Cyber Security Risks in Wearable Devices
Furkejuvvon:
| Publikašuvnnas: | International Conference on Cyber Warfare and Security (Mar 2025), p. 709 |
|---|---|
| Váldodahkki: | |
| Eará dahkkit: | |
| Almmustuhtton: |
Academic Conferences International Limited
|
| Fáttát: | |
| Liŋkkat: | Citation/Abstract Full Text Full Text - PDF |
| Fáddágilkorat: |
Eai fáddágilkorat, Lasit vuosttaš fáddágilkora!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3202191297 | ||
| 003 | UK-CbPIL | ||
| 035 | |a 3202191297 | ||
| 045 | 2 | |b d20250301 |b d20250331 | |
| 084 | |a 142229 |2 nlm | ||
| 100 | 1 | |a Vargas, Stacey |u Department of Physics and Astronomy, Virginia Military Institute, Lexington, USA | |
| 245 | 1 | |a Cyber Security Risks in Wearable Devices | |
| 260 | |b Academic Conferences International Limited |c Mar 2025 | ||
| 513 | |a Conference Proceedings | ||
| 520 | 3 | |a The growing popularity of wearable devices, particularly for medical and fitness applications, has increased reliance on these technologies for tracking biometric data. These devices typically transmit data in multiple stages, beginning with Bluetooth Low Energy (BLE) connectivity, followed by transmission to internet-enabled devices, and ultimately to cloud storage. Each communication step introduces potential cybersecurity vulnerabilities. Understanding the functionality of wearable devices, the data transmission process, and the associated cyber risks, is crucial to safeguarding users against cyberattacks. This paper explores the types of sensors used in wearables, the data transmission workflow, and the cybersecurity challenges involved. It also discusses potential preventative measures to mitigate these risks. | |
| 610 | 4 | |a TechTarget | |
| 653 | |a Network security | ||
| 653 | |a Virtual private networks | ||
| 653 | |a Tracking devices | ||
| 653 | |a Biometrics | ||
| 653 | |a Communication | ||
| 653 | |a Cloud computing | ||
| 653 | |a Sensors | ||
| 653 | |a Workflow | ||
| 653 | |a Firmware | ||
| 653 | |a Cybersecurity | ||
| 653 | |a Wearable technology | ||
| 653 | |a Wearable computers | ||
| 653 | |a Devices | ||
| 653 | |a Data transmission | ||
| 653 | |a Connectivity | ||
| 653 | |a Data encryption | ||
| 653 | |a Literature reviews | ||
| 653 | |a Blood | ||
| 653 | |a Internet of Things | ||
| 653 | |a Prevention programs | ||
| 653 | |a Internet | ||
| 653 | |a Popularity | ||
| 653 | |a Storage | ||
| 653 | |a Computer mediated communication | ||
| 653 | |a Risk | ||
| 653 | |a Tracking | ||
| 653 | |a Telecommunications | ||
| 700 | 1 | |a Lewis, Durig |u Department of Physics and Astronomy, Virginia Military Institute, Lexington, USA | |
| 773 | 0 | |t International Conference on Cyber Warfare and Security |g (Mar 2025), p. 709 | |
| 786 | 0 | |d ProQuest |t Political Science Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3202191297/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/3202191297/fulltext/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3202191297/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |