SlideShare a Scribd company logo
Digital	
  security	
  
How	
  secure	
  is	
  it	
  really?
Digital Security
Photo:	
  cc:	
  Bart	
  Carrade -­‐ www.flickr.com/photos/79011202@N04/7072609283/in/photolist-­‐bLYYkn-­‐9FWHcc-­‐bwC1f2-­‐2BTPCo-­‐2RDkiu-­‐f7Fkhn-­‐km1tFH-­‐8sjp3y-­‐7w4VE1-­‐28Ds22-­‐sUXQ6-­‐kH7Q3X-­‐6hZux7-­‐nCStzM-­‐5iYBjz-­‐7PwA1X-­‐fE13e3-­‐
LZ3Dp-­‐qHY6Mw-­‐gU3peV-­‐ah3YXB-­‐5GiNip-­‐9579Au-­‐e2rYY8-­‐5iPrPD-­‐7jjxwU-­‐48cAWc-­‐pBKSWU-­‐7JSrFD-­‐bqEriT-­‐qwWeeF-­‐eW3S9h-­‐83CqCS-­‐9djz7q-­‐q41Zkh-­‐8dHWy4-­‐3T3Se-­‐8vhN34-­‐eABbhZ-­‐55EBwp-­‐dWuBMW-­‐5vXTLG-­‐oMYHKD-­‐aANE2-­‐
r1bohc-­‐fFPc7w-­‐5wq1Jx-­‐p6DXEN-­‐8qZekG-­‐dwHZKK
Compromising our information
and our health. By:	
  Erica	
  Carnevale
The lack of digital security has
compromised our personal and company
information, as well as our medical
devices.
Photo:	
  Cc:	
  abdullah.khan2012	
  -­‐ www.flickr.com/photos/75862793@N06/6812695893/in/photolist-­‐bo1R92-­‐5uJAoe-­‐tdcqNN-­‐5iJeQd-­‐8tXVig-­‐bo1RWk-­‐dAVeCJ-­‐9NZ3iX-­‐dAQBfD-­‐5BuyeX-­‐dzkUGb-­‐5iHjaA-­‐ehT2jv-­‐8Awb6L-­‐e4SthJ-­‐8J1khi-­‐
qvNpmr-­‐bhHvwx-­‐6cwx2o-­‐acjC7c-­‐vxi-­‐9gWgTb-­‐6Evq3k-­‐9QmUyn-­‐mG6WrQ-­‐9YD6Vw-­‐mG3mdX-­‐haWTXU-­‐mG4n4v-­‐b67Ej-­‐mG4a74-­‐mG4i6F-­‐mG2XAH-­‐LSutf-­‐mG5xbJ-­‐mG583J-­‐7mdYcf-­‐eQBHN1-­‐mG4wnc-­‐mG5t4L-­‐mG4Een-­‐jESE12-­‐2ia9Rc-­‐
pyD8we-­‐mG58KX-­‐9QpJ33-­‐cdxYCs-­‐tvksmy-­‐ex2J3H-­‐dYdmN
2/3 of the Canadian population owns a
smartphone.6
Photo:	
  Cc:	
  Gonzalo	
  Baeza -­‐ www.flickr.com/photos/gonzalobaeza/8292958010/in/photolist-­‐dCPzuE-­‐fhEmim-­‐jpBnkE-­‐i52con-­‐5A3Kon-­‐9Li1n1-­‐oZN6c9-­‐i5L2an-­‐hu8x36-­‐7gEWV7-­‐peadiC-­‐jpBnC3-­‐7w8xG1-­‐jFzBKX-­‐7LAtpL-­‐i5bSmz-­‐g93SZD-­‐
jAcpuE-­‐p6hnj5-­‐ptBVF7-­‐eM5aF6-­‐job32H-­‐pdWJe5-­‐rmZJES-­‐eM5wxX-­‐kWvShV-­‐9qmJp4-­‐AXKxcb-­‐deLgpu-­‐peab6w-­‐8jvm3s-­‐ptBQc1-­‐pvnKai-­‐oeDrpa-­‐pwNUsN-­‐9qpLks-­‐i5bgT9-­‐eM54Mp-­‐eMgGbE-­‐jpBnx3-­‐8TQyba-­‐pvE51B-­‐4QoDw9-­‐9qpKtA-­‐
9qmHyv-­‐pea9Py-­‐i4WK4B-­‐9qmGPK-­‐21PJaA-­‐eyaiBQ
54% of smartphone users are worried
about the security level on their mobile
devices7…
Photo:	
  Cc:	
  Jimmy	
  Álvarez -­‐ www.flickr.com/photos/jimmyflickr/2892191058/in/faves-­‐143778368@N06/
…… demonstrating that with advancing
technology people still do not trust the
level of security that their devices
possess.
Photo:	
  Cc:	
  Marcie	
  Casas	
  -­‐ www.flickr.com/photos/marciecasas/5347580266/in/photolist-­‐99xKiL-­‐9vw3rV-­‐rmB6z8-­‐abhKDz-­‐oiFHFy-­‐g8KAp9-­‐5Xnd1G-­‐5oYETZ-­‐k4zbd4-­‐4jxdZH-­‐oa6eaC-­‐2pcoBB-­‐4vareY-­‐bjLFXK-­‐5Wtibx-­‐r5a29j-­‐8NYgsR-­‐
4ZJEm2-­‐3kTLzq-­‐frLeXm-­‐eYKV7c-­‐8ySvFB-­‐6Yoiq8-­‐Bq9iBh-­‐2kHCE-­‐avMNa5-­‐5pwiva-­‐4UUSFp-­‐bsmmzd-­‐ekFX5v-­‐a2v9fG-­‐8NHKks-­‐56mn88-­‐nx25o-­‐7fAPZc-­‐2oQHhp-­‐5wqAR3-­‐nd8skd-­‐nXCEn-­‐6Caj8v-­‐urX3T-­‐bQZTzZ-­‐5QxKEK-­‐gDM8Y-­‐7N6FpZ-­‐
And they should not trust it!
Photo:	
  Cc:	
  Kay	
  Yin	
  -­‐ https://www.flickr.com/photos/imkiwiyournot/8296251942/in/photolist-­‐dD7sEA-­‐dAAKXV-­‐bAZc9u-­‐ksvkir-­‐7x7SxV-­‐Nx6Az-­‐bx4Gyu-­‐4qyv6H-­‐foF2B2-­‐9PWn8R-­‐531zHS-­‐nSQ13j-­‐amLMGg-­‐8GM6M5-­‐cEXuSy-­‐LhSVM-­‐
9meLzG-­‐4AZH4B-­‐rdUG6q-­‐9JbnDJ-­‐8rVGqY-­‐tZteF-­‐4HxqZj-­‐dQPXEa-­‐a293rk-­‐9B5zsH-­‐7976Ex-­‐8Y24Kb-­‐7vaeng-­‐8phKha-­‐apdFZp-­‐6FX74T-­‐4LLTEL-­‐rFJCWH-­‐9mL9eW-­‐ak8osE-­‐7Au7dM-­‐5AxoVu-­‐6DDQHr-­‐8gav3x-­‐5Uq3ZA-­‐3eBt5x-­‐9YVcQS-­‐F2hV5-­‐
N9tfi-­‐9yteV-­‐4qiQDe-­‐oJygow-­‐bbijFa-­‐tCJ8Y
Smartphone data that is gathered can be used to pinpoint
your location, identify you and monitor your phone,
regardless of app privacy policies or phone settings.12
Photo:	
  Cc:	
  Yasunobu Ikeda	
  -­‐ www.flickr.com/photos/clockmaker-­‐jp/2662752901/in/faves-­‐143778368@N06/
Shopkick is an app that collects personal
information about the user but does not outline
what the information is being used for and who
it is being sold to in its privacy policy.4
Photo:	
  Cc:	
  NATS	
  Press	
  Office	
  -­‐ www.flickr.com/photos/natspressoffice/13085089605/in/photolist-­‐9m8RsH-­‐4z7rwb-­‐fxQpM-­‐2b61H9-­‐eZxVuK-­‐ak7hXk-­‐8UxCTj-­‐8QEcXb-­‐9mco4f-­‐btTti5-­‐9pxgGB-­‐arF84-­‐7zSsL1-­‐9r3HWm-­‐vFmTy3-­‐5eVeXR-­‐
nJeZWZ-­‐9Uz7bc-­‐CqaqGY-­‐bJDnpB-­‐gegezb-­‐g9FDWk-­‐gbbC6J-­‐HPWZNT-­‐kisKDH-­‐eVCzWz-­‐y7Yp6f-­‐jHwscd-­‐brsQrH-­‐geHAXk-­‐g8dbjY-­‐gbaGAr-­‐g9FHdk-­‐g8kxgn-­‐khg-­‐gGqspG-­‐gGqCej-­‐gGgAkE-­‐gGh9CW-­‐gRaFve-­‐f6XbVk-­‐g8cQip-­‐gJcj59-­‐7wbp3W-­‐
gR96JZ-­‐gGt9VN-­‐gR827h-­‐kWhvgc-­‐kWhvig-­‐kWhvN4
Preventing apps
from using your
location or
restricting them to
only use it when
you are using the
app, is not enough
to prevent the app
from tracking your
device.3
Photo:	
  Cc:	
  JOSE	
  SANTANA	
  -­‐ https://www.flickr.com/photos/34340561@N07/16123207190/in/photolist-­‐qyKDLS-­‐oqmKnf-­‐
ec2tJF-­‐bw63y7-­‐nTKzmB-­‐gXndWK-­‐e6rn8f-­‐fK5siK-­‐s7KcVS-­‐pdRxzH-­‐awRP6g-­‐dWCHKe-­‐omfAVB-­‐anqVsJ-­‐6WvtLg-­‐dC3nrM-­‐8CL57e-­‐
qHpuZE-­‐gYJrBr-­‐qyw3HK-­‐rgUkph-­‐4zV17D-­‐aTsuUp-­‐xwosGd-­‐dT6A2Z-­‐a328ww-­‐ota6wU-­‐EZqp4V-­‐nJvSKe-­‐re2v5r-­‐bvLtQX-­‐pWTskF-­‐
9wVGUq-­‐pNGYiT-­‐n6S7Gn-­‐9YKf4D-­‐qFmQxs-­‐rs7xgU-­‐fDEjr1-­‐rbTTy9-­‐zNS6gc-­‐ePHVJF-­‐phop4p-­‐6z6hK2-­‐rpSdFY-­‐ejdpXm-­‐dvdHYr-­‐
mb5LEg-­‐codzeC-­‐8Kk9pB
Photo:	
  cc:	
  Mikhail_108	
  -­‐ www.flickr.com/photos/m108/14900693136/in/photolist-­‐oGHWWm-­‐9KDR4w-­‐rTh92w-­‐pWYTSK-­‐qde4VK-­‐e3uEtT-­‐9mtKbm-­‐9kfFfA-­‐sssbZt-­‐fAJW9n-­‐azmh7G-­‐9mfja2-­‐58vzRG-­‐7EhY6G-­‐9mhrdz-­‐49S34-­‐5CWLE3-­‐
dNdWaA-­‐6DV6Xy-­‐aF85tD-­‐bcLUgM-­‐dVdg6J-­‐fYyP78-­‐nw1gHG-­‐5ZPxra-­‐79huAo-­‐eJvJ8F-­‐5JB2YS-­‐aF8518-­‐8y3pTW-­‐o7M1X-­‐peU6Q-­‐aFbTWw-­‐9uZD9Q-­‐oskZ1R-­‐aFbTTm-­‐5koG7C-­‐a1swjG-­‐a1svXm-­‐4KFAiH-­‐7zveJu-­‐7ysCdk-­‐7p313i-­‐eZNDiE-­‐qB4Tof-­‐
aF84Sx-­‐n47gZR-­‐fzbHvT-­‐fEvBaf-­‐8VKTrB
The Weather Channel accesses your location on
average every 10 minutes even when the
application is not being used.11
Photo:	
  Cc:	
  Carlos	
  Enciso -­‐ www.flickr.com/photos/krynowekeine/2703085724/in/photolist-­‐57S2dh-­‐anugYV-­‐8JDpUk-­‐4DUj7t-­‐
6ZwD6a-­‐aHDBzc-­‐nQjXBf-­‐irF6Zz-­‐bYk9XS-­‐pVCNxd-­‐pXatNz-­‐5SKg4s-­‐nPo7W-­‐8NY6pe-­‐6HtZeY-­‐53DM8u-­‐4mBqT8-­‐cLf2FJ-­‐9GzL8R-­‐
zvoKWP-­‐9vgDsi-­‐mDEbwD-­‐mNiVnX-­‐dc7tQL-­‐pSAumv-­‐6g49Hd-­‐hVm9YF-­‐kEzNo-­‐aDbWzk-­‐6XEPZo-­‐rh1MX1-­‐2bFBUn-­‐dkfD63-­‐
oPbxPL-­‐bVPS5R-­‐4T5Dmr-­‐bjBLk4-­‐eXiQZJ-­‐67S2qB-­‐dkXsZw-­‐7qWay5-­‐aXCjbc-­‐4QsgZ3-­‐81kkEj-­‐4tXTwW-­‐B3VXk-­‐5cfVvW-­‐diojeE-­‐
atNu8-­‐kaQQ8r
Sensors in your
devices and apps
that collect data
and track your
location, could
cause you to be
more vulnerable to
cyber attacks.3
Personal
information is
now being
compromised
because of poor
digital security
and now company
information is
also under attack. Photo:	
  Cc:	
  Sivaserver -­‐ www.flickr.com/photos/91707070@N03/8331732961/in/photolist-­‐dGfiWi-­‐aMbw5H-­‐2Yxv9A-­‐ap5Je6-­‐
aeKut7-­‐8CpFau-­‐6rf4Xg-­‐8G68F2-­‐hQf1N4-­‐bfmZ4v-­‐bxFnW-­‐8G68zt-­‐dQEPCC-­‐9XaVP2-­‐8t6B4C-­‐uiDMM-­‐6UDnWP-­‐2b5yP9-­‐8G9iDJ-­‐
rEAH-­‐8G68JX-­‐nmZnrf-­‐8G9j7q-­‐8G68VZ-­‐dvdWi-­‐8G68jZ-­‐8G691g-­‐cZUPK-­‐8G9iL3-­‐6jQj7m-­‐9uQG7p-­‐9wJLwq-­‐61yf68-­‐9bWVHV-­‐
7uXPBA-­‐4mAf35-­‐3A1j1z-­‐5c5WBr-­‐o2diQp-­‐9JwUna-­‐c8pb39-­‐hfXPnN-­‐pZKRuh-­‐uqdE6-­‐7Wxvgo-­‐6JgTHw-­‐uq4zV-­‐6jTJBA-­‐3A1nek-­‐
633hUd
Wearable technology makes it easy for employees to
gain secret information about their employer because of
the discrete size of the device.2
Photo:	
  Cc:Kentaro -­‐ www.flickr.com/photos/kaleidalabs/17288411245/in/photolist-­‐skHCkX-­‐rDfcBu-­‐s1neMt-­‐s2oh7i-­‐skF39F-­‐shEAaf-­‐tsUEqj-­‐tKBETt-­‐oZKSSM-­‐tsUEs3-­‐skHdVv-­‐sNEFuK-­‐rxCLNV-­‐tsVfW5-­‐s4ggoP-­‐s4geaa-­‐tKBFJM-­‐rg4of3-­‐skHB6c-­‐
sfwwx7-­‐BmpvT1-­‐s7BFJU-­‐sgAVBJ-­‐p9qyGp-­‐sg8pQ7-­‐Cv7uK6-­‐s49eDm-­‐oSur3d-­‐s47UyN-­‐s49kuE-­‐s47VVL-­‐roH5RJ-­‐skyekJ-­‐s2oegi-­‐siqudm-­‐roHh7j-­‐s4g5vB-­‐s2o3Xc-­‐s4g3FV-­‐roHcfA-­‐roH52h-­‐s47Xyf-­‐sky5a9-­‐oZKRft-­‐skEMHX-­‐saNZmz-­‐rsjqaq-­‐FLBgAQ-­‐
FEJ4Cu-­‐rdNUQQ
Employees are open to wearable
technology such as smartwatches while
in the workplace.8
70% of Millennials8
51% of Generation X8
Photo:	
  Cc:	
  Randy	
  Caldwell	
   -­‐ www.flickr.com/photos/misterperturbed/6321178442/in/photolist-­‐aCzG8d-­‐dfKUvh-­‐9BSptf-­‐dNzL7V-­‐adDCVX-­‐7mUtiX-­‐e183o8-­‐9N8BXZ-­‐5A4XGt-­‐b5HsBV-­‐4so2Pm-­‐77xo3J-­‐6vFYag-­‐6uJGPD-­‐apQzvX-­‐6RsH6B-­‐
bN45xp-­‐oBjgjh-­‐63RtEc-­‐5co28q-­‐4T4JwP-­‐6StU3G-­‐bGZZTB-­‐7RYdss-­‐4mcyyB-­‐ifaPZK-­‐5cP725-­‐6e7Cca-­‐5dXg6g-­‐5HKn6o-­‐8GUmVW-­‐4eaGRU-­‐ae8Nnr-­‐8XRZ69-­‐2XgkS7-­‐8adZUK-­‐ctA8WU-­‐ddg4wH-­‐6PwAQ1-­‐7vNsCg-­‐9kVn5C-­‐4Ru2mz-­‐gSE3xd-­‐
aheuj5-­‐2X8wAS-­‐8xjChz-­‐2Shzpt-­‐6exmYs-­‐3SeL8J-­‐4xDem6
These individuals are the future and with their
acceptance towards wearable technology
in the workplace, company security will become a
serious issue.
Photo.	
  Cc:	
  Geoff	
  R	
  -­‐ www.flickr.com/photos/sockrotation/4301185320/in/photolist-­‐7y5GxA-­‐6epSQ1-­‐edYmW-­‐JXcQk-­‐boGFEr-­‐r2TAmZ-­‐6amA3a-­‐7BKMW6-­‐78dU6H-­‐9dK1A-­‐czomPS-­‐aYzc7r-­‐8dD3c5-­‐ahyKd7-­‐crmFc-­‐bgwVWn-­‐bdLjtr-­‐9wGnZd-­‐
bcGyWv-­‐7tRLqF-­‐6JEup6-­‐89N7vC-­‐jU28M-­‐21DDxg-­‐8HXjbs-­‐4EG8cS-­‐5g8Gk5-­‐7n71SR-­‐4GMyDi-­‐emN9f-­‐5yeAn2-­‐qQQuYJ-­‐91NFdN-­‐8tcm9d-­‐Kb56V-­‐2z8mCe-­‐udZKv-­‐269VsE-­‐78Hnyv-­‐r2vFSN-­‐pA82SF-­‐3pQaVB-­‐5NqtWW-­‐YQSig-­‐uGQFk-­‐o9QhbW-­‐
4SiijR-­‐7xCknd-­‐b4Vg5F-­‐52rGjR
Not only is personal
information affected but our
health is now under attack
with the ability of hackers to
access medical technology.
Photo.	
  Cc:	
  Cat2398	
  -­‐ www.flickr.com/photos/9501510@N02/9667098575/in/photolist-­‐fJfpBn-­‐eKoVxK-­‐2FGkT2-­‐779t3E-­‐6aduTP-­‐pj5dav-­‐pj5cHi-­‐andndG-­‐nAHYxa-­‐pj6e5A-­‐2ywEDH-­‐pJcnBs-­‐4hHLyc-­‐jKVFj7-­‐8mh8fz-­‐pyxBAh-­‐andqXh-­‐4kSm6G-­‐
pj6UrD-­‐aiSUf5-­‐4RWiNA-­‐4ZNbyu-­‐5m6n1Z-­‐6yjsMr-­‐5R9wJX-­‐oYWwus-­‐pj5bBF-­‐pj5dFv-­‐andyFm-­‐mgRpqV-­‐pj5bRD-­‐ckGuhU-­‐2Eippg-­‐97rLC4-­‐aCGMHM-­‐97rNyK-­‐pAj2CX-­‐5m6m5D-­‐pLi7Vd-­‐2BnH5p-­‐nrwbFK-­‐eYT1f3-­‐anaANF-­‐4pQVek-­‐8pNoiH-­‐
anaDpK-­‐c2PXME-­‐5SUY5F-­‐3JNaFR-­‐5QsHYK
Thousands of medical devices, such as x-ray
machines, MRI scanners and drug infusion
pumps, are exposed to hacking,
resulting in significant health risks for
researchers and patients. 10
Photo:	
  Cc:	
  Trey	
  Menefee -­‐ www.flickr.com/photos/trey333/4058372679/in/photolist-­‐7bCdNK-­‐72TnnS-­‐gd4JNa-­‐h4a4Tm-­‐3qVzq5-­‐sgnUc5-­‐hk4EvK-­‐8puvSw-­‐3npcCN-­‐6QGcKa-­‐5CRA9X-­‐8xw2No-­‐bA6VdM-­‐ak13bw-­‐a8dZfJ-­‐EW5aY-­‐kjMaCR-­‐
fUCdzX-­‐epMjcs-­‐fbYcD9-­‐ptP4G-­‐8JZ2LF-­‐74oyvD-­‐74st6q-­‐9pF7R-­‐app5M6-­‐5EpcsE-­‐bsmFkz-­‐eehzuc-­‐8p8S2M-­‐ryH1i7-­‐app5dv-­‐5kausR-­‐djZY4h-­‐4ahH3B-­‐hsmzL-­‐74staJ-­‐9p1MH4-­‐65G3d1-­‐6QKgmh-­‐qt8RmK-­‐fRwD2-­‐9AmUKX-­‐8HN5i6-­‐fRwxu-­‐fXEUPf-­‐
bt4u2a-­‐dwVXmf-­‐7z2GJh-­‐EGpUEy
Photo:	
  cc:	
  Alan	
  Levine	
  -­‐ www.flickr.com/photos/cogdog/24410761961/in/photolist-­‐Dc6x5e-­‐25AL36-­‐8PvAQr-­‐7aJgBW-­‐6dEHDv-­‐4DCV4d-­‐o8vonH-­‐dAgLdo-­‐dAgsmo-­‐dAbhtP-­‐6dEMht-­‐bVFEVj-­‐dAgM93-­‐dAaZQD-­‐dAbiXx-­‐dAbeVt-­‐6dJSLf-­‐
dAaYPv-­‐dAgLX3-­‐dAgGXf-­‐8Ef6GH-­‐8b5Acz-­‐dAgJsS-­‐6DEik8-­‐8rBGq8-­‐dAbi8M-­‐dAgJVu-­‐dAgNas-­‐dAbjhV-­‐dAgGM5-­‐5W6aek-­‐dAfpq3-­‐48Jz9U-­‐dAbeMr-­‐6dEMun-­‐dAaYw4-­‐dAbf9M-­‐rmP4d-­‐dAgs6j-­‐bN8iev-­‐aRCCAn-­‐dAaZsc-­‐9iwUHU-­‐dAbj6B-­‐d4CYHj-­‐
98EJYb-­‐q5NaTu-­‐4nDv6r-­‐qnbVAF-­‐7WzWop
Something	
  as	
  
simple	
  as	
  a	
  
computerized	
  
insulin	
  pump	
  could	
  
be	
  hacked and	
  
administer	
  a	
  
dangerous	
  amount	
  
of	
  insulin.5
Photo:	
  Cc:	
  Lars	
  Nielsen	
   -­‐ www.flickr.com/photos/31291514@N04/13953040668/in/photolist-­‐nfYYSG-­‐dYgNVD-­‐5mFXbD-­‐hd5wU-­‐8qUkFB-­‐5P4zDk-­‐5n2PY-­‐dvcZad-­‐5WtXJy-­‐7KR6CW-­‐ev26jp-­‐5c5cEh-­‐66Z1vu-­‐81yxjx-­‐5MPfm7-­‐9uaeyi-­‐83s9nT-­‐
4dj37C-­‐57Tsyg-­‐5R1oy8-­‐pzWojf-­‐bphqKF-­‐oLAYoe-­‐8CeQ3z-­‐bud7JS-­‐ashm5t-­‐7XKRzd-­‐ag2gvL-­‐apbYU5-­‐3AhiCv-­‐76Xyr8-­‐4M4Paz-­‐64HxYR-­‐6D8Cgk-­‐64QfAW-­‐9uLTxi-­‐baQN5R-­‐7gXPn6-­‐egss9F-­‐6uUeTe-­‐9gHyTk-­‐5xXrq-­‐r7BEFo-­‐53vgLG-­‐54LpAh-­‐
9fZazU-­‐7kmxkJ-­‐jfmvRv-­‐3GzgeA-­‐gXmb7t	
  
How can we prevent
this from occurring and remain
safe in the digital world?
To increase digital security
for personal information,
company information and
medical machines you
should…
Photo:	
  Cc:	
  Defence Images	
  -­‐ www.flickr.com/photos/defenceimages/6938469933/in/photolist-­‐bz8tnX-­‐4c9jPm-­‐7wtiuh-­‐8VafEh-­‐6PRxhq-­‐iqdv6-­‐3gFv8o-­‐qFazgy-­‐b4HXag-­‐bnx3rn-­‐7QsvVh-­‐6PMpza-­‐dWVK4Y-­‐7R35TL-­‐91oJMR-­‐dx8dRU-­‐
q4WwbM-­‐ezmdir-­‐hoMMAK-­‐e4tEhy-­‐9nKs6F-­‐6PMpDR-­‐6PMpni-­‐6X1r5J-­‐arBLng-­‐gZ9cos-­‐a39gFk-­‐qjMtJz-­‐oZNyv-­‐nm9pLx-­‐9aQxiw-­‐jAvJse-­‐chPnS1-­‐pS6reA-­‐bMfPP-­‐pQ4ozQ-­‐bz8tuK-­‐srbKe-­‐bz8tBR-­‐93bWr3-­‐dWLwrz-­‐bmdAKd-­‐d9gMVb-­‐7oLnmk-­‐
PGkKh-­‐4Qu5XV-­‐a6pFHb-­‐6Xjqcm-­‐qSbTyo-­‐4GQUJB
Photo:	
  Cc:	
  Karol	
  Franks	
  -­‐ www.flickr.com/photos/karolfranks/15136260663/in/photolist-­‐p4xhXr-­‐4VCEHf-­‐7rGXLn-­‐8w2AKt-­‐eefodz-­‐oTEycq-­‐j1P9wV-­‐eacbDC-­‐sjZXzH-­‐5Vnb1t-­‐5kDUvW-­‐4FUpDx-­‐CedUUw-­‐9rwG83-­‐9DeeWv-­‐62VnQ2-­‐azLjAh-­‐
8yMA6C-­‐567p-­‐2goVK7-­‐f2f61a-­‐jabPo5-­‐6Ztnz6-­‐61zdbE-­‐VgjKe-­‐8o6Um3-­‐4yZyv2-­‐bPiVCc-­‐7XjZ5S-­‐aeMzr3-­‐ncoXC5-­‐aqeq7S-­‐QuQNR-­‐nSaTsQ-­‐oio1gn-­‐r29bk5-­‐4cq6Ht-­‐83LQef-­‐ogHLLH-­‐bpcRvq-­‐eHbRcJ-­‐cBykzs-­‐bpb3NV-­‐6FFXTq-­‐8AUv2E-­‐p3zfGw-­‐
5fVAoS-­‐9mDA1w-­‐9QGeWv-­‐nzjQWL
• Avoid giving personal information to
apps.9
• Establish security policies for
wearable devices in the workplace.2
• Hospitals should develop strict
network policies to avoid hackers.1
Works cited
1. Arsene,	
  L.	
  (2015,	
  October	
  4).	
  Hacking	
  Vulnerable	
  Medical	
  Equipment	
  Puts	
  Millions	
  at	
  Risk	
  -­‐InformationWeek.	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  http://www.informationweek.com/partner-­‐
perspectives/bitdefender/hacking-­‐vulnerable-­‐medical-­‐equipment-­‐puts-­‐millions-­‐at-­‐risk/a/d-­‐id/1319873
2.	
  	
  	
  Cole,	
  S.	
  (n.d.).	
  How	
  The	
  Apple	
  Watch	
  Will	
  Change	
  Office	
  Life.	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  http://www.fastcompany.com/3043533/the-­‐future-­‐of-­‐work/how-­‐the-­‐apple-­‐watch-­‐will-­‐change-­‐office-­‐life
3.	
  	
  	
  Feltman,	
  R.	
  (2014).	
  Phones	
  are	
  giving	
  away	
  your	
  location,	
  regardless	
  of	
  your	
  privacy	
  settings.	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  http://qz.com/203778/phones-­‐are-­‐giving-­‐away-­‐your-­‐location-­‐regardless-­‐of-­‐your-­‐
privacy-­‐settings/
4.	
  	
  	
  Golbeck,	
  J.	
  (2014).	
  This	
  App	
  Tracks	
  You	
  While	
  You	
  Shop.	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  
http://www.slate.com/articles/technology/future_tense/2014/01/ibeacon_shopkick_privacy_policies_for_location_tracking_apps_aren_t_clear.single.html
5.	
  	
  	
  Home,	
  hacked	
  home.	
  (2014,	
  July	
  12).	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  http://www.economist.com/news/special-­‐report/21606420-­‐perils-­‐connected-­‐devices-­‐home-­‐hacked-­‐home
6.	
  	
  	
  Matrix,	
  Sydneyeve.	
  “Module	
  3:	
  Mobilities”.	
  2016.	
  Presentation.	
  
7.	
  	
  	
  People	
  don't	
  trust	
  smartphone	
  security	
  –and	
  that's	
  choking	
  the	
  mobile	
  economy.	
  (n.d.).	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  http://www.techradar.com/us/news/phone-­‐and-­‐communications/mobile-­‐
phones/people-­‐don-­‐t-­‐trust-­‐smartphone-­‐security-­‐and-­‐that-­‐s-­‐choking-­‐the-­‐mobile-­‐economy-­‐1285887
8.	
  	
  	
  PwC:	
  Half	
  of	
  people	
  willing	
  to	
  use	
  workplace	
  smartwatch.	
  (n.d.).	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  http://www.consultancy.uk/news/1828/pwc-­‐half-­‐of-­‐people-­‐willing-­‐to-­‐use-­‐workplace-­‐smartwatch
9.	
  	
  	
  Smartphone	
  Privacy	
  Settings	
  You	
  Need	
  To	
  Activate	
  Today.	
  (n.d.).	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  http://www.makeuseof.com/tag/smartphone-­‐privacy-­‐settings-­‐need-­‐activate-­‐today/
10.	
  	
  	
  Thousands	
  of	
  medical	
  devices	
  are	
  vulnerable	
  to	
  hacking,	
  security	
  researchers	
  say.	
  (n.d.).	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  http://www.pcworld.com/article/2987813/thousands-­‐of-­‐medical-­‐devices-­‐are-­‐
vulnerable-­‐to-­‐hacking-­‐security-­‐researchers-­‐say.html
11.	
  	
  	
  Where	
  Were	
  You	
  3	
  Minutes	
  Ago?	
  Your	
  Apps	
  Know.	
  (n.d.).	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  http://blogs.wsj.com/digits/2015/03/23/where-­‐were-­‐you-­‐3-­‐minutes-­‐ago-­‐your-­‐apps-­‐know/?mod=LS1
12.	
  	
  	
  Williams,	
  R.	
  (n.d.).	
  How	
  your	
  phone	
  is	
  revealing	
  your	
  location,	
  regardless	
  of	
  privacy	
  settings.	
  Retrieved	
  June	
  05,	
  2016,	
  from	
  http://www.telegraph.co.uk/technology/mobile-­‐phones/10795009/How-­‐your-­‐
phone-­‐is-­‐revealing-­‐your-­‐location-­‐regardless-­‐of-­‐privacy-­‐settings.html

More Related Content

What's hot

Williams michael final_ppp
Williams michael final_pppWilliams michael final_ppp
Williams michael final_ppp
Michael Williams
 
Brandon Reynolds PPP
Brandon Reynolds PPPBrandon Reynolds PPP
Brandon Reynolds PPP
Brandon Reynolds
 
PPP FINAL
PPP FINALPPP FINAL
PPP FINAL
Kyle Simmons
 
Amanda Ledesma- Philanthropist of Music
Amanda Ledesma- Philanthropist of MusicAmanda Ledesma- Philanthropist of Music
Amanda Ledesma- Philanthropist of Music
Amanda Ledesma
 
Final ppp slides
Final ppp slidesFinal ppp slides
Final ppp slides
laava
 
ScottII_James_4.4 Final PPP Slide Show
ScottII_James_4.4 Final PPP Slide ShowScottII_James_4.4 Final PPP Slide Show
ScottII_James_4.4 Final PPP Slide Show
Jc Scott
 
Sirbaugh_Jerry_W4_PPP_ Final
Sirbaugh_Jerry_W4_PPP_ FinalSirbaugh_Jerry_W4_PPP_ Final
Sirbaugh_Jerry_W4_PPP_ Final
JSirbaugh
 
Moore daniel final_slideshare
Moore daniel final_slideshareMoore daniel final_slideshare
Moore daniel final_slideshare
DMoore81
 
Aliche´ Matthews-King Personal Persona Project
Aliche´ Matthews-King Personal Persona ProjectAliche´ Matthews-King Personal Persona Project
Aliche´ Matthews-King Personal Persona Project
Aliche´ King
 
Corina gutierrez ppp slideshow
Corina gutierrez ppp slideshowCorina gutierrez ppp slideshow
Corina gutierrez ppp slideshow
CGutierrez1225
 
DeVries_Dale_4.4
DeVries_Dale_4.4DeVries_Dale_4.4
DeVries_Dale_4.4
Dale De Vries
 
Henson mikayla ignite presentation
Henson mikayla ignite presentationHenson mikayla ignite presentation
Henson mikayla ignite presentation
mhenson24
 
Kristine Torcuator 4.4 FINAL Personal Persona Project Slide Show
Kristine Torcuator 4.4 FINAL Personal Persona Project Slide ShowKristine Torcuator 4.4 FINAL Personal Persona Project Slide Show
Kristine Torcuator 4.4 FINAL Personal Persona Project Slide Show
KayTorcuator
 
Creative Special Forces by Jose Pacheco
Creative Special Forces by Jose PachecoCreative Special Forces by Jose Pacheco
Creative Special Forces by Jose Pacheco
Jose_Pacheco_Negron
 
Jeremy Jones - Full Sail - PPP Slide Show
Jeremy Jones - Full Sail  - PPP Slide ShowJeremy Jones - Full Sail  - PPP Slide Show
Jeremy Jones - Full Sail - PPP Slide Show
_jeremy_jones
 
Iroegbu nwanne ppp
Iroegbu nwanne pppIroegbu nwanne ppp
Iroegbu nwanne ppp
hassanah iroegbu
 
Interactive ppt final
Interactive ppt finalInteractive ppt final
Interactive ppt final
Travis Crabtree
 
Final PPP Presentation
Final PPP PresentationFinal PPP Presentation
Final PPP Presentation
Jimmy Llanos
 
Ea discussion 4ignite presentation slideshow
Ea discussion 4ignite presentation slideshowEa discussion 4ignite presentation slideshow
Ea discussion 4ignite presentation slideshow
Artie Edwards
 
Bernard Coleman 4.4 PcP final PPP
Bernard Coleman 4.4 PcP final PPP Bernard Coleman 4.4 PcP final PPP
Bernard Coleman 4.4 PcP final PPP
b3c00
 

What's hot (20)

Williams michael final_ppp
Williams michael final_pppWilliams michael final_ppp
Williams michael final_ppp
 
Brandon Reynolds PPP
Brandon Reynolds PPPBrandon Reynolds PPP
Brandon Reynolds PPP
 
PPP FINAL
PPP FINALPPP FINAL
PPP FINAL
 
Amanda Ledesma- Philanthropist of Music
Amanda Ledesma- Philanthropist of MusicAmanda Ledesma- Philanthropist of Music
Amanda Ledesma- Philanthropist of Music
 
Final ppp slides
Final ppp slidesFinal ppp slides
Final ppp slides
 
ScottII_James_4.4 Final PPP Slide Show
ScottII_James_4.4 Final PPP Slide ShowScottII_James_4.4 Final PPP Slide Show
ScottII_James_4.4 Final PPP Slide Show
 
Sirbaugh_Jerry_W4_PPP_ Final
Sirbaugh_Jerry_W4_PPP_ FinalSirbaugh_Jerry_W4_PPP_ Final
Sirbaugh_Jerry_W4_PPP_ Final
 
Moore daniel final_slideshare
Moore daniel final_slideshareMoore daniel final_slideshare
Moore daniel final_slideshare
 
Aliche´ Matthews-King Personal Persona Project
Aliche´ Matthews-King Personal Persona ProjectAliche´ Matthews-King Personal Persona Project
Aliche´ Matthews-King Personal Persona Project
 
Corina gutierrez ppp slideshow
Corina gutierrez ppp slideshowCorina gutierrez ppp slideshow
Corina gutierrez ppp slideshow
 
DeVries_Dale_4.4
DeVries_Dale_4.4DeVries_Dale_4.4
DeVries_Dale_4.4
 
Henson mikayla ignite presentation
Henson mikayla ignite presentationHenson mikayla ignite presentation
Henson mikayla ignite presentation
 
Kristine Torcuator 4.4 FINAL Personal Persona Project Slide Show
Kristine Torcuator 4.4 FINAL Personal Persona Project Slide ShowKristine Torcuator 4.4 FINAL Personal Persona Project Slide Show
Kristine Torcuator 4.4 FINAL Personal Persona Project Slide Show
 
Creative Special Forces by Jose Pacheco
Creative Special Forces by Jose PachecoCreative Special Forces by Jose Pacheco
Creative Special Forces by Jose Pacheco
 
Jeremy Jones - Full Sail - PPP Slide Show
Jeremy Jones - Full Sail  - PPP Slide ShowJeremy Jones - Full Sail  - PPP Slide Show
Jeremy Jones - Full Sail - PPP Slide Show
 
Iroegbu nwanne ppp
Iroegbu nwanne pppIroegbu nwanne ppp
Iroegbu nwanne ppp
 
Interactive ppt final
Interactive ppt finalInteractive ppt final
Interactive ppt final
 
Final PPP Presentation
Final PPP PresentationFinal PPP Presentation
Final PPP Presentation
 
Ea discussion 4ignite presentation slideshow
Ea discussion 4ignite presentation slideshowEa discussion 4ignite presentation slideshow
Ea discussion 4ignite presentation slideshow
 
Bernard Coleman 4.4 PcP final PPP
Bernard Coleman 4.4 PcP final PPP Bernard Coleman 4.4 PcP final PPP
Bernard Coleman 4.4 PcP final PPP
 

Similar to Digital Security: Compromising our information and out health.

Harvey mark 4.6
Harvey mark 4.6Harvey mark 4.6
Harvey mark 4.6
markharveyjr88
 
Angel De Arce's Professional persona project
Angel De Arce's Professional persona project Angel De Arce's Professional persona project
Angel De Arce's Professional persona project
Angel Dearce
 
Wieneke_Blaine_PPPslideshow_Final
Wieneke_Blaine_PPPslideshow_FinalWieneke_Blaine_PPPslideshow_Final
Wieneke_Blaine_PPPslideshow_Final
winakey
 
Lindsay Smith's Professional Persona Project
Lindsay Smith's Professional Persona Project Lindsay Smith's Professional Persona Project
Lindsay Smith's Professional Persona Project
Lindsay Smith
 
Final PPP
Final PPPFinal PPP
Final PPP
MaraCherry
 
The Evolution of Readership
The Evolution of ReadershipThe Evolution of Readership
The Evolution of Readership
C. Stelling
 
Pecha Kucha tic
Pecha Kucha ticPecha Kucha tic
Pecha Kucha tic
cristina conesa
 
Group d3 copy 2
Group d3 copy 2Group d3 copy 2
Group d3 copy 2
ALLD3
 
Final PPP SlideShow
Final PPP SlideShowFinal PPP SlideShow
Final PPP SlideShow
crtijerina
 
Robert lewis 4.4_ppp_slideshow_final
Robert lewis 4.4_ppp_slideshow_finalRobert lewis 4.4_ppp_slideshow_final
Robert lewis 4.4_ppp_slideshow_final
Jim Lewis
 
Pedro santana a2
Pedro santana a2Pedro santana a2
Pedro santana a2
PedroSantana123
 
Final PPP submission!
Final PPP submission!Final PPP submission!
Final PPP submission!
ShelbyAnne3C
 
Personal Persona Project Slideshow
Personal Persona Project SlideshowPersonal Persona Project Slideshow
Personal Persona Project Slideshow
Judd Seger
 
Presentation Blueprint
Presentation BlueprintPresentation Blueprint
Presentation Blueprint
Sean Thompson 
 
Lateco Strapp slides
Lateco Strapp slidesLateco Strapp slides
Lateco Strapp slides
Lateco Strapp
 
Andre Keenan PPP
Andre Keenan PPPAndre Keenan PPP
Andre Keenan PPP
Drekastro
 
Christopher Harris PPP
Christopher Harris PPPChristopher Harris PPP
Christopher Harris PPP
Chris Harris
 
SEP Presentation
SEP PresentationSEP Presentation
SEP Presentation
Connor Dahlin
 
Garr Reynold's Top Ten PowerPoint Tips
Garr Reynold's Top Ten PowerPoint TipsGarr Reynold's Top Ten PowerPoint Tips
Garr Reynold's Top Ten PowerPoint Tips
thefont
 
Michael griffis' visual resume
Michael griffis' visual resumeMichael griffis' visual resume
Michael griffis' visual resume
Michael Griffis
 

Similar to Digital Security: Compromising our information and out health. (20)

Harvey mark 4.6
Harvey mark 4.6Harvey mark 4.6
Harvey mark 4.6
 
Angel De Arce's Professional persona project
Angel De Arce's Professional persona project Angel De Arce's Professional persona project
Angel De Arce's Professional persona project
 
Wieneke_Blaine_PPPslideshow_Final
Wieneke_Blaine_PPPslideshow_FinalWieneke_Blaine_PPPslideshow_Final
Wieneke_Blaine_PPPslideshow_Final
 
Lindsay Smith's Professional Persona Project
Lindsay Smith's Professional Persona Project Lindsay Smith's Professional Persona Project
Lindsay Smith's Professional Persona Project
 
Final PPP
Final PPPFinal PPP
Final PPP
 
The Evolution of Readership
The Evolution of ReadershipThe Evolution of Readership
The Evolution of Readership
 
Pecha Kucha tic
Pecha Kucha ticPecha Kucha tic
Pecha Kucha tic
 
Group d3 copy 2
Group d3 copy 2Group d3 copy 2
Group d3 copy 2
 
Final PPP SlideShow
Final PPP SlideShowFinal PPP SlideShow
Final PPP SlideShow
 
Robert lewis 4.4_ppp_slideshow_final
Robert lewis 4.4_ppp_slideshow_finalRobert lewis 4.4_ppp_slideshow_final
Robert lewis 4.4_ppp_slideshow_final
 
Pedro santana a2
Pedro santana a2Pedro santana a2
Pedro santana a2
 
Final PPP submission!
Final PPP submission!Final PPP submission!
Final PPP submission!
 
Personal Persona Project Slideshow
Personal Persona Project SlideshowPersonal Persona Project Slideshow
Personal Persona Project Slideshow
 
Presentation Blueprint
Presentation BlueprintPresentation Blueprint
Presentation Blueprint
 
Lateco Strapp slides
Lateco Strapp slidesLateco Strapp slides
Lateco Strapp slides
 
Andre Keenan PPP
Andre Keenan PPPAndre Keenan PPP
Andre Keenan PPP
 
Christopher Harris PPP
Christopher Harris PPPChristopher Harris PPP
Christopher Harris PPP
 
SEP Presentation
SEP PresentationSEP Presentation
SEP Presentation
 
Garr Reynold's Top Ten PowerPoint Tips
Garr Reynold's Top Ten PowerPoint TipsGarr Reynold's Top Ten PowerPoint Tips
Garr Reynold's Top Ten PowerPoint Tips
 
Michael griffis' visual resume
Michael griffis' visual resumeMichael griffis' visual resume
Michael griffis' visual resume
 

Recently uploaded

Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
Celine George
 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
JomonJoseph58
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Vivekanand Anglo Vedic Academy
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 

Recently uploaded (20)

Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 

Digital Security: Compromising our information and out health.

  • 1. Digital  security   How  secure  is  it  really? Digital Security Photo:  cc:  Bart  Carrade -­‐ www.flickr.com/photos/79011202@N04/7072609283/in/photolist-­‐bLYYkn-­‐9FWHcc-­‐bwC1f2-­‐2BTPCo-­‐2RDkiu-­‐f7Fkhn-­‐km1tFH-­‐8sjp3y-­‐7w4VE1-­‐28Ds22-­‐sUXQ6-­‐kH7Q3X-­‐6hZux7-­‐nCStzM-­‐5iYBjz-­‐7PwA1X-­‐fE13e3-­‐ LZ3Dp-­‐qHY6Mw-­‐gU3peV-­‐ah3YXB-­‐5GiNip-­‐9579Au-­‐e2rYY8-­‐5iPrPD-­‐7jjxwU-­‐48cAWc-­‐pBKSWU-­‐7JSrFD-­‐bqEriT-­‐qwWeeF-­‐eW3S9h-­‐83CqCS-­‐9djz7q-­‐q41Zkh-­‐8dHWy4-­‐3T3Se-­‐8vhN34-­‐eABbhZ-­‐55EBwp-­‐dWuBMW-­‐5vXTLG-­‐oMYHKD-­‐aANE2-­‐ r1bohc-­‐fFPc7w-­‐5wq1Jx-­‐p6DXEN-­‐8qZekG-­‐dwHZKK Compromising our information and our health. By:  Erica  Carnevale
  • 2. The lack of digital security has compromised our personal and company information, as well as our medical devices. Photo:  Cc:  abdullah.khan2012  -­‐ www.flickr.com/photos/75862793@N06/6812695893/in/photolist-­‐bo1R92-­‐5uJAoe-­‐tdcqNN-­‐5iJeQd-­‐8tXVig-­‐bo1RWk-­‐dAVeCJ-­‐9NZ3iX-­‐dAQBfD-­‐5BuyeX-­‐dzkUGb-­‐5iHjaA-­‐ehT2jv-­‐8Awb6L-­‐e4SthJ-­‐8J1khi-­‐ qvNpmr-­‐bhHvwx-­‐6cwx2o-­‐acjC7c-­‐vxi-­‐9gWgTb-­‐6Evq3k-­‐9QmUyn-­‐mG6WrQ-­‐9YD6Vw-­‐mG3mdX-­‐haWTXU-­‐mG4n4v-­‐b67Ej-­‐mG4a74-­‐mG4i6F-­‐mG2XAH-­‐LSutf-­‐mG5xbJ-­‐mG583J-­‐7mdYcf-­‐eQBHN1-­‐mG4wnc-­‐mG5t4L-­‐mG4Een-­‐jESE12-­‐2ia9Rc-­‐ pyD8we-­‐mG58KX-­‐9QpJ33-­‐cdxYCs-­‐tvksmy-­‐ex2J3H-­‐dYdmN
  • 3. 2/3 of the Canadian population owns a smartphone.6 Photo:  Cc:  Gonzalo  Baeza -­‐ www.flickr.com/photos/gonzalobaeza/8292958010/in/photolist-­‐dCPzuE-­‐fhEmim-­‐jpBnkE-­‐i52con-­‐5A3Kon-­‐9Li1n1-­‐oZN6c9-­‐i5L2an-­‐hu8x36-­‐7gEWV7-­‐peadiC-­‐jpBnC3-­‐7w8xG1-­‐jFzBKX-­‐7LAtpL-­‐i5bSmz-­‐g93SZD-­‐ jAcpuE-­‐p6hnj5-­‐ptBVF7-­‐eM5aF6-­‐job32H-­‐pdWJe5-­‐rmZJES-­‐eM5wxX-­‐kWvShV-­‐9qmJp4-­‐AXKxcb-­‐deLgpu-­‐peab6w-­‐8jvm3s-­‐ptBQc1-­‐pvnKai-­‐oeDrpa-­‐pwNUsN-­‐9qpLks-­‐i5bgT9-­‐eM54Mp-­‐eMgGbE-­‐jpBnx3-­‐8TQyba-­‐pvE51B-­‐4QoDw9-­‐9qpKtA-­‐ 9qmHyv-­‐pea9Py-­‐i4WK4B-­‐9qmGPK-­‐21PJaA-­‐eyaiBQ
  • 4. 54% of smartphone users are worried about the security level on their mobile devices7… Photo:  Cc:  Jimmy  Álvarez -­‐ www.flickr.com/photos/jimmyflickr/2892191058/in/faves-­‐143778368@N06/
  • 5. …… demonstrating that with advancing technology people still do not trust the level of security that their devices possess. Photo:  Cc:  Marcie  Casas  -­‐ www.flickr.com/photos/marciecasas/5347580266/in/photolist-­‐99xKiL-­‐9vw3rV-­‐rmB6z8-­‐abhKDz-­‐oiFHFy-­‐g8KAp9-­‐5Xnd1G-­‐5oYETZ-­‐k4zbd4-­‐4jxdZH-­‐oa6eaC-­‐2pcoBB-­‐4vareY-­‐bjLFXK-­‐5Wtibx-­‐r5a29j-­‐8NYgsR-­‐ 4ZJEm2-­‐3kTLzq-­‐frLeXm-­‐eYKV7c-­‐8ySvFB-­‐6Yoiq8-­‐Bq9iBh-­‐2kHCE-­‐avMNa5-­‐5pwiva-­‐4UUSFp-­‐bsmmzd-­‐ekFX5v-­‐a2v9fG-­‐8NHKks-­‐56mn88-­‐nx25o-­‐7fAPZc-­‐2oQHhp-­‐5wqAR3-­‐nd8skd-­‐nXCEn-­‐6Caj8v-­‐urX3T-­‐bQZTzZ-­‐5QxKEK-­‐gDM8Y-­‐7N6FpZ-­‐
  • 6. And they should not trust it! Photo:  Cc:  Kay  Yin  -­‐ https://www.flickr.com/photos/imkiwiyournot/8296251942/in/photolist-­‐dD7sEA-­‐dAAKXV-­‐bAZc9u-­‐ksvkir-­‐7x7SxV-­‐Nx6Az-­‐bx4Gyu-­‐4qyv6H-­‐foF2B2-­‐9PWn8R-­‐531zHS-­‐nSQ13j-­‐amLMGg-­‐8GM6M5-­‐cEXuSy-­‐LhSVM-­‐ 9meLzG-­‐4AZH4B-­‐rdUG6q-­‐9JbnDJ-­‐8rVGqY-­‐tZteF-­‐4HxqZj-­‐dQPXEa-­‐a293rk-­‐9B5zsH-­‐7976Ex-­‐8Y24Kb-­‐7vaeng-­‐8phKha-­‐apdFZp-­‐6FX74T-­‐4LLTEL-­‐rFJCWH-­‐9mL9eW-­‐ak8osE-­‐7Au7dM-­‐5AxoVu-­‐6DDQHr-­‐8gav3x-­‐5Uq3ZA-­‐3eBt5x-­‐9YVcQS-­‐F2hV5-­‐ N9tfi-­‐9yteV-­‐4qiQDe-­‐oJygow-­‐bbijFa-­‐tCJ8Y
  • 7. Smartphone data that is gathered can be used to pinpoint your location, identify you and monitor your phone, regardless of app privacy policies or phone settings.12 Photo:  Cc:  Yasunobu Ikeda  -­‐ www.flickr.com/photos/clockmaker-­‐jp/2662752901/in/faves-­‐143778368@N06/
  • 8. Shopkick is an app that collects personal information about the user but does not outline what the information is being used for and who it is being sold to in its privacy policy.4 Photo:  Cc:  NATS  Press  Office  -­‐ www.flickr.com/photos/natspressoffice/13085089605/in/photolist-­‐9m8RsH-­‐4z7rwb-­‐fxQpM-­‐2b61H9-­‐eZxVuK-­‐ak7hXk-­‐8UxCTj-­‐8QEcXb-­‐9mco4f-­‐btTti5-­‐9pxgGB-­‐arF84-­‐7zSsL1-­‐9r3HWm-­‐vFmTy3-­‐5eVeXR-­‐ nJeZWZ-­‐9Uz7bc-­‐CqaqGY-­‐bJDnpB-­‐gegezb-­‐g9FDWk-­‐gbbC6J-­‐HPWZNT-­‐kisKDH-­‐eVCzWz-­‐y7Yp6f-­‐jHwscd-­‐brsQrH-­‐geHAXk-­‐g8dbjY-­‐gbaGAr-­‐g9FHdk-­‐g8kxgn-­‐khg-­‐gGqspG-­‐gGqCej-­‐gGgAkE-­‐gGh9CW-­‐gRaFve-­‐f6XbVk-­‐g8cQip-­‐gJcj59-­‐7wbp3W-­‐ gR96JZ-­‐gGt9VN-­‐gR827h-­‐kWhvgc-­‐kWhvig-­‐kWhvN4
  • 9. Preventing apps from using your location or restricting them to only use it when you are using the app, is not enough to prevent the app from tracking your device.3 Photo:  Cc:  JOSE  SANTANA  -­‐ https://www.flickr.com/photos/34340561@N07/16123207190/in/photolist-­‐qyKDLS-­‐oqmKnf-­‐ ec2tJF-­‐bw63y7-­‐nTKzmB-­‐gXndWK-­‐e6rn8f-­‐fK5siK-­‐s7KcVS-­‐pdRxzH-­‐awRP6g-­‐dWCHKe-­‐omfAVB-­‐anqVsJ-­‐6WvtLg-­‐dC3nrM-­‐8CL57e-­‐ qHpuZE-­‐gYJrBr-­‐qyw3HK-­‐rgUkph-­‐4zV17D-­‐aTsuUp-­‐xwosGd-­‐dT6A2Z-­‐a328ww-­‐ota6wU-­‐EZqp4V-­‐nJvSKe-­‐re2v5r-­‐bvLtQX-­‐pWTskF-­‐ 9wVGUq-­‐pNGYiT-­‐n6S7Gn-­‐9YKf4D-­‐qFmQxs-­‐rs7xgU-­‐fDEjr1-­‐rbTTy9-­‐zNS6gc-­‐ePHVJF-­‐phop4p-­‐6z6hK2-­‐rpSdFY-­‐ejdpXm-­‐dvdHYr-­‐ mb5LEg-­‐codzeC-­‐8Kk9pB
  • 10. Photo:  cc:  Mikhail_108  -­‐ www.flickr.com/photos/m108/14900693136/in/photolist-­‐oGHWWm-­‐9KDR4w-­‐rTh92w-­‐pWYTSK-­‐qde4VK-­‐e3uEtT-­‐9mtKbm-­‐9kfFfA-­‐sssbZt-­‐fAJW9n-­‐azmh7G-­‐9mfja2-­‐58vzRG-­‐7EhY6G-­‐9mhrdz-­‐49S34-­‐5CWLE3-­‐ dNdWaA-­‐6DV6Xy-­‐aF85tD-­‐bcLUgM-­‐dVdg6J-­‐fYyP78-­‐nw1gHG-­‐5ZPxra-­‐79huAo-­‐eJvJ8F-­‐5JB2YS-­‐aF8518-­‐8y3pTW-­‐o7M1X-­‐peU6Q-­‐aFbTWw-­‐9uZD9Q-­‐oskZ1R-­‐aFbTTm-­‐5koG7C-­‐a1swjG-­‐a1svXm-­‐4KFAiH-­‐7zveJu-­‐7ysCdk-­‐7p313i-­‐eZNDiE-­‐qB4Tof-­‐ aF84Sx-­‐n47gZR-­‐fzbHvT-­‐fEvBaf-­‐8VKTrB The Weather Channel accesses your location on average every 10 minutes even when the application is not being used.11
  • 11. Photo:  Cc:  Carlos  Enciso -­‐ www.flickr.com/photos/krynowekeine/2703085724/in/photolist-­‐57S2dh-­‐anugYV-­‐8JDpUk-­‐4DUj7t-­‐ 6ZwD6a-­‐aHDBzc-­‐nQjXBf-­‐irF6Zz-­‐bYk9XS-­‐pVCNxd-­‐pXatNz-­‐5SKg4s-­‐nPo7W-­‐8NY6pe-­‐6HtZeY-­‐53DM8u-­‐4mBqT8-­‐cLf2FJ-­‐9GzL8R-­‐ zvoKWP-­‐9vgDsi-­‐mDEbwD-­‐mNiVnX-­‐dc7tQL-­‐pSAumv-­‐6g49Hd-­‐hVm9YF-­‐kEzNo-­‐aDbWzk-­‐6XEPZo-­‐rh1MX1-­‐2bFBUn-­‐dkfD63-­‐ oPbxPL-­‐bVPS5R-­‐4T5Dmr-­‐bjBLk4-­‐eXiQZJ-­‐67S2qB-­‐dkXsZw-­‐7qWay5-­‐aXCjbc-­‐4QsgZ3-­‐81kkEj-­‐4tXTwW-­‐B3VXk-­‐5cfVvW-­‐diojeE-­‐ atNu8-­‐kaQQ8r Sensors in your devices and apps that collect data and track your location, could cause you to be more vulnerable to cyber attacks.3
  • 12. Personal information is now being compromised because of poor digital security and now company information is also under attack. Photo:  Cc:  Sivaserver -­‐ www.flickr.com/photos/91707070@N03/8331732961/in/photolist-­‐dGfiWi-­‐aMbw5H-­‐2Yxv9A-­‐ap5Je6-­‐ aeKut7-­‐8CpFau-­‐6rf4Xg-­‐8G68F2-­‐hQf1N4-­‐bfmZ4v-­‐bxFnW-­‐8G68zt-­‐dQEPCC-­‐9XaVP2-­‐8t6B4C-­‐uiDMM-­‐6UDnWP-­‐2b5yP9-­‐8G9iDJ-­‐ rEAH-­‐8G68JX-­‐nmZnrf-­‐8G9j7q-­‐8G68VZ-­‐dvdWi-­‐8G68jZ-­‐8G691g-­‐cZUPK-­‐8G9iL3-­‐6jQj7m-­‐9uQG7p-­‐9wJLwq-­‐61yf68-­‐9bWVHV-­‐ 7uXPBA-­‐4mAf35-­‐3A1j1z-­‐5c5WBr-­‐o2diQp-­‐9JwUna-­‐c8pb39-­‐hfXPnN-­‐pZKRuh-­‐uqdE6-­‐7Wxvgo-­‐6JgTHw-­‐uq4zV-­‐6jTJBA-­‐3A1nek-­‐ 633hUd
  • 13. Wearable technology makes it easy for employees to gain secret information about their employer because of the discrete size of the device.2 Photo:  Cc:Kentaro -­‐ www.flickr.com/photos/kaleidalabs/17288411245/in/photolist-­‐skHCkX-­‐rDfcBu-­‐s1neMt-­‐s2oh7i-­‐skF39F-­‐shEAaf-­‐tsUEqj-­‐tKBETt-­‐oZKSSM-­‐tsUEs3-­‐skHdVv-­‐sNEFuK-­‐rxCLNV-­‐tsVfW5-­‐s4ggoP-­‐s4geaa-­‐tKBFJM-­‐rg4of3-­‐skHB6c-­‐ sfwwx7-­‐BmpvT1-­‐s7BFJU-­‐sgAVBJ-­‐p9qyGp-­‐sg8pQ7-­‐Cv7uK6-­‐s49eDm-­‐oSur3d-­‐s47UyN-­‐s49kuE-­‐s47VVL-­‐roH5RJ-­‐skyekJ-­‐s2oegi-­‐siqudm-­‐roHh7j-­‐s4g5vB-­‐s2o3Xc-­‐s4g3FV-­‐roHcfA-­‐roH52h-­‐s47Xyf-­‐sky5a9-­‐oZKRft-­‐skEMHX-­‐saNZmz-­‐rsjqaq-­‐FLBgAQ-­‐ FEJ4Cu-­‐rdNUQQ
  • 14. Employees are open to wearable technology such as smartwatches while in the workplace.8 70% of Millennials8 51% of Generation X8 Photo:  Cc:  Randy  Caldwell   -­‐ www.flickr.com/photos/misterperturbed/6321178442/in/photolist-­‐aCzG8d-­‐dfKUvh-­‐9BSptf-­‐dNzL7V-­‐adDCVX-­‐7mUtiX-­‐e183o8-­‐9N8BXZ-­‐5A4XGt-­‐b5HsBV-­‐4so2Pm-­‐77xo3J-­‐6vFYag-­‐6uJGPD-­‐apQzvX-­‐6RsH6B-­‐ bN45xp-­‐oBjgjh-­‐63RtEc-­‐5co28q-­‐4T4JwP-­‐6StU3G-­‐bGZZTB-­‐7RYdss-­‐4mcyyB-­‐ifaPZK-­‐5cP725-­‐6e7Cca-­‐5dXg6g-­‐5HKn6o-­‐8GUmVW-­‐4eaGRU-­‐ae8Nnr-­‐8XRZ69-­‐2XgkS7-­‐8adZUK-­‐ctA8WU-­‐ddg4wH-­‐6PwAQ1-­‐7vNsCg-­‐9kVn5C-­‐4Ru2mz-­‐gSE3xd-­‐ aheuj5-­‐2X8wAS-­‐8xjChz-­‐2Shzpt-­‐6exmYs-­‐3SeL8J-­‐4xDem6
  • 15. These individuals are the future and with their acceptance towards wearable technology in the workplace, company security will become a serious issue. Photo.  Cc:  Geoff  R  -­‐ www.flickr.com/photos/sockrotation/4301185320/in/photolist-­‐7y5GxA-­‐6epSQ1-­‐edYmW-­‐JXcQk-­‐boGFEr-­‐r2TAmZ-­‐6amA3a-­‐7BKMW6-­‐78dU6H-­‐9dK1A-­‐czomPS-­‐aYzc7r-­‐8dD3c5-­‐ahyKd7-­‐crmFc-­‐bgwVWn-­‐bdLjtr-­‐9wGnZd-­‐ bcGyWv-­‐7tRLqF-­‐6JEup6-­‐89N7vC-­‐jU28M-­‐21DDxg-­‐8HXjbs-­‐4EG8cS-­‐5g8Gk5-­‐7n71SR-­‐4GMyDi-­‐emN9f-­‐5yeAn2-­‐qQQuYJ-­‐91NFdN-­‐8tcm9d-­‐Kb56V-­‐2z8mCe-­‐udZKv-­‐269VsE-­‐78Hnyv-­‐r2vFSN-­‐pA82SF-­‐3pQaVB-­‐5NqtWW-­‐YQSig-­‐uGQFk-­‐o9QhbW-­‐ 4SiijR-­‐7xCknd-­‐b4Vg5F-­‐52rGjR
  • 16. Not only is personal information affected but our health is now under attack with the ability of hackers to access medical technology. Photo.  Cc:  Cat2398  -­‐ www.flickr.com/photos/9501510@N02/9667098575/in/photolist-­‐fJfpBn-­‐eKoVxK-­‐2FGkT2-­‐779t3E-­‐6aduTP-­‐pj5dav-­‐pj5cHi-­‐andndG-­‐nAHYxa-­‐pj6e5A-­‐2ywEDH-­‐pJcnBs-­‐4hHLyc-­‐jKVFj7-­‐8mh8fz-­‐pyxBAh-­‐andqXh-­‐4kSm6G-­‐ pj6UrD-­‐aiSUf5-­‐4RWiNA-­‐4ZNbyu-­‐5m6n1Z-­‐6yjsMr-­‐5R9wJX-­‐oYWwus-­‐pj5bBF-­‐pj5dFv-­‐andyFm-­‐mgRpqV-­‐pj5bRD-­‐ckGuhU-­‐2Eippg-­‐97rLC4-­‐aCGMHM-­‐97rNyK-­‐pAj2CX-­‐5m6m5D-­‐pLi7Vd-­‐2BnH5p-­‐nrwbFK-­‐eYT1f3-­‐anaANF-­‐4pQVek-­‐8pNoiH-­‐ anaDpK-­‐c2PXME-­‐5SUY5F-­‐3JNaFR-­‐5QsHYK
  • 17. Thousands of medical devices, such as x-ray machines, MRI scanners and drug infusion pumps, are exposed to hacking, resulting in significant health risks for researchers and patients. 10 Photo:  Cc:  Trey  Menefee -­‐ www.flickr.com/photos/trey333/4058372679/in/photolist-­‐7bCdNK-­‐72TnnS-­‐gd4JNa-­‐h4a4Tm-­‐3qVzq5-­‐sgnUc5-­‐hk4EvK-­‐8puvSw-­‐3npcCN-­‐6QGcKa-­‐5CRA9X-­‐8xw2No-­‐bA6VdM-­‐ak13bw-­‐a8dZfJ-­‐EW5aY-­‐kjMaCR-­‐ fUCdzX-­‐epMjcs-­‐fbYcD9-­‐ptP4G-­‐8JZ2LF-­‐74oyvD-­‐74st6q-­‐9pF7R-­‐app5M6-­‐5EpcsE-­‐bsmFkz-­‐eehzuc-­‐8p8S2M-­‐ryH1i7-­‐app5dv-­‐5kausR-­‐djZY4h-­‐4ahH3B-­‐hsmzL-­‐74staJ-­‐9p1MH4-­‐65G3d1-­‐6QKgmh-­‐qt8RmK-­‐fRwD2-­‐9AmUKX-­‐8HN5i6-­‐fRwxu-­‐fXEUPf-­‐ bt4u2a-­‐dwVXmf-­‐7z2GJh-­‐EGpUEy
  • 18. Photo:  cc:  Alan  Levine  -­‐ www.flickr.com/photos/cogdog/24410761961/in/photolist-­‐Dc6x5e-­‐25AL36-­‐8PvAQr-­‐7aJgBW-­‐6dEHDv-­‐4DCV4d-­‐o8vonH-­‐dAgLdo-­‐dAgsmo-­‐dAbhtP-­‐6dEMht-­‐bVFEVj-­‐dAgM93-­‐dAaZQD-­‐dAbiXx-­‐dAbeVt-­‐6dJSLf-­‐ dAaYPv-­‐dAgLX3-­‐dAgGXf-­‐8Ef6GH-­‐8b5Acz-­‐dAgJsS-­‐6DEik8-­‐8rBGq8-­‐dAbi8M-­‐dAgJVu-­‐dAgNas-­‐dAbjhV-­‐dAgGM5-­‐5W6aek-­‐dAfpq3-­‐48Jz9U-­‐dAbeMr-­‐6dEMun-­‐dAaYw4-­‐dAbf9M-­‐rmP4d-­‐dAgs6j-­‐bN8iev-­‐aRCCAn-­‐dAaZsc-­‐9iwUHU-­‐dAbj6B-­‐d4CYHj-­‐ 98EJYb-­‐q5NaTu-­‐4nDv6r-­‐qnbVAF-­‐7WzWop Something  as   simple  as  a   computerized   insulin  pump  could   be  hacked and   administer  a   dangerous  amount   of  insulin.5
  • 19. Photo:  Cc:  Lars  Nielsen   -­‐ www.flickr.com/photos/31291514@N04/13953040668/in/photolist-­‐nfYYSG-­‐dYgNVD-­‐5mFXbD-­‐hd5wU-­‐8qUkFB-­‐5P4zDk-­‐5n2PY-­‐dvcZad-­‐5WtXJy-­‐7KR6CW-­‐ev26jp-­‐5c5cEh-­‐66Z1vu-­‐81yxjx-­‐5MPfm7-­‐9uaeyi-­‐83s9nT-­‐ 4dj37C-­‐57Tsyg-­‐5R1oy8-­‐pzWojf-­‐bphqKF-­‐oLAYoe-­‐8CeQ3z-­‐bud7JS-­‐ashm5t-­‐7XKRzd-­‐ag2gvL-­‐apbYU5-­‐3AhiCv-­‐76Xyr8-­‐4M4Paz-­‐64HxYR-­‐6D8Cgk-­‐64QfAW-­‐9uLTxi-­‐baQN5R-­‐7gXPn6-­‐egss9F-­‐6uUeTe-­‐9gHyTk-­‐5xXrq-­‐r7BEFo-­‐53vgLG-­‐54LpAh-­‐ 9fZazU-­‐7kmxkJ-­‐jfmvRv-­‐3GzgeA-­‐gXmb7t   How can we prevent this from occurring and remain safe in the digital world?
  • 20. To increase digital security for personal information, company information and medical machines you should… Photo:  Cc:  Defence Images  -­‐ www.flickr.com/photos/defenceimages/6938469933/in/photolist-­‐bz8tnX-­‐4c9jPm-­‐7wtiuh-­‐8VafEh-­‐6PRxhq-­‐iqdv6-­‐3gFv8o-­‐qFazgy-­‐b4HXag-­‐bnx3rn-­‐7QsvVh-­‐6PMpza-­‐dWVK4Y-­‐7R35TL-­‐91oJMR-­‐dx8dRU-­‐ q4WwbM-­‐ezmdir-­‐hoMMAK-­‐e4tEhy-­‐9nKs6F-­‐6PMpDR-­‐6PMpni-­‐6X1r5J-­‐arBLng-­‐gZ9cos-­‐a39gFk-­‐qjMtJz-­‐oZNyv-­‐nm9pLx-­‐9aQxiw-­‐jAvJse-­‐chPnS1-­‐pS6reA-­‐bMfPP-­‐pQ4ozQ-­‐bz8tuK-­‐srbKe-­‐bz8tBR-­‐93bWr3-­‐dWLwrz-­‐bmdAKd-­‐d9gMVb-­‐7oLnmk-­‐ PGkKh-­‐4Qu5XV-­‐a6pFHb-­‐6Xjqcm-­‐qSbTyo-­‐4GQUJB
  • 21. Photo:  Cc:  Karol  Franks  -­‐ www.flickr.com/photos/karolfranks/15136260663/in/photolist-­‐p4xhXr-­‐4VCEHf-­‐7rGXLn-­‐8w2AKt-­‐eefodz-­‐oTEycq-­‐j1P9wV-­‐eacbDC-­‐sjZXzH-­‐5Vnb1t-­‐5kDUvW-­‐4FUpDx-­‐CedUUw-­‐9rwG83-­‐9DeeWv-­‐62VnQ2-­‐azLjAh-­‐ 8yMA6C-­‐567p-­‐2goVK7-­‐f2f61a-­‐jabPo5-­‐6Ztnz6-­‐61zdbE-­‐VgjKe-­‐8o6Um3-­‐4yZyv2-­‐bPiVCc-­‐7XjZ5S-­‐aeMzr3-­‐ncoXC5-­‐aqeq7S-­‐QuQNR-­‐nSaTsQ-­‐oio1gn-­‐r29bk5-­‐4cq6Ht-­‐83LQef-­‐ogHLLH-­‐bpcRvq-­‐eHbRcJ-­‐cBykzs-­‐bpb3NV-­‐6FFXTq-­‐8AUv2E-­‐p3zfGw-­‐ 5fVAoS-­‐9mDA1w-­‐9QGeWv-­‐nzjQWL • Avoid giving personal information to apps.9 • Establish security policies for wearable devices in the workplace.2 • Hospitals should develop strict network policies to avoid hackers.1
  • 22. Works cited 1. Arsene,  L.  (2015,  October  4).  Hacking  Vulnerable  Medical  Equipment  Puts  Millions  at  Risk  -­‐InformationWeek.  Retrieved  June  05,  2016,  from  http://www.informationweek.com/partner-­‐ perspectives/bitdefender/hacking-­‐vulnerable-­‐medical-­‐equipment-­‐puts-­‐millions-­‐at-­‐risk/a/d-­‐id/1319873 2.      Cole,  S.  (n.d.).  How  The  Apple  Watch  Will  Change  Office  Life.  Retrieved  June  05,  2016,  from  http://www.fastcompany.com/3043533/the-­‐future-­‐of-­‐work/how-­‐the-­‐apple-­‐watch-­‐will-­‐change-­‐office-­‐life 3.      Feltman,  R.  (2014).  Phones  are  giving  away  your  location,  regardless  of  your  privacy  settings.  Retrieved  June  05,  2016,  from  http://qz.com/203778/phones-­‐are-­‐giving-­‐away-­‐your-­‐location-­‐regardless-­‐of-­‐your-­‐ privacy-­‐settings/ 4.      Golbeck,  J.  (2014).  This  App  Tracks  You  While  You  Shop.  Retrieved  June  05,  2016,  from   http://www.slate.com/articles/technology/future_tense/2014/01/ibeacon_shopkick_privacy_policies_for_location_tracking_apps_aren_t_clear.single.html 5.      Home,  hacked  home.  (2014,  July  12).  Retrieved  June  05,  2016,  from  http://www.economist.com/news/special-­‐report/21606420-­‐perils-­‐connected-­‐devices-­‐home-­‐hacked-­‐home 6.      Matrix,  Sydneyeve.  “Module  3:  Mobilities”.  2016.  Presentation.   7.      People  don't  trust  smartphone  security  –and  that's  choking  the  mobile  economy.  (n.d.).  Retrieved  June  05,  2016,  from  http://www.techradar.com/us/news/phone-­‐and-­‐communications/mobile-­‐ phones/people-­‐don-­‐t-­‐trust-­‐smartphone-­‐security-­‐and-­‐that-­‐s-­‐choking-­‐the-­‐mobile-­‐economy-­‐1285887 8.      PwC:  Half  of  people  willing  to  use  workplace  smartwatch.  (n.d.).  Retrieved  June  05,  2016,  from  http://www.consultancy.uk/news/1828/pwc-­‐half-­‐of-­‐people-­‐willing-­‐to-­‐use-­‐workplace-­‐smartwatch 9.      Smartphone  Privacy  Settings  You  Need  To  Activate  Today.  (n.d.).  Retrieved  June  05,  2016,  from  http://www.makeuseof.com/tag/smartphone-­‐privacy-­‐settings-­‐need-­‐activate-­‐today/ 10.      Thousands  of  medical  devices  are  vulnerable  to  hacking,  security  researchers  say.  (n.d.).  Retrieved  June  05,  2016,  from  http://www.pcworld.com/article/2987813/thousands-­‐of-­‐medical-­‐devices-­‐are-­‐ vulnerable-­‐to-­‐hacking-­‐security-­‐researchers-­‐say.html 11.      Where  Were  You  3  Minutes  Ago?  Your  Apps  Know.  (n.d.).  Retrieved  June  05,  2016,  from  http://blogs.wsj.com/digits/2015/03/23/where-­‐were-­‐you-­‐3-­‐minutes-­‐ago-­‐your-­‐apps-­‐know/?mod=LS1 12.      Williams,  R.  (n.d.).  How  your  phone  is  revealing  your  location,  regardless  of  privacy  settings.  Retrieved  June  05,  2016,  from  http://www.telegraph.co.uk/technology/mobile-­‐phones/10795009/How-­‐your-­‐ phone-­‐is-­‐revealing-­‐your-­‐location-­‐regardless-­‐of-­‐privacy-­‐settings.html