IoT devices are always listening, can take pictures and collect data, and phone home. Over half of consumers polled are concerned about privacy, yet continue to purchase these devices.
- [Instructor] IoT devices are always listening,…collecting data and even phoning home.…However, using a device to spy on someone…isn't a new concept.…Apps have been around for years.…For example, apps to spy on your boyfriend…and monitor location and communication.…I'm at this website…and it lists a number of best spy apps that you can use.…
Wearable technology, such as smart watches are very popular.…However there's an additional level of concern,…as they have the ability to gather and extract data.…Smart watches can send and receive data…and even take pictures.…If someone were to walk into a sensitive area,…they could take photos or record images…without anyone knowing.…Many times an IoT device has unprotected data…on the internal memory without any encryption,…PIN or password and someone can simply…gather the information once they have access to the device.…
Some of the precautions you can take…to decrease the risks include disabling Bluetooth…when dealing with business related wearable devices…and IoT products.…
In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT.
- Security, privacy, and the IoT
- Attacks and glitches
- Denial-of-sleep attacks
- Voice and sound attacks
- IoT vulnerabilities
- Glitches and compatibility issues
- Privacy concerns
- Existing standards and regulations
- Proposed standards and legislation
- Firewalls and IDS
Skill Level Intermediate
Raspberry Pi: Home Monitoring and Controlwith David Ross1h 29m Intermediate
Ethical Hacking: Mobile Devices and Platformswith Malcolm Shore1h 52m Intermediate
2. Potential Attacks and Glitches
5. Existing Standards and Regulations
6. Proposed Standards and Legislation
7. Securing IoT Devices
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.