Security Strategy Definitions

  • E

    embedded system security

    Embedded system security is a strategic approach to protecting software running on embedded systems from attack. An embedded system is a programmable hardware component with a minimal operating system and software.

  • I

    Identity of Things (IDoT)

    The Identity of Things (IDoT) involves assigning unique identifiers with associated metadata to devices and objects (things), enabling them to connect and communicate effectively with other entities over the Internet.

  • Internet of Things privacy (IoT privacy)

    Internet of Things privacy is the special considerations required to protect the information of individuals from exposure in the IoT environment, in which almost any physical or logical entity or object can be given a unique identifier and the ability to communicate autonomously over the Internet or similar network.

  • IoT attack surface

    The IoT attack surface is the sum total of all potential security vulnerabilities in IoT devices and associated software and infrastructure in a given network, be it local or the entire Internet.

  • IoT policy (Internet of Things policy)

    An Internet of Things policy is a document that provides a comprehensive guide designed to help an organization deal with the complex issues surrounding the IoT.

  • IoT security (internet of things security)

    IoT security is the technology area concerned with safeguarding connected devices and networks in the internet of things (IoT).

  • M

    machine authentication

    Machine authentication is the authorization of an automated human-to-machine or machine-to-machine (M2M) communication through verification of a digital certificate or digital credentials. Unlike user authentication, the process does not involve any action on the part of a human.

  • U

    universal authentication

    Universal authentication is a network identity-verification method that allows users to move from site to site securely without having to enter identifying information multiple times.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close