The amount of data collected by IoT devices is staggering—one household collects 15,000 data points daily. However, many IoT devices have their own 5 G connection and can activate independently, eavesdrop and collect data, and may or may not turn off when
- [Narrator] IoT devices have built-in functions…such as a microphone, a camera, and night vision,…and are the eyes, and the ears of the world.…Through controllers and cloud processing,…we now give those tiny devices…the ability to think and act autonomously.…Many devices, once booted, immediately phone home…without any prompts from the user.…Consumers are unaware of this,…along with the dangers of devices communicating,…and possibly a malicious actor,…remotely controlling the device.…
Everything from kitchen products, children's toys,…cars, and surveillance products are collecting data.…When you purchase a device and plug it in,…you may not even be aware that the device…is transmitting data.…In fact, many have a built-in 5G connection,…and won't even need to access your Wi-Fi network at home…to transmit data.…Many IoT devices have a built-in voice recognition software,…and they're always listening.…
The concern is that they're not only listening…to your voice, but other noises that the device hears…while someone is inputting information into the device.…
In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT.
- Security, privacy, and the IoT
- Attacks and glitches
- Denial-of-sleep attacks
- Voice and sound attacks
- IoT vulnerabilities
- Glitches and compatibility issues
- Privacy concerns
- Existing standards and regulations
- Proposed standards and legislation
- Firewalls and IDS
Skill Level Intermediate
Raspberry Pi: Home Monitoring and Controlwith David Ross1h 29m Intermediate
Ethical Hacking: Mobile Devices and Platformswith Malcolm Shore1h 47m Intermediate
2. Potential Attacks and Glitches
5. Existing Standards and Regulations
6. Proposed Standards and Legislation
7. Securing IoT Devices
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.