This is an old revision of the document!
1. Name three aspects of information security 2. What is the information security risk? 3. What is the information security threat? 4. What is the information vulnerability? 5. List the vulnerabilities of web-interfaces in IoT 6. List the vulnerabilities of authentication in IoT 7. List the vulnerabilities in network services in IoT 8. List the methods of countering the vulnerabilities of web interfaces in IoT 9. List methods of countering the vulnerabilities of authentication in IoT 10. List methods of countering the vulnerabilities in network services in IoT 11. Name three methods of malware detection 12. What is the signature-based detection technique? 13. What is the behavior-based detection technique? 14. What is the WirelessHART? 15. What is the 6LoWPAN? 16. What general ways of improving IoT privacy do you know? 17. What is the inventory attack speaking of IoT threats? 18. What is the linkage threat speaking of IoT? 19. What is the profiling threat speaking of IoT? 20. What difficulties arise during authentication in IoT?