Many security issues are associated with wearable devices. According to Drolet (2016), there are seven potential security concerns for wearable devices. One of the concerns is the physical access to these wearables, and the ease at which access is available. A Fitbit, for example, is basically just a wristband, a type of wearable device that happens to be the most popular. The wristband design combined with the small size makes these devices easily stolen or lost. Since most of these devices store unencrypted data, there is a greater risk for sensitive data to fall into the wrong hands (Drolet, 2016, para. 3). One might wonder how a wearable device would obtain sensitive data. It is important to note that wearable devices vary in capability from something as simple as tracking daily steps like a Fitbit, to taking pictures like the Samsung watch. Imagine even the most stringent of security policies which allow no sensitive data to leave a work building. Discovering sensitive material on a smart watch would require specific direction or it would not likely be considered a possibility. As with most new technology, the security industry must learn as exposure occurs.
Martini says, “Employee education is a huge security issue for today 's organizations...
... middle of paper ...
..., and must comply with the company security policies.
This Information Security Policy consists of guidelines, standards, and procedures to define the implementation of the policy. The policy is housed on the company intranet under the policies page. Any questions or concerns relating to the security of business information assets are welcomed, and should be brought to the attention of the Chief Security Officer.
Due to the sheer volume and variety of wearable devices available, exemptions are available. Exemption requests must be submitted in writing to the Chief Security Office by submitting the standard Exemption Request Form. Any violation of this policy may result in disciplinary action, up to and possibly including termination from the company.
I appreciate and thank you for your attention in creating a secure work environment for our employees and clients.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- ... For example, an animated advertisement on a static web page may increase fixation since the motion will grab the user’s attention throughout the search process. Fixation location involves the part of the visual range that the studied person fixates on. Commonly, the areas that eyes fixate on are the most important due to experience, curiosity, shock, and significance. It has been more than a century that psychologist use eye tracking for psychoanalysis. Complex psychological profiles can be created from people by using eye movement analyzing.... [tags: wearable computer, privacy, secrecy]
1733 words (5 pages)
- This paper looks at the security concerns that the Internet of Things, or IOT carries along with it. The Internet of Things is defined as “a proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data” This increasing level of connectivity and interconnectivity certainly makes everyday tasks easier for the average person, but at the same time, it makes finding holes in security measures easy as well. The Internet of Things is said to have been “in the works” in the 1990’s.... [tags: Security, Computer security, Internet]
1545 words (4.4 pages)
- Introduction Consider the following scenario: you would like to cook a breakfast based on a recipe found online while browsing on your mobile device. Similar to following a recipe found in any cookbook, your focus will be shared between the recipe instructions and the execution of the instructions (i.e. retrieving, preparing, and combining ingredients, retrieving cooking tools, etc.). While this is a common experience with learning to cook a new recipe, switching focus between a phone or book can also be very tedious if the recipe has many steps and stages; and there is the potential for increased frustration for a culinary novice.... [tags: Google Glass, Recognizer Performance]
2786 words (8 pages)
- Introduction Nowadays wearable electronic devices are becoming more and more popular. On the one hand, people care more about their health. Therefore wristband with health monitoring function are highly demanding. On the other hand, the trend of larger screen smartphone makes it difficult to hold within one hand. So some manufacturers provide smartwatches as accessories of their smartphones which have screens over 5 inches. Today we want to introduce Watchlife, a totally new wearable device that is truly designed to enhance people’s life.... [tags: business proposal analysis]
1180 words (3.4 pages)
- Mobile Security Catching Up. Revealing the Nuts and Bolts of the Security of Mobile Devices Summary: The paper tells about growing importance of mobile security and explains differences between mobile and normal security. The paper provides a brief overview of mobile network security and mobile threats. The author stated that, beginning the use of smart phones have become so powerful and affected security system which in turn led to increased importance on mobile security.... [tags: Computer security, Security, Physical security]
890 words (2.5 pages)
- Objective: I will be searching about the Security Risks of Mobile Phones, Expanding on them, how they affect us and what we can do to prevent them. “About 75 percent of the world has Mobile Phones”. I will be searching how it affects their everyday life. I will also talk about different Mobile Phones and what kind of risks they contain. It is a Vast and broad topic which requires a lot of Research. I will be searching different sites to make sure that I have Why we Choose it. We Chose Mobile Security Risk because we thought it was a really nice area to expand our knowledge in and also expand the knowledge of the person who is or might be read this.... [tags: Mobile Device Security]
3373 words (9.6 pages)
- Information systems now connect worldwide, so raising security concerns and increased vulnerabilities within organizations and government agencies. Asllani, White, & Ettkin notes “the impact of cybersecurity vulnerabilities that aren’t addressed in advance has significant operational consequences.” (Asllani, White, & Ettkin, 2012). Although cybersecurity is critical, only 25% carry out security measures as part of their standard operational processes. (Asllani, White, & Ettkin, 2012). Financial systems and critical infrastructure alike, should they fall prey to nefarious activities, can have devastating impact to the organization and persons it affected.... [tags: Security, National security, Risk]
1422 words (4.1 pages)
- How reliable are wearable fitness tracking devices. In today’s day and age technology is becoming the normal for making every day American lives easier and allowing them to have access to information at the push of a button instead of looking it up or researching it yourself. This is what brought me to the idea to research how technology has influenced fitness and exercise, and a big way technology has changed fitness is through wearable fitness tracking devices. These are devices that are worn on your wrist like a watch and are able to track workouts and tell people when they are most active and when they are more sedentary throughout their day.... [tags: Obesity, Physical exercise, Exercise, Heart rate]
861 words (2.5 pages)
- For years now, the military has taken advantage of the use of wearable technology. Soldiers have been wearing sensors in their uniforms and cameras in their helmets. When it was noticed that such devices were fairly cheap to make, app developers and manufacturers decided to bring it to the market in 2013. Companies such as Google, Samsung, and Sony have been quick to jump on the bandwagon. Google has created their idea of wearable technology in their launch of “Google Glass”. The high tech glasses can do almost anything computer can do such as navigation, make calls, take pictures, record videos as you see them and even video chat.... [tags: ethical dilemma, google glass, military]
1170 words (3.3 pages)
- For years now the military has taken advantage of the use of wearable technology. Soldiers have been wearing sensors in their uniforms and cameras in their helmets. When it was noticed that such devices were fairly cheap to make, app developers and manufacturers decided to bring it to the market in 2013. Companies such as Google, Samsung, and Sony have been quick to jump onto the bandwagon. Google has created their idea of wearable technology in their launch of “Google Glass”. The high tech glasses can do almost anything computer can do such as navigation, make calls, take pictures, record videos as you see them and even video chat.... [tags: watches, privacy, ethics]
774 words (2.2 pages)