Sarbanes-Oxley (SOX) is a set of compliance requirements outlined for public companies. The requirements specify methods to create and sustain security controls and procedures, as well as conduct a yearly audit.
- [Instructor] US lawmakers created…the 2000s Sarbanes-Oxley Act, or SOX,…in response to a number of corporate accounting scandals…occurring between the years 2000 and 2002.…Let's take a look.…I'm at this website here where we can see the 10 worst…corporate accounting scandals of all times.…In 1998, Waste Management reported 1.7 billion dollars…in fake earnings.…
In 2002, Worldcom inflated assets by as much as 11 billion.…In 2002, Tyco's CEO stole 150 million,…and then also inflated company income by 500 million.…In 2003, Healthsouth inflated estimated earnings…by 1.4 billion.…
And in 2003, Freddie Mac misstated five billion in earnings.…Although all scandals were significant,…in the early 2000s, Enron was a large financially sound…Texas-based company, and was involved in a number of…energy-related ventures, such as oil refineries…and power plants.…Enron committed a number of different crimes,…along with fraudulent reporting that were extensive…and ongoing.…
Shareholders eventually lost 74 billion dollars.…The Enron scandal pushed the American public and Congress…
In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT.
- Security, privacy, and the IoT
- Attacks and glitches
- Denial-of-sleep attacks
- Voice and sound attacks
- IoT vulnerabilities
- Glitches and compatibility issues
- Privacy concerns
- Existing standards and regulations
- Proposed standards and legislation
- Firewalls and IDS
Skill Level Intermediate
Raspberry Pi: Home Monitoring and Controlwith David Ross1h 29m Intermediate
Ethical Hacking: Mobile Devices and Platformswith Malcolm Shore1h 47m Intermediate
2. Potential Attacks and Glitches
5. Existing Standards and Regulations
6. Proposed Standards and Legislation
7. Securing IoT Devices
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.