Discover the many Internet of Things (IoT) devices that can pose a risk to our privacy, and how standards, regulations, and proper device selection can help ensure data privacy.
Overview
Syllabus
Introduction
- Protecting IoT privacy
- Discovering resources
- Exploring IoT devices
- Leveraging IoT data
- Recognizing privacy concerns
- Challenge: Understanding IoT vulnerabilities
- Solution: Understanding IoT vulnerabilities
- Collecting consumer data
- Spying on consumers using the IoT
- Eavesdropping and acting independently
- Helping government and law enforcement
- Converging IoT and AI
- Securing card data with PCI DSS
- Ensuring privacy with HIPAA
- Providing privacy guidelines
- Adhering to the COBIT framework
- Recognizing the need for standards
- Promoting IoT legislation
- Using resources on NIST and OWASP
- Defining IoT protocols
- Creating a common IoT language
- Ensuring privacy in the IoT
- Securing data using blockchains and PUFs
- Keeping smart devices secure
- Discovering the IoT Security Foundation
- Summary
Taught by
Lisa Bock