Skip to content
Skip to main content

About this free course

Download this course

Share this free course

Internet of everything
Internet of everything

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

4.3 Security and the IoE

Security has become the primary concern for all interconnected computer systems. The IoE is not immune to attack and a good system should be designed with security in mind. In this section you will cover security architecture and policies, what may be a beneficial security strategy, the pervasive nature of security, security devices, wireless security, the risk of personal data with the IoE and system redundancy and how this assures security.

The increased number of connected devices and the amount of data they generate increases the demand for security of that data.

Watch the video of John Stewart, Senior Vice President, Chief Security Officer at Cisco Systems, discussing how to secure billions of devices in the IoE.

Download this video clip.Video player: ioe_1_video_4_3_1_1_security_included.mp4
Copy this transcript to the clipboard
Print this transcript
Show transcript|Hide transcript
 
Interactive feature not available in single page view (see it in standard view).

Hacking attacks are a daily occurrence, and it seems no organisation is immune. Given how easy it is to steal and misuse information in today’s connected world, it is only natural to be concerned about this problem as people, process, data, and things all become connected in the IoE. In the video, DARPA and Car Hacking [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)] , Dr. Kathleen Fisher of the Defense Advanced Research Projects Agency (DARPA) describes how a hacker could control the operation of a motor vehicle remotely.