Privacy is being free from unwelcome observation. The massive amounts of IoT devices pervasively collecting data will ultimately will affect privacy and transform lives for decades.
- [Instructor] The term privacy…correlates to a number of different concepts…including free from being observed or disturbed,…or protecting the information you don't want others to know,…such as personal information.…In today's society, there seems to be…so much online that personal privacy is fading away.…Many people enjoy sharing information via social media.…This type of sharing is voluntary…and ranges from significant life events…to trivial details about visiting a restaurant.…
Social media reminds us that you may want to…enforce privacy settings by notifying you…that you can choose who can see your post.…Lisa, you've recently shared to a post to Public.…We want to make sure that you know…that you can choose a different audience for every post.…To learn how, check out our Privacy Basics.…Many blogs and posts share information…about how we shouldn't post inappropriate content…or any personal information about you…or your family or company business.…
Many of us even disable geotagging on our cellphone.…Law enforcement practices surveillance…
In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT.
- Security, privacy, and the IoT
- Attacks and glitches
- Denial-of-sleep attacks
- Voice and sound attacks
- IoT vulnerabilities
- Glitches and compatibility issues
- Privacy concerns
- Existing standards and regulations
- Proposed standards and legislation
- Firewalls and IDS
Skill Level Intermediate
Raspberry Pi: Home Monitoring and Controlwith David Ross1h 29m Intermediate
Ethical Hacking: Mobile Devices and Platformswith Malcolm Shore1h 47m Intermediate
2. Potential Attacks and Glitches
5. Existing Standards and Regulations
6. Proposed Standards and Legislation
7. Securing IoT Devices
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.