24 Min.

Module 4: Security and Privacy Introduction to the Internet of Everything (I2IoE) Summary

    • Technologie

In this podcast, the panel discusses the vulnerability of billions of connections between people and devices in the IoE to some level of attack. Left unchecked, the IoE provides opportunity for hackers to compromise devices that are not traditionally called computers (e.g., security cameras, car systems, and power grids). Securing disparate devices using proprietary protocols is challenging. However, a holistic solution based on a secure network can mitigate the risk. Additionally, there is concern for people's privacy. Organizations must become more purposeful in assessing risks and handling private information facilitated by robust privacy policies.

In this podcast, the panel discusses the vulnerability of billions of connections between people and devices in the IoE to some level of attack. Left unchecked, the IoE provides opportunity for hackers to compromise devices that are not traditionally called computers (e.g., security cameras, car systems, and power grids). Securing disparate devices using proprietary protocols is challenging. However, a holistic solution based on a secure network can mitigate the risk. Additionally, there is concern for people's privacy. Organizations must become more purposeful in assessing risks and handling private information facilitated by robust privacy policies.

24 Min.

Top‑Podcasts in Technologie

Apple Events (video)
Apple
Lex Fridman Podcast
Lex Fridman
Mac & i - der Apple-Podcast
Mac & i
Flugforensik - Abstürze und ihre Geschichte
Flugforensik
Mission Klima – Lösungen für die Krise
NDR Info
c’t uplink - der IT-Podcast aus Nerdistan
c’t Magazin