SlideShare a Scribd company logo
1 of 22
Download to read offline
Digital	
  security	
  
How	
  secure	
  is	
  it	
  really?
Digital Security
Photo:	
  cc:	
  Bart	
  Carrade -­‐ www.flickr.com/photos/79011202@N04/7072609283/in/photolist-­‐bLYYkn-­‐9FWHcc-­‐bwC1f2-­‐2BTPCo-­‐2RDkiu-­‐f7Fkhn-­‐km1tFH-­‐8sjp3y-­‐7w4VE1-­‐28Ds22-­‐sUXQ6-­‐kH7Q3X-­‐
6hZux7-­‐nCStzM-­‐5iYBjz-­‐7PwA1X-­‐fE13e3-­‐LZ3Dp-­‐qHY6Mw-­‐gU3peV-­‐ah3YXB-­‐5GiNip-­‐9579Au-­‐e2rYY8-­‐5iPrPD-­‐7jjxwU-­‐48cAWc-­‐pBKSWU-­‐7JSrFD-­‐bqEriT-­‐qwWeeF-­‐eW3S9h-­‐83CqCS-­‐9djz7q-­‐q41Zkh-­‐
8dHWy4-­‐3T3Se-­‐8vhN34-­‐eABbhZ-­‐55EBwp-­‐dWuBMW-­‐5vXTLG-­‐oMYHKD-­‐aANE2-­‐r1bohc-­‐fFPc7w-­‐5wq1Jx-­‐p6DXEN-­‐8qZekG-­‐dwHZKK
Compromising our information
and our health. By:	
  Erica	
  Carnevale
The lack of digital security has
compromised our personal and company
information, as well as our medical
devices.
Photo:	
  Cc:	
  abdullah.khan2012	
  -­‐ www.flickr.com/photos/75862793@N06/6812695893/in/photolist-­‐bo1R92-­‐5uJAoe-­‐tdcqNN-­‐5iJeQd-­‐8tXVig-­‐bo1RWk-­‐dAVeCJ-­‐9NZ3iX-­‐dAQBfD-­‐5BuyeX-­‐dzkUGb-­‐5iHjaA
ehT2jv-­‐8Awb6L-­‐e4SthJ-­‐8J1khi-­‐qvNpmr-­‐bhHvwx-­‐6cwx2o-­‐acjC7c-­‐vxi-­‐9gWgTb-­‐6Evq3k-­‐9QmUyn-­‐mG6WrQ-­‐9YD6Vw-­‐mG3mdX-­‐haWTXU-­‐mG4n4v-­‐b67Ej-­‐mG4a74-­‐mG4i6F-­‐mG2XAH-­‐LSutf-­‐mG5xbJ-­‐
mG583J-­‐7mdYcf-­‐eQBHN1-­‐mG4wnc-­‐mG5t4L-­‐mG4Een-­‐jESE12-­‐2ia9Rc-­‐pyD8we-­‐mG58KX-­‐9QpJ33-­‐cdxYCs-­‐tvksmy-­‐ex2J3H-­‐dYdmN
2/3 of the Canadian population owns a
smartphone.6
Photo:	
  Cc:	
  Gonzalo	
  Baeza -­‐ www.flickr.com/photos/gonzalobaeza/8292958010/in/photolist-­‐dCPzuE-­‐fhEmim-­‐jpBnkE-­‐i52con-­‐5A3Kon-­‐9Li1n1-­‐oZN6c9-­‐i5L2an-­‐hu8x36-­‐7gEWV7-­‐peadiC-­‐jpBnC3-­‐
7w8xG1-­‐jFzBKX-­‐7LAtpL-­‐i5bSmz-­‐g93SZD-­‐jAcpuE-­‐p6hnj5-­‐ptBVF7-­‐eM5aF6-­‐job32H-­‐pdWJe5-­‐rmZJES-­‐eM5wxX-­‐kWvShV-­‐9qmJp4-­‐AXKxcb-­‐deLgpu-­‐peab6w-­‐8jvm3s-­‐ptBQc1-­‐pvnKai-­‐oeDrpa-­‐pwNUsN-­‐
9qpLks-­‐i5bgT9-­‐eM54Mp-­‐eMgGbE-­‐jpBnx3-­‐8TQyba-­‐pvE51B-­‐4QoDw9-­‐9qpKtA-­‐9qmHyv-­‐pea9Py-­‐i4WK4B-­‐9qmGPK-­‐21PJaA-­‐eyaiBQ
54% of smartphone users are worried
about the security level on their mobile
devices7…
Photo:	
  Cc:	
  Jimmy	
  Álvarez -­‐ www.flickr.com/photos/jimmyflickr/2892191058/in/faves-­‐143778368@N06/
…… demonstrating that with advancing
technology people still do not trust the
level of security that their devices
possess.
Photo:	
  Cc:	
  Marcie	
  Casas	
  -­‐ www.flickr.com/photos/marciecasas/5347580266/in/photolist-­‐99xKiL-­‐9vw3rV-­‐rmB6z8-­‐abhKDz-­‐oiFHFy-­‐g8KAp9-­‐5Xnd1G-­‐5oYETZ-­‐k4zbd4-­‐4jxdZH-­‐oa6eaC-­‐2pcoBB-­‐4vareY-­‐
bjLFXK-­‐5Wtibx-­‐r5a29j-­‐8NYgsR-­‐4ZJEm2-­‐3kTLzq-­‐frLeXm-­‐eYKV7c-­‐8ySvFB-­‐6Yoiq8-­‐Bq9iBh-­‐2kHCE-­‐avMNa5-­‐5pwiva-­‐4UUSFp-­‐bsmmzd-­‐ekFX5v-­‐a2v9fG-­‐8NHKks-­‐56mn88-­‐nx25o-­‐7fAPZc-­‐2oQHhp-­‐5wqAR3-­‐
nd8skd-­‐nXCEn-­‐6Caj8v-­‐urX3T-­‐bQZTzZ-­‐5QxKEK-­‐gDM8Y-­‐7N6FpZ-­‐czJw43-­‐bqJNEK-­‐9u3UiC-­‐4MkQyw-­‐4yUpNz
And they should not trust it!
Photo:	
  Cc:	
  Kay	
  Yin	
  -­‐ https://www.flickr.com/photos/imkiwiyournot/8296251942/in/photolist-­‐dD7sEA-­‐dAAKXV-­‐bAZc9u-­‐ksvkir-­‐7x7SxV-­‐Nx6Az-­‐bx4Gyu-­‐4qyv6H-­‐foF2B2-­‐9PWn8R-­‐531zHS-­‐nSQ13j-­‐
amLMGg-­‐8GM6M5-­‐cEXuSy-­‐LhSVM-­‐9meLzG-­‐4AZH4B-­‐rdUG6q-­‐9JbnDJ-­‐8rVGqY-­‐tZteF-­‐4HxqZj-­‐dQPXEa-­‐a293rk-­‐9B5zsH-­‐7976Ex-­‐8Y24Kb-­‐7vaeng-­‐8phKha-­‐apdFZp-­‐6FX74T-­‐4LLTEL-­‐rFJCWH-­‐9mL9eW-­‐
ak8osE-­‐7Au7dM-­‐5AxoVu-­‐6DDQHr-­‐8gav3x-­‐5Uq3ZA-­‐3eBt5x-­‐9YVcQS-­‐F2hV5-­‐N9tfi-­‐9yteV-­‐4qiQDe-­‐oJygow-­‐bbijFa-­‐tCJ8Y
Smartphone data that is gathered can be used to pinpoint
your location, identify you and monitor your phone,
regardless of app privacy policies or phone settings.12
Photo:	
  Cc:	
  Yasunobu Ikeda	
  -­‐ www.flickr.com/photos/clockmaker-­‐jp/2662752901/in/faves-­‐143778368@N06/
Shopkick is an app that collects personal
information about the user but does not outline
what the information is being used for and who
it is being sold to in its privacy policy.4
Photo:	
  Cc:	
  NATS	
  Press	
  Office	
  -­‐ www.flickr.com/photos/natspressoffice/13085089605/in/photolist-­‐9m8RsH-­‐4z7rwb-­‐fxQpM-­‐2b61H9-­‐eZxVuK-­‐ak7hXk-­‐8UxCTj-­‐8QEcXb-­‐9mco4f-­‐btTti5-­‐9pxgGB-­‐arF84-­‐
7zSsL1-­‐9r3HWm-­‐vFmTy3-­‐5eVeXR-­‐nJeZWZ-­‐9Uz7bc-­‐CqaqGY-­‐bJDnpB-­‐gegezb-­‐g9FDWk-­‐gbbC6J-­‐HPWZNT-­‐kisKDH-­‐eVCzWz-­‐y7Yp6f-­‐jHwscd-­‐brsQrH-­‐geHAXk-­‐g8dbjY-­‐gbaGAr-­‐g9FHdk-­‐g8kxgn-­‐khg-­‐gGqspG-­‐
gGqCej-­‐gGgAkE-­‐gGh9CW-­‐gRaFve-­‐f6XbVk-­‐g8cQip-­‐gJcj59-­‐7wbp3W-­‐gR96JZ-­‐gGt9VN-­‐gR827h-­‐kWhvgc-­‐kWhvig-­‐kWhvN4
Preventing apps
from using your
location or
restricting them to
only use it when
you are using the
app, is not enough
to prevent the app
from tracking your
device.3
Photo:	
  Cc:	
  JOSE	
  SANTANA	
  -­‐ https://www.flickr.com/photos/34340561@N07/16123207190/in/photolist-­‐qyKDLS-­‐
oqmKnf-­‐ec2tJF-­‐bw63y7-­‐nTKzmB-­‐gXndWK-­‐e6rn8f-­‐fK5siK-­‐s7KcVS-­‐pdRxzH-­‐awRP6g-­‐dWCHKe-­‐omfAVB-­‐anqVsJ-­‐
6WvtLg-­‐dC3nrM-­‐8CL57e-­‐qHpuZE-­‐gYJrBr-­‐qyw3HK-­‐rgUkph-­‐4zV17D-­‐aTsuUp-­‐xwosGd-­‐dT6A2Z-­‐a328ww-­‐ota6wU-­‐
EZqp4V-­‐nJvSKe-­‐re2v5r-­‐bvLtQX-­‐pWTskF-­‐9wVGUq-­‐pNGYiT-­‐n6S7Gn-­‐9YKf4D-­‐qFmQxs-­‐rs7xgU-­‐fDEjr1-­‐rbTTy9-­‐zNS6gc-­‐
ePHVJF-­‐phop4p-­‐6z6hK2-­‐rpSdFY-­‐ejdpXm-­‐dvdHYr-­‐mb5LEg-­‐codzeC-­‐8Kk9pB
Photo:	
  cc:	
  Mikhail_108	
  -­‐ www.flickr.com/photos/m108/14900693136/in/photolist-­‐oGHWWm-­‐9KDR4w-­‐rTh92w-­‐pWYTSK-­‐qde4VK-­‐e3uEtT-­‐9mtKbm-­‐9kfFfA-­‐sssbZt-­‐fAJW9n-­‐azmh7G-­‐9mfja2-­‐58vzRG-­‐
7EhY6G-­‐9mhrdz-­‐49S34-­‐5CWLE3-­‐dNdWaA-­‐6DV6Xy-­‐aF85tD-­‐bcLUgM-­‐dVdg6J-­‐fYyP78-­‐nw1gHG-­‐5ZPxra-­‐79huAo-­‐eJvJ8F-­‐5JB2YS-­‐aF8518-­‐8y3pTW-­‐o7M1X-­‐peU6Q-­‐aFbTWw-­‐9uZD9Q-­‐oskZ1R-­‐aFbTTm-­‐
5koG7C-­‐a1swjG-­‐a1svXm-­‐4KFAiH-­‐7zveJu-­‐7ysCdk-­‐7p313i-­‐eZNDiE-­‐qB4Tof-­‐aF84Sx-­‐n47gZR-­‐fzbHvT-­‐fEvBaf-­‐8VKTrB
The Weather Channel accesses your location on
average every 10 minutes even when the
application is not being used.11
Photo:	
  Cc:	
  Carlos	
  Enciso-­‐ www.flickr.com/photos/krynowekeine/2703085724/in/photolist-­‐57S2dh-­‐
anugYV-­‐8JDpUk-­‐4DUj7t-­‐6ZwD6a-­‐aHDBzc-­‐nQjXBf-­‐irF6Zz-­‐bYk9XS-­‐pVCNxd-­‐pXatNz-­‐5SKg4s-­‐nPo7W-­‐
8NY6pe-­‐6HtZeY-­‐53DM8u-­‐4mBqT8-­‐cLf2FJ-­‐9GzL8R-­‐zvoKWP-­‐9vgDsi-­‐mDEbwD-­‐mNiVnX-­‐dc7tQL-­‐pSAumv-­‐
6g49Hd-­‐hVm9YF-­‐kEzNo-­‐aDbWzk-­‐6XEPZo-­‐rh1MX1-­‐2bFBUn-­‐dkfD63-­‐oPbxPL-­‐bVPS5R-­‐4T5Dmr-­‐bjBLk4-­‐
eXiQZJ-­‐67S2qB-­‐dkXsZw-­‐7qWay5-­‐aXCjbc-­‐4QsgZ3-­‐81kkEj-­‐4tXTwW-­‐B3VXk-­‐5cfVvW-­‐diojeE-­‐atNu8-­‐kaQQ8r
Sensors in your
devices and apps
that collect data
and track your
location, could
cause you to be
more vulnerable to
cyber attacks.3
Personal
information is
now being
compromised
because of poor
digital security
and now company
information is
also under attack.
Photo:	
  Cc:	
  Sivaserver -­‐ www.flickr.com/photos/91707070@N03/8331732961/in/photolist-­‐dGfiWi-­‐
aMbw5H-­‐2Yxv9A-­‐ap5Je6-­‐aeKut7-­‐8CpFau-­‐6rf4Xg-­‐8G68F2-­‐hQf1N4-­‐bfmZ4v-­‐bxFnW-­‐8G68zt-­‐dQEPCC-­‐
9XaVP2-­‐8t6B4C-­‐uiDMM-­‐6UDnWP-­‐2b5yP9-­‐8G9iDJ-­‐rEAH-­‐8G68JX-­‐nmZnrf-­‐8G9j7q-­‐8G68VZ-­‐dvdWi-­‐8G68jZ-­‐
8G691g-­‐cZUPK-­‐8G9iL3-­‐6jQj7m-­‐9uQG7p-­‐9wJLwq-­‐61yf68-­‐9bWVHV-­‐7uXPBA-­‐4mAf35-­‐3A1j1z-­‐5c5WBr-­‐
o2diQp-­‐9JwUna-­‐c8pb39-­‐hfXPnN-­‐pZKRuh-­‐uqdE6-­‐7Wxvgo-­‐6JgTHw-­‐uq4zV-­‐6jTJBA-­‐3A1nek-­‐633hUd
Wearable technology makes it easy for employees to
gain secret information about their employer because of
the discrete size of the device.2
Photo:	
  Cc:Kentaro -­‐ www.flickr.com/photos/kaleidalabs/17288411245/in/photolist-­‐skHCkX-­‐rDfcBu-­‐s1neMt-­‐s2oh7i-­‐skF39F-­‐shEAaf-­‐tsUEqj-­‐tKBETt-­‐oZKSSM-­‐tsUEs3-­‐skHdVv-­‐sNEFuK-­‐rxCLNV-­‐tsVfW5-­‐
s4ggoP-­‐s4geaa-­‐tKBFJM-­‐rg4of3-­‐skHB6c-­‐sfwwx7-­‐BmpvT1-­‐s7BFJU-­‐sgAVBJ-­‐p9qyGp-­‐sg8pQ7-­‐Cv7uK6-­‐s49eDm-­‐oSur3d-­‐s47UyN-­‐s49kuE-­‐s47VVL-­‐roH5RJ-­‐skyekJ-­‐s2oegi-­‐siqudm-­‐roHh7j-­‐s4g5vB-­‐s2o3Xc-­‐
s4g3FV-­‐roHcfA-­‐roH52h-­‐s47Xyf-­‐sky5a9-­‐oZKRft-­‐skEMHX-­‐saNZmz-­‐rsjqaq-­‐FLBgAQ-­‐FEJ4Cu-­‐rdNUQQ
Employees are open to wearable
technology such as smartwatches while
in the workplace.8
70% of Millennials8
51% of Generation X8
Photo:	
  Cc:	
  Randy	
  Caldwell	
  -­‐ www.flickr.com/photos/misterperturbed/6321178442/in/photolist-­‐aCzG8d-­‐dfKUvh-­‐9BSptf-­‐dNzL7V-­‐adDCVX-­‐7mUtiX-­‐e183o8-­‐9N8BXZ-­‐5A4XGt-­‐b5HsBV-­‐4so2Pm-­‐77xo3J-­‐
6vFYag-­‐6uJGPD-­‐apQzvX-­‐6RsH6B-­‐bN45xp-­‐oBjgjh-­‐63RtEc-­‐5co28q-­‐4T4JwP-­‐6StU3G-­‐bGZZTB-­‐7RYdss-­‐4mcyyB-­‐ifaPZK-­‐5cP725-­‐6e7Cca-­‐5dXg6g-­‐5HKn6o-­‐8GUmVW-­‐4eaGRU-­‐ae8Nnr-­‐8XRZ69-­‐2XgkS7-­‐
8adZUK-­‐ctA8WU-­‐ddg4wH-­‐6PwAQ1-­‐7vNsCg-­‐9kVn5C-­‐4Ru2mz-­‐gSE3xd-­‐aheuj5-­‐2X8wAS-­‐8xjChz-­‐2Shzpt-­‐6exmYs-­‐3SeL8J-­‐4xDem6
These individuals are the future and with their
acceptance towards wearable technology
in the workplace, company security will become a
serious issue.
Photo.	
  Cc:	
  Geoff	
  R	
  -­‐ www.flickr.com/photos/sockrotation/4301185320/in/photolist-­‐7y5GxA-­‐6epSQ1-­‐edYmW-­‐JXcQk-­‐boGFEr-­‐r2TAmZ-­‐6amA3a-­‐7BKMW6-­‐78dU6H-­‐9dK1A-­‐czomPS-­‐aYzc7r-­‐8dD3c5-­‐
ahyKd7-­‐crmFc-­‐bgwVWn-­‐bdLjtr-­‐9wGnZd-­‐bcGyWv-­‐7tRLqF-­‐6JEup6-­‐89N7vC-­‐jU28M-­‐21DDxg-­‐8HXjbs-­‐4EG8cS-­‐5g8Gk5-­‐7n71SR-­‐4GMyDi-­‐emN9f-­‐5yeAn2-­‐qQQuYJ-­‐91NFdN-­‐8tcm9d-­‐Kb56V-­‐2z8mCe-­‐udZKv-­‐
269VsE-­‐78Hnyv-­‐r2vFSN-­‐pA82SF-­‐3pQaVB-­‐5NqtWW-­‐YQSig-­‐uGQFk-­‐o9QhbW-­‐4SiijR-­‐7xCknd-­‐b4Vg5F-­‐52rGjR
Not only is personal
information affected but our
health is now under attack
with the ability of hackers to
access medical technology.
Photo.	
  Cc:	
  Cat2398	
  -­‐ www.flickr.com/photos/9501510@N02/9667098575/in/photolist-­‐fJfpBn-­‐eKoVxK-­‐2FGkT2-­‐779t3E-­‐6aduTP-­‐pj5dav-­‐pj5cHi-­‐andndG-­‐nAHYxa-­‐pj6e5A-­‐2ywEDH-­‐pJcnBs-­‐4hHLyc-­‐
jKVFj7-­‐8mh8fz-­‐pyxBAh-­‐andqXh-­‐4kSm6G-­‐pj6UrD-­‐aiSUf5-­‐4RWiNA-­‐4ZNbyu-­‐5m6n1Z-­‐6yjsMr-­‐5R9wJX-­‐oYWwus-­‐pj5bBF-­‐pj5dFv-­‐andyFm-­‐mgRpqV-­‐pj5bRD-­‐ckGuhU-­‐2Eippg-­‐97rLC4-­‐aCGMHM-­‐97rNyK-­‐
pAj2CX-­‐5m6m5D-­‐pLi7Vd-­‐2BnH5p-­‐nrwbFK-­‐eYT1f3-­‐anaANF-­‐4pQVek-­‐8pNoiH-­‐anaDpK-­‐c2PXME-­‐5SUY5F-­‐3JNaFR-­‐5QsHYK
Thousands of medical devices, such as x-ray
machines, MRI scanners and drug infusion
pumps, are exposed to hacking,
resulting in significant health risks for
researchers and patients. 10
Photo:	
  Cc:	
  Trey	
  Menefee -­‐ www.flickr.com/photos/trey333/4058372679/in/photolist-­‐7bCdNK-­‐72TnnS-­‐gd4JNa-­‐h4a4Tm-­‐3qVzq5-­‐sgnUc5-­‐hk4EvK-­‐8puvSw-­‐3npcCN-­‐6QGcKa-­‐5CRA9X-­‐8xw2No-­‐
bA6VdM-­‐ak13bw-­‐a8dZfJ-­‐EW5aY-­‐kjMaCR-­‐fUCdzX-­‐epMjcs-­‐fbYcD9-­‐ptP4G-­‐8JZ2LF-­‐74oyvD-­‐74st6q-­‐9pF7R-­‐app5M6-­‐5EpcsE-­‐bsmFkz-­‐eehzuc-­‐8p8S2M-­‐ryH1i7-­‐app5dv-­‐5kausR-­‐djZY4h-­‐4ahH3B-­‐hsmzL-­‐
74staJ-­‐9p1MH4-­‐65G3d1-­‐6QKgmh-­‐qt8RmK-­‐fRwD2-­‐9AmUKX-­‐8HN5i6-­‐fRwxu-­‐fXEUPf-­‐bt4u2a-­‐dwVXmf-­‐7z2GJh-­‐EGpUEy
Something	
  as	
  
simple	
  as	
  a	
  
computerized	
  
insulin	
  pump	
  could	
  
be	
  hacked and	
  
administer	
  a	
  
dangerous	
  amount	
  
of	
  insulin.5
Photo:	
  cc:	
  Alan	
  Levine	
  -­‐ www.flickr.com/photos/cogdog/24410761961/in/photolist-­‐Dc6x5e-­‐25AL36-­‐8PvAQr-­‐7aJgBW-­‐6dEHDv-­‐4DCV4d-­‐o8vonH-­‐dAgLdo-­‐dAgsmo-­‐dAbhtP-­‐6dEMht-­‐bVFEVj-­‐dAgM93-­‐
dAaZQD-­‐dAbiXx-­‐dAbeVt-­‐6dJSLf-­‐dAaYPv-­‐dAgLX3-­‐dAgGXf-­‐8Ef6GH-­‐8b5Acz-­‐dAgJsS-­‐6DEik8-­‐8rBGq8-­‐dAbi8M-­‐dAgJVu-­‐dAgNas-­‐dAbjhV-­‐dAgGM5-­‐5W6aek-­‐dAfpq3-­‐48Jz9U-­‐dAbeMr-­‐6dEMun-­‐dAaYw4-­‐
dAbf9M-­‐rmP4d-­‐dAgs6j-­‐bN8iev-­‐aRCCAn-­‐dAaZsc-­‐9iwUHU-­‐dAbj6B-­‐d4CYHj-­‐98EJYb-­‐q5NaTu-­‐4nDv6r-­‐qnbVAF-­‐7WzWop
Photo:	
  Cc:	
  Lars	
  Nielsen	
  -­‐ www.flickr.com/photos/31291514@N04/13953040668/in/photolist-­‐nfYYSG-­‐dYgNVD-­‐5mFXbD-­‐hd5wU-­‐8qUkFB-­‐5P4zDk-­‐5n2PY-­‐dvcZad-­‐5WtXJy-­‐7KR6CW-­‐ev26jp-­‐5c5cEh-­‐
66Z1vu-­‐81yxjx-­‐5MPfm7-­‐9uaeyi-­‐83s9nT-­‐4dj37C-­‐57Tsyg-­‐5R1oy8-­‐pzWojf-­‐bphqKF-­‐oLAYoe-­‐8CeQ3z-­‐bud7JS-­‐ashm5t-­‐7XKRzd-­‐ag2gvL-­‐apbYU5-­‐3AhiCv-­‐76Xyr8-­‐4M4Paz-­‐64HxYR-­‐6D8Cgk-­‐64QfAW-­‐9uLTxi-­‐
baQN5R-­‐7gXPn6-­‐egss9F-­‐6uUeTe-­‐9gHyTk-­‐5xXrq-­‐r7BEFo-­‐53vgLG-­‐54LpAh-­‐9fZazU-­‐7kmxkJ-­‐jfmvRv-­‐3GzgeA-­‐gXmb7t	
  
How can we prevent
this from occurring and remain
safe in the digital world?
To increase digital security
for personal information,
company information and
medical machines you
should…
Photo:	
  Cc:	
  Defence Images	
  -­‐ www.flickr.com/photos/defenceimages/6938469933/in/photolist-­‐bz8tnX-­‐4c9jPm-­‐7wtiuh-­‐8VafEh-­‐6PRxhq-­‐iqdv6-­‐3gFv8o-­‐qFazgy-­‐b4HXag-­‐bnx3rn-­‐7QsvVh-­‐6PMpza-­‐
dWVK4Y-­‐7R35TL-­‐91oJMR-­‐dx8dRU-­‐q4WwbM-­‐ezmdir-­‐hoMMAK-­‐e4tEhy-­‐9nKs6F-­‐6PMpDR-­‐6PMpni-­‐6X1r5J-­‐arBLng-­‐gZ9cos-­‐a39gFk-­‐qjMtJz-­‐oZNyv-­‐nm9pLx-­‐9aQxiw-­‐jAvJse-­‐chPnS1-­‐pS6reA-­‐bMfPP-­‐
pQ4ozQ-­‐bz8tuK-­‐srbKe-­‐bz8tBR-­‐93bWr3-­‐dWLwrz-­‐bmdAKd-­‐d9gMVb-­‐7oLnmk-­‐PGkKh-­‐4Qu5XV-­‐a6pFHb-­‐6Xjqcm-­‐qSbTyo-­‐4GQUJB
Photo:	
  Cc:	
  Karol	
  Franks	
  -­‐ www.flickr.com/photos/karolfranks/15136260663/in/photolist-­‐p4xhXr-­‐4VCEHf-­‐7rGXLn-­‐8w2AKt-­‐eefodz-­‐oTEycq-­‐j1P9wV-­‐eacbDC-­‐sjZXzH-­‐5Vnb1t-­‐5kDUvW-­‐4FUpDx-­‐
CedUUw-­‐9rwG83-­‐9DeeWv-­‐62VnQ2-­‐azLjAh-­‐8yMA6C-­‐567p-­‐2goVK7-­‐f2f61a-­‐jabPo5-­‐6Ztnz6-­‐61zdbE-­‐VgjKe-­‐8o6Um3-­‐4yZyv2-­‐bPiVCc-­‐7XjZ5S-­‐aeMzr3-­‐ncoXC5-­‐aqeq7S-­‐QuQNR-­‐nSaTsQ-­‐oio1gn-­‐r29bk5-­‐
4cq6Ht-­‐83LQef-­‐ogHLLH-­‐bpcRvq-­‐eHbRcJ-­‐cBykzs-­‐bpb3NV-­‐6FFXTq-­‐8AUv2E-­‐p3zfGw-­‐5fVAoS-­‐9mDA1w-­‐9QGeWv-­‐nzjQWL
• Avoid giving personal information to
apps.9
• Establish security policies for
wearable devices in the workplace.2
• Hospitals should develop strict
network policies to avoid hackers.1
Works cited
1. Arsene,	
  L.	
  (2015,	
  October	
  4).	
  Hacking	
  Vulnerable	
  Medical	
  Equipment	
  Puts	
  Millions	
  at	
  Risk	
  -­‐InformationWeek.	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  http://www.informationweek.com/partner-­‐
perspectives/bitdefender/hacking-­‐vulnerable-­‐medical-­‐equipment-­‐puts-­‐millions-­‐at-­‐risk/a/d-­‐id/1319873
2.	
  	
  	
  Cole,	
  S.	
  (n.d.).	
  How	
  The	
  Apple	
  Watch	
  Will	
  Change	
  Office	
  Life.	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  http://www.fastcompany.com/3043533/the-­‐future-­‐of-­‐work/how-­‐the-­‐apple-­‐watch-­‐will-­‐change-­‐office-­‐life
3.	
  	
  	
  Feltman,	
  R.	
  (2014).	
  Phones	
  are	
  giving	
  away	
  your	
  location,	
  regardless	
  of	
  your	
  privacy	
  settings.	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  http://qz.com/203778/phones-­‐are-­‐giving-­‐away-­‐your-­‐location-­‐regardless-­‐of-­‐your-­‐
privacy-­‐settings/
4.	
  	
  	
  Golbeck,	
  J.	
  (2014).	
  This	
  App	
  Tracks	
  You	
  While	
  You	
  Shop.	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  
http://www.slate.com/articles/technology/future_tense/2014/01/ibeacon_shopkick_privacy_policies_for_location_tracking_apps_aren_t_clear.single.html
5.	
  	
  	
  Home,	
  hacked	
  home.	
  (2014,	
  July	
  12).	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  http://www.economist.com/news/special-­‐report/21606420-­‐perils-­‐connected-­‐devices-­‐home-­‐hacked-­‐home
6.	
  	
  	
  Matrix,	
  Sydneyeve.	
  “Module	
  3:	
  Mobilities”.	
  2016.	
  Presentation.	
  
7.	
  	
  	
  People	
  don't	
  trust	
  smartphone	
  security	
  –and	
  that's	
  choking	
  the	
  mobile	
  economy.	
  (n.d.).	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  http://www.techradar.com/us/news/phone-­‐and-­‐communications/mobile-­‐
phones/people-­‐don-­‐t-­‐trust-­‐smartphone-­‐security-­‐and-­‐that-­‐s-­‐choking-­‐the-­‐mobile-­‐economy-­‐1285887
8.	
  	
  	
  PwC:	
  Half	
  of	
  people	
  willing	
  to	
  use	
  workplace	
  smartwatch.	
  (n.d.).	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  http://www.consultancy.uk/news/1828/pwc-­‐half-­‐of-­‐people-­‐willing-­‐to-­‐use-­‐workplace-­‐smartwatch
9.	
  	
  	
  Smartphone	
  Privacy	
  Settings	
  You	
  Need	
  To	
  Activate	
  Today.	
  (n.d.).	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  http://www.makeuseof.com/tag/smartphone-­‐privacy-­‐settings-­‐need-­‐activate-­‐today/
10.	
  	
  	
  Thousands	
  of	
  medical	
  devices	
  are	
  vulnerable	
  to	
  hacking,	
  security	
  researchers	
  say.	
  (n.d.).	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  http://www.pcworld.com/article/2987813/thousands-­‐of-­‐medical-­‐devices-­‐are-­‐
vulnerable-­‐to-­‐hacking-­‐security-­‐researchers-­‐say.html
11.	
  	
  	
  Where	
  Were	
  You	
  3	
  Minutes	
  Ago?	
  Your	
  Apps	
  Know.	
  (n.d.).	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  http://blogs.wsj.com/digits/2015/03/23/where-­‐were-­‐you-­‐3-­‐minutes-­‐ago-­‐your-­‐apps-­‐know/?mod=LS1
12.	
  	
  	
  Williams,	
  R.	
  (n.d.).	
  How	
  your	
  phone	
  is	
  revealing	
  your	
  location,	
  regardless	
  of	
  privacy	
  settings.	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  http://www.telegraph.co.uk/technology/mobile-­‐phones/10795009/How-­‐your-­‐
phone-­‐is-­‐revealing-­‐your-­‐location-­‐regardless-­‐of-­‐privacy-­‐settings.html

More Related Content

What's hot

Conference presentationDon’t Be Scared! Technology Tools That are ACTUALLY Ea...
Conference presentationDon’t Be Scared! Technology Tools That are ACTUALLY Ea...Conference presentationDon’t Be Scared! Technology Tools That are ACTUALLY Ea...
Conference presentationDon’t Be Scared! Technology Tools That are ACTUALLY Ea...msing012
 
Sirbaugh_Jerry_W4_PPP_ Final
Sirbaugh_Jerry_W4_PPP_ FinalSirbaugh_Jerry_W4_PPP_ Final
Sirbaugh_Jerry_W4_PPP_ FinalJSirbaugh
 
Aliche´ Matthews-King Personal Persona Project
Aliche´ Matthews-King Personal Persona ProjectAliche´ Matthews-King Personal Persona Project
Aliche´ Matthews-King Personal Persona ProjectAliche´ King
 
Corina gutierrez ppp slideshow
Corina gutierrez ppp slideshowCorina gutierrez ppp slideshow
Corina gutierrez ppp slideshowCGutierrez1225
 
Moore daniel final_slideshare
Moore daniel final_slideshareMoore daniel final_slideshare
Moore daniel final_slideshareDMoore81
 
Mason Adam PPP Final
Mason Adam PPP FinalMason Adam PPP Final
Mason Adam PPP FinalAdam Mason
 
Amanda Ledesma- Philanthropist of Music
Amanda Ledesma- Philanthropist of MusicAmanda Ledesma- Philanthropist of Music
Amanda Ledesma- Philanthropist of MusicAmanda Ledesma
 
Creative Special Forces by Jose Pacheco
Creative Special Forces by Jose PachecoCreative Special Forces by Jose Pacheco
Creative Special Forces by Jose PachecoJose_Pacheco_Negron
 
Henson mikayla ignite presentation
Henson mikayla ignite presentationHenson mikayla ignite presentation
Henson mikayla ignite presentationmhenson24
 
Kristine Torcuator 4.4 FINAL Personal Persona Project Slide Show
Kristine Torcuator 4.4 FINAL Personal Persona Project Slide ShowKristine Torcuator 4.4 FINAL Personal Persona Project Slide Show
Kristine Torcuator 4.4 FINAL Personal Persona Project Slide ShowKayTorcuator
 
Wieneke_Blaine_PPPslideshow_Final
Wieneke_Blaine_PPPslideshow_FinalWieneke_Blaine_PPPslideshow_Final
Wieneke_Blaine_PPPslideshow_Finalwinakey
 
Jeremy Jones - Full Sail - PPP Slide Show
Jeremy Jones - Full Sail  - PPP Slide ShowJeremy Jones - Full Sail  - PPP Slide Show
Jeremy Jones - Full Sail - PPP Slide Show_jeremy_jones
 
Bernard Coleman 4.4 PcP final PPP
Bernard Coleman 4.4 PcP final PPP Bernard Coleman 4.4 PcP final PPP
Bernard Coleman 4.4 PcP final PPP b3c00
 
Physical fitness & muscle videos
Physical fitness & muscle videosPhysical fitness & muscle videos
Physical fitness & muscle videosParva Lucerna
 

What's hot (20)

PPP FINAL
PPP FINALPPP FINAL
PPP FINAL
 
Conference presentationDon’t Be Scared! Technology Tools That are ACTUALLY Ea...
Conference presentationDon’t Be Scared! Technology Tools That are ACTUALLY Ea...Conference presentationDon’t Be Scared! Technology Tools That are ACTUALLY Ea...
Conference presentationDon’t Be Scared! Technology Tools That are ACTUALLY Ea...
 
Sirbaugh_Jerry_W4_PPP_ Final
Sirbaugh_Jerry_W4_PPP_ FinalSirbaugh_Jerry_W4_PPP_ Final
Sirbaugh_Jerry_W4_PPP_ Final
 
Aliche´ Matthews-King Personal Persona Project
Aliche´ Matthews-King Personal Persona ProjectAliche´ Matthews-King Personal Persona Project
Aliche´ Matthews-King Personal Persona Project
 
Corina gutierrez ppp slideshow
Corina gutierrez ppp slideshowCorina gutierrez ppp slideshow
Corina gutierrez ppp slideshow
 
Moore daniel final_slideshare
Moore daniel final_slideshareMoore daniel final_slideshare
Moore daniel final_slideshare
 
Mason Adam PPP Final
Mason Adam PPP FinalMason Adam PPP Final
Mason Adam PPP Final
 
Amanda Ledesma- Philanthropist of Music
Amanda Ledesma- Philanthropist of MusicAmanda Ledesma- Philanthropist of Music
Amanda Ledesma- Philanthropist of Music
 
DeVries_Dale_4.4
DeVries_Dale_4.4DeVries_Dale_4.4
DeVries_Dale_4.4
 
Cookies
CookiesCookies
Cookies
 
Creative Special Forces by Jose Pacheco
Creative Special Forces by Jose PachecoCreative Special Forces by Jose Pacheco
Creative Special Forces by Jose Pacheco
 
Pecha Kucha tic
Pecha Kucha ticPecha Kucha tic
Pecha Kucha tic
 
Randle_Scott_4.4
Randle_Scott_4.4Randle_Scott_4.4
Randle_Scott_4.4
 
Henson mikayla ignite presentation
Henson mikayla ignite presentationHenson mikayla ignite presentation
Henson mikayla ignite presentation
 
Kristine Torcuator 4.4 FINAL Personal Persona Project Slide Show
Kristine Torcuator 4.4 FINAL Personal Persona Project Slide ShowKristine Torcuator 4.4 FINAL Personal Persona Project Slide Show
Kristine Torcuator 4.4 FINAL Personal Persona Project Slide Show
 
Wieneke_Blaine_PPPslideshow_Final
Wieneke_Blaine_PPPslideshow_FinalWieneke_Blaine_PPPslideshow_Final
Wieneke_Blaine_PPPslideshow_Final
 
Jeremy Jones - Full Sail - PPP Slide Show
Jeremy Jones - Full Sail  - PPP Slide ShowJeremy Jones - Full Sail  - PPP Slide Show
Jeremy Jones - Full Sail - PPP Slide Show
 
Bernard Coleman 4.4 PcP final PPP
Bernard Coleman 4.4 PcP final PPP Bernard Coleman 4.4 PcP final PPP
Bernard Coleman 4.4 PcP final PPP
 
Physical fitness & muscle videos
Physical fitness & muscle videosPhysical fitness & muscle videos
Physical fitness & muscle videos
 
Interactive ppt final
Interactive ppt finalInteractive ppt final
Interactive ppt final
 

Similar to Flipbook assignment digital security compromising our information and our health

Williams michael final_ppp
Williams michael final_pppWilliams michael final_ppp
Williams michael final_pppMichael Williams
 
Angel De Arce's Professional persona project
Angel De Arce's Professional persona project Angel De Arce's Professional persona project
Angel De Arce's Professional persona project Angel Dearce
 
Lindsay Smith's Professional Persona Project
Lindsay Smith's Professional Persona Project Lindsay Smith's Professional Persona Project
Lindsay Smith's Professional Persona Project Lindsay Smith
 
The Evolution of Readership
The Evolution of ReadershipThe Evolution of Readership
The Evolution of ReadershipC. Stelling
 
Group d3 copy 2
Group d3 copy 2Group d3 copy 2
Group d3 copy 2ALLD3
 
Final PPP SlideShow
Final PPP SlideShowFinal PPP SlideShow
Final PPP SlideShowcrtijerina
 
Robert lewis 4.4_ppp_slideshow_final
Robert lewis 4.4_ppp_slideshow_finalRobert lewis 4.4_ppp_slideshow_final
Robert lewis 4.4_ppp_slideshow_finalJim Lewis
 
Final PPP submission!
Final PPP submission!Final PPP submission!
Final PPP submission!ShelbyAnne3C
 
Christopher Harris PPP
Christopher Harris PPPChristopher Harris PPP
Christopher Harris PPPChris Harris
 
Lateco Strapp slides
Lateco Strapp slidesLateco Strapp slides
Lateco Strapp slidesLateco Strapp
 
Personal Persona Project Slideshow
Personal Persona Project SlideshowPersonal Persona Project Slideshow
Personal Persona Project SlideshowJudd Seger
 
Andre Keenan PPP
Andre Keenan PPPAndre Keenan PPP
Andre Keenan PPPDrekastro
 
Garr Reynold's Top Ten PowerPoint Tips
Garr Reynold's Top Ten PowerPoint TipsGarr Reynold's Top Ten PowerPoint Tips
Garr Reynold's Top Ten PowerPoint Tipsthefont
 
Michael griffis' visual resume
Michael griffis' visual resumeMichael griffis' visual resume
Michael griffis' visual resumeMichael Griffis
 

Similar to Flipbook assignment digital security compromising our information and our health (20)

Williams michael final_ppp
Williams michael final_pppWilliams michael final_ppp
Williams michael final_ppp
 
Harvey mark 4.6
Harvey mark 4.6Harvey mark 4.6
Harvey mark 4.6
 
Angel De Arce's Professional persona project
Angel De Arce's Professional persona project Angel De Arce's Professional persona project
Angel De Arce's Professional persona project
 
Lindsay Smith's Professional Persona Project
Lindsay Smith's Professional Persona Project Lindsay Smith's Professional Persona Project
Lindsay Smith's Professional Persona Project
 
The Evolution of Readership
The Evolution of ReadershipThe Evolution of Readership
The Evolution of Readership
 
Final PPP
Final PPPFinal PPP
Final PPP
 
Group d3 copy 2
Group d3 copy 2Group d3 copy 2
Group d3 copy 2
 
Final PPP SlideShow
Final PPP SlideShowFinal PPP SlideShow
Final PPP SlideShow
 
Robert lewis 4.4_ppp_slideshow_final
Robert lewis 4.4_ppp_slideshow_finalRobert lewis 4.4_ppp_slideshow_final
Robert lewis 4.4_ppp_slideshow_final
 
Final PPP submission!
Final PPP submission!Final PPP submission!
Final PPP submission!
 
Christopher Harris PPP
Christopher Harris PPPChristopher Harris PPP
Christopher Harris PPP
 
Lateco Strapp slides
Lateco Strapp slidesLateco Strapp slides
Lateco Strapp slides
 
Pedro santana a2
Pedro santana a2Pedro santana a2
Pedro santana a2
 
Presentation Blueprint
Presentation BlueprintPresentation Blueprint
Presentation Blueprint
 
Get A Dream Slideshow
Get A Dream SlideshowGet A Dream Slideshow
Get A Dream Slideshow
 
Personal Persona Project Slideshow
Personal Persona Project SlideshowPersonal Persona Project Slideshow
Personal Persona Project Slideshow
 
Andre Keenan PPP
Andre Keenan PPPAndre Keenan PPP
Andre Keenan PPP
 
Garr Reynold's Top Ten PowerPoint Tips
Garr Reynold's Top Ten PowerPoint TipsGarr Reynold's Top Ten PowerPoint Tips
Garr Reynold's Top Ten PowerPoint Tips
 
SEP Presentation
SEP PresentationSEP Presentation
SEP Presentation
 
Michael griffis' visual resume
Michael griffis' visual resumeMichael griffis' visual resume
Michael griffis' visual resume
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 

Flipbook assignment digital security compromising our information and our health

  • 1. Digital  security   How  secure  is  it  really? Digital Security Photo:  cc:  Bart  Carrade -­‐ www.flickr.com/photos/79011202@N04/7072609283/in/photolist-­‐bLYYkn-­‐9FWHcc-­‐bwC1f2-­‐2BTPCo-­‐2RDkiu-­‐f7Fkhn-­‐km1tFH-­‐8sjp3y-­‐7w4VE1-­‐28Ds22-­‐sUXQ6-­‐kH7Q3X-­‐ 6hZux7-­‐nCStzM-­‐5iYBjz-­‐7PwA1X-­‐fE13e3-­‐LZ3Dp-­‐qHY6Mw-­‐gU3peV-­‐ah3YXB-­‐5GiNip-­‐9579Au-­‐e2rYY8-­‐5iPrPD-­‐7jjxwU-­‐48cAWc-­‐pBKSWU-­‐7JSrFD-­‐bqEriT-­‐qwWeeF-­‐eW3S9h-­‐83CqCS-­‐9djz7q-­‐q41Zkh-­‐ 8dHWy4-­‐3T3Se-­‐8vhN34-­‐eABbhZ-­‐55EBwp-­‐dWuBMW-­‐5vXTLG-­‐oMYHKD-­‐aANE2-­‐r1bohc-­‐fFPc7w-­‐5wq1Jx-­‐p6DXEN-­‐8qZekG-­‐dwHZKK Compromising our information and our health. By:  Erica  Carnevale
  • 2. The lack of digital security has compromised our personal and company information, as well as our medical devices. Photo:  Cc:  abdullah.khan2012  -­‐ www.flickr.com/photos/75862793@N06/6812695893/in/photolist-­‐bo1R92-­‐5uJAoe-­‐tdcqNN-­‐5iJeQd-­‐8tXVig-­‐bo1RWk-­‐dAVeCJ-­‐9NZ3iX-­‐dAQBfD-­‐5BuyeX-­‐dzkUGb-­‐5iHjaA ehT2jv-­‐8Awb6L-­‐e4SthJ-­‐8J1khi-­‐qvNpmr-­‐bhHvwx-­‐6cwx2o-­‐acjC7c-­‐vxi-­‐9gWgTb-­‐6Evq3k-­‐9QmUyn-­‐mG6WrQ-­‐9YD6Vw-­‐mG3mdX-­‐haWTXU-­‐mG4n4v-­‐b67Ej-­‐mG4a74-­‐mG4i6F-­‐mG2XAH-­‐LSutf-­‐mG5xbJ-­‐ mG583J-­‐7mdYcf-­‐eQBHN1-­‐mG4wnc-­‐mG5t4L-­‐mG4Een-­‐jESE12-­‐2ia9Rc-­‐pyD8we-­‐mG58KX-­‐9QpJ33-­‐cdxYCs-­‐tvksmy-­‐ex2J3H-­‐dYdmN
  • 3. 2/3 of the Canadian population owns a smartphone.6 Photo:  Cc:  Gonzalo  Baeza -­‐ www.flickr.com/photos/gonzalobaeza/8292958010/in/photolist-­‐dCPzuE-­‐fhEmim-­‐jpBnkE-­‐i52con-­‐5A3Kon-­‐9Li1n1-­‐oZN6c9-­‐i5L2an-­‐hu8x36-­‐7gEWV7-­‐peadiC-­‐jpBnC3-­‐ 7w8xG1-­‐jFzBKX-­‐7LAtpL-­‐i5bSmz-­‐g93SZD-­‐jAcpuE-­‐p6hnj5-­‐ptBVF7-­‐eM5aF6-­‐job32H-­‐pdWJe5-­‐rmZJES-­‐eM5wxX-­‐kWvShV-­‐9qmJp4-­‐AXKxcb-­‐deLgpu-­‐peab6w-­‐8jvm3s-­‐ptBQc1-­‐pvnKai-­‐oeDrpa-­‐pwNUsN-­‐ 9qpLks-­‐i5bgT9-­‐eM54Mp-­‐eMgGbE-­‐jpBnx3-­‐8TQyba-­‐pvE51B-­‐4QoDw9-­‐9qpKtA-­‐9qmHyv-­‐pea9Py-­‐i4WK4B-­‐9qmGPK-­‐21PJaA-­‐eyaiBQ
  • 4. 54% of smartphone users are worried about the security level on their mobile devices7… Photo:  Cc:  Jimmy  Álvarez -­‐ www.flickr.com/photos/jimmyflickr/2892191058/in/faves-­‐143778368@N06/
  • 5. …… demonstrating that with advancing technology people still do not trust the level of security that their devices possess. Photo:  Cc:  Marcie  Casas  -­‐ www.flickr.com/photos/marciecasas/5347580266/in/photolist-­‐99xKiL-­‐9vw3rV-­‐rmB6z8-­‐abhKDz-­‐oiFHFy-­‐g8KAp9-­‐5Xnd1G-­‐5oYETZ-­‐k4zbd4-­‐4jxdZH-­‐oa6eaC-­‐2pcoBB-­‐4vareY-­‐ bjLFXK-­‐5Wtibx-­‐r5a29j-­‐8NYgsR-­‐4ZJEm2-­‐3kTLzq-­‐frLeXm-­‐eYKV7c-­‐8ySvFB-­‐6Yoiq8-­‐Bq9iBh-­‐2kHCE-­‐avMNa5-­‐5pwiva-­‐4UUSFp-­‐bsmmzd-­‐ekFX5v-­‐a2v9fG-­‐8NHKks-­‐56mn88-­‐nx25o-­‐7fAPZc-­‐2oQHhp-­‐5wqAR3-­‐ nd8skd-­‐nXCEn-­‐6Caj8v-­‐urX3T-­‐bQZTzZ-­‐5QxKEK-­‐gDM8Y-­‐7N6FpZ-­‐czJw43-­‐bqJNEK-­‐9u3UiC-­‐4MkQyw-­‐4yUpNz
  • 6. And they should not trust it! Photo:  Cc:  Kay  Yin  -­‐ https://www.flickr.com/photos/imkiwiyournot/8296251942/in/photolist-­‐dD7sEA-­‐dAAKXV-­‐bAZc9u-­‐ksvkir-­‐7x7SxV-­‐Nx6Az-­‐bx4Gyu-­‐4qyv6H-­‐foF2B2-­‐9PWn8R-­‐531zHS-­‐nSQ13j-­‐ amLMGg-­‐8GM6M5-­‐cEXuSy-­‐LhSVM-­‐9meLzG-­‐4AZH4B-­‐rdUG6q-­‐9JbnDJ-­‐8rVGqY-­‐tZteF-­‐4HxqZj-­‐dQPXEa-­‐a293rk-­‐9B5zsH-­‐7976Ex-­‐8Y24Kb-­‐7vaeng-­‐8phKha-­‐apdFZp-­‐6FX74T-­‐4LLTEL-­‐rFJCWH-­‐9mL9eW-­‐ ak8osE-­‐7Au7dM-­‐5AxoVu-­‐6DDQHr-­‐8gav3x-­‐5Uq3ZA-­‐3eBt5x-­‐9YVcQS-­‐F2hV5-­‐N9tfi-­‐9yteV-­‐4qiQDe-­‐oJygow-­‐bbijFa-­‐tCJ8Y
  • 7. Smartphone data that is gathered can be used to pinpoint your location, identify you and monitor your phone, regardless of app privacy policies or phone settings.12 Photo:  Cc:  Yasunobu Ikeda  -­‐ www.flickr.com/photos/clockmaker-­‐jp/2662752901/in/faves-­‐143778368@N06/
  • 8. Shopkick is an app that collects personal information about the user but does not outline what the information is being used for and who it is being sold to in its privacy policy.4 Photo:  Cc:  NATS  Press  Office  -­‐ www.flickr.com/photos/natspressoffice/13085089605/in/photolist-­‐9m8RsH-­‐4z7rwb-­‐fxQpM-­‐2b61H9-­‐eZxVuK-­‐ak7hXk-­‐8UxCTj-­‐8QEcXb-­‐9mco4f-­‐btTti5-­‐9pxgGB-­‐arF84-­‐ 7zSsL1-­‐9r3HWm-­‐vFmTy3-­‐5eVeXR-­‐nJeZWZ-­‐9Uz7bc-­‐CqaqGY-­‐bJDnpB-­‐gegezb-­‐g9FDWk-­‐gbbC6J-­‐HPWZNT-­‐kisKDH-­‐eVCzWz-­‐y7Yp6f-­‐jHwscd-­‐brsQrH-­‐geHAXk-­‐g8dbjY-­‐gbaGAr-­‐g9FHdk-­‐g8kxgn-­‐khg-­‐gGqspG-­‐ gGqCej-­‐gGgAkE-­‐gGh9CW-­‐gRaFve-­‐f6XbVk-­‐g8cQip-­‐gJcj59-­‐7wbp3W-­‐gR96JZ-­‐gGt9VN-­‐gR827h-­‐kWhvgc-­‐kWhvig-­‐kWhvN4
  • 9. Preventing apps from using your location or restricting them to only use it when you are using the app, is not enough to prevent the app from tracking your device.3 Photo:  Cc:  JOSE  SANTANA  -­‐ https://www.flickr.com/photos/34340561@N07/16123207190/in/photolist-­‐qyKDLS-­‐ oqmKnf-­‐ec2tJF-­‐bw63y7-­‐nTKzmB-­‐gXndWK-­‐e6rn8f-­‐fK5siK-­‐s7KcVS-­‐pdRxzH-­‐awRP6g-­‐dWCHKe-­‐omfAVB-­‐anqVsJ-­‐ 6WvtLg-­‐dC3nrM-­‐8CL57e-­‐qHpuZE-­‐gYJrBr-­‐qyw3HK-­‐rgUkph-­‐4zV17D-­‐aTsuUp-­‐xwosGd-­‐dT6A2Z-­‐a328ww-­‐ota6wU-­‐ EZqp4V-­‐nJvSKe-­‐re2v5r-­‐bvLtQX-­‐pWTskF-­‐9wVGUq-­‐pNGYiT-­‐n6S7Gn-­‐9YKf4D-­‐qFmQxs-­‐rs7xgU-­‐fDEjr1-­‐rbTTy9-­‐zNS6gc-­‐ ePHVJF-­‐phop4p-­‐6z6hK2-­‐rpSdFY-­‐ejdpXm-­‐dvdHYr-­‐mb5LEg-­‐codzeC-­‐8Kk9pB
  • 10. Photo:  cc:  Mikhail_108  -­‐ www.flickr.com/photos/m108/14900693136/in/photolist-­‐oGHWWm-­‐9KDR4w-­‐rTh92w-­‐pWYTSK-­‐qde4VK-­‐e3uEtT-­‐9mtKbm-­‐9kfFfA-­‐sssbZt-­‐fAJW9n-­‐azmh7G-­‐9mfja2-­‐58vzRG-­‐ 7EhY6G-­‐9mhrdz-­‐49S34-­‐5CWLE3-­‐dNdWaA-­‐6DV6Xy-­‐aF85tD-­‐bcLUgM-­‐dVdg6J-­‐fYyP78-­‐nw1gHG-­‐5ZPxra-­‐79huAo-­‐eJvJ8F-­‐5JB2YS-­‐aF8518-­‐8y3pTW-­‐o7M1X-­‐peU6Q-­‐aFbTWw-­‐9uZD9Q-­‐oskZ1R-­‐aFbTTm-­‐ 5koG7C-­‐a1swjG-­‐a1svXm-­‐4KFAiH-­‐7zveJu-­‐7ysCdk-­‐7p313i-­‐eZNDiE-­‐qB4Tof-­‐aF84Sx-­‐n47gZR-­‐fzbHvT-­‐fEvBaf-­‐8VKTrB The Weather Channel accesses your location on average every 10 minutes even when the application is not being used.11
  • 11. Photo:  Cc:  Carlos  Enciso-­‐ www.flickr.com/photos/krynowekeine/2703085724/in/photolist-­‐57S2dh-­‐ anugYV-­‐8JDpUk-­‐4DUj7t-­‐6ZwD6a-­‐aHDBzc-­‐nQjXBf-­‐irF6Zz-­‐bYk9XS-­‐pVCNxd-­‐pXatNz-­‐5SKg4s-­‐nPo7W-­‐ 8NY6pe-­‐6HtZeY-­‐53DM8u-­‐4mBqT8-­‐cLf2FJ-­‐9GzL8R-­‐zvoKWP-­‐9vgDsi-­‐mDEbwD-­‐mNiVnX-­‐dc7tQL-­‐pSAumv-­‐ 6g49Hd-­‐hVm9YF-­‐kEzNo-­‐aDbWzk-­‐6XEPZo-­‐rh1MX1-­‐2bFBUn-­‐dkfD63-­‐oPbxPL-­‐bVPS5R-­‐4T5Dmr-­‐bjBLk4-­‐ eXiQZJ-­‐67S2qB-­‐dkXsZw-­‐7qWay5-­‐aXCjbc-­‐4QsgZ3-­‐81kkEj-­‐4tXTwW-­‐B3VXk-­‐5cfVvW-­‐diojeE-­‐atNu8-­‐kaQQ8r Sensors in your devices and apps that collect data and track your location, could cause you to be more vulnerable to cyber attacks.3
  • 12. Personal information is now being compromised because of poor digital security and now company information is also under attack. Photo:  Cc:  Sivaserver -­‐ www.flickr.com/photos/91707070@N03/8331732961/in/photolist-­‐dGfiWi-­‐ aMbw5H-­‐2Yxv9A-­‐ap5Je6-­‐aeKut7-­‐8CpFau-­‐6rf4Xg-­‐8G68F2-­‐hQf1N4-­‐bfmZ4v-­‐bxFnW-­‐8G68zt-­‐dQEPCC-­‐ 9XaVP2-­‐8t6B4C-­‐uiDMM-­‐6UDnWP-­‐2b5yP9-­‐8G9iDJ-­‐rEAH-­‐8G68JX-­‐nmZnrf-­‐8G9j7q-­‐8G68VZ-­‐dvdWi-­‐8G68jZ-­‐ 8G691g-­‐cZUPK-­‐8G9iL3-­‐6jQj7m-­‐9uQG7p-­‐9wJLwq-­‐61yf68-­‐9bWVHV-­‐7uXPBA-­‐4mAf35-­‐3A1j1z-­‐5c5WBr-­‐ o2diQp-­‐9JwUna-­‐c8pb39-­‐hfXPnN-­‐pZKRuh-­‐uqdE6-­‐7Wxvgo-­‐6JgTHw-­‐uq4zV-­‐6jTJBA-­‐3A1nek-­‐633hUd
  • 13. Wearable technology makes it easy for employees to gain secret information about their employer because of the discrete size of the device.2 Photo:  Cc:Kentaro -­‐ www.flickr.com/photos/kaleidalabs/17288411245/in/photolist-­‐skHCkX-­‐rDfcBu-­‐s1neMt-­‐s2oh7i-­‐skF39F-­‐shEAaf-­‐tsUEqj-­‐tKBETt-­‐oZKSSM-­‐tsUEs3-­‐skHdVv-­‐sNEFuK-­‐rxCLNV-­‐tsVfW5-­‐ s4ggoP-­‐s4geaa-­‐tKBFJM-­‐rg4of3-­‐skHB6c-­‐sfwwx7-­‐BmpvT1-­‐s7BFJU-­‐sgAVBJ-­‐p9qyGp-­‐sg8pQ7-­‐Cv7uK6-­‐s49eDm-­‐oSur3d-­‐s47UyN-­‐s49kuE-­‐s47VVL-­‐roH5RJ-­‐skyekJ-­‐s2oegi-­‐siqudm-­‐roHh7j-­‐s4g5vB-­‐s2o3Xc-­‐ s4g3FV-­‐roHcfA-­‐roH52h-­‐s47Xyf-­‐sky5a9-­‐oZKRft-­‐skEMHX-­‐saNZmz-­‐rsjqaq-­‐FLBgAQ-­‐FEJ4Cu-­‐rdNUQQ
  • 14. Employees are open to wearable technology such as smartwatches while in the workplace.8 70% of Millennials8 51% of Generation X8 Photo:  Cc:  Randy  Caldwell  -­‐ www.flickr.com/photos/misterperturbed/6321178442/in/photolist-­‐aCzG8d-­‐dfKUvh-­‐9BSptf-­‐dNzL7V-­‐adDCVX-­‐7mUtiX-­‐e183o8-­‐9N8BXZ-­‐5A4XGt-­‐b5HsBV-­‐4so2Pm-­‐77xo3J-­‐ 6vFYag-­‐6uJGPD-­‐apQzvX-­‐6RsH6B-­‐bN45xp-­‐oBjgjh-­‐63RtEc-­‐5co28q-­‐4T4JwP-­‐6StU3G-­‐bGZZTB-­‐7RYdss-­‐4mcyyB-­‐ifaPZK-­‐5cP725-­‐6e7Cca-­‐5dXg6g-­‐5HKn6o-­‐8GUmVW-­‐4eaGRU-­‐ae8Nnr-­‐8XRZ69-­‐2XgkS7-­‐ 8adZUK-­‐ctA8WU-­‐ddg4wH-­‐6PwAQ1-­‐7vNsCg-­‐9kVn5C-­‐4Ru2mz-­‐gSE3xd-­‐aheuj5-­‐2X8wAS-­‐8xjChz-­‐2Shzpt-­‐6exmYs-­‐3SeL8J-­‐4xDem6
  • 15. These individuals are the future and with their acceptance towards wearable technology in the workplace, company security will become a serious issue. Photo.  Cc:  Geoff  R  -­‐ www.flickr.com/photos/sockrotation/4301185320/in/photolist-­‐7y5GxA-­‐6epSQ1-­‐edYmW-­‐JXcQk-­‐boGFEr-­‐r2TAmZ-­‐6amA3a-­‐7BKMW6-­‐78dU6H-­‐9dK1A-­‐czomPS-­‐aYzc7r-­‐8dD3c5-­‐ ahyKd7-­‐crmFc-­‐bgwVWn-­‐bdLjtr-­‐9wGnZd-­‐bcGyWv-­‐7tRLqF-­‐6JEup6-­‐89N7vC-­‐jU28M-­‐21DDxg-­‐8HXjbs-­‐4EG8cS-­‐5g8Gk5-­‐7n71SR-­‐4GMyDi-­‐emN9f-­‐5yeAn2-­‐qQQuYJ-­‐91NFdN-­‐8tcm9d-­‐Kb56V-­‐2z8mCe-­‐udZKv-­‐ 269VsE-­‐78Hnyv-­‐r2vFSN-­‐pA82SF-­‐3pQaVB-­‐5NqtWW-­‐YQSig-­‐uGQFk-­‐o9QhbW-­‐4SiijR-­‐7xCknd-­‐b4Vg5F-­‐52rGjR
  • 16. Not only is personal information affected but our health is now under attack with the ability of hackers to access medical technology. Photo.  Cc:  Cat2398  -­‐ www.flickr.com/photos/9501510@N02/9667098575/in/photolist-­‐fJfpBn-­‐eKoVxK-­‐2FGkT2-­‐779t3E-­‐6aduTP-­‐pj5dav-­‐pj5cHi-­‐andndG-­‐nAHYxa-­‐pj6e5A-­‐2ywEDH-­‐pJcnBs-­‐4hHLyc-­‐ jKVFj7-­‐8mh8fz-­‐pyxBAh-­‐andqXh-­‐4kSm6G-­‐pj6UrD-­‐aiSUf5-­‐4RWiNA-­‐4ZNbyu-­‐5m6n1Z-­‐6yjsMr-­‐5R9wJX-­‐oYWwus-­‐pj5bBF-­‐pj5dFv-­‐andyFm-­‐mgRpqV-­‐pj5bRD-­‐ckGuhU-­‐2Eippg-­‐97rLC4-­‐aCGMHM-­‐97rNyK-­‐ pAj2CX-­‐5m6m5D-­‐pLi7Vd-­‐2BnH5p-­‐nrwbFK-­‐eYT1f3-­‐anaANF-­‐4pQVek-­‐8pNoiH-­‐anaDpK-­‐c2PXME-­‐5SUY5F-­‐3JNaFR-­‐5QsHYK
  • 17. Thousands of medical devices, such as x-ray machines, MRI scanners and drug infusion pumps, are exposed to hacking, resulting in significant health risks for researchers and patients. 10 Photo:  Cc:  Trey  Menefee -­‐ www.flickr.com/photos/trey333/4058372679/in/photolist-­‐7bCdNK-­‐72TnnS-­‐gd4JNa-­‐h4a4Tm-­‐3qVzq5-­‐sgnUc5-­‐hk4EvK-­‐8puvSw-­‐3npcCN-­‐6QGcKa-­‐5CRA9X-­‐8xw2No-­‐ bA6VdM-­‐ak13bw-­‐a8dZfJ-­‐EW5aY-­‐kjMaCR-­‐fUCdzX-­‐epMjcs-­‐fbYcD9-­‐ptP4G-­‐8JZ2LF-­‐74oyvD-­‐74st6q-­‐9pF7R-­‐app5M6-­‐5EpcsE-­‐bsmFkz-­‐eehzuc-­‐8p8S2M-­‐ryH1i7-­‐app5dv-­‐5kausR-­‐djZY4h-­‐4ahH3B-­‐hsmzL-­‐ 74staJ-­‐9p1MH4-­‐65G3d1-­‐6QKgmh-­‐qt8RmK-­‐fRwD2-­‐9AmUKX-­‐8HN5i6-­‐fRwxu-­‐fXEUPf-­‐bt4u2a-­‐dwVXmf-­‐7z2GJh-­‐EGpUEy
  • 18. Something  as   simple  as  a   computerized   insulin  pump  could   be  hacked and   administer  a   dangerous  amount   of  insulin.5 Photo:  cc:  Alan  Levine  -­‐ www.flickr.com/photos/cogdog/24410761961/in/photolist-­‐Dc6x5e-­‐25AL36-­‐8PvAQr-­‐7aJgBW-­‐6dEHDv-­‐4DCV4d-­‐o8vonH-­‐dAgLdo-­‐dAgsmo-­‐dAbhtP-­‐6dEMht-­‐bVFEVj-­‐dAgM93-­‐ dAaZQD-­‐dAbiXx-­‐dAbeVt-­‐6dJSLf-­‐dAaYPv-­‐dAgLX3-­‐dAgGXf-­‐8Ef6GH-­‐8b5Acz-­‐dAgJsS-­‐6DEik8-­‐8rBGq8-­‐dAbi8M-­‐dAgJVu-­‐dAgNas-­‐dAbjhV-­‐dAgGM5-­‐5W6aek-­‐dAfpq3-­‐48Jz9U-­‐dAbeMr-­‐6dEMun-­‐dAaYw4-­‐ dAbf9M-­‐rmP4d-­‐dAgs6j-­‐bN8iev-­‐aRCCAn-­‐dAaZsc-­‐9iwUHU-­‐dAbj6B-­‐d4CYHj-­‐98EJYb-­‐q5NaTu-­‐4nDv6r-­‐qnbVAF-­‐7WzWop
  • 19. Photo:  Cc:  Lars  Nielsen  -­‐ www.flickr.com/photos/31291514@N04/13953040668/in/photolist-­‐nfYYSG-­‐dYgNVD-­‐5mFXbD-­‐hd5wU-­‐8qUkFB-­‐5P4zDk-­‐5n2PY-­‐dvcZad-­‐5WtXJy-­‐7KR6CW-­‐ev26jp-­‐5c5cEh-­‐ 66Z1vu-­‐81yxjx-­‐5MPfm7-­‐9uaeyi-­‐83s9nT-­‐4dj37C-­‐57Tsyg-­‐5R1oy8-­‐pzWojf-­‐bphqKF-­‐oLAYoe-­‐8CeQ3z-­‐bud7JS-­‐ashm5t-­‐7XKRzd-­‐ag2gvL-­‐apbYU5-­‐3AhiCv-­‐76Xyr8-­‐4M4Paz-­‐64HxYR-­‐6D8Cgk-­‐64QfAW-­‐9uLTxi-­‐ baQN5R-­‐7gXPn6-­‐egss9F-­‐6uUeTe-­‐9gHyTk-­‐5xXrq-­‐r7BEFo-­‐53vgLG-­‐54LpAh-­‐9fZazU-­‐7kmxkJ-­‐jfmvRv-­‐3GzgeA-­‐gXmb7t   How can we prevent this from occurring and remain safe in the digital world?
  • 20. To increase digital security for personal information, company information and medical machines you should… Photo:  Cc:  Defence Images  -­‐ www.flickr.com/photos/defenceimages/6938469933/in/photolist-­‐bz8tnX-­‐4c9jPm-­‐7wtiuh-­‐8VafEh-­‐6PRxhq-­‐iqdv6-­‐3gFv8o-­‐qFazgy-­‐b4HXag-­‐bnx3rn-­‐7QsvVh-­‐6PMpza-­‐ dWVK4Y-­‐7R35TL-­‐91oJMR-­‐dx8dRU-­‐q4WwbM-­‐ezmdir-­‐hoMMAK-­‐e4tEhy-­‐9nKs6F-­‐6PMpDR-­‐6PMpni-­‐6X1r5J-­‐arBLng-­‐gZ9cos-­‐a39gFk-­‐qjMtJz-­‐oZNyv-­‐nm9pLx-­‐9aQxiw-­‐jAvJse-­‐chPnS1-­‐pS6reA-­‐bMfPP-­‐ pQ4ozQ-­‐bz8tuK-­‐srbKe-­‐bz8tBR-­‐93bWr3-­‐dWLwrz-­‐bmdAKd-­‐d9gMVb-­‐7oLnmk-­‐PGkKh-­‐4Qu5XV-­‐a6pFHb-­‐6Xjqcm-­‐qSbTyo-­‐4GQUJB
  • 21. Photo:  Cc:  Karol  Franks  -­‐ www.flickr.com/photos/karolfranks/15136260663/in/photolist-­‐p4xhXr-­‐4VCEHf-­‐7rGXLn-­‐8w2AKt-­‐eefodz-­‐oTEycq-­‐j1P9wV-­‐eacbDC-­‐sjZXzH-­‐5Vnb1t-­‐5kDUvW-­‐4FUpDx-­‐ CedUUw-­‐9rwG83-­‐9DeeWv-­‐62VnQ2-­‐azLjAh-­‐8yMA6C-­‐567p-­‐2goVK7-­‐f2f61a-­‐jabPo5-­‐6Ztnz6-­‐61zdbE-­‐VgjKe-­‐8o6Um3-­‐4yZyv2-­‐bPiVCc-­‐7XjZ5S-­‐aeMzr3-­‐ncoXC5-­‐aqeq7S-­‐QuQNR-­‐nSaTsQ-­‐oio1gn-­‐r29bk5-­‐ 4cq6Ht-­‐83LQef-­‐ogHLLH-­‐bpcRvq-­‐eHbRcJ-­‐cBykzs-­‐bpb3NV-­‐6FFXTq-­‐8AUv2E-­‐p3zfGw-­‐5fVAoS-­‐9mDA1w-­‐9QGeWv-­‐nzjQWL • Avoid giving personal information to apps.9 • Establish security policies for wearable devices in the workplace.2 • Hospitals should develop strict network policies to avoid hackers.1
  • 22. Works cited 1. Arsene,  L.  (2015,  October  4).  Hacking  Vulnerable  Medical  Equipment  Puts  Millions  at  Risk  -­‐InformationWeek.  Retrieved  June  05,  2016,  from  http://www.informationweek.com/partner-­‐ perspectives/bitdefender/hacking-­‐vulnerable-­‐medical-­‐equipment-­‐puts-­‐millions-­‐at-­‐risk/a/d-­‐id/1319873 2.      Cole,  S.  (n.d.).  How  The  Apple  Watch  Will  Change  Office  Life.  Retrieved  June  05,  2016,  from  http://www.fastcompany.com/3043533/the-­‐future-­‐of-­‐work/how-­‐the-­‐apple-­‐watch-­‐will-­‐change-­‐office-­‐life 3.      Feltman,  R.  (2014).  Phones  are  giving  away  your  location,  regardless  of  your  privacy  settings.  Retrieved  June  05,  2016,  from  http://qz.com/203778/phones-­‐are-­‐giving-­‐away-­‐your-­‐location-­‐regardless-­‐of-­‐your-­‐ privacy-­‐settings/ 4.      Golbeck,  J.  (2014).  This  App  Tracks  You  While  You  Shop.  Retrieved  June  05,  2016,  from   http://www.slate.com/articles/technology/future_tense/2014/01/ibeacon_shopkick_privacy_policies_for_location_tracking_apps_aren_t_clear.single.html 5.      Home,  hacked  home.  (2014,  July  12).  Retrieved  June  05,  2016,  from  http://www.economist.com/news/special-­‐report/21606420-­‐perils-­‐connected-­‐devices-­‐home-­‐hacked-­‐home 6.      Matrix,  Sydneyeve.  “Module  3:  Mobilities”.  2016.  Presentation.   7.      People  don't  trust  smartphone  security  –and  that's  choking  the  mobile  economy.  (n.d.).  Retrieved  June  05,  2016,  from  http://www.techradar.com/us/news/phone-­‐and-­‐communications/mobile-­‐ phones/people-­‐don-­‐t-­‐trust-­‐smartphone-­‐security-­‐and-­‐that-­‐s-­‐choking-­‐the-­‐mobile-­‐economy-­‐1285887 8.      PwC:  Half  of  people  willing  to  use  workplace  smartwatch.  (n.d.).  Retrieved  June  05,  2016,  from  http://www.consultancy.uk/news/1828/pwc-­‐half-­‐of-­‐people-­‐willing-­‐to-­‐use-­‐workplace-­‐smartwatch 9.      Smartphone  Privacy  Settings  You  Need  To  Activate  Today.  (n.d.).  Retrieved  June  05,  2016,  from  http://www.makeuseof.com/tag/smartphone-­‐privacy-­‐settings-­‐need-­‐activate-­‐today/ 10.      Thousands  of  medical  devices  are  vulnerable  to  hacking,  security  researchers  say.  (n.d.).  Retrieved  June  05,  2016,  from  http://www.pcworld.com/article/2987813/thousands-­‐of-­‐medical-­‐devices-­‐are-­‐ vulnerable-­‐to-­‐hacking-­‐security-­‐researchers-­‐say.html 11.      Where  Were  You  3  Minutes  Ago?  Your  Apps  Know.  (n.d.).  Retrieved  June  05,  2016,  from  http://blogs.wsj.com/digits/2015/03/23/where-­‐were-­‐you-­‐3-­‐minutes-­‐ago-­‐your-­‐apps-­‐know/?mod=LS1 12.      Williams,  R.  (n.d.).  How  your  phone  is  revealing  your  location,  regardless  of  privacy  settings.  Retrieved  June  05,  2016,  from  http://www.telegraph.co.uk/technology/mobile-­‐phones/10795009/How-­‐your-­‐ phone-­‐is-­‐revealing-­‐your-­‐location-­‐regardless-­‐of-­‐privacy-­‐settings.html