COBIT is a set of IT security standards designed to provide a framework for best practices. It ensures the privacy and security of trade secrets, personal information, and company-specific data.
- [Instructor] Because of the rapidly changing…IT landscape businesses and industry leaders…constantly face the challenge…of managing and governing their complex…information technology infrastructure.…COBIT or control objectives for IT…helps navigate the challenge…of providing information assurance,…security, and risk mitigation.…COBIT is a set of IT principles…that provides a best practice framework…designed to safeguard the privacy and security…of company-specific data, such as trade secrets…and personal information to ensure value…for its stakeholders.…
COBIT divides the framework into four domains…that include plan and organize,…acquire and implement, deliver and support,…and monitor and evaluate.…It's a high level position and helps to contribute…to ensure regulatory compliance.…Security controls must provide…acceptable levels of protection and reduction of risks.…IT and business roles are changing.…
More and more people in the business role…will require IT skills…and be involved in IT decisions and procedures.…
In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT.
- Security, privacy, and the IoT
- Attacks and glitches
- Denial-of-sleep attacks
- Voice and sound attacks
- IoT vulnerabilities
- Glitches and compatibility issues
- Privacy concerns
- Existing standards and regulations
- Proposed standards and legislation
- Firewalls and IDS
Skill Level Intermediate
Raspberry Pi: Home Monitoring and Controlwith David Ross1h 29m Intermediate
Ethical Hacking: Mobile Devices and Platformswith Malcolm Shore1h 47m Intermediate
2. Potential Attacks and Glitches
5. Existing Standards and Regulations
6. Proposed Standards and Legislation
7. Securing IoT Devices
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.