Cybersafe: How To Protect Your Online Life by Patrick Acheampong
Author:Patrick Acheampong [Acheampong, Patrick]
Language: eng
Format: epub
Tags: cyber crime, online privacy, hacking, cybersecurity, ransomware
Publisher: MOA Holdings
Published: 2018-05-31T18:30:00+00:00
Data collection, protection and privacy
The vision for the IoT is to make our everyday lives easier and boost the efficiency and productivity of businesses and employees. The data collected will help us make smarter decisions. But this will also have an impact on privacy expectations. If data collected by connected devices is compromised it will undermine trust in the IoT. We are already seeing consumers place higher expectations on businesses and governments to safeguard their personal information.
Your fitness watch is monitoring and storing critical health data including your heart rate, activities and performance with every second of its use. You can’t even imagine the amount of data that might be getting generated every moment by all of your IoT devices combined.
Also, the company that collects data may choose to abuse the data, or sell the data to someone with a foul intent. Another possibility could be, a company that collects the data for legitimate reasons may get hacked, and the hacker steals the stored data.
Connecting IoT devices also introduces new risks. For consumers there is a risk to privacy as these devices will record vast amounts of data about their daily lives that could be pieced together to create a deeply intimate portrait of their existence. For businesses, each of these new devices is a potential gateway into your network for hackers to exploit, and potentially allow them access to not just data but also the controls to physical systems where they could do real damage.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6625)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6347)
Machine Learning Security Principles by John Paul Mueller(6318)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5990)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5950)
Solidity Programming Essentials by Ritesh Modi(4064)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3705)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3434)
Mastering Python for Networking and Security by José Manuel Ortega(3359)
Future Crimes by Marc Goodman(3351)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3308)
Learn Computer Forensics - Second Edition by William Oettinger(3193)
Incident Response with Threat Intelligence by Roberto Martínez(2922)
Mobile App Reverse Engineering by Abhinav Mishra(2889)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2835)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2805)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2787)
