preview

Cyber Security : Mobile Phones, Televisions, Tvs, Cars, Heart Monitors And Refrigerators

Better Essays

Smart and IoT devices range from mobile phones, televisions, cars, heart monitors and refrigerators. Each of these devices empowers us to simplify and make our lives more convenient. These devices allow us easier access and share data but comes with a certain amount of risk. The increase of smart devices has also increased the number of cyber threats and attacks. The cyber threats that plague these devices are consistently getting more advanced and harder to detect but they consist of Trojans, viruses, botnets, and advanced manipulative devices. Cyber security is an emerging field of Information Technology (IT) that requires a lot of attention but with the growing threats IT professionals need to be well versed in the threats that could …show more content…

Online shopping is not the safest place as it has always come at a risk with data breaches or exposing your personal and credit card information. Cyber attackers attack these sites as well as social media websites to gain access to this information and eventually gaining access the users personal data. This data can then be used for harm or to exploit the individual for their own personal gain. Social media has gained enormous popularity within many cultures and ages making it a dangerous place to store information. This information can be used to exploit the user, his/her company, his/her family and friends. The user should not store private information such as date of birth (DOB); location, personal information and regulate who can visit your page. Unfortunately, for smart mobile devices SSL certificates are few and far between but more and more websites are coming along. An addition to the SSL certificates the touchscreen feature can also be detrimental to the security of the smart device. Cyber criminals are able to exploit and gain access to your fingerprint data or hide malicious code in the form of a link. Sometimes when utilizing the touch screen option our touch does not associate to the right link and can subverted click the link is associated with the spyware, malware, or other malicious logic. These types of devices have been encompassed with multiple ways to connect to a network or the internet. One of the most important

Get Access