IoT connecting things

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Risks of cloud computing

Abuse and evil use of cloud computing Insecure interfaces Data loss or leakage Account or service hijacking

Edge computing

At the edge of a typical enterprise network is a network of IoT-enabled devices consisting of sensors and perhaps actuators

Cloud security as a service

In the context of cloud computing, cloud security as a service, designated SecaaS, is offered by CSP. The Cloud Security Alliance (CSA) defines SecaaS as the provision/facility of security applications and services via the cloud

Message Queuing Telemetry Transport (MQTT)

Newer application protocols created to support IoT devices, is a lightweight messaging protocol with minimal overhead for remote.

4G/5G

This mature technology makes it possible for IoT devices to take advantage of communications over large geographic areas. Fourth Generation is the current cellular-based technology for transferring data.

controller

are responsible for collecting data from sensors and providing network or Internet connectivity. may have the ability to make immediate decisions, or they may send data to a more powerful computer for analysis.

open-loop control system

do not use feedback, instructs the plant to perform a predetermined action without any verification of the desired results.

control system

includes a controller that uses inputs and outputs to manage and regulate the behavior of the system in an attempt to achieve a desired state. The ____ portion of the system, the process and the actuator, is often called the plant

IT

information technology

actuators

is a basic motor that can be used to move or control a mechanism or system, based on a specific set of instructions.

sensors

is a device that can be used to measure a physical property by detecting some type of information from the physical world. This information could be light, moisture, motion, pressure, temperature, or any other environmental condition

ZigBee

is a low-energy, low-power, low-data rate wireless protocol specification used to create personal area network, PANs. Cheaper than Bluetooth and Wi-fi.

LoRaWAN

is a network protocol intended for wireless battery-operated things in regional, national or global networks. targets key requirements of the Internet of Things such as secure bi-directional communication, mobility and localization services.

cloud computing

is a service that offers on-demand access to a shared pool of configurable computing resources. Often deployed off-premises, these resources can be made available quickly with minimal management effort

Bluetooth

is a wireless protocol used for data communication over short distances. Communication between devices takes place through a short-range wireless network called a personal area network.

Low-Power Wide-Area Networks (LPWAN)

is designed to support long range communications for low bit rate devices such as sensors, actuators, and controllers.

feedback

is when the output of a system, or process, affects the input, is also often referred to as a ____ loop. This is because the input results in output that is continually resampled and used as new input.

OT

operational technology

controlled systems

sensors, actuators, controllers and processers

embedded systems

specified functions real-time operation tiny and lightweight limited power resources operate at hazardous and critical areas their cost must be low

closed-loop control system

uses feedback to determine whether the collected output is the desired output. can continually adjust the output based on the desired state (the input) and measured state from the previous loop through the system.

processes

uses inputs to execute the right actions to achieve the desired output. is a series of steps or actions taken to achieve a desired result by the consumer of the process. is a set of rules that govern the series of steps or actions in the process.

impact of IoT on privacy

· Confidentiality · Data Access Control · Dealing with Huge Amount of Data Challenges for Securing IoT Devices

Benefits of cloud computing

· Geographic diversity · Platform and infrastructure diversity Big advantage is to store your data and share it with others.

Security issues for cloud computing

· Security is a major consideration when augmenting or replacing on-premises systems with cloud services Availability, auditability etc.

Fog computing

· computing devices are deployed physically near the edge of the IoT network near the sensors and other data-generating devices


Ensembles d'études connexes

NURS 486 MOC III Exam #2: GI ATI Notes

View Set

Chapter 11: Income and Expenditure

View Set

Chapter 11 - The Health Care Delivery System

View Set

Patho CYU Chapters 27, 28, 29, 31, 33

View Set

Financial Accounting - Module 3: Introduction to the accounting cycle

View Set