24 min

Module 4: Security and Privacy Introduction to the Internet of Everything (I2IoE) Summary

    • Technology

In this podcast, the panel discusses the vulnerability of billions of connections between people and devices in the IoE to some level of attack. Left unchecked, the IoE provides opportunity for hackers to compromise devices that are not traditionally called computers (e.g., security cameras, car systems, and power grids). Securing disparate devices using proprietary protocols is challenging. However, a holistic solution based on a secure network can mitigate the risk. Additionally, there is concern for people's privacy. Organizations must become more purposeful in assessing risks and handling private information facilitated by robust privacy policies.

In this podcast, the panel discusses the vulnerability of billions of connections between people and devices in the IoE to some level of attack. Left unchecked, the IoE provides opportunity for hackers to compromise devices that are not traditionally called computers (e.g., security cameras, car systems, and power grids). Securing disparate devices using proprietary protocols is challenging. However, a holistic solution based on a secure network can mitigate the risk. Additionally, there is concern for people's privacy. Organizations must become more purposeful in assessing risks and handling private information facilitated by robust privacy policies.

24 min

Top Podcasts In Technology

Apple Events (video)
Apple
Deep Questions with Cal Newport
Cal Newport
Lex Fridman Podcast
Lex Fridman
TED Radio Hour
NPR
WSJ’s The Future of Everything
The Wall Street Journal
Apple Events (audio)
Apple