Question: can you turn this introduction into a 4 - 5 bullet slide? With the sheer number of devices in our everyday lives there are a
can you turn this introduction into a bullet slide?
With the sheer number of devices in our everyday lives there are a lot of access points to our data. There are both pros and cons to this. On one hand, it is easier than ever to use, see, or change our data. There are also many different avenues to do so with things like personal computers, smartphones, tablets, wearable smart devices, and more. On the other hand, having so many access points means there are that many more security concerns. Each device integrated into our lives requires its own security protocols to ensure that it keeps our data safe. If one device slips up data could end up in the wrong persons hands, leading to a snowball effect of gathering personal information.
As we expand our IoT more of our devices will communicate with one another. This means that devices that dont even handle sensitive information can put our livelihoods at risk. A smartphone or tablet can have amazing security, but if something like a camera or garage door opener is compromised then they could infect the rest of the devices that they communicate with. If someone or some organizations entire IoT were to be compromised theres no telling how much data a cybercriminal could get their hands on and how much damage they could do with it
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
