The amount of devices on the IoT in the past five years has exploded. Ongoing concerns about the security and privacy of data on the IoT has led to the expanded role of NIST and OWASP in securing the IoT.
- [Instructor] Ongoing concerns about the security…and privacy of data on the IoT…has led to the expanded role of NIST and OWASP…in securing the IoT.…NIST has been in existence for over a century.…In 1901, they began as the National Bureau of Standards…and then in 1988, they became the…National Institute of Standards and Technology.…NIST is influential in advancement and…industrial competitiveness by supporting science,…standards, and technology that enhances…and improves our quality of life.…
NIST has a Cybersecurity Program for the Internet of Things,…that is in line with existing initiatives at NIST.…The program has several focus areas to encourage…and promote secure growth in the IoT market.…I'm at this webpage,…NIST Cybersecurity for the IoT Program.…Let's scroll down.…Here it talks about IoT on the rise…and predicted IoT market growth.…Down below it talks about the cybersecurity…for IoT program, and here are several focus areas.…
Fundamental research, including guidance…and best practices that address IoT security.…
In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT.
- Security, privacy, and the IoT
- Attacks and glitches
- Denial-of-sleep attacks
- Voice and sound attacks
- IoT vulnerabilities
- Glitches and compatibility issues
- Privacy concerns
- Existing standards and regulations
- Proposed standards and legislation
- Firewalls and IDS
Skill Level Intermediate
Raspberry Pi: Home Monitoring and Controlwith David Ross1h 29m Intermediate
Ethical Hacking: Mobile Devices and Platformswith Malcolm Shore1h 47m Intermediate
2. Potential Attacks and Glitches
5. Existing Standards and Regulations
6. Proposed Standards and Legislation
7. Securing IoT Devices
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.