Posts

Showing posts from March, 2018

Importance of cybersecurity best practise in the Home digital eco-system

What is the home digital eco-system? The home digital eco-system can be made up of a single user or many and how they interact with connected devices and services within the home. The focus of this blog post will be a single household. It is how a user interacts with services and software applications using their devices. The devices may be sole use or multi-use for a service, for example, a device like the Amazon echo dot is set-up for a single item while a smartphone can be used to control multiple devices and services.  The home digital eco-system is not confined to the geolocation of the home as many of services need access to external assets. Thus, whilst the eco-system may include smart home devices, home banking, entertainment, home shopping, the root of many of these services are outside the home. The services can be solely in used in-house whiles others need access to resources outside the house. For example, smart metering for utilities is stand-alone ...

Ethics and healthcare

As those who occasionally follow my activity you'll know that I've been treading the furrow to get Ethics as a standards dimension. This is particularly seen in the eHealth domain. I'm hoping my contribution to ETSI's white paper gets published soon but just in case I've extracted some of the text from it to highlight here. From the paper's abstract:  Medical technology has often been viewed as a niche market, paling into commercial insignificance when compared to ‘life-style’ devices, and complicated by issues surrounding medical device regulation and government procurement practices. This view has been reinforced in Europe by the uneven success of early eHealth systems which were dependent on the successful introduction of new digital communications and a new approach to medical services. However in 2018 and into the future we ought to be able to put this behind us and open up the market for eHealth that can take advantage of the possibilities of speed,...

The analysis of the Socio-Technical Environment (STE) of Online Sextortion from a Cyber Security Perspective

Image
Summary Extortion is an old crime that has taken on a new dimension with developments in technology with the advent of modern communication technology, there is now the potential to affect anyone who is targeted and becomes trapped in an online sextortion racket irrespective of the geographic and social distance between extortioner and extortionee. The Federal Bureau of Investigation (FBI) (fbi.gov 2017) describe sextortion as " a serious crime that occurs when someone threatens to distribute a person’s private and sensitive material if they don't provide the perpetrator with images of a sexual nature, sexual favours, or money ". The perpetrator may also threaten to harm a targeted individual's friends or relatives by using the information they have obtained from that person's electronic devices or online profile unless the target complies with their demands. The FBI state that online predators work to gain the trust of the targeted victim by pretending...