Definitions and Fundamentals
Ethical Issues in Edge Computing & IoT
The Future of Edge Computing and IoT
How Edge Computing Enhances IoT
Security Challenges
100

The unabbreviated form of IoT

What is the Internet of Things

100

This issue happens when personal information is shared without permission.

What is Data Privacy?

100

This security method ensures only trusted devices and people access sensitive information.

What is Zero Trust?

100

This helps devices act quickly by reducing the time it takes to send data back and forth.

What is Reduced Latency?

100

This happens when IoT devices don’t have proper protection like strong passwords or updates.

What is Device Vulnerability?

200

This term refers to performing computations locally on devices rather than relying on cloud servers.

What is Edge Computing?

200

This term refers to organizations being transparent about what data they collect and how it is processed.

What is Data Transparency? 

200

This trend shifts from cloud storage, giving people control over their own data.

What is Decentralization?

200

This advantage enhances data protection by keeping sensitive information processed and stored locally.

What is Improved Privacy and Data Security?

200

This method of security asks users for multiple proofs of identity to keep data safe.

What is Multi-Factor Authentication?

300

This involves interconnected devices on a network that exchange data autonomously to achieve a goal.

What is the Internet of Things? (IoT)

300

This allows people to decide what data they want to share with their devices.

What is User Consent?

300

These wearable devices will keep improving healthcare by providing real-time data about a person’s health.

What are Smart Wearables?

300

Allows real-time decisions to be made at the device level rather than in a centralized system.

What is Efficient Local Data Processing?

300

This ensures that data is protected while being sent to and from IoT devices.

What is Secure Data Transfer?

400

These are devices like gateways or mini data centers that process data locally at the edge.

What are Edge Devices?

400

This technique addresses privacy by processing data to prevent exposure of sensitive information.

What is Privacy-Preserving Data Processing?

400

This problem occurs when data is spread across multiple devices, making it hard to manage.

What is Data Fragmentation?

400

This advantage allows businesses to scale IoT systems efficiently without high cloud costs.

What is Reduced Cost and Increased Scalability?

400

Government Exploitation of IoT for mass surveillance without user consent.

What is Surveillance & Government 

500

What are the 3 Main Networks used by the IoT?

What is WiFi, Bluetooth, and Cellular?

500

This issue stems from government surveillance using IoT, potentially violating civil rights.

What is Surveillance and Smart Policing?

500

This technology enables devices to make smart AI-driven decisions without distant servers.

What is AI at the Edge?

500

This benefit optimizes network use by sending only relevant data to the cloud.

What is Bandwidth Efficiency?

500

 This technology lets people control who sees their data in an IoT system.

What is Blockchain?