Posts

Showing posts from March, 2018

Importance of cybersecurity best practise in the Home digital eco-system

What is the home digital eco-system? The home digital eco-system can be made up of a single user or many and how they interact with connected devices and services within the home. The focus of this blog post will be a single household. It is how a user interacts with services and software applications using their devices. The devices may be sole use or multi-use for a service, for example, a device like the Amazon echo dot is set-up for a single item while a smartphone can be used to control multiple devices and services.  The home digital eco-system is not confined to the geolocation of the home as many of services need access to external assets. Thus, whilst the eco-system may include smart home devices, home banking, entertainment, home shopping, the root of many of these services are outside the home.
The services can be solely in used in-house whiles others need access to resources outside the house. For example, smart metering for utilities is stand-alone in that they report us…

Ethics and healthcare

As those who occasionally follow my activity you'll know that I've been treading the furrow to get Ethics as a standards dimension. This is particularly seen in the eHealth domain. I'm hoping my contribution to ETSI's white paper gets published soon but just in case I've extracted some of the text from it to highlight here.

From the paper's abstract: Medical technology has often been viewed as a niche market, paling into commercial insignificance when compared to ‘life-style’ devices, and complicated by issues surrounding medical device regulation and government procurement practices. This view has been reinforced in Europe by the uneven success of early eHealth systems which were dependent on the successful introduction of new digital communications and a new approach to medical services.

However in 2018 and into the future we ought to be able to put this behind us and open up the market for eHealth that can take advantage of the possibilities of speed, and vol…

The analysis of the Socio-Technical Environment (STE) of Online Sextortion from a Cyber Security Perspective

Image
Summary