SlideShare a Scribd company logo
1 of 10
 The Internet began in 1969 with the exchange of a
simple message between two computers. Since
then, the Internet has grown rapidly, connecting
people to other people and to electronic resources
around the world. More recently, a wide variety of
devices have begun to be attached to the Internet
including household appliances, vehicles, factories,
smart homes and personal health monitors. This new
network of machines has been coined the “Internet
of Things.”
 The Internet of Things opens up a vast array of nifty
new possibilities: cars that can report engine
performance to your mechanic, personal health
monitors that send data to your physician,
environmental monitoring of air, water and soil,
coordinating traffic and alerts about road conditions,
and “smart homes.” One example of a smart home
device is the “smart refrigerator,” which keeps your
food cool but also monitors the food inside, tracking
best-before dates and reminding you to pick up milk
and bread on the way home.
 However, while smart and connected devices provide
convenience and other benefits, they come with a variety
of security and privacy concerns. Just like your personal
computer, Internet-connected devices are vulnerable to
computer viruses and attacks. One security report
identified potential vulnerabilities in smart fridges. Some
articles have described how cars can be remotely hacked
to gain control of brakes, door locks, steering and even
seat belts. Larger attacks could possibly target public
utilities such as power grids and water treatment plants.
 Other attacks may take control of household devices
(turning them into what are metaphorically called
“zombies”) and using them to attack other computers.
Large networks of “zombies” called “botnets” can be
collected and used to send spam e-mails or perform
“denial of service attacks” against other targets.
 What’s more, these devices are often compromised
without the knowledge of their owners. Many devices are
left vulnerable to such attacks because they have factory-
default passwords which people neglect to change, or
they are not properly updated or patched when security
holes are uncovered.
 The second concern relates to privacy. One can only
imagine how advertisers would love to know your
viewing habits along with the contents of your
fridge and the places you drive your car. Devices
equipped with cameras and microphones bring up
the creepy possibility of someone eavesdropping or
spying within your home.
 To avoid these issues, engineers and companies
developing smart devices should start with “security by
design” and take responsibility for security and privacy
rather than leaving it as an afterthought. Devices should
automatically manage security updates and not be
configured with default passwords. Manufacturers
should put the interests of their users first by minimizing
the data they collect, treating it securely, notifying users
about what information is collected, and providing choice
about what and how information is used. Finally,
consumers should have the choice to simply disconnect
their devices from the Internet.
 Generally, all of these aspects of concern are to
preserve human rights, privacy and confidentiality
which have been mentioned long ago in the Qur'an.
Allah, the Most Merciful has cited in the Qur'an the
shariah or standards for all human-beings to live
peacefully without harming others (security, privacy,
authority, ethics) and perform ibadah as khalifah.
Allah s.w.t says in Surah Al-Baqarah verse 30 that He
would create mankind to be the vicegerent:
 “Behold, thy Lord said to the angels: "I will create a
vicegerent on earth." They said: "Wilt Thou place
therein one who will make mischief therein and shed
blood?- whilst we do celebrate Thy praises and
glorify Thy holy (name)?" He said: "I know what ye
know not.”
 We all are grateful for the new possibilities wrought
by the Internet, but we will be more content if my
blender and toaster are not part of the Internet of
Things.

More Related Content

What's hot

Internet of things
Internet of thingsInternet of things
Internet of thingsAkhash Kumar
 
IOT unPlugged@Lounge47
IOT unPlugged@Lounge47IOT unPlugged@Lounge47
IOT unPlugged@Lounge47Lounge47
 
Energy and The Internet of Things
Energy and The Internet of ThingsEnergy and The Internet of Things
Energy and The Internet of ThingsEenovators Limited
 
Internet of things
Internet of thingsInternet of things
Internet of thingsRoshni Singh
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of ThingsRohan M
 
The Internet of Things (and the myth of the “Smart” Fridge)
The Internet of Things (and the myth of the “Smart” Fridge)The Internet of Things (and the myth of the “Smart” Fridge)
The Internet of Things (and the myth of the “Smart” Fridge)Avi Itzkovitch
 
Internet of Things
Internet of  ThingsInternet of  Things
Internet of ThingsSourabhmt11
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Internet of Things.
Internet of Things.Internet of Things.
Internet of Things.Diksha Patel
 
Geeks bearing gifts: Unwrapping New Technologies, Version April12
Geeks bearing gifts: Unwrapping New Technologies, Version April12Geeks bearing gifts: Unwrapping New Technologies, Version April12
Geeks bearing gifts: Unwrapping New Technologies, Version April12ayoungkin
 
IoT in Public Sector
IoT in Public Sector IoT in Public Sector
IoT in Public Sector Bessie Wang
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGSMD HABIBULLAH
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 pptMhae Lyn
 
Itsm group15 project
Itsm group15 projectItsm group15 project
Itsm group15 projectJugal Shah
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Internet of things
Internet of thingsInternet of things
Internet of thingsIotex social
 

What's hot (20)

Internet of things
Internet of thingsInternet of things
Internet of things
 
IOT unPlugged@Lounge47
IOT unPlugged@Lounge47IOT unPlugged@Lounge47
IOT unPlugged@Lounge47
 
Energy and The Internet of Things
Energy and The Internet of ThingsEnergy and The Internet of Things
Energy and The Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
 
The Internet of Things (and the myth of the “Smart” Fridge)
The Internet of Things (and the myth of the “Smart” Fridge)The Internet of Things (and the myth of the “Smart” Fridge)
The Internet of Things (and the myth of the “Smart” Fridge)
 
Internet of Things
Internet of  ThingsInternet of  Things
Internet of Things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
M phasis
M phasis M phasis
M phasis
 
Internet of Things.
Internet of Things.Internet of Things.
Internet of Things.
 
Iot
IotIot
Iot
 
Geeks bearing gifts: Unwrapping New Technologies, Version April12
Geeks bearing gifts: Unwrapping New Technologies, Version April12Geeks bearing gifts: Unwrapping New Technologies, Version April12
Geeks bearing gifts: Unwrapping New Technologies, Version April12
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IoT in Public Sector
IoT in Public Sector IoT in Public Sector
IoT in Public Sector
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 
Itsm group15 project
Itsm group15 projectItsm group15 project
Itsm group15 project
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 

Similar to Faith-based Internet of Things

Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
 
Understanding the Internet of Things (IoT) | Sysfore
Understanding the Internet of Things (IoT) | SysforeUnderstanding the Internet of Things (IoT) | Sysfore
Understanding the Internet of Things (IoT) | SysforeSysfore Technologies
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineHadilAlHaj
 
Internet Of Things (IOT)
Internet  Of Things (IOT)Internet  Of Things (IOT)
Internet Of Things (IOT)rabbianasir99
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxmariuse18nolet
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics pptWulax37
 
SECURITY ATTACKS AND COUNTERMEASURES IN SMART HOMES
SECURITY ATTACKS AND COUNTERMEASURES IN SMART HOMESSECURITY ATTACKS AND COUNTERMEASURES IN SMART HOMES
SECURITY ATTACKS AND COUNTERMEASURES IN SMART HOMESIJCI JOURNAL
 

Similar to Faith-based Internet of Things (20)

IBM Xforce Q4 2014
IBM Xforce Q4 2014IBM Xforce Q4 2014
IBM Xforce Q4 2014
 
Iot new
Iot newIot new
Iot new
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
IoT White Paper
IoT White PaperIoT White Paper
IoT White Paper
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Understanding the Internet of Things (IoT) | Sysfore
Understanding the Internet of Things (IoT) | SysforeUnderstanding the Internet of Things (IoT) | Sysfore
Understanding the Internet of Things (IoT) | Sysfore
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
IoT-updated.pptx
IoT-updated.pptxIoT-updated.pptx
IoT-updated.pptx
 
Topic 7
Topic 7Topic 7
Topic 7
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Internet Of Things (IOT)
Internet  Of Things (IOT)Internet  Of Things (IOT)
Internet Of Things (IOT)
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
Hamza
HamzaHamza
Hamza
 
iot.docx
iot.docxiot.docx
iot.docx
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics ppt
 
IOT
IOTIOT
IOT
 
SECURITY ATTACKS AND COUNTERMEASURES IN SMART HOMES
SECURITY ATTACKS AND COUNTERMEASURES IN SMART HOMESSECURITY ATTACKS AND COUNTERMEASURES IN SMART HOMES
SECURITY ATTACKS AND COUNTERMEASURES IN SMART HOMES
 

More from The Wisdom Daily

Digital Transformation: Best Practices
Digital Transformation: Best PracticesDigital Transformation: Best Practices
Digital Transformation: Best PracticesThe Wisdom Daily
 
How to Design for User Trust?
How to Design for User Trust?How to Design for User Trust?
How to Design for User Trust?The Wisdom Daily
 
Building Trust in the Cyberspace
Building Trust in the CyberspaceBuilding Trust in the Cyberspace
Building Trust in the CyberspaceThe Wisdom Daily
 
Security and Privacy Issues in Deep Learning
Security and Privacy Issues in Deep LearningSecurity and Privacy Issues in Deep Learning
Security and Privacy Issues in Deep LearningThe Wisdom Daily
 
Understanding Intelligence: Ml vs. AI
Understanding Intelligence: Ml vs. AIUnderstanding Intelligence: Ml vs. AI
Understanding Intelligence: Ml vs. AIThe Wisdom Daily
 
Mobile Best Practices for UX
Mobile Best Practices for UXMobile Best Practices for UX
Mobile Best Practices for UXThe Wisdom Daily
 
Principles of UX Engineering
Principles of UX EngineeringPrinciples of UX Engineering
Principles of UX EngineeringThe Wisdom Daily
 
How to Conquer the Field of UX?
How to Conquer the Field of UX?How to Conquer the Field of UX?
How to Conquer the Field of UX?The Wisdom Daily
 
The How, Why and What of Metrics?
The How, Why and What of Metrics?The How, Why and What of Metrics?
The How, Why and What of Metrics?The Wisdom Daily
 
How to Make Your Ideas Stick for UX?
How to Make Your Ideas Stick for UX?How to Make Your Ideas Stick for UX?
How to Make Your Ideas Stick for UX?The Wisdom Daily
 
How to Design in a Multiscreen World ?
How to Design in a Multiscreen World ?How to Design in a Multiscreen World ?
How to Design in a Multiscreen World ?The Wisdom Daily
 
Deep learning & Humanity's Grand Challenges
Deep learning & Humanity's Grand ChallengesDeep learning & Humanity's Grand Challenges
Deep learning & Humanity's Grand ChallengesThe Wisdom Daily
 

More from The Wisdom Daily (20)

Engineering UX
Engineering UXEngineering UX
Engineering UX
 
How to Scale for IoT?
How to Scale for IoT?How to Scale for IoT?
How to Scale for IoT?
 
Digital Transformation: Best Practices
Digital Transformation: Best PracticesDigital Transformation: Best Practices
Digital Transformation: Best Practices
 
How to Design for User Trust?
How to Design for User Trust?How to Design for User Trust?
How to Design for User Trust?
 
Building Trust in the Cyberspace
Building Trust in the CyberspaceBuilding Trust in the Cyberspace
Building Trust in the Cyberspace
 
How to Get Started in ML?
How to Get Started in ML?How to Get Started in ML?
How to Get Started in ML?
 
Security and Privacy Issues in Deep Learning
Security and Privacy Issues in Deep LearningSecurity and Privacy Issues in Deep Learning
Security and Privacy Issues in Deep Learning
 
Understanding Intelligence: Ml vs. AI
Understanding Intelligence: Ml vs. AIUnderstanding Intelligence: Ml vs. AI
Understanding Intelligence: Ml vs. AI
 
Comp science
Comp scienceComp science
Comp science
 
Fundamentals of Big Data
Fundamentals of Big DataFundamentals of Big Data
Fundamentals of Big Data
 
Mobile Best Practices for UX
Mobile Best Practices for UXMobile Best Practices for UX
Mobile Best Practices for UX
 
UX for Product Excellence
UX for Product ExcellenceUX for Product Excellence
UX for Product Excellence
 
Principles of UX Engineering
Principles of UX EngineeringPrinciples of UX Engineering
Principles of UX Engineering
 
How to Conquer the Field of UX?
How to Conquer the Field of UX?How to Conquer the Field of UX?
How to Conquer the Field of UX?
 
The How, Why and What of Metrics?
The How, Why and What of Metrics?The How, Why and What of Metrics?
The How, Why and What of Metrics?
 
How to Make Your Ideas Stick for UX?
How to Make Your Ideas Stick for UX?How to Make Your Ideas Stick for UX?
How to Make Your Ideas Stick for UX?
 
Fundamentals of UX Design
Fundamentals of UX DesignFundamentals of UX Design
Fundamentals of UX Design
 
Basics of UX Research
Basics of UX ResearchBasics of UX Research
Basics of UX Research
 
How to Design in a Multiscreen World ?
How to Design in a Multiscreen World ?How to Design in a Multiscreen World ?
How to Design in a Multiscreen World ?
 
Deep learning & Humanity's Grand Challenges
Deep learning & Humanity's Grand ChallengesDeep learning & Humanity's Grand Challenges
Deep learning & Humanity's Grand Challenges
 

Recently uploaded

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Faith-based Internet of Things

  • 1.
  • 2.  The Internet began in 1969 with the exchange of a simple message between two computers. Since then, the Internet has grown rapidly, connecting people to other people and to electronic resources around the world. More recently, a wide variety of devices have begun to be attached to the Internet including household appliances, vehicles, factories, smart homes and personal health monitors. This new network of machines has been coined the “Internet of Things.”
  • 3.  The Internet of Things opens up a vast array of nifty new possibilities: cars that can report engine performance to your mechanic, personal health monitors that send data to your physician, environmental monitoring of air, water and soil, coordinating traffic and alerts about road conditions, and “smart homes.” One example of a smart home device is the “smart refrigerator,” which keeps your food cool but also monitors the food inside, tracking best-before dates and reminding you to pick up milk and bread on the way home.
  • 4.  However, while smart and connected devices provide convenience and other benefits, they come with a variety of security and privacy concerns. Just like your personal computer, Internet-connected devices are vulnerable to computer viruses and attacks. One security report identified potential vulnerabilities in smart fridges. Some articles have described how cars can be remotely hacked to gain control of brakes, door locks, steering and even seat belts. Larger attacks could possibly target public utilities such as power grids and water treatment plants.
  • 5.  Other attacks may take control of household devices (turning them into what are metaphorically called “zombies”) and using them to attack other computers. Large networks of “zombies” called “botnets” can be collected and used to send spam e-mails or perform “denial of service attacks” against other targets.  What’s more, these devices are often compromised without the knowledge of their owners. Many devices are left vulnerable to such attacks because they have factory- default passwords which people neglect to change, or they are not properly updated or patched when security holes are uncovered.
  • 6.  The second concern relates to privacy. One can only imagine how advertisers would love to know your viewing habits along with the contents of your fridge and the places you drive your car. Devices equipped with cameras and microphones bring up the creepy possibility of someone eavesdropping or spying within your home.
  • 7.  To avoid these issues, engineers and companies developing smart devices should start with “security by design” and take responsibility for security and privacy rather than leaving it as an afterthought. Devices should automatically manage security updates and not be configured with default passwords. Manufacturers should put the interests of their users first by minimizing the data they collect, treating it securely, notifying users about what information is collected, and providing choice about what and how information is used. Finally, consumers should have the choice to simply disconnect their devices from the Internet.
  • 8.  Generally, all of these aspects of concern are to preserve human rights, privacy and confidentiality which have been mentioned long ago in the Qur'an. Allah, the Most Merciful has cited in the Qur'an the shariah or standards for all human-beings to live peacefully without harming others (security, privacy, authority, ethics) and perform ibadah as khalifah. Allah s.w.t says in Surah Al-Baqarah verse 30 that He would create mankind to be the vicegerent:
  • 9.  “Behold, thy Lord said to the angels: "I will create a vicegerent on earth." They said: "Wilt Thou place therein one who will make mischief therein and shed blood?- whilst we do celebrate Thy praises and glorify Thy holy (name)?" He said: "I know what ye know not.”
  • 10.  We all are grateful for the new possibilities wrought by the Internet, but we will be more content if my blender and toaster are not part of the Internet of Things.