Key terms/definitions
In this section, we’ll discuss some of the key concepts in the field of IoT security:
- Air-gapped systems: Having an air-gapped system means not connecting two or more networks unless there is a specific need for connection and it is implemented primarily to reduce the probability of security attacks – a threat actor can’t use the vulnerability in one network to target other connected networks.
- Asymmetric encryption: Asymmetric encryption uses a public key for encryption and a private key for decryption, unlike symmetric encryption, where the same key is used for both encryption and decryption. Asymmetric encryption requires more computational power than symmetric encryption but provides more robust security.
- Attack vector: Attack vector refers to the method and/or mechanism used by threat actors to compromise the security of the system.
- Authentication: Authentication refers to the ability of the receiver to verify whether...