ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان
ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
Abstract
Wearable computing devices promise to deliver countless benefits to users. Moreover, they are among the most personal and unique computing devices of all, more so than laptops and tablets and even more so than smartphones. However, this uniqueness also brings with it a risk of security issues not encountered previously in information systems: the potential to not only compromise data, but also to physically harm the wearer. This article considers wearable device security from three perspectives: whether the threat is to the device and/or the individual, the role that the wearable device plays, and how holistic wearable device security strategies can be developed and monitored.
4. Conclusion: Are wearables a real concern?
Many of the situations described above sound like the material of conspiracy stories and science fiction novels. Hacking into wearables to change the reading of the wearer’s vitals is the modus operandi of a James Bond villain rather than a target any black-hat hacker would really be interested in. But such is the world we live in today–—people often violate ‘‘computer security for little reason beyond maliciousness or for personal gain’’ (Moore, 2005, p. 258). Serious vulnerabilities in several models of drug infusion pumps in hospitals have already been discovered, which allow a hacker to secretly and remotely change the amount of drugs administered to a patient (Zetter, 2015). Doing so indirectly, via wearables, is the next logical step.