IOT, Edge Computing, Cybersecurity and Privacy Flashcards

1
Q

refers to a network of
interconnected devices that communicate and exchange
data over the internet.

A

Internet of Things (IoT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

data is sent to remote servers (data
centers) for processing.

A

cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

processes data locally, either on the device itself or on
a nearby edge server, reducing the need to send data to the cloud.

A

Edge computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

focuses on safeguarding networks,
devices, and data from malicious attacks, unauthorized
access, and other vulnerabilities.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ensures that
individuals’ personal data is protected and not misused.

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Devices that collect data from the physical
environment (e.g., temperature, humidity, motion sensors).

A

Sensors and Actuators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Communication protocols like Wi-Fi, Bluetooth, Zigbee, or
5G that connect devices to networks or the internet.

A

Connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Devices send data to centralized systems or the cloud
for analysis.

A

Data Processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Software applications that allow users to interact with IoT
systems and make decisions.

A

User Interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IoT enables devices like thermostats, lighting, security cameras, and
appliances to be interconnected, making homes more energy-efficient and secure.

A

Smart Homes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IoT facilitates remote patient monitoring through wearables that
track vital signs and send alerts in real-time to healthcare providers.

A

Healthcare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Factories and industries use sensors to monitor equipment performance,
predict maintenance needs, and optimize production, leading to increased efficiency and
reduced downtime.

A

Industrial IoT (IIoT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IoT contributes to the development of smart cities by connecting traffic lights,
waste management systems, and public utilities, resulting in optimized resource use and
better public services.

A

Smart Cities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In autonomous vehicles, edge computing is
crucial for processing sensor data in real-time to make immediate driving
decisions, such as obstacle detection and route planning.

A

Real-Time Decision Making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Smart manufacturing systems use edge computing to

instantly detect machine malfunctions and adjust production lines in real-
time, minimizing downtime.

A

Reduced Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Edge computing reduces the amount of data sent
to cloud servers, which is particularly important for IoT devices that
generate massive amounts of data, such as security cameras, drones, and
smart meters.

A

Bandwidth Optimization

17
Q

Malicious software like viruses, worms, ransomware, and spyware
that damage systems or steal information.

A

Malware

18
Q

Fraudulent attempts to obtain sensitive information (e.g.,
passwords, credit card numbers) by disguising as trustworthy entities via
email or websites.

A

Phishing

19
Q

Attacks that flood a network with traffic,
overwhelming it and causing a shutdown of services.

A

Denial of Service (DoS/DDoS)

20
Q

Interception of communication between two
parties to eavesdrop or alter information being exchanged.

A

Man-in-the-Middle (MITM)

21
Q

Data is encrypted both at rest and in transit to protect it from unauthorized
access. Modern encryption protocols, such as AES (Advanced Encryption Standard), ensure
that sensitive information like financial records and healthcare data remains secure.

A

Encryption

22
Q

adds an extra layer of security beyond just
passwords, requiring users to verify their identity through additional means (e.g., biometrics,
SMS codes).

A

Multi-Factor Authentication (MFA)

23
Q

monitor incoming and outgoing network traffic and block potentially
harmful data packets. They are a fundamental line of defense in preventing unauthorized
access to systems.

A

Firewalls

24
Q

In this approach, no user or device is automatically trusted, whether
inside or outside the organization. Access is granted based on strict verification, reducing the
risk of insider threats or compromised accounts.

A

Zero Trust Architecture

25
Q

Companies often collect vast amounts of user data, which
can include personal details, location information, and online activity. This
raises concerns about how data is used and shared.

A

Data Collection

26
Q

Third-party sharing of user data without consent is a significant
privacy issue, particularly in industries like advertising, where personal
information is sold for targeted marketing.

A

Data Sharing

27
Q

Unauthorized access to sensitive data can result in identity
theft, financial fraud, and other serious consequences for individuals.

A

Data Breaches

28
Q

Only collecting the data that is necessary for a specific purpose,
reducing the risk of exposure and misuse.

A

Data Minimization

29
Q

Techniques such as data anonymization remove or mask
personally identifiable information (PII) so that individuals cannot be traced back
through the data.

A

Anonymization

30
Q

Legislation like the GDPR (General Data Protection
Regulation) in the EU and CCPA (California Consumer Privacy Act) in the US sets
strict guidelines for how organizations can collect, process, and store user data,
ensuring that individuals’ privacy rights are respected.

A

Compliance with Regulations

31
Q

Implementing transparent mechanisms for user consent, giving
individuals control over their data and how it is used.

A

User Consent

32
Q

Ensuring that data is encrypted at the edge
before it is transmitted to other devices or the cloud.

A

Encryption at the Edge

33
Q

Ensuring that only authorized devices can connect to
the IoT network to prevent spoofing or unauthorized access.

A

Authentication

34
Q

Edge computing can enable faster
detection and mitigation of cyberattacks on IoT devices, as
processing happens locally, reducing latency.

A

Real-Time Threat Detection