Wearable Devices Information Security: An Overview

Author(s):  
Angelo Brichetto ◽  
Santiago Criollo-C ◽  
Ángel Jaramillo-Alcázar ◽  
Sergio Luján-Mora
2018 ◽  
Vol 14 (10) ◽  
pp. 155014771880848
Author(s):  
Yongzhi Chen ◽  
Xiaojun Wen ◽  
Zhiwei Sun ◽  
Zoe L Jiang ◽  
Junbin Fang

At present, wearable devices are in the ascendant in the field of personal smart communication terminals across the globe, but their information security issues deserve attention. We hereby propose a secure transmission solution that addresses the special requirements of wearable devices in information security. It is based on the principle of quantum secure communication and works well to protect sensitive information on wearable devices. The solution utilizes the coherence properties of quantum entanglement and uses quantum information security techniques such as quantum key distribution and non-orthogonal base measurement to realize secure transmission of sensitive information on wearable devices. Unlike traditional encryption methods based on the complexity of the mathematical algorithm, the solution has unconditional security.


2018 ◽  
Vol 14 (5) ◽  
pp. 155014771877967
Author(s):  
Xiaojun Wen ◽  
Genping Wang ◽  
Yongzhi Chen ◽  
Zhengzhong Yi ◽  
Zoe L Jiang ◽  
...  

Currently, wearable devices are developing prosperously in the fields of global communication electronic products and personal intelligent terminals, but their information security problem cannot be ignored. Based on quantum security communication principle and combined with the special requirements of wearable devices for information security technology, this article gives a safe transmission scheme used for protecting the sensitive information of wearable devices. This scheme is to realize the safe transmission of sensitive information about wearable devices through quantum key distribution, quantum teleportation, and other quantum information security technologies and this scheme has an unconditional security than the traditional encryption methods based on algorithmic complexity.


2019 ◽  
Vol 49 (2-3) ◽  
pp. 150-156 ◽  
Author(s):  
Liezel Cilliers

Background: Mobile health has provided new and exciting ways for patients to partake in their healthcare. Wearable devices are designed to collect the user’s health data, which can be analysed to provide information about the user’s health status. However, little research has been conducted that addresses privacy and information security issues of these devices. Objective: To investigate the privacy and information security issues to which users are exposed when using wearable health devices. Method: The study used a cross-sectional survey approach to collect data from a convenience sample of 106 respondents. Results: Half of the respondents did not understand the need to protect health information. There also appeared to be a general lack of awareness among respondents about the information security issues surrounding their data collected by wearable devices. Conclusion: Users were not knowledgeable about the privacy risks that their data are exposed to or how these data are protected once collected. Implications: Users of wearable devices that collect personal information about health need to be educated about privacy and information security issues to which they are exposed when using these devices.


Author(s):  
I. D. Rudinskiy ◽  
D. Ya. Okolot

The article discusses aspects of the formation of information security culture of college students. The relevance of the work is due to the increasing threats to the information security of the individual and society due to the rapid increase in the number of information services used. Based on this, one of the important problems of the development of the information society is the formation of a culture of information security of the individual as part of the general culture in its socio-technical aspect and as part of the professional culture of the individual. The study revealed the structural components of the phenomenon of information security culture, identified the reasons for the interest in the target group of students. It justifies the need for future mid-level specialists to form an additional universal competency that ensures the individual’s ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources. As a result of the study, recommendations were formulated on the basis of which a culture of information security for college students can be formed and developed and a decomposition of this process into enlarged stages is proposed. The proposals on the list of disciplines are formulated, within the framework of the study of which a culture of information security can develop. The authors believe that the recommendations developed will help future mid-level specialists to master the universal competency, consisting in the ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources, as well as to correctly access the necessary information and its further legitimate use, which ultimately forms a culture of information security.


2017 ◽  
Vol 4 (1) ◽  
pp. 62-66
Author(s):  
Luyen Ha Nam

From long, long time ago until nowadays information still takes a serious position for all aspect of life, fromindividual to organization. In ABC company information is somewhat very sensitive, very important. But how wekeep our information safe, well we have many ways to do that: in hard drive, removable disc etc. with otherorganizations they even have data centre to save their information. The objective of information security is to keep information safe from unwanted access. We applied Risk Mitigation Action framework on our data management system and after several months we have a result far better than before we use it: information more secure, quickly detect incidents, improve internal and external collaboration etc.


2019 ◽  
Vol 22 (4) ◽  
pp. 336-341
Author(s):  
D. V. Ivanov ◽  
D. A. Moskvin

In the article the approach and methods of ensuring the security of VANET-networks based on automated counteraction to information security threats through self-regulation of the network structure using the theory of fractal graphs is provided.


2020 ◽  
Vol 7 (1) ◽  
pp. 57-62
Author(s):  
Vladislav A. Voevodin ◽  
◽  
Maria S. Markina ◽  
Pavel V. Markin ◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document