Protocol abstraction
Simple and fast installation
Security with hardware
Data storage
Putting your intelligence into computer
Programming with you own intelligence
Making a machine intelligence
Putting more memory into computer
A key on your key chain
A key given to the public
A key not to be given to the public
A key that opens a secret door
Security
Process
People
Things
Bot-to-Bot(B2B)
Machine-to-Machine (M2M)
InterCloud
Skynet
Satoshi Nakamoto
Samsung
John Macfee
Chaina
A distributed ledger on a peer-to-peer network
A type of Cryptocurrency
An exchange
A centralized ledger
No system hardening
No mechanism for updating software
Default or hardcoded passwords
All of the above
Web robot
WWW robot
Both (A) and (B)
None of these
Crack a password or username
Find a hidden web page
find the key used to encrypt a message
Injection Attack
Brute force attack
Session Hijacking
DoS
DDoS
Brute Force
Passive
Keep changing your password
Update your every device
Avoid using devices that are risky
Virus
Natural Disaster
Spoofing
DREAD
OWASP
STRIDE
DAR
Asset
Vulnerability
Threat
Time
Make good use of technology
Clean up and get organized
Concentrate on one key task at a time
Port address
MAC address of Device
Unique identifier of the parameter
Unique identifier of the device
Signaling
Power Consumption
Presence Detection
CPU, ROM, I/O ports and timers
RAM, ROM, 1/0 ports and timers
PU, RAM, 1/O ports and timers
CPU, RAM, ROM, I/O ports and timers