Security Definitions

  • C

    car hacking

    Car hacking is the manipulation of the code in a car's electronic control unit (ECU) to exploit a vulnerability and gain control of other ECU units in the vehicle.  

  • D

    device attack

    A device attack is an exploit in which the attacker takes advantage of a vulnerable device to gain network access.

  • E

    embedded device hacking

    Embedded device hacking is the exploiting of vulnerabilities in embedded software to gain control of the device. Attackers have hacked embedded systems to spy on the devices, to take control of them or simply to disable (brick) them.

  • embedded system security

    While trends like BYOD, the IoT and automation speed ahead, the security of embedded systems often lags. As attacks on embedded systems and firmware become more common, however, it becomes increasingly crucial to protect these ubiquitous devices.

  • I

    Identity of Things (IDoT)

    The Identity of Things (IDoT) involves assigning unique identifiers with associated metadata to devices and objects (things), enabling them to connect and communicate effectively with other entities over the Internet.

  • Internet of Things privacy (IoT privacy)

    Internet of Things privacy is the special considerations required to protect the information of individuals from exposure in the IoT environment, in which almost any physical or logical entity or object can be given a unique identifier and the ability to communicate autonomously over the Internet or similar network.

  • IoT attack surface

    The IoT attack surface is the sum total of all potential security vulnerabilities in IoT devices and associated software and infrastructure in a given network, be it local or the entire Internet.

  • IoT botnet (Internet of Things botnet)

    An IoT botnet (Internet of Things botnet) is a group of hacked computers, smart appliances and Internet-connected devices that have been co-opted for illicit purposes.

  • IoT policy (Internet of Things policy)

    An Internet of Things policy is a document that provides a comprehensive guide designed to help an organization deal with the complex issues surrounding the IoT.

  • IoT security (Internet of Things security)

    IoT security is the area of endeavor concerned with safeguarding connected devices and networks in the Internet of things (IoT). A major concern is to make sure that security remains an important part of product design for all networked devices.

  • M

    machine authentication

    Machine authentication is the authorization of an automated human-to-machine or machine-to-machine (M2M) communication through verification of a digital certificate or digital credentials. Unlike user authentication, the process does not involve any action on the part of a human.

  • man-in-the-middle attack (MitM)

    A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages between two parties who think they are communicating directly with each other.

  • meet-in-the-middle attack

    Meet-in-the-middle is a type of attack that can exponentially reduce the number of brute force permutations required to decrypt text that has been encrypted by more than one key. Such an attack makes it much easier for an intruder to gain access to data.

  • R

    RFID skimming

    RFID skimming is the wireless interception of information from RFID chip-based debit, credit and ID cards and other documents, such as passports. The purpose of RFID skimming may be simple theft or more complex identity theft. Most typically, thieves use an NFC-enabled device that records unencrypted data from the card's RFID chip, which is broadcast into the air.

  • RFID virus

    An RFID (radio-frequency identification) virus is malicious code inserted into an RFID tag to alter or corrupt data in an RFID system.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close