A worm is a virus that can propagate without any help from a transport agent. Researchers are discovering worms that spread using IoT and can take over lights in a smart city, mine cryptocurrency, or attack the electric grid.
- [Female Instructor] A malware attack can be devastating.…As an attack can infiltrate the network…and allow unauthorized access.…Malware programs fall into one of five different classes.…Rootkits provide a backdoor for illegal access to a host.…Spyware records keystrokes and other activity…and sends it to a collection site.…Trojans appear as a useful program,…such as a game or utility,…but contains malware that allows hackers to take control…of the victim's computer remotely.…
Viruses can self-replicate yet need a way to propagate…to other hosts.…And a worm is a self-propagating virus…that can spread on it's own.…Viruses and worms are two common malicious programs.…A virus is like a human virus.…In that it can self-replicate and spread to other programs…within the system.…The results can be as simple as launching a pop-up…or more serious results such as disabling anti-virus…or destroying files.…
A virus must have a way to travel to another host,…such as an email attachment.…A worm is a virus subclass that has the ability…
In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT.
- Security, privacy, and the IoT
- Attacks and glitches
- Denial-of-sleep attacks
- Voice and sound attacks
- IoT vulnerabilities
- Glitches and compatibility issues
- Privacy concerns
- Existing standards and regulations
- Proposed standards and legislation
- Firewalls and IDS
Skill Level Intermediate
Raspberry Pi: Home Monitoring and Controlwith David Ross1h 29m Intermediate
Ethical Hacking: Mobile Devices and Platformswith Malcolm Shore1h 52m Intermediate
2. Potential Attacks and Glitches
5. Existing Standards and Regulations
6. Proposed Standards and Legislation
7. Securing IoT Devices
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.