Podcast: Internet of Things and the Department of Defense

IoT

Presented: August 8, 2017 12:00 pm (ET)
Presented by: Gregory Nichols

While the threat posed by a conventional terrorist attack (suicide bomb, active shooter, etc.) is still significant, the risk a bad actor takes in carrying out an attack is also significant. However, the risks a bad actor takes in exploiting the IoT is significantly lower than the risk associated with conventional terrorist attacks. This is because manipulating technologies connected to the IoT can be carried out remotely by utilizing systems already in place. Exploiting the IoT is accomplished using the connectivity of the financial services, transportation systems, and energy sectors as a weapon against their primary users. Attacks such as these will not only harm people but can also cause substantial damage to the economy and critical infrastructure components in the United States. Therefore, promoting awareness of these threats, along with developing mitigation techniques, is important for the defense and homeland security enterprises.

Computer Icon

Host a Webinar with HDIAC

Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?

Want to find out more about this topic?

Request a FREE Technical Inquiry!