Author
Updated
7/28/2020Released
8/18/2017In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT.
- Security, privacy, and the IoT
- Attacks and glitches
- Denial-of-sleep attacks
- Voice and sound attacks
- IoT vulnerabilities
- Glitches and compatibility issues
- Privacy concerns
- Existing standards and regulations
- Proposed standards and legislation
- Firewalls and IDS
- Blockchain
Skill Level Intermediate
Duration
Views
- [Lisa] The Internet of Things is an emerging technology that is expanding quickly with huge gaps in security and is plagued with vulnerabilities, malware, and the potential to disrupt infrastructure. In this course, we'll discover how cyber attacks, along with compromised privacy, is increasing due to serious vulnerabilities in IoT devices. We'll review the proposed standards and legislation in the works to ensure privacy of data collected on the Internet of Things. In addition, we'll learn how to layer on security methods by using firewalls, intrusion detection systems, and anti-malware protection along with cryptographic techniques in order to defend against the next attack. Hello, my name is Lisa Bock and I'm a security ambassador. If you're ready to learn about the many vulnerabilities in the Internet of Things and what we need to do to lock down and secure our IoT devices, then let's get started.
Related Courses
-
Raspberry Pi: Home Monitoring and Control
with David Ross1h 29m Intermediate -
Ethical Hacking: Mobile Devices and Platforms
with Malcolm Shore1h 52m Intermediate
-
Introduction
-
Securing the IoT1m 7s
-
-
1. Overview
-
Security, privacy, and IoT2m 32s
-
Internet of Things3m 10s
-
Security2m 34s
-
Privacy3m 38s
-
Massive adoption3m 27s
-
-
2. Potential Attacks and Glitches
-
Attacks and glitches2m 43s
-
DDoS5m 9s
-
Denial-of-sleep attacks3m 19s
-
IoT worms3m 34s
-
Voice and sound attacks3m 20s
-
-
3. Vulnerabilities
-
IoT vulnerabilities3m 16s
-
No malware needed3m 53s
-
Vendor backdoors3m 9s
-
Army of Things3m 8s
-
-
4. Privacy
-
Privacy concerns2m 55s
-
Spying3m 46s
-
Data collection4m 12s
-
Independent devices3m 41s
-
Government3m 24s
-
-
5. Existing Standards and Regulations
-
PCI DSS2m 28s
-
HIPAA2m 43s
-
COBIT3m 10s
-
Sarbanes-Oxley3m 5s
-
6. Proposed Standards and Legislation
-
Need for standards3m 38s
-
Security legislation3m 50s
-
IoT protocols4m 20s
-
Common IoT language2m 37s
-
-
7. Securing IoT Devices
-
Firewalls and IDS2m 8s
-
Education and awareness2m 39s
-
-
Conclusion
-
Next steps1m 15s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Securing the IoT