of Things Security
  • Separation of duties in Internet of Things Security
  • Smart home security in Internet of Things Security
  • Smart Meter in Internet of Things Security
  • Software-Defined Network (SDN) in Internet of Things Security
  • Software-defined networking (SDN) security in Internet of Things Security
  • Software-defined perimeter (SDP) in Internet of Things Security
  • Structure Attenuation in Internet of Things Security
  • Supply chain risk management in Internet of Things Security
  • Supply chain security in Internet of Things Security

T

  • Threat intelligence in Internet of Things Security
  • Threat modeling in Internet of Things Security
  • Tokenization in Internet of Things Security
  • Transmission Control Protocol/Internet Protocol (TCP/IP) in Internet of Things Security
  • Transport Layer Security (TLS) in Internet of Things Security
  • Trusted execution environment (TEE) in Internet of Things Security
  • Trusted platform module (TPM) in Internet of Things Security
  • Two-factor authentication (2FA) in Internet of Things Security
  • Two-man rule in Internet of Things Security

U

  • Ultra-Wide Band (UWB) in Internet of Things Security
  • Unified threat management (UTM) in Internet of Things Security
  • User behavior analytics (UBA) in Internet of Things Security

V

  • Virtual private network (VPN) in Internet of Things Security
  • Virtualization security in Internet of Things Security
  • Vulnerability management in Internet of Things Security

W

  • Web application firewall (WAF) in Internet of Things Security
  • Wireless security in Internet of Things Security
  • WPA3 in Internet of Things Security

Z

  • Zero-day vulnerability in Internet of Things Security
  • Zero-trust security in Internet of Things Security
  • ZigBee/Z-Wave in Internet of Things Security

Others

  • 6LoWPAN in Internet of Things Security
Smart Cities Management Glossary
Basel III Glossary

Get industry recognized certification – Contact us

keyboard_arrow_up