Hyper-connectivity: Cyber Security Threats and Concerns

28

description

Cyber-attacks happen on all types of organizations and individuals. They can start in many different places, including any device that’s connected to the Internet. This becomes highly problematic in our modern society when we have devices such as copy machines that are hooked up to the Internet in order to update themselves report usage, install software, etc. Having all these devices connected to the Internet increases our exposure and vulnerability. With so many targets we need to create an orderly way to look for threats. Learning Outcomes: • Define Mixed Reality • Understand Associated Risks with Mixed Reality • Gain Awareness in Emerging Cyber Threats in Mixed Reality, Virtual Reality, and Augmented Reality • Understand Applicability to Doctoral Research

Transcript of Hyper-connectivity: Cyber Security Threats and Concerns

Page 1: Hyper-connectivity: Cyber Security Threats and Concerns
Page 2: Hyper-connectivity: Cyber Security Threats and Concerns
Page 3: Hyper-connectivity: Cyber Security Threats and Concerns
Page 5: Hyper-connectivity: Cyber Security Threats and Concerns
Page 6: Hyper-connectivity: Cyber Security Threats and Concerns
Page 7: Hyper-connectivity: Cyber Security Threats and Concerns
Page 8: Hyper-connectivity: Cyber Security Threats and Concerns
Page 9: Hyper-connectivity: Cyber Security Threats and Concerns
Page 10: Hyper-connectivity: Cyber Security Threats and Concerns
Page 11: Hyper-connectivity: Cyber Security Threats and Concerns
Page 12: Hyper-connectivity: Cyber Security Threats and Concerns
Page 13: Hyper-connectivity: Cyber Security Threats and Concerns
Page 14: Hyper-connectivity: Cyber Security Threats and Concerns
Page 15: Hyper-connectivity: Cyber Security Threats and Concerns
Page 16: Hyper-connectivity: Cyber Security Threats and Concerns
Page 17: Hyper-connectivity: Cyber Security Threats and Concerns
Page 18: Hyper-connectivity: Cyber Security Threats and Concerns
Page 19: Hyper-connectivity: Cyber Security Threats and Concerns
Page 20: Hyper-connectivity: Cyber Security Threats and Concerns
Page 22: Hyper-connectivity: Cyber Security Threats and Concerns
Page 23: Hyper-connectivity: Cyber Security Threats and Concerns
Page 24: Hyper-connectivity: Cyber Security Threats and Concerns
Page 25: Hyper-connectivity: Cyber Security Threats and Concerns