Matching Pairs IoT securityOnline version IoT security simple questions by Patricia Muñoz 1 Authentication 2 IoT Device 3 Data breach 4 Encryption 5 Vulnerability 6 Firewall When information is stolen or exposed illegally A software/hardware system that blocks unauthorized access Confirming identity before access is granted A smart device connected to the internet The process of encoding information to protect it A weak point that can be exploited by hackers