The line between IoT data collection and privacy is beginning to blur. Unless regulated, businesses can use the data to make decisions on insurance premiums and hiring practices.
- The potential of massive surveillance…comes with the overall awareness…that our lives are being followed everywhere.…Law enforcement places cameras, throughout cites,…that are capable of tracking our every move.…Experts argue that surveillance is necessary…in order to provide better planning,…more efficient energy use…and improved parking and health benefits.…However, in some cases it's hard to separate…what device is helpful and what might cause…a risk to security and privacy.…
Every day sensors, cameras and devices…collect data on what we do, where we drive,…what we purchase and even activity in our homes.…In addition, if we were speeding or missed a stoplight,…sensors can collect that information and send it somewhere.…IoT devices range from fitness trackers…to cars and medical devices.…In addition, the data on the device itself…could be subject to admission in court.…
Was that heart rate increase due to exercising…or were you doing something illegal?…Recent reports from the Federal Trade Commission…notes that researchers are now concerned…
In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT.
- Security, privacy, and the IoT
- Attacks and glitches
- Denial-of-sleep attacks
- Voice and sound attacks
- IoT vulnerabilities
- Glitches and compatibility issues
- Privacy concerns
- Existing standards and regulations
- Proposed standards and legislation
- Firewalls and IDS
Skill Level Intermediate
Raspberry Pi: Home Monitoring and Controlwith David Ross1h 29m Intermediate
Ethical Hacking: Mobile Devices and Platformswith Malcolm Shore1h 47m Intermediate
2. Potential Attacks and Glitches
5. Existing Standards and Regulations
6. Proposed Standards and Legislation
7. Securing IoT Devices
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.