SlideShare a Scribd company logo
Sebastien Vandaele
The internet of things
What shouldn’t be connected and why?
The devices you own shouldn’t be connected to your personal data and important
information like bank details.
What’s the biggest risk associated with the Internet of Things?
The biggest risk that comes with the internet of things, is hackers. The devices at the
moment have poor security and this is already proven in the past by numerous cyber-
attacks. Some of the attacks include; Mirai botnet and the Senrio Devil’s Ivy attack. With the
Mirai botnet, there was the flaw of weak default logins. These were easily hacked and they
often couldn’t be changed. This allowed the hackers to easily take over the weak device.
The Senrio Devil’s Ivy attack used a flaw which was common in many devices. The hackers
would access a vulnerable device and take it over by restoring it to the factory settings.
When someone put in their password, the hackers could take over the whole network the
device was on.
Can we reasonably translate our experiences and emotions into
algorithms?
Computers do not have emotions, there is not a single computer that gets angry when you
shut it off. In order to give it emotions, someone would have to write a code which says how
the computer should feel in every single situation. Emotions are something so complex that
it is almost impossible to put it in an algorithm. The human race has some basic emotions
that every culture has and this is imbedded into us when we are born. These aren’t taught,
so in order to teach them to a computer would take too long.
As technology gets smarter, will our abilities to think, feel and act be
affected?
With the evolution of technology, there are things going to change. The idea of what can
happen in the future is going into the realm of science fiction. Scientist are now already
looking for technology to help us do certain things. Further in the future, there is a big
chance that technology will be incorporated into our bodies and that it will enhance certain
capabilities.
Sebastien Vandaele
What decisions can or cannot be delegated to smart things?
Smart things shouldn’t be given the decision over a moral choice. An algorithm doesn’t
know sympathy, so it would just calculate certain chances and probabilities. The devices
should give us all the information, but we have to make the choice.
Sources:
McCreary, M. (2018, October 28). The Dangers of the Internet of Things (Infographic).
Retrieved November 3, 2019, from https://www.entrepreneur.com/article/322429
van Hooijdonk, R. (2019, March 7). The hidden dangers of IoT devices - IoT Agenda.
Retrieved November 3, 2019, from
https://internetofthingsagenda.techtarget.com/blog/IoT-Agenda/The-hidden-dangers-of-
IoT-devices
Welcome To The AA. (2019, February 24). WELCOME TO THE AA EPISODE #49 LIEVEN
SCHEIRE [YouTube]. Retrieved November 3, 2019, from
https://www.youtube.com/watch?v=quYO20qfcew

More Related Content

What's hot

Is AI going to provide safety for us?
Is AI going to provide safety for us?Is AI going to provide safety for us?
Is AI going to provide safety for us?
DLabs
 
Internet of things
Internet of thingsInternet of things
Internet of things
Pallavi Gupta
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
Saurav Jha
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
Maurice Dawson
 
20 tips for information security around human factors and human error
20 tips for information security around human factors and human error20 tips for information security around human factors and human error
20 tips for information security around human factors and human error
Toru Nakata
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
IoT
IoTIoT
IoT
Mphasis
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
Jamie Proctor-Brassard
 
2 01 Terms
2 01 Terms2 01 Terms
2 01 Terms
Aaron Vrba
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Quick Heal Technologies Ltd.
 
Network security
Network securityNetwork security
Network security
nafisarayhana1
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
Rashed Sayyed
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
Laura Platt
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Arjun Chetry
 

What's hot (20)

Krishna cyber safety
Krishna cyber safetyKrishna cyber safety
Krishna cyber safety
 
Is AI going to provide safety for us?
Is AI going to provide safety for us?Is AI going to provide safety for us?
Is AI going to provide safety for us?
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
 
20 tips for information security around human factors and human error
20 tips for information security around human factors and human error20 tips for information security around human factors and human error
20 tips for information security around human factors and human error
 
Smartphones
SmartphonesSmartphones
Smartphones
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
IoT
IoTIoT
IoT
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
2 01 Terms
2 01 Terms2 01 Terms
2 01 Terms
 
2 01 Hw
2 01 Hw2 01 Hw
2 01 Hw
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Network security
Network securityNetwork security
Network security
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
cyber_security
cyber_securitycyber_security
cyber_security
 

Similar to The internet of things

Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
 
Cybersecurity Research.pptx
Cybersecurity Research.pptxCybersecurity Research.pptx
Cybersecurity Research.pptx
BT Techsoft Pvt. Ltd
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
venkatvajradhar1
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Pixel Crayons
 
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
DataScienceConferenc1
 
How Artificial Intelligence Might Change The Society.pdf
How Artificial Intelligence Might Change The Society.pdfHow Artificial Intelligence Might Change The Society.pdf
How Artificial Intelligence Might Change The Society.pdf
Aimore Technologies
 
How Artificial Intelligence Is Used For Cybersecurity Attacks
 How Artificial Intelligence Is Used For Cybersecurity Attacks  How Artificial Intelligence Is Used For Cybersecurity Attacks
How Artificial Intelligence Is Used For Cybersecurity Attacks
Sysvoot Antivirus
 
What are Pros and Cons of Internet of Things?
What are Pros and Cons of Internet of Things?What are Pros and Cons of Internet of Things?
What are Pros and Cons of Internet of Things?
Pixel Crayons
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika University
Avantika University
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
Burhan Ahmed
 
Home cyber security
Home cyber securityHome cyber security
Home cyber security
Michael File
 
Security
SecuritySecurity
Security
Bob Cherry
 
Top And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AITop And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AI
amdigitalmark15
 
#2 Human Factor and System_Heru Wijayanto
#2 Human Factor and System_Heru Wijayanto#2 Human Factor and System_Heru Wijayanto
#2 Human Factor and System_Heru Wijayanto
Sociopreneur Indonesia
 
cyber crime
 cyber crime cyber crime
cyber crime
Surkhab Shelly
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
Robert Smith
 
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET Journal
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
SahilRao25
 
Unlocking the Hidden Potential
Unlocking the Hidden PotentialUnlocking the Hidden Potential
Unlocking the Hidden Potential
EricaCiko
 

Similar to The internet of things (20)

Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Cybersecurity Research.pptx
Cybersecurity Research.pptxCybersecurity Research.pptx
Cybersecurity Research.pptx
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
 
How Artificial Intelligence Might Change The Society.pdf
How Artificial Intelligence Might Change The Society.pdfHow Artificial Intelligence Might Change The Society.pdf
How Artificial Intelligence Might Change The Society.pdf
 
How Artificial Intelligence Is Used For Cybersecurity Attacks
 How Artificial Intelligence Is Used For Cybersecurity Attacks  How Artificial Intelligence Is Used For Cybersecurity Attacks
How Artificial Intelligence Is Used For Cybersecurity Attacks
 
What are Pros and Cons of Internet of Things?
What are Pros and Cons of Internet of Things?What are Pros and Cons of Internet of Things?
What are Pros and Cons of Internet of Things?
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika University
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Home cyber security
Home cyber securityHome cyber security
Home cyber security
 
Security
SecuritySecurity
Security
 
Top And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AITop And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AI
 
#2 Human Factor and System_Heru Wijayanto
#2 Human Factor and System_Heru Wijayanto#2 Human Factor and System_Heru Wijayanto
#2 Human Factor and System_Heru Wijayanto
 
cyber crime
 cyber crime cyber crime
cyber crime
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
 
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber Defence
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 
Unlocking the Hidden Potential
Unlocking the Hidden PotentialUnlocking the Hidden Potential
Unlocking the Hidden Potential
 

More from SebastienVandaele

Seminar powerpoint
Seminar powerpointSeminar powerpoint
Seminar powerpoint
SebastienVandaele
 
Websites 2
Websites 2Websites 2
Websites 2
SebastienVandaele
 
Content task
Content taskContent task
Content task
SebastienVandaele
 
Pictochart
PictochartPictochart
Pictochart
SebastienVandaele
 
Cooperation ppt
Cooperation pptCooperation ppt
Cooperation ppt
SebastienVandaele
 
Cooperation
CooperationCooperation
Cooperation
SebastienVandaele
 

More from SebastienVandaele (7)

Seminar powerpoint
Seminar powerpointSeminar powerpoint
Seminar powerpoint
 
Websites 2
Websites 2Websites 2
Websites 2
 
Content task
Content taskContent task
Content task
 
Pictochart
PictochartPictochart
Pictochart
 
Cooperation ppt
Cooperation pptCooperation ppt
Cooperation ppt
 
Cooperation
CooperationCooperation
Cooperation
 
Cv
CvCv
Cv
 

Recently uploaded

Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 

Recently uploaded (20)

Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 

The internet of things

  • 1. Sebastien Vandaele The internet of things What shouldn’t be connected and why? The devices you own shouldn’t be connected to your personal data and important information like bank details. What’s the biggest risk associated with the Internet of Things? The biggest risk that comes with the internet of things, is hackers. The devices at the moment have poor security and this is already proven in the past by numerous cyber- attacks. Some of the attacks include; Mirai botnet and the Senrio Devil’s Ivy attack. With the Mirai botnet, there was the flaw of weak default logins. These were easily hacked and they often couldn’t be changed. This allowed the hackers to easily take over the weak device. The Senrio Devil’s Ivy attack used a flaw which was common in many devices. The hackers would access a vulnerable device and take it over by restoring it to the factory settings. When someone put in their password, the hackers could take over the whole network the device was on. Can we reasonably translate our experiences and emotions into algorithms? Computers do not have emotions, there is not a single computer that gets angry when you shut it off. In order to give it emotions, someone would have to write a code which says how the computer should feel in every single situation. Emotions are something so complex that it is almost impossible to put it in an algorithm. The human race has some basic emotions that every culture has and this is imbedded into us when we are born. These aren’t taught, so in order to teach them to a computer would take too long. As technology gets smarter, will our abilities to think, feel and act be affected? With the evolution of technology, there are things going to change. The idea of what can happen in the future is going into the realm of science fiction. Scientist are now already looking for technology to help us do certain things. Further in the future, there is a big chance that technology will be incorporated into our bodies and that it will enhance certain capabilities.
  • 2. Sebastien Vandaele What decisions can or cannot be delegated to smart things? Smart things shouldn’t be given the decision over a moral choice. An algorithm doesn’t know sympathy, so it would just calculate certain chances and probabilities. The devices should give us all the information, but we have to make the choice. Sources: McCreary, M. (2018, October 28). The Dangers of the Internet of Things (Infographic). Retrieved November 3, 2019, from https://www.entrepreneur.com/article/322429 van Hooijdonk, R. (2019, March 7). The hidden dangers of IoT devices - IoT Agenda. Retrieved November 3, 2019, from https://internetofthingsagenda.techtarget.com/blog/IoT-Agenda/The-hidden-dangers-of- IoT-devices Welcome To The AA. (2019, February 24). WELCOME TO THE AA EPISODE #49 LIEVEN SCHEIRE [YouTube]. Retrieved November 3, 2019, from https://www.youtube.com/watch?v=quYO20qfcew