Internet of Things - convenience for yourself and unfortunately others...
This week’s content is centered around the Internet of Things or IoT for short. Rose Barker defined it as “devices that have network connectivity that collects user data, process and analyze that data and then return it back to the user (Barker, R. 2018).” This sparked back memories of the olden times when we would save and share data through a “…floppy disk, hard drive, USB flash drive… (Wolske, M. 2020).” Which is what is known as Sneakernet, a term I’d never heard of before the reading. Reading and watching these videos put into perspective how great technology is and how bad technology can be potentially.
Rose Barker has mentioned most IoT devices “…are connected back to a central device like a smartphone or a laptop we are going to call the anchored device (Barker, R. 2018).” Speaking personally when a new device is released, I am often drawn towards its compatibility to either stream or share data between many devices. We often forget that when that capability is presented then we are open to possibly being hacked on multiple devices. We often don’t think about safeguarding all devices with proper security programs. I don’t have any antiviruses installed on any of my devices which I am now just realizing. I know first-hand of having an identity theft breach. Luckily my credit card app noticed a charge in another state that seemed suspicious and notified me. Had the app itself does not have the proper safeguarding protocols those people that stole my information probably would’ve gotten away with it. So, I am glad that the media that we are covering this week reminded me of the possible dangers and the necessity of having reliable security programs. So while we can enjoy the good that IoT devices provide us, we must take the proper steps to protect ourselves.
Citation
Barker, R. (2018, April 5). Internet of Things: Are Smart Devices Helping or Harming? Retrieved November 21, 2022, from https://www.youtube.com/watch?v=ipdTLJcIkWI
Wolske, M. (2020). 2A: Digital Internets, Past and Present . In Person-centered guide to demystifying technology: Working together to observe/ question/ design/ prototype/ and implement/reject technology in support of people's valued beings and doings. essay, Windsor & Downs Press.
Hi Chan, I totally understand having the identity theft breach. I am glad you were able to do something fast because of the safeguarding in place! I on the other hand had to learn the hard way. Either way, it is very important to take security measures as you mention above because it's very easy to become the target of hackers.
ReplyDeleteYes, I agree! While we can enjoy and develop creativity with the use of IoTs, we must be able to protect ourselves from hackers. Many companies will advertise many compatible devices in addition to security cameras, baby monitors, Alexa, or Google Home, I've heard plenty of horror stories of people hacking into their network
ReplyDelete