22
Digital security Digital S ecurity Photo: cc: Bart Carrade www.flickr.com/photos/79011202@N04/7072609283/in/photolistbLYYkn9FWHccbwC1f22BTPCo2RDkiuf7Fkhnkm1tFH8sjp3y7w4VE128Ds22sUXQ6kH7Q3X6hZux7nCStzM5iYBjz7PwA1XfE13e3 LZ3DpqHY6MwgU3peVah3YXB5GiNip9579Aue2rYY85iPrPD7jjxwU48cAWcpBKSWU7JSrFDbqEriTqwWeeFeW3S9h83CqCS9djz7qq41Zkh8dHWy 43T3Se8vhN34eABbhZ55EBwpdW uBMW5vXTLGoMYHKDaANE2 r1bohcfFPc7w5wq1Jxp6DXEN8qZekGdwHZKK Compromising our information and our health. By: Erica Carnevale

Digital Security: Compromising our information and out health

Embed Size (px)

Citation preview

Page 1: Digital Security: Compromising our information and out health

Digital  security  How  secure  is  it  really?

Digital Security

Photo:  cc:  Bart  Carrade -­‐ www.flickr.com/photos/79011202@N04/7072609283/in/photolist-­‐bLYYkn-­‐9FWHcc-­‐bwC1f2-­‐2BTPCo-­‐2RDkiu-­‐f7Fkhn-­‐km1tFH-­‐8sjp3y-­‐7w4VE1-­‐28Ds22-­‐sUXQ6-­‐kH7Q3X-­‐6hZux7-­‐nCStzM-­‐5iYBjz-­‐7PwA1X-­‐fE13e3-­‐LZ3Dp-­‐qHY6Mw-­‐gU3peV-­‐ah3YXB-­‐5GiNip-­‐9579Au-­‐e2rYY8-­‐5iPrPD-­‐7jjxwU-­‐48cAWc-­‐pBKSWU-­‐7JSrFD-­‐bqEriT-­‐qwWeeF-­‐eW3S9h-­‐83CqCS-­‐9djz7q-­‐q41Zkh-­‐8dHWy4-­‐3T3Se-­‐8vhN34-­‐eABbhZ-­‐55EBwp-­‐dWuBMW-­‐5vXTLG-­‐oMYHKD-­‐aANE2-­‐r1bohc-­‐fFPc7w-­‐5wq1Jx-­‐p6DXEN-­‐8qZekG-­‐dwHZKK

Compromising our information and our health.

By:  Erica  Carnevale

Page 2: Digital Security: Compromising our information and out health

The lack of digital security has compromised our personal and company

information, as well as our medical devices.

Photo:  Cc:  abdullah.khan2012  -­‐ www.flickr.com/photos/75862793@N06/6812695893/in/photolist-­‐bo1R92-­‐5uJAoe-­‐tdcqNN-­‐5iJeQd-­‐8tXVig-­‐bo1RWk-­‐dAVeCJ-­‐9NZ3iX-­‐dAQBfD-­‐5BuyeX-­‐dzkUGb-­‐5iHjaA-­‐ehT2jv-­‐8Awb6L-­‐e4SthJ-­‐8J1khi-­‐qvNpmr-­‐bhHvwx-­‐6cwx2o-­‐acjC7c-­‐vxi-­‐9gWgTb-­‐6Evq3k-­‐9QmUyn-­‐mG6WrQ-­‐9YD6Vw-­‐mG3mdX-­‐haWTXU-­‐mG4n4v-­‐b67Ej-­‐mG4a74-­‐mG4i6F-­‐mG2XAH-­‐LSutf-­‐mG5xbJ-­‐mG583J-­‐7mdYcf-­‐eQBHN1-­‐mG4wnc-­‐mG5t4L-­‐mG4Een-­‐jESE12-­‐2ia9Rc-­‐pyD8we-­‐mG58KX-­‐9QpJ33-­‐cdxYCs-­‐tvksmy-­‐ex2J3H-­‐dYdmN

Page 3: Digital Security: Compromising our information and out health

2/3 of the Canadian population owns a smartphone.6

Photo:  Cc:  Gonzalo  Baeza -­‐ www.flickr.com/photos/gonzalobaeza/8292958010/in/photolist-­‐dCPzuE-­‐fhEmim-­‐jpBnkE-­‐i52con-­‐5A3Kon-­‐9Li1n1-­‐oZN6c9-­‐i5L2an-­‐hu8x36-­‐7gEWV7-­‐peadiC-­‐jpBnC3-­‐7w8xG1-­‐jFzBKX-­‐7LAtpL-­‐i5bSmz-­‐g93SZD-­‐jAcpuE-­‐p6hnj5-­‐ptBVF7-­‐eM5aF6-­‐job32H-­‐pdWJe5-­‐rmZJES-­‐eM5wxX-­‐kWvShV-­‐9qmJp4-­‐AXKxcb-­‐deLgpu-­‐peab6w-­‐8jvm3s-­‐ptBQc1-­‐pvnKai-­‐oeDrpa-­‐pwNUsN-­‐9qpLks-­‐i5bgT9-­‐eM54Mp-­‐eMgGbE-­‐jpBnx3-­‐8TQyba-­‐pvE51B-­‐4QoDw9-­‐9qpKtA-­‐9qmHyv-­‐pea9Py-­‐i4WK4B-­‐9qmGPK-­‐21PJaA-­‐eyaiBQ

Page 4: Digital Security: Compromising our information and out health

54% of smartphone users are worriedabout the security level on their mobile

devices7…

Photo:  Cc:  Jimmy  Álvarez -­‐ www.flickr.com/photos/jimmyflickr/2892191058/in/faves-­‐143778368@N06/

Page 5: Digital Security: Compromising our information and out health

…… demonstrating that with advancing technology people still do not trust the

level of security that their devices possess.

Photo:  Cc:  Marcie  Casas  -­‐ www.flickr.com/photos/marciecasas/5347580266/in/photolis t-­‐99xKiL-­‐9vw3rV-­‐rmB6z8-­‐abhKDz-­‐oiFHFy-­‐g8KAp9-­‐5Xnd1G-­‐5oYETZ-­‐k4zbd4-­‐4jxdZH-­‐oa6eaC-­‐2pcoBB-­‐4vareY-­‐bjLFXK-­‐5Wtibx-­‐r5a29j-­‐8NYgsR-­‐4ZJEm2-­‐3kTLzq-­‐frLeXm-­‐eYKV7c-­‐8ySvFB-­‐6Yoiq8-­‐Bq9iBh-­‐2kHCE-­‐avMNa5-­‐5pwiva-­‐4UUSFp-­‐bsmmzd-­‐ekFX5v-­‐a2v9fG-­‐8NHKks-­‐56mn88-­‐nx25o-­‐7fAPZc-­‐2oQHhp-­‐5wqAR3-­‐nd8skd-­‐nXCEn-­‐6Caj8v-­‐urX3T-­‐bQZTzZ-­‐5QxKEK-­‐gDM8Y-­‐7N6FpZ-­‐czJw43-­‐bqJNEK-­‐9u3UiC-­‐4MkQyw-­‐4yUpNz

Page 6: Digital Security: Compromising our information and out health

And they should not trust it!

Photo:  Cc:  Kay  Yin  -­‐ https://www.flickr.com/photos/imkiwiyournot/8296251942/in/photolis t-­‐dD7sEA-­‐dAAKXV-­‐bAZc9u-­‐ksvkir-­‐7x7SxV-­‐Nx6Az-­‐bx4Gyu-­‐4qyv6H-­‐foF2B2-­‐9PWn8R-­‐531zHS-­‐nSQ13j-­‐amLMGg-­‐8GM6M5-­‐cEXuSy-­‐LhSVM-­‐9meLzG-­‐4AZH4B-­‐rdUG6q-­‐9JbnDJ-­‐8rVGqY-­‐tZteF-­‐4HxqZj-­‐dQPXEa-­‐a293rk-­‐9B5zsH-­‐7976Ex-­‐8Y24Kb-­‐7vaeng-­‐8phKha-­‐apdFZp-­‐6FX74T-­‐4LLTEL-­‐rFJCWH-­‐9mL9eW-­‐ak8osE-­‐7Au7dM-­‐5AxoVu-­‐6DDQHr-­‐8gav3x-­‐5Uq3ZA-­‐3eBt5x-­‐9YVcQS-­‐F2hV5-­‐N9tfi-­‐9yteV-­‐4qiQDe-­‐oJygow-­‐bbijFa-­‐tCJ8Y

Page 7: Digital Security: Compromising our information and out health

Smartphone data that is gathered can be used to pinpoint your location, identify you and monitor your phone,

regardless of app privacy policies or phone settings.12Photo:  Cc:  Yasunobu Ikeda  -­‐ www.flickr.com/photos/clockmaker-­‐jp/2662752901/in/faves-­‐143778368@N06/

Page 8: Digital Security: Compromising our information and out health

Shopkick is an app that collects personal information about the user but does not outline what the information is being used for and who

it is being sold to in its privacy policy.4

Photo:  Cc:  NATS  Press  Office  -­‐ www.flickr.com/photos/natspressoffice/13085089605/in/photolis t-­‐9m8RsH-­‐4z7rwb-­‐fxQpM-­‐2b61H9-­‐eZxVuK-­‐ak7hXk-­‐8UxCTj-­‐8QEcXb-­‐9mco4f-­‐btTti5-­‐9pxgGB-­‐arF84-­‐7zSsL1-­‐9r3HWm-­‐vFmTy3-­‐5eVeXR-­‐nJeZWZ-­‐9Uz7bc-­‐CqaqGY-­‐bJDnpB-­‐gegezb-­‐g9FDWk-­‐gbbC6J-­‐HPWZNT-­‐kisKDH-­‐eVCzWz-­‐y7Yp6f-­‐jHwscd-­‐brsQrH-­‐geHAXk-­‐g8dbjY-­‐gbaGAr-­‐g9FHdk-­‐g8kxgn-­‐khg-­‐gGqspG-­‐gGqCej-­‐gGgAkE-­‐gGh9CW-­‐gRaFve-­‐f6XbVk-­‐g8cQip-­‐gJcj59-­‐7wbp3W-­‐gR96JZ-­‐gGt9VN-­‐gR827h-­‐kWhvgc-­‐kWhvig-­‐kWhvN4

Page 9: Digital Security: Compromising our information and out health

Preventing apps from using your location or restricting them to only use it when you are using the app, is not enough to prevent the app from tracking your device.3

Photo:  Cc:  JOSE  SANTANA  -­‐ https://www.flickr.com/photos/34340561@N07/16123207190/in/photolist-­‐qyKDLS-­‐oqmKnf-­‐ec2tJF-­‐bw63y7-­‐nTKzmB-­‐gXndWK-­‐e6rn8f-­‐fK5siK-­‐s7KcVS-­‐pdRxzH-­‐awRP6g-­‐dWCHKe-­‐omfAVB-­‐anqVsJ-­‐6WvtLg-­‐dC3nrM-­‐8CL57e-­‐qHpuZE-­‐gYJrBr-­‐qyw3HK-­‐rgUkph-­‐4zV17D-­‐aTsuUp-­‐xwosGd-­‐dT6A2Z-­‐a328ww-­‐ota6wU-­‐EZqp4V-­‐nJvSKe-­‐re2v5r-­‐bvLtQX-­‐pWTskF-­‐9wVGUq-­‐pNGYiT-­‐n6S7Gn-­‐9YKf4D-­‐qFmQxs-­‐rs7xgU-­‐fDEjr1-­‐rbTTy9-­‐zNS6gc-­‐ePHVJF-­‐phop4p-­‐6z6hK2-­‐rpSdFY-­‐ejdpXm-­‐dvdHYr-­‐

mb5LEg-­‐codzeC-­‐8Kk9pB

Page 10: Digital Security: Compromising our information and out health

Photo:  cc:  Mikhail_108  -­‐ www.flickr.com/photos/m108/14900693136/in/photolist-­‐oGHWWm-­‐9KDR4w-­‐rTh92w-­‐pWYTSK-­‐qde4VK-­‐e3uEtT-­‐9mtKbm-­‐9kfFfA-­‐sssbZt-­‐fAJW9n-­‐azmh7G-­‐9mfja2-­‐58vzRG-­‐7EhY6G-­‐9mhrdz-­‐49S34-­‐5CWLE3-­‐dNdWaA-­‐6DV6Xy-­‐aF85tD-­‐bcLUgM-­‐dVdg6J-­‐fYyP78-­‐nw1gHG-­‐5ZPxra-­‐79huAo-­‐eJvJ8F-­‐5JB2YS-­‐aF8518-­‐8y3pTW-­‐o7M1X-­‐peU6Q-­‐aFbTWw-­‐9uZD9Q-­‐oskZ1R-­‐aFbTTm-­‐5koG7C-­‐a1swjG-­‐a1svXm-­‐4KFAiH-­‐7zveJu-­‐7ysCdk-­‐7p313i-­‐eZNDiE-­‐qB4Tof-­‐aF84Sx-­‐n47gZR-­‐fzbHvT-­‐fEvBaf-­‐8VKTrB

The Weather Channel accesses your location on average every 10 minutes even when the

application is not being used.11

Page 11: Digital Security: Compromising our information and out health

Photo:  Cc:  Carlos  Enciso -­‐ www.flickr.com/photos/krynowekeine/2703085724/in/photolist-­‐57S2dh-­‐anugYV-­‐8JDpUk-­‐4DUj7t-­‐6ZwD6a-­‐aHDBzc-­‐nQjXBf-­‐irF6Zz-­‐bYk9XS-­‐pVCNxd-­‐pXatNz-­‐5SKg4s-­‐nPo7W-­‐8NY6pe-­‐6HtZeY-­‐53DM8u-­‐4mBqT8-­‐cLf2FJ-­‐9GzL8R-­‐zvoKWP-­‐9vgDsi-­‐mDEbwD-­‐mNiVnX-­‐dc7tQL-­‐pSAumv-­‐6g49Hd-­‐hVm9YF-­‐kEzNo-­‐aDbWzk-­‐6XEPZo-­‐rh1MX1-­‐2bFBUn-­‐dkfD63-­‐oPbxPL-­‐bVPS5R-­‐4T5Dmr-­‐bjBLk4-­‐eXiQZJ-­‐67S2qB-­‐dkXsZw-­‐7qWay5-­‐aXCjbc-­‐4QsgZ3-­‐81kkEj-­‐4tXTwW-­‐B3VXk-­‐5cfVvW-­‐diojeE-­‐atNu8-­‐kaQQ8r

Sensors in your devices and apps

that collect data and track your location, could

cause you to be more vulnerable to

cyber attacks.3

Page 12: Digital Security: Compromising our information and out health

Personal information is now being compromised because of poor digital security and now company information is also under attack. Photo:  Cc:  Sivaserver -­‐ www.flickr.com/photos/91707070@N03/8331732961/in/photolis t-­‐dGfiWi-­‐aMbw5H-­‐2Yxv9A-­‐ap5Je6-­‐

aeKut7-­‐8CpFau-­‐6rf4Xg-­‐8G68F2-­‐hQf1N4-­‐bfmZ4v-­‐bxFnW-­‐8G68zt-­‐dQEPCC-­‐9XaVP2-­‐8t6B4C-­‐uiDMM-­‐6UDnWP-­‐2b5yP9-­‐8G9iDJ-­‐rEAH-­‐8G68JX-­‐nmZnrf-­‐8G9j7q-­‐8G68VZ-­‐dvdWi-­‐8G68jZ-­‐8G691g-­‐cZUPK-­‐8G9iL3-­‐6jQj7m-­‐9uQG7p-­‐9wJLwq-­‐61yf68-­‐9bWVHV-­‐7uXPBA-­‐4mAf35-­‐3A1j1z-­‐5c5WBr-­‐o2diQp-­‐9JwUna-­‐c8pb39-­‐hfXPnN-­‐pZKRuh-­‐uqdE6-­‐7Wxvgo-­‐6JgTHw-­‐uq4zV-­‐6jTJBA-­‐3A1nek-­‐633hUd

Page 13: Digital Security: Compromising our information and out health

Wearable technology makes it easy for employees to gain secret information about their employer because of

the discrete size of the device.2

Photo:  Cc:Kentaro -­‐ www.flickr.com/photos/kaleidalabs/17288411245/in/photolist-­‐skHCkX-­‐rDfcBu-­‐s1neMt-­‐s2oh7i-­‐skF39F-­‐shEAaf-­‐tsUEqj-­‐tKBETt-­‐oZKSSM-­‐tsUEs3-­‐skHdVv-­‐sNEFuK-­‐rxCLNV-­‐tsVfW5-­‐s4ggoP-­‐s4geaa-­‐tKBFJM-­‐rg4of3-­‐skHB6c-­‐sfwwx7-­‐BmpvT1-­‐s7BFJU-­‐sgAVBJ-­‐p9qyGp-­‐sg8pQ7-­‐Cv7uK6-­‐s49eDm-­‐oSur3d-­‐s47UyN-­‐s49kuE-­‐s47VVL-­‐roH5RJ-­‐skyekJ-­‐s2oegi-­‐siqudm-­‐roHh7j-­‐s4g5vB-­‐s2o3Xc-­‐s4g3FV-­‐roHcfA-­‐roH52h-­‐s47Xyf-­‐sky5a9-­‐oZKRft-­‐skEMHX-­‐saNZmz-­‐rsjqaq-­‐FLBgAQ-­‐FEJ4Cu-­‐rdNUQQ

Page 14: Digital Security: Compromising our information and out health

Employees are open to wearable technology such as smartwatches while in the workplace.8

70% of Millennials8

51% of Generation X8

Photo:  Cc:  Randy  Caldwell   -­‐ www.flickr.com/photos/misterperturbed/6321178442/in/photolist-­‐aCzG8d-­‐dfKUvh-­‐9BSptf-­‐dNzL7V-­‐adDCVX-­‐7mUtiX-­‐e183o8-­‐9N8BXZ-­‐5A4XGt-­‐b5HsBV-­‐4so2Pm-­‐77xo3J-­‐6vFYag-­‐6uJGPD-­‐apQzvX-­‐6RsH6B-­‐bN45xp-­‐oBjgjh-­‐63RtEc-­‐5co28q-­‐4T4JwP-­‐6StU3G-­‐bGZZTB-­‐7RYdss-­‐4mcyyB-­‐ifaPZK-­‐5cP725-­‐6e7Cca-­‐5dXg6g-­‐5HKn6o-­‐8GUmVW-­‐4eaGRU-­‐ae8Nnr-­‐8XRZ69-­‐2XgkS7-­‐8adZUK-­‐ctA8WU-­‐ddg4wH-­‐6PwAQ1-­‐7vNsCg-­‐9kVn5C-­‐4Ru2mz-­‐gSE3xd-­‐aheuj5-­‐2X8wAS-­‐8xjChz-­‐2Shzpt-­‐6exmYs-­‐3SeL8J-­‐4xDem6

Page 15: Digital Security: Compromising our information and out health

These individuals are the future and with their acceptance towards wearable technology in the workplace, company security will become a serious issue.

Photo.  Cc:  Geoff  R  -­‐ www.flickr.com/photos/sockrotation/4301185320/in/photolist-­‐7y5GxA-­‐6epSQ1-­‐edYmW-­‐JXcQk-­‐boGFEr-­‐r2TAmZ-­‐6amA3a-­‐7BKMW6-­‐78dU6H-­‐9dK1A-­‐czomPS-­‐aYzc7r-­‐8dD3c5-­‐ahyKd7-­‐crmFc-­‐bgwVWn-­‐bdLjtr-­‐9wGnZd-­‐bcGyWv-­‐7tRLqF-­‐6JEup6-­‐89N7vC-­‐jU28M-­‐21DDxg-­‐8HXjbs-­‐4EG8cS-­‐5g8Gk5-­‐7n71SR-­‐4GMyDi-­‐emN9f-­‐5yeAn2-­‐qQQuYJ-­‐91NFdN-­‐8tcm9d-­‐Kb56V-­‐2z8mCe-­‐udZKv-­‐269VsE-­‐78Hnyv-­‐r2vFSN-­‐pA82SF-­‐3pQaVB-­‐5NqtWW-­‐YQSig-­‐uGQFk-­‐o9QhbW-­‐4SiijR-­‐7xCknd-­‐b4Vg5F-­‐52rGjR

Page 16: Digital Security: Compromising our information and out health

Not only is personal information affected but our health is now under attack with the ability of hackers to access medical technology.

Photo.  Cc:  Cat2398  -­‐ www.flickr.com/photos/9501510@N02/9667098575/in/photolist-­‐fJfpBn-­‐eKoVxK-­‐2FGkT2-­‐779t3E-­‐6aduTP-­‐pj5dav-­‐pj5cHi-­‐andndG-­‐nAHYxa-­‐pj6e5A-­‐2ywEDH-­‐pJcnBs-­‐4hHLyc-­‐jKVFj7-­‐8mh8fz-­‐pyxBAh-­‐andqXh-­‐4kSm6G-­‐pj6UrD-­‐aiSUf5-­‐4RWiNA-­‐4ZNbyu-­‐5m6n1Z-­‐6yjsMr-­‐5R9wJX-­‐oYWwus-­‐pj5bBF-­‐pj5dFv-­‐andyFm-­‐mgRpqV-­‐pj5bRD-­‐ckGuhU-­‐2Eippg-­‐97rLC4-­‐aCGMHM-­‐97rNyK-­‐pAj2CX-­‐5m6m5D-­‐pLi7Vd-­‐2BnH5p-­‐nrwbFK-­‐eYT1f3-­‐anaANF-­‐4pQVek-­‐8pNoiH-­‐anaDpK-­‐c2PXME-­‐5SUY5F-­‐3JNaFR-­‐5QsHYK

Page 17: Digital Security: Compromising our information and out health

Thousands of medical devices, such as x-ray machines, MRI scanners and drug infusion

pumps, are exposed to hacking,

resulting in significant health risks for researchers and patients. 10

Photo:  Cc:  Trey  Menefee -­‐ www.flickr.com/photos/trey333/4058372679/in/photolist-­‐7bCdNK-­‐72TnnS-­‐gd4JNa-­‐h4a4Tm-­‐3qVzq5-­‐sgnUc5-­‐hk4EvK-­‐8puvSw-­‐3npcCN-­‐6QGcKa-­‐5CRA9X-­‐8xw2No-­‐bA6VdM-­‐ak13bw-­‐a8dZfJ-­‐EW5aY-­‐kjMaCR-­‐fUCdzX-­‐epMjcs-­‐fbYcD9-­‐ptP4G-­‐8JZ2LF-­‐74oyvD-­‐74st6q-­‐9pF7R-­‐app5M6-­‐5EpcsE-­‐bsmFkz-­‐eehzuc-­‐8p8S2M-­‐ryH1i7-­‐app5dv-­‐5kausR-­‐djZY4h-­‐4ahH3B-­‐hsmzL-­‐74staJ-­‐9p1MH4-­‐65G3d1-­‐6QKgmh-­‐qt8RmK-­‐fRwD2-­‐9AmUKX-­‐8HN5i6-­‐fRwxu-­‐fXEUPf-­‐bt4u2a-­‐dwVXmf-­‐7z2GJh-­‐EGpUEy

Page 18: Digital Security: Compromising our information and out health

Photo:  cc:  Alan  Levine  -­‐ www.flickr.com/photos/cogdog/24410761961/in/photolist-­‐Dc6x5e-­‐25AL36-­‐8PvAQr-­‐7aJgBW-­‐6dEHDv-­‐4DCV4d-­‐o8vonH-­‐dAgLdo-­‐dAgsmo-­‐dAbhtP-­‐6dEMht-­‐bVFEVj-­‐dAgM93-­‐dAaZQD-­‐dAbiXx-­‐dAbeVt-­‐6dJSLf-­‐dAaYPv-­‐dAgLX3-­‐dAgGXf-­‐8Ef6GH-­‐8b5Acz-­‐dAgJsS-­‐6DEik8-­‐8rBGq8-­‐dAbi8M-­‐dAgJVu-­‐dAgNas-­‐dAbjhV-­‐dAgGM5-­‐5W6aek-­‐dAfpq3-­‐48Jz9U-­‐dAbeMr-­‐6dEMun-­‐dAaYw4-­‐dAbf9M-­‐rmP4d-­‐dAgs6j-­‐bN8iev-­‐aRCCAn-­‐dAaZsc-­‐9iwUHU-­‐dAbj6B-­‐d4CYHj-­‐98EJYb-­‐q5NaTu-­‐4nDv6r-­‐qnbVAF-­‐7WzWop

Something  as  simple  as  a  

computerized  insulin  pump  could  

be  hacked and  administer  a  

dangerous  amount  of  insulin.5

Page 19: Digital Security: Compromising our information and out health

Photo:  Cc:  Lars  Nielsen   -­‐ www.flickr.com/photos/31291514@N04/13953040668/in/photolist-­‐nfYYSG-­‐dYgNVD-­‐5mFXbD-­‐hd5wU-­‐8qUkFB-­‐5P4zDk-­‐5n2PY-­‐dvcZad-­‐5WtXJy-­‐7KR6CW-­‐ev26jp-­‐5c5cEh-­‐66Z1vu-­‐81yxjx-­‐5MPfm7-­‐9uaeyi-­‐83s9nT-­‐4dj37C-­‐57Tsyg-­‐5R1oy8-­‐pzWojf-­‐bphqKF-­‐oLAYoe-­‐8CeQ3z-­‐bud7JS-­‐ashm5t-­‐7XKRzd-­‐ag2gvL-­‐apbYU5-­‐3AhiCv-­‐76Xyr8-­‐4M4Paz-­‐64HxYR-­‐6D8Cgk-­‐64QfAW-­‐9uLTxi-­‐baQN5R-­‐7gXPn6-­‐egss9F-­‐6uUeTe-­‐9gHyTk-­‐5xXrq-­‐r7BEFo-­‐53vgLG-­‐54LpAh-­‐9fZazU-­‐7kmxkJ-­‐jfmvRv-­‐3GzgeA-­‐gXmb7t  

How can we preventthis from occurring and remain

safe in the digital world?

Page 20: Digital Security: Compromising our information and out health

To increase digital security for personal information, company information and

medical machines you should…

Photo:  Cc:  Defence Images  -­‐ www.flickr.com/photos/defenceimages/6938469933/in/photolist-­‐bz8tnX-­‐4c9jPm-­‐7wtiuh-­‐8VafEh-­‐6PRxhq-­‐iqdv6-­‐3gFv8o-­‐qFazgy-­‐b4HXag-­‐bnx3rn-­‐7QsvVh-­‐6PMpza-­‐dWVK4Y-­‐7R35TL-­‐91oJMR-­‐dx8dRU-­‐q4WwbM-­‐ezmdir-­‐hoMMAK-­‐e4tEhy-­‐9nKs6F-­‐6PMpDR-­‐6PMpni-­‐6X1r5J-­‐arBLng-­‐gZ9cos-­‐a39gFk-­‐qjMtJz-­‐oZNyv-­‐nm9pLx-­‐9aQxiw-­‐jAvJse-­‐chPnS1-­‐pS6reA-­‐bMfPP-­‐pQ4ozQ-­‐bz8tuK-­‐srbKe-­‐bz8tBR-­‐93bWr3-­‐dWLwrz-­‐bmdAKd-­‐d9gMVb-­‐7oLnmk-­‐PGkKh-­‐4Qu5XV-­‐a6pFHb-­‐6Xjqcm-­‐qSbTyo-­‐4GQUJB

Page 21: Digital Security: Compromising our information and out health

Photo:  Cc:  Karol  Franks  -­‐ www.flickr.com/photos/karolfranks/15136260663/in/photolist-­‐p4xhXr-­‐4VCEHf-­‐7rGXLn-­‐8w2AKt-­‐eefodz-­‐oTEycq-­‐j1P9wV-­‐eacbDC-­‐s jZXzH-­‐5Vnb1t-­‐5kDUvW-­‐4FUpDx-­‐CedUUw-­‐9rwG83-­‐9DeeWv-­‐62VnQ2-­‐azLjAh-­‐8yMA6C-­‐567p-­‐2goVK7-­‐f2f61a-­‐jabPo5-­‐6Ztnz6-­‐61zdbE-­‐VgjKe-­‐8o6Um3-­‐4yZyv2-­‐bPiVCc-­‐7XjZ5S-­‐aeMzr3-­‐ncoXC5-­‐aqeq7S-­‐QuQNR-­‐nSaTsQ-­‐oio1gn-­‐r29bk5-­‐4cq6Ht-­‐83LQef-­‐ogHLLH-­‐bpcRvq-­‐eHbRcJ-­‐cBykzs-­‐bpb3NV-­‐6FFXTq-­‐8AUv2E-­‐p3zfGw-­‐5fVAoS-­‐9mDA1w-­‐9QGeWv-­‐nzjQWL

• Avoid giving personal information to apps.9

• Establish security policies for wearable devices in the workplace.2

• Hospitals should develop strict network policies to avoid hackers.1

Page 22: Digital Security: Compromising our information and out health

Works cited

1. Arsene,   L.  (2015,  October  4).  Hacking  Vulnerable  Medical  Equipment  Puts  Millions  at  Risk  -­‐ InformationWeek.  Retrieved  June  05,  2016,  from  http://www.informationweek.com/partner-­‐perspectives/bitdefender/hacking-­‐vulnerable-­‐medical-­‐equipment-­‐puts-­‐millions-­‐at-­‐risk/a/d-­‐id/1319873

2.      Cole,  S.  (n.d.).  How  The  Apple  Watch  Will  Change  Office  Life.  Retrieved  June  05,  2016,  from  http://www.fastcompany.com/3043533/the-­‐future-­‐of-­‐work/how-­‐the-­‐apple-­‐watch-­‐will-­‐change-­‐office-­‐life

3.      Feltman,  R.  (2014).  Phones  are  giving  away  your  location,  regardless  of  your  privacy  settings.  Retrieved  June  05,  2016,  from  http://qz.com/203778/phones-­‐are-­‐giving-­‐away-­‐your-­‐location-­‐regardless-­‐of-­‐your-­‐privacy-­‐settings/

4.      Golbeck,  J.  (2014).  This  App  Tracks  You  While  You  Shop.  Retrieved  June  05,  2016,  from  http://www.slate.com/articles/technology/future_tense/2014/01/ibeacon_shopkick_privacy_policies_for_location_tracking_apps_aren_t_clear.single.html

5.      Home,  hacked  home.  (2014,  July  12).  Retrieved  June  05,  2016,  from  http://www.economist.com/news/special-­‐report/21606420-­‐perils-­‐connected-­‐devices-­‐home-­‐hacked-­‐home

6.      Matrix,  Sydneyeve.  “Module  3:  Mobilities”.  2016.  Presentation.  

7.      People  don't  trust  smartphone  security  – and  that's  choking  the  mobile  economy.  (n.d.).  Retrieved  June  05,  2016,  from  http://www.techradar.com/us/news/phone-­‐and-­‐communications/mobile-­‐phones/people-­‐don-­‐t-­‐trust-­‐smartphone-­‐security-­‐and-­‐that-­‐s-­‐choking-­‐the-­‐mobile-­‐economy-­‐1285887

8.      PwC:  Half  of  people  willing  to  use  workplace  smartwatch.  (n.d.).  Retrieved  June  05,  2016,  from  http://www.consultancy.uk/news/1828/pwc-­‐half-­‐of-­‐people-­‐willing-­‐to-­‐use-­‐workplace-­‐smartwatch

9.      Smartphone  Privacy  Settings  You  Need  To  Activate  Today.  (n.d.).  Retrieved  June  05,  2016,  from  http://www.makeuseof.com/tag/smartphone-­‐privacy-­‐settings-­‐need-­‐activate-­‐today/

10.      Thousands  of  medical  devices  are  vulnerable  to  hacking,  security  researchers  say.  (n.d.).  Retrieved  June  05,  2016,  from  http://www.pcworld.com/article/2987813/thousands-­‐of-­‐medical-­‐devices-­‐are-­‐vulnerable-­‐to-­‐hacking-­‐security-­‐researchers-­‐say.html

11.      Where  Were   You  3  Minutes  Ago?  Your  Apps  Know.  (n.d.).  Retrieved  June  05,  2016,  from  http://blogs.wsj.com/digits/2015/03/23/where-­‐were-­‐you-­‐3-­‐minutes-­‐ago-­‐your-­‐apps-­‐know/?mod=LS1

12.      Williams,  R.  (n.d.).  How  your  phone  is  revealing  your  location,  regardless  of  privacy  settings.  Retrieved  June  05,  2016,  from  http://www.telegraph.co.uk/technology/mobile-­‐phones/10795009/How-­‐your-­‐phone-­‐is-­‐revealing-­‐your-­‐location-­‐regardless-­‐of-­‐privacy-­‐settings.html