By 2020, there will be seven IoT devices for every human being on Earth. These devices will collect massive amounts of data on a continuous basis, and be a threat to privacy as few will be free from unwelcome observation.
- [Instructor] As consumers we need to be aware that the IoT device we just purchased will most likely be storing our sensitive information. In addition, it may be transferring data to other devices or to the cloud. We need to ensure that the device is authentic and that we can trust it. Many times hackers try to obtain sensitive information for financial gain or extortion. If the device doesn't conceal or protect the data someone can gain access to the information.
When faced with the prospect of all these things collecting massive amounts of data there comes with it privacy concerns which may affect our own collective security. Companies have specific guidelines on what to collect, how much data to collect, and that they are to hold the data only as long as necessary. We can apply privacy settings to our browser. When we shop online many times we'll see a privacy notice.
Many policies are very similar. This policy covers the personal information that we collect through our sites. Personal information is information is information that identifies you personally. An example of personal information includes your name, address, email address, telephone number, and the information you provide when you request a catalog, subscribe to a newsletter, or make a purchase at one of our online stores.
However, when thinking about the Internet of Things and security we're introducing a new paradigm. Compromising the privacy of our information. When you launch an IoT device you most likely won't see a privacy notice. Businesses and consumers are recognizing the value of integration of IoT products and systems into their infrastructure. However, securing the IoT is different than securing a data center.
The IoT will bring challenges of ensuring security and privacy. Businesses and consumers will need reassurance that the IoT data will remain in its original form and be available only to someone with appropriate permissions. IoT devices are constantly collecting massive amounts of data and are a threat to our privacy as we may no longer be free from unwelcome observation.
In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT.
- Security, privacy, and the IoT
- Attacks and glitches
- Denial-of-sleep attacks
- Voice and sound attacks
- IoT vulnerabilities
- Glitches and compatibility issues
- Privacy concerns
- Existing standards and regulations
- Proposed standards and legislation
- Firewalls and IDS