Relier Pairs IoT securityVersion en ligne IoT security simple questions par Patricia Muñoz 1 Authentication 2 Encryption 3 Firewall 4 Vulnerability 5 Data breach 6 IoT Device A weak point that can be exploited by hackers A smart device connected to the internet The process of encoding information to protect it Confirming identity before access is granted When information is stolen or exposed illegally A software/hardware system that blocks unauthorized access