Disaster stories involving the Internet of Things are all the rage. They feature cars (both driven and driverless), the power grid, dams, and tunnel ventilation systems. A particularly vivid and realistic one, near-future fiction published last month in New York Magazine, described a cyberattack on New York that involved hacking of cars, the water system, hospitals, elevators, and the power grid. In these stories, thousands of people die. Chaos ensues. While some of these scenarios overhype the mass destruction, the individual risks are all real. And traditional computer and network security isn’t prepared to deal with them.Classic information security is a triad: confidentiality, integrity, and availability. You’ll see it called “CIA,” which admittedly is confusing in the context of national security. But basically, the three things I can do with your data are steal it (confidentiality), modify it (integrity), or prevent you from getting it (availability).
1More
1More
A cloud office suite alternative to Microsoft and Google - CSC Blogs - 0 views
1More
Florida sheriff pledges to arrest CEO Tim Cook if Apple resists crypto cooperation | Ar... - 1 views
3More
The Internet of Things Will Turn Large-Scale Hacks into Real World Disasters | Motherboard - 0 views
1More
US State Police Have Spent Millions on Israeli Phone Cracking Tech | Motherboard - 0 views
5More
Federal smartphone kill-switch legislation proposed - Network World - 0 views
4More
We finally gave Congress email addresses - Sunlight Foundation Blog - 0 views
2More
Apple will face $350M trial over iPod DRM | Ars Technica - 1 views
2More
Microsoft Office whips Google Docs: It's finally game over | Computerworld Blogs - 0 views
‹ Previous
21 - 40 of 54
Next ›
Showing 20▼ items per page