Home Mobile and IoT security terms

38 terms

Mobile and IoT security terms

Mobile and Internet of Things (IoT) security terms define numerous tools, technologies, and cybersecurity solutions used in mobile phones or smart appliances. In this glossary, learn about biometric authentication, APK’s, firmware and other mobile or IoT related terms.

Mobile Application Security Testing

Mobile application security testing (MAST) refers to the process of assessing mobile apps to identify security vulnerabilities.

Wearable computer

A wearable computer refers to a compact electronic gadget created for wearing on the body, delivering computational functionality and connectivity for its users.

VeriChip

VeriChip is a human microchip implant, the size of a grain of rice, intended to be used for identification and accessing a person’s medical records through a unique ID.

Vehicle-to-Infrastructure

Vehicle-to-Infrastructure is the communication framework for the wireless exchange of data between vehicles and smart infrastructure.

USB Restricted Mode

USB Restricted Mode is a security feature implemented by Apple on iOS devices to protect the data on the device.

Ubiquitous computing

Ubiquitous computing is the concept of seamlessly integrating technology into our everyday lives through connected electronic devices (e.g., smart products).

Smart meter

A smart meter is a device that records information like electricity, gas, and water consumption.

The importance of mobile and IoT security terminology

Whether you’re using public Wi-Fi or accessing smart gadgets, understanding the terminology of mobile and IoT security can help you improve your technical knowledge and recognize potential cyber threats before they occur.

Expand your technical know-how

In the glossary, you’ll find detailed definitions of the most common mobile and IoT security terms — perfect for those who want to know more about their systems.

Safeguard against threats

Learning the basic mobile and IoT security terms can improve your skill in understanding system vulnerabilities and noticing the threats before they can do damage.

Protect your gadgets

Be it smartphone or smart fridge, learning how mobile and IoT security works will provide you options to safeguard your devices from malicious actors.

Two women learning cybersecurity terminology.

Online security starts with a click.

Stay safe with the world’s leading VPN

Can’t find an answer to your question?

Ask the questions that matter to you — and get answers from our cybersecurity experts.