38 terms
Mobile and IoT security terms
Mobile and Internet of Things (IoT) security terms define numerous tools, technologies, and cybersecurity solutions used in mobile phones or smart appliances. In this glossary, learn about biometric authentication, APK’s, firmware and other mobile or IoT related terms.
Mobile Application Security Testing
Mobile application security testing (MAST) refers to the process of assessing mobile apps to identify security vulnerabilities.
Wearable computer
A wearable computer refers to a compact electronic gadget created for wearing on the body, delivering computational functionality and connectivity for its users.
VeriChip
VeriChip is a human microchip implant, the size of a grain of rice, intended to be used for identification and accessing a person’s medical records through a unique ID.
Vehicle-to-Infrastructure
Vehicle-to-Infrastructure is the communication framework for the wireless exchange of data between vehicles and smart infrastructure.
USB Restricted Mode
USB Restricted Mode is a security feature implemented by Apple on iOS devices to protect the data on the device.
Ubiquitous computing
Ubiquitous computing is the concept of seamlessly integrating technology into our everyday lives through connected electronic devices (e.g., smart products).
Smart meter
A smart meter is a device that records information like electricity, gas, and water consumption.
Smart grid
The term “smart grid” refers to a system of transformers, substations, and other electrical devices, combined with advanced technology to monitor and control the energy supply chain.
Smart dust
Smart dust consists of tiny microelectromechanical systems (MEMS) like sensors and robots that can detect environmental factors such as light, temperature, and chemicals.
Smart device
A smart device is an electronic gadget that’s connected to the internet and can do more than its basic functions.
Smart bulb
A smart bulb is a type of IoT device that enables the user to customize, schedule, and control a lightbulb through an internet connection.
SIM toolkit
The SIM toolkit, often abbreviated as STK, is a standard set of applications and commands that reside on the SIM card and enable it to interact with the user and device, offering various functionalities beyond the core call and messaging services.
Sideloading
Sideloading is downloading and installing an application or program from a third-party source rather than the official retailer.
Rooting
Rooting refers to “unlocking” your Android smartphone’s operating system.
QuadRooter
QuadRooter is a group of four vulnerabilities on Android devices with Qualcomm chipsets.
Operational technology
Operational technology is software and hardware technology that detects or controls assets, processes, equipment, and events.
Mobile workforce
Mobile workforce refers to various groups of employees in many industries, not confined to traditional office environments.
Mobile web
The mobile web refers to accessing and using the internet on various mobile devices, such as tablets, smartphones, and some types of computer devices.
Mobile tagging
Mobile tagging refers to the practice of attaching specific markers, such as barcodes or QR codes, to physical objects for easy identification.
Mobile station international subscriber directory number
Mobile station international subscriber directory number (MSISDN) refers to the number that is uniquely associated with every SIM card in GSM and UMTS networks.
Mobile credential
A mobile credential is a digital representation of electronic identification documents stored and accessed on a mobile device (e.g., smartphone or table).
Mobile code
Mobile code is a type of code that runs on mobile devices like smartphones and tablets.
MAM
MAM is software used to secure and enable control and monitoring of applications used by employees on a company’s and personal mobile devices.
Machine to Machine
Machine to Machine (M2M) enables direct communication between devices through wired or wireless channels, eliminating the need for human intervention.
Jailbreaking
Jailbreaking is a term used to describe the removal of restricted mode on iPhones.
IP camera
An IP camera is a digital video camera that can transmit data over the internet or a local network.
IoT middleware
IoT middleware is the software that makes communication between different components possible.
IoT gateway
An IoT gateway serves as a way for smart IoT (Internet of Things) devices to get access to the internet.
Internet of Medical Things
The Internet of Medical Things is the interplay between internet-connected medical devices, software, IT systems, and healthcare services.
Internet of Everything
The Internet of Everything is a philosophy connecting smart devices, data, and people over the global internet.
Internet of Bodies
The Internet of Bodies is the result of integrating Internet of Things (IoT) technologies with the human body.
Industrial internet of Things (IIoT)
Industrial internet of things (IIoT) refers to using internet-connected devices to collect and analyze data across the company.
IMEI
International Mobile Equipment Identity, or IMEI, is a code that every mobile device has.
Firmware over-the-air
Firmware over-the-air (FOTA) refers to the process of remotely updating or upgrading firmware on devices wirelessly, typically over a network connection.
Face ID
Face ID, or facial recognition technology or facial recognition authentication, is a biometric technology.
Embedded software
Embedded software is software that is specifically built for a device.
Bricking
Bricking defines a state where an electronic device becomes completely unresponsive and can’t function or be easily repaired.
The importance of mobile and IoT security terminology
Whether you’re using public Wi-Fi or accessing smart gadgets, understanding the terminology of mobile and IoT security can help you improve your technical knowledge and recognize potential cyber threats before they occur.
Expand your technical know-how
In the glossary, you’ll find detailed definitions of the most common mobile and IoT security terms — perfect for those who want to know more about their systems.
Safeguard against threats
Learning the basic mobile and IoT security terms can improve your skill in understanding system vulnerabilities and noticing the threats before they can do damage.
Protect your gadgets
Be it smartphone or smart fridge, learning how mobile and IoT security works will provide you options to safeguard your devices from malicious actors.
Online security starts with a click.
Stay safe with the world’s leading VPN
Explore related glossary categories
Can’t find an answer to your question?
Ask the questions that matter to you — and get answers from our cybersecurity experts.