A securityRefers to whether or not IoT devices or data are protected from unauthorized viewers. keyA number used to encrypt (or encode) information so that no one can read it. Keys are used when encoding and decoding. You shouldn't have to mess with keys yourself. used in some systemsThis is a very generic term for any collection of components that, all together, can do something. Systems can be built from subsystems. Examples are your cell phone; your computer; the radio in your car; anything that seems like a "whole." to create individual root keysA key that is typically unique to each IoT device (but might not be) and which is used to create session keys for communication between IoT devices and IoT servers in the cloud. for IoTThe Internet of Things. A broad term covering many different applications where "things" are interconnected through the internet. devices.