Encryption
Decryption
Locking
Registering
Signaling
Security
Power Detection
Power Consunmption
Confidentiality
Integrity
None of these
Both of these
Eclipse Kura
Red Hat
Intercloud
Bot 2 Bot
name of spouse
Name of hobby
Contains multiple random digit with special charactor
None of the above
e-Government related
Enterprise
company based
Business oriented plateform
Spam
Injection
Spoofing
DoS attack
Authentication
Authoring
Authorization
Accounting
HTTPS
SSL
SMTP
SFTP
Protocol abstraction
Simple and fast installation
Security with hardware
Data storage
Smartphones
Tablet and PCs
Smart Watches
All of the above
Phishing
Surfing
Trojan horse
Wamp
Request-response model
Push-pull model
Publish-subscribe model
All of these
physical computing
chemical computing
mechanism
cloud computing
Coulomb's Law
Lenz's Law
Fleming's Right-hand Rule
Fleming's Left-hand Rule
Transparent, slide
Translucent, transparency
Opaque, flip chart
Opaque, transparency
time slice
RMS
cooperative multitasking
pre-emptive
Cloud initiated communication
TLS / SSL
IPS (Instrusion Prevention System)
Firewalll
avrgcc
g++
cpython
avrdude
TCP
HTTP
IP
FTP
Service provider
SaaS
IaaS
None
DoS
DDoS
Brute force
Passive
CPU, ROM, I/O ports and timers
RAM, ROM, 1/0 ports and timers
PU, RAM, 1/O ports and timers
CPU, RAM, ROM, I/O ports and timers
DREAD
OWASP
STRIDE
DAR
Setting a selected bit of R
Clearing a selected bit of R
Complement selected bit of R
Simplex
Duplex
Full-Duplex
Process
People
Things
Revealing
Eavesdropping
Availability
Power Consumption
Presence Detection
Systems
Devices
Networks
Services
XMPP
SPI
MQTT
A router
A Firewall
A Network Protocol
Python Shell
Standard
Regulation
Internet
32
64
8
16
Subject
Body
Address
Salutation
Improve usability and interoperability
Reduce the security
Complicate the development
Increase the cost
Experiment
Inquiry
Investigation
Virus
Natural Disaster
Biometric Data
Passwords
Private data
backup
NANO
OCTAVE
PASTA
DSL
W3C
MIT
Firewall
Signal
Machine to machine
Interconnected
Network
Port address
MAC address of Device
Unique identifier of the parameter
Unique identifier of the device
Asset
Vulnerability
Threat
Time
Principle of least privilege
Defence in depth
Attack surface
Eelipse Kapua
Mirai botnet
cipher
Ethernet
Stuxnet