IoT Glossary

The world of IoT can be daunting, we’ve done our best to help you navigate it with dozens of key definitions (and counting).
Quiz of the day
A quiz image, let's play
What's...
Non-Repudiation
Check answer!
A quiz image, let's play
Non-Repudiation
Non-repudiation is the assurance that a user or system cannot deny having sent or received a message or performed an action.
Learn more

Access Control

Access control is the process of controlling and managing access to a system or network, typically through the use of user authentication, authorization, and permissions.
Read more

Application Security

Application security refers to the set of measures and practices used to protect software applications from cyber attacks and data breaches.
Read more

Asset Tracking

Asset tracking is the process of monitoring and managing the location and movement of physical assets, such as equipment, vehicles, or inventory
Read more

Authentication

Authentication is the process of verifying the identity of a user, device, or application attempting to access a system or network.
Read more

Authorization

Authorization is the process of granting or denying access to a system or network based on a user's identity and the permissions they have been granted.
Read more

Behavior Analytics

Behavior analytics is the process of analyzing patterns of user behavior and activity to identify potential security threats and incidents.
Read more

Blockchain

A blockchain is a decentralized and distributed ledger technology that provides a secure and transparent way to store and exchange information.
Read more

Cloud Security

Cloud security refers to the set of measures and practices used to protect data, applications, and infrastructure hosted in cloud environments.
Read more

Confidentiality

Confidentiality is the protection of sensitive information from unauthorized access or disclosure.
Read more

Connected IoT Devices

Connected devices refer to the growing network of devices, appliances, and equipment that are connected to the internet and capable of collecting and exchanging data.
Read more

Cryptography

Cryptography is the practice of securing information through the use of encryption and other cryptographic techniques.
Read more

Cryptowallets

Cryptowallets are digital wallets used to securely store, manage, and transfer cryptocurrencies such as Bitcoin, Ethereum, and others.
Read more

Cybersecurity

Cybersecurity is the set of measures and practices used to protect computer systems, networks, and data from cyber attacks, theft, and damage.
Read more

Data Integrity

Data integrity is the assurance that data is accurate, complete, and consistent over its entire lifecycle.
Read more

Digital Certificates

Digital certificates are electronic documents that are used to verify the identity of a person, device, or organization.
Read more
DDoS

Distributed Denial of Service (DDoS)

A distributed denial of service (DDoS) attack is a type of cyber attack that involves overwhelming a system or network with traffic, typically from multiple sources.
Read more

Edge Security

Edge security refers to the set of measures and practices used to protect devices, applications, and data at the edge of a network or system.
Read more

Embedded Systems

Embedded systems are computer systems that are integrated into other devices, such as cars, appliances, and medical devices.
Read more

Encryption

Encryption is the process of converting data into a secret code to protect it from unauthorized access or disclosure.
Read more

Endpoint Security

Endpoint security refers to the set of measures and practices used to protect devices, such as laptops, smartphones, and tablets, from cyber attacks and data breaches.
Read more

Firewalls

Firewalls are security devices or software that are used to monitor and control incoming and outgoing network traffic, based on a set of predefined security rules.
Read more

Firmware Security

Firmware security refers to the set of measures and practices used to protect the firmware, or low-level software, that controls the hardware of a device.
Read more

Fraud Detection

Fraud detection refers to the set of measures and practices used to identify and prevent fraudulent activity, such as credit card fraud or identity theft.
Read more

Hardware Security

Hardware security refers to the set of measures and practices used to protect the physical components of a computer system or device from cyber attacks and data breaches.
Read more
IAM

Identity and Access Management (IAM)

Identity and access management (IAM) is the set of practices and technologies used to manage digital identities and control access to computer systems and networks.
Read more

In-Field Provisionning

In-field provisioning is the process of securely deploying and configuring software and firmware updates to IoT devices in the field, without requiring physical access.
Read more
IoT

Internet of Things

The Internet of Things (IoT) is the process of connecting physical things to the internet to benefit from the data they can provide and to control them remotely.
Read more

Intrusion Detection

Intrusion detection is the process of monitoring and analyzing computer systems and networks for signs of unauthorized access or malicious activity.
Read more

IoT Malware

IoT malware refers to malicious software or code that is specifically designed to target Internet of Things (IoT) devices, such as smart home devices or industrial control systems.
Read more

IoT Security

IoT security refers to the set of measures and practices used to protect Internet of Things (IoT) devices and networks from cyber attacks, theft, and damage.
Read more

Key Management

Key management is the process of generating, storing, distributing, and revoking cryptographic keys used to secure data and communications.
Read more

Matter Standard

The Matter Standard is an open-source, royalty-free, and secure standard for smart home devices that enables interoperability and security.
Read more

Mobile Device Security

Mobile device security refers to the set of measures and practices used to protect smartphones, tablets, and other mobile devices from cyber attacks and data breaches.
Read more

Network Security

Network security refers to the set of measures and practices used to protect computer networks from cyber attacks, theft, and damage.
Read more

Non-Repudiation

Non-repudiation is the assurance that a user or system cannot deny having sent or received a message or performed an action.
Read more

OAuth

OAuth is an open standard protocol used for secure authorization of web and mobile applications.
Read more
OTA

Over-The-Air (OTA) Updates

Over-the-air (OTA) updates are software updates for devices or systems that are delivered wirelessly, typically through a wireless network or cellular connection.
Read more

Penetration Testing

Penetration testing, or "pen testing," is the practice of simulating cyber attacks on computer systems and networks to identify vulnerabilities and weaknesses.
Read more

Privacy

Privacy refers to the right of individuals to control how their personal information is collected, used, and disclosed.
Read more
PKI

Public Key Infrastructure (PKI)

Public key infrastructure (PKI) is a set of technologies and practices used to secure communications and transactions over the internet.
Read more

Quantum Computing

Quantum computing is a type of computing that uses quantum mechanics to perform complex calculations at high speeds.
Read more

Real-Time Monitoring

Real-time monitoring is the process of continuously monitoring computer systems and networks for signs of cyber attacks or other security incidents.
Read more

Rogue Devices

Rogue devices are unauthorized or unmanaged devices that are connected to a computer network, typically without the knowledge or approval of network administrators.
Read more

Secure Boot

Secure boot is a process that ensures the integrity and authenticity of firmware, operating systems, and other software components on a computer system or device.
Read more

Secure Elements

Secure elements are specialized hardware components that are designed to securely store and manage cryptographic keys and other sensitive information.
Read more

Secure Firmware

Secure firmware refers to firmware, or low-level software, that is designed to be resistant to cyber attacks and data breaches.
Read more

Security Analytics

Security analytics is the process of using data analysis and machine learning techniques to identify and respond to security threats and incidents.
Read more
SOC

Security Operations Center (SOC)

A security operations center (SOC) is a centralized facility or team responsible for monitoring and responding to security incidents and threats.
Read more

Security Policies

Security policies are the set of rules and procedures that govern the use, access, and management of computer systems, networks, and data.
Read more

Self-Healing

Self-healing refers to the ability of a computer system or network to automatically detect, diagnose, and repair security issues or other problems.
Read more

Semiconductor Manufacturers

Semiconductor manufacturers are companies that design, develop, and produce semiconductor materials, chips, and electronic components used in electronic devices
Read more

Smart Contract Security

Smart contract security refers to the set of measures and practices used to ensure the integrity and security of blockchain-based smart contracts.
Read more

Smart Home IoT Devices

Smart home IoT devices are internet-connected devices that are designed to automate and enhance various aspects of a home.
Read more

Software Security

Software security refers to the set of measures and practices used to protect software applications from cyber attacks and data breaches.
Read more
TLS

Transport Layer Security (TLS)

Transport Layer Security (TLS) is a cryptographic protocol used to secure communications over computer networks, including the internet.
Read more
VPN

Virtual Private Networks (VPN)

A virtual private network (VPN) is a secure and private network connection that allows users to access resources and services over the internet.
Read more

Vulnerability Assessment

Vulnerability assessment is the process of identifying and assessing potential vulnerabilities and weaknesses in computer systems and networks.
Read more

Vulnerability Management

Vulnerability management is the process of identifying, prioritizing, and addressing potential vulnerabilities and weaknesses in computer systems and networks.
Read more

Wireless Security

Wireless security refers to the set of measures and practices used to protect wireless networks and devices from cyber attacks and data breaches.
Read more