Reports of the CIA and MI5 hacking into smart devices to eavesdrop on private conversations are giving consumers more reason for concern. In addition to the security flaws that IoT devices have, there's also concern that governments are using IoT devices
- [Instructor] George Orwell wrote 1984,…a story that depicts a time…where Big Brother watches everything.…In January 2017, this classic book appeared…on New York Times best-seller list,…which may be in response to news of the CIA…hacking into smart devices to eavesdrop…on private conversations.…WikiLeaks reported that the CIA had a project…named Weeping Angel…that worked on certain Internet-connected models…of Samsung TVs.…
By using a fake off mode, the TV may appear that it's off,…but the power continues to run,…so that the device can collect audio and video…of anything in the room.…One indication that your device has been hacked…is that there is a blue LED light in the back of the set…that remains lit.…To truly know you're not being watched or listened to,…experts suggest to simply unplug the device.…Many devices have voice-activated services.…
In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT.
- Security, privacy, and the IoT
- Attacks and glitches
- Denial-of-sleep attacks
- Voice and sound attacks
- IoT vulnerabilities
- Glitches and compatibility issues
- Privacy concerns
- Existing standards and regulations
- Proposed standards and legislation
- Firewalls and IDS
Skill Level Intermediate
Raspberry Pi: Home Monitoring and Controlwith David Ross1h 29m Intermediate
Ethical Hacking: Mobile Devices and Platformswith Malcolm Shore1h 52m Intermediate
2. Potential Attacks and Glitches
5. Existing Standards and Regulations
6. Proposed Standards and Legislation
7. Securing IoT Devices
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.