Security Strategy Definitions

  • E

    embedded system security

    While trends like BYOD, the IoT and automation speed ahead, the security of embedded systems often lags. As attacks on embedded systems and firmware become more common, however, it becomes increasingly crucial to protect these ubiquitous devices.

  • I

    Identity of Things (IDoT)

    The Identity of Things (IDoT) involves assigning unique identifiers with associated metadata to devices and objects (things), enabling them to connect and communicate effectively with other entities over the Internet.

  • Internet of Things privacy (IoT privacy)

    Internet of Things privacy is the special considerations required to protect the information of individuals from exposure in the IoT environment, in which almost any physical or logical entity or object can be given a unique identifier and the ability to communicate autonomously over the Internet or similar network.

  • IoT attack surface

    The IoT attack surface is the sum total of all potential security vulnerabilities in IoT devices and associated software and infrastructure in a given network, be it local or the entire Internet.

  • IoT policy (Internet of Things policy)

    An Internet of Things policy is a document that provides a comprehensive guide designed to help an organization deal with the complex issues surrounding the IoT.

  • IoT security (Internet of Things security)

    IoT security is the area of endeavor concerned with safeguarding connected devices and networks in the Internet of things (IoT). A major concern is to make sure that security remains an important part of product design for all networked devices.

  • M

    machine authentication

    Machine authentication is the authorization of an automated human-to-machine or machine-to-machine (M2M) communication through verification of a digital certificate or digital credentials. Unlike user authentication, the process does not involve any action on the part of a human.

  • U

    universal authentication

    Universal authentication is a network identity-verification method that allows users to move from site to site securely without having to enter identifying information multiple times.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close