Artwork

Content provided by Cisco Networking Academy. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cisco Networking Academy or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Module 4: Security and Privacy

24:44
 
Share
 

Manage episode 152598388 series 1064737
Content provided by Cisco Networking Academy. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cisco Networking Academy or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
In this podcast, the panel discusses the vulnerability of billions of connections between people and devices in the IoE to some level of attack. Left unchecked, the IoE provides opportunity for hackers to compromise devices that are not traditionally called computers (e.g., security cameras, car systems, and power grids). Securing disparate devices using proprietary protocols is challenging. However, a holistic solution based on a secure network can mitigate the risk. Additionally, there is concern for people's privacy. Organizations must become more purposeful in assessing risks and handling private information facilitated by robust privacy policies.
  continue reading

5 episodes

Artwork
iconShare
 
Manage episode 152598388 series 1064737
Content provided by Cisco Networking Academy. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cisco Networking Academy or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
In this podcast, the panel discusses the vulnerability of billions of connections between people and devices in the IoE to some level of attack. Left unchecked, the IoE provides opportunity for hackers to compromise devices that are not traditionally called computers (e.g., security cameras, car systems, and power grids). Securing disparate devices using proprietary protocols is challenging. However, a holistic solution based on a secure network can mitigate the risk. Additionally, there is concern for people's privacy. Organizations must become more purposeful in assessing risks and handling private information facilitated by robust privacy policies.
  continue reading

5 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide