Anglais STN B1
Mme GRUÉ
melanie.grue(at)univ-paris8.fr
The Internet of Things
https://datafloq.com/read/7-trends-of-internet-of-things-in-2017/2530
Université Paris 8 – Vincennes Saint-Denis
CONTENTS
Règlement intérieur …………………………………………………………………………………………………………. 4
Évaluation ……………………………………………………………………………………………………………………… 5
La correspondance par email ……………………………………………………………………………………………. 6
USEFUL VOCABULARY …………………………………………………………………………………………… 7
THE INTERNET OF THINGS: INTRODUCTION ……………………………………………………………. 9
The Internet of Things explained by Kevin Ashton ………………………………………………………… 10 What is the internet of things? …………………………………………………………………………………….. 16
APPLICATIONS ………………………………………………………………………………………………………….. 19
The little-known story of the first IoT device ………………………………………………………………… 20 Future smart homes will have roll-up TVs, a brain-wave bath …………………………………………. 22 Aruba: The Rise of IoT in Healthcare (Video) ………………………………………………………………. 25 Could the care we need come from the internet of things? ………………………………………………. 27 Smart Cities: Step into the city of the future! (Video) …………………………………………………….. 30 The smart cities of tomorrow are already here (Video) …………………………………………………… 31
QUESTIONS AND CRITICISM…………………………………………………………………………………….. 35
The IoT: how your TV, car and toys could spy on you …………………………………………………… 36 Rise of the machines: who is the ‘internet of things’ good for? ……………………………………….. 38 The IoT opened up a new frontier of domestic abuse ……………………………………………………… 41
REGULATIONS AND GOVERNANCE ………………………………………………………………………… 43
IoT: Are Smart Devices Helping or Harming? (Video) …………………………………………………… 44 Alexa should be banned from the bedroom, privacy expert says ……………………………………… 46 How is the Internet of Things affected by GDPR? (Video) ……………………………………………… 48 Regulating the IoT: Impact and new considerations for cybersecurity and new regulations … 49
Règlement intérieur
NB : Aucune des mesures ci-dessous n’est négociable.
- Article 5 du règlement intérieur de l’Université Paris 8 Vincennes Saint-Denis :
« les téléphones portables doivent être éteints lors des activités pédagogiques »^1. Sauf indication contraire, les téléphones portables ne sont pas autorisés en TD. Leur utilisation entraînera une exclusion de cours.
-
Les écouteurs, casques audio, bonnets et casquettes sont ôtés AVANT l’entrée en classe.
-
Au-delà de 3 absences non-justifiées, l’étudiant(e) sera supprimé(e) de la liste.
-
L’étudiant(e) dispose d’un délai d’une semaine MAXIMUM pour justifier son absence, par email (copie du justificatif) ou en personne. Passé ce délai, le justificatif ne sera pas accepté et l’absence sera considérée comme injustifiée. RAPPEL : Les rendez-vous médicaux et administratifs non urgents sont à prendre en dehors des heures de cours. Ils ne sont pas admis comme justificatifs.
-
Après une absence et avant le TD suivant, le cours doit être rattrapé.
-
“Four strikes = you’re out” : le quatrième manquement au règlement (absences
injustifiées, travail non fait, cours non rattrapé, utilisation du téléphone, insolence …) entraînera l’exclusion définitive du TD.
- RAPPEL : La session de rattrapage est ouverte aux étudiants assidus tout au long du semestre et qui ont composé aux examens de contrôle continu, mais ayant obtenu une moyenne inférieure à 10/20. Les étudiants absents (sans justificatifs) aux évaluations ou non assidus ne sont pas autorisés à passer l’examen de rattrapage. Ils se réinscriront à un prochain semestre pour valider l’UE de langue.
1 https://www.univ-paris8.fr/IMG/pdf_reglement-interieur.pdf.
Évaluation
Podcast = 2 0 % (cf consignes ci-dessous)
DST1= 30%
DST2 = 50%
Bonus : participation
Podcast guidelines
-
Podcasts will be recorded in class on week 12.
-
Individual OR pair work.
-
Duration: 2 minutes minimum.
-
Record a presentation of / a conversation on the topic of your choice. You can talk
about a film, your favorite singer, climate change, politics, your holidays, your plans for the future, a viral video, the dangers of social media, gender equality, a new technological device, Jeff Bezos’ trip to space, Uberization, the Olympics, …
-
Hand-in a written/printed transcript
-
Send your podcast by email. The title of your file is “Name STN B1”.
La correspondance par email
-
Ne contactez les enseignants qu’en cas de nécessité et faites preuve de bon sens. Envoyer un email 6 mn avant le début du cours pour dire que vous êtes coincé(e) dans les transports n’a aucun intérêt. Vous pouvez envoyer un email pour : communiquer un justificatif d’absence ; demander des précisions sur le cours ; solliciter un entretien ; signaler à l’avance une absence justifiée.
-
Un email à un enseignant n’est pas un texto à un copain. Notez que :
-
Un email commence par une formule d’adresse : Bonjour / Bonsoir / Madame / Bonjour Madame.
-
La qualité de la langue doit être irréprochable. RELISEZ-VOUS. Les messages comportant trop d’erreurs seront ignorés. NB : les phrases négatives contiennent l’adverbe « ne ». On n’écrit pas « j’ai pas pu venir » / « je sais pas »…
-
Le ton est soutenu : Je me permets de vous contacter car / Pourriez-vous s’il vous plait / Serait- il possible de / Ce mail pour vous informer que / Veuillez trouver ci-joint mon justificatif d’absence, etc. PAS DE SMILEY.
-
Un mail se termine par une formule de politesse ( Je vous remercie d’avance pour votre réponse / cordialement ) …
-
Nom + prénom en guise de signature.
Exemple :
Madame,
Ce mail pour vous signaler que je serai absent au cours du 9 novembre de 9h à 12h, pour raisons médicales. Je vous présenterai un justificatif à mon retour la semaine prochaine.
Cordialement, John Watson
-
NE PAS ENVOYER UNE PIECE JOINTE AVEC UN EMAIL VIDE : Elle sera ignorée. Envoyer une PJ sans mail d’explication est grossier et donne une très mauvaise image de vous. Madame, veuillez trouver ci-joint mon justificatif d’absence / mon devoir.
-
Le délai de rigueur pour répondre aux emails est de 48h. Par ailleurs, les enseignants ne vivent pas à l’université. Les mails envoyés le week-end recevront une réponse le lundi. Les emails envoyés après 20h seront traités dans les jours suivants.
-
Les mails insultants, agressifs ou mensongers seront directement transférés à la direction du CDL et de l’UFR de l’étudiant(e) concerné(e). Vous êtes prié(e)s de rester courtois(es) et honnêtes dans vos échanges.
-
Les emails lus et pris en compte reçoivent un accusé de réception et/ou une réponse.
USEFUL VOCABULARY
NOUNS ADJECTIVES VERBS
accomplissement achievement addiction addiction une avancée advance un avantage advantage un défenseur advocate uneavancée breakthrough une entreprise company une inquiétude concern la critique criticism un appareil device un doute doubt un inconvénient drawback l’efficacité efficiency la peur fear une entreprise firm l’avenir future une amélioration improvement un désavantage inconvenience une limite limit l’humanité mankind une nouveauté novelty l’obsolescence obsolescence un opposant opponent le potentiel potential le progrès progress une régression regression des règles regulations une révolution revolution scepticisme scepticism la science science un scientifique scientist la sécurité security / safety un critère standard
précis accurate accro addicted bénéfique beneficial bienveillantbenevolent mieuxbetter inquiet concerned pratique convenient critique critical dangereux dangerous dévastateur devastating nuisible detrimental éthique ethical effrayant frightening nuisible harmful inoffensif harmless dangereux hazardous immoral immoral indispensable indispensable infaillible infallible paresseuxlazy malveillant malevolent moderne modern moral moral puissant powerful problématique problematic productif productive rentable profitable progressiste progressive soulagé relieved révolutionnaire revolutionary sceptique sceptical scientifique scientific sécurisésafe / secure
accomplir achieve interdire ban bénéficier de benefit from… contrôler control créer create mettre au point develop adhérer à embrace mettre en danger endanger évoluer evolve craindre fear améliorer improve parvenir à manage to … réparer mend modifier modify surveiller monitor empêcher prevent programmer program remettre en question question régulerregulate perfectionnerrefine reguler regulate révolutionner revolutionize limiterset limits modeler, façonner shape réussir succeed faire confiance trust essayertry déconnecter unplug moderniser upgrade mettre en garde warn
le succès success
une technique technique
la technologie technology
une menace threat
la confiance trust
un avertissement warning
social social sophistiqué sophisticated superflu superfluous technique technical technologique technological menaçant threatening transformateur transformative contraire à l’éthique unethical inutile useless vital vital inquiétant worrying inquiet worried
THE INTERNET OF THINGS:
INTRODUCTION
The Internet of Things explained by Kevin Ashton
https://www.youtube.com/watch?v=PXncS2_63o4
WHAT IS THE INTERNET OF THINGS? (1:31)
When we talk about the Internet of Things, what we mean is _________________________________
gathering __________________________________ by themselves. So in the 20th century, in the 1900s,
computers only got _______________ from people—typically people using keyboards. In the 21st
century, it has become possible for computers (and therefore ________________________ ) to
understand the world around them by themselves. Your smartphone has about 10
____________________ and knows where it is and knows which direction it’s going and knows
whether it’s moving, it knows what the ambient temperature is, it knows what the barometric
pressure is, you don’t have to tell it any of these things. And that allows for other applications.
So one ________________________________ that is an Internet of
Things application, and that a lot of people don’t think
about as an Internet of Things application is Uber, the ride
sharing service. Uber could not work if people didn’t have
smartphones that knew their location. And you can also see
why the Internet is important in Uber application, because your ________________________________
knows where you are, this somebody willing to give you a ride, their smartphone knows where
they are, that information goes into the _______________________________ , and Uber has a piece of
software that finds the nearest driver for you and gets you there. It’s a very simple example of
how internet-connected sensing delivers value.
WHAT HAS CHANGED SINCE 1999? (2:53 4:20)
The Internet of Things has unfolded in some ways much faster than I thought it would, and in
other ways much more slowly. We got a lot of things right in the late 1990s and early 2000s
about the importance of having computers able to _____________________________ their own
information and the ____________________ of sensing things ________________________________________ , and
so one example that people use everyday that they don’t even think about anymore is GPS. It’s
hard almost to remember how we used to get around without having a map in our car that was
______________________________ , that knew where we were. We’ve taken that very much for granted
but that’s an example of computers ________________________ something for
________________________________ , in this case location, and then delivering a very useful application
with that information. So in many ways we got things right when we saw that it would be very
valuable to have automated sensing.
What was completely unforeseeable in the late 1990s and early 2000s was the rapid advance
we’d have in wireless technology. There was no
________________. To get on the internet you had to
________________ in. Cellular telephony was really quite basic
and wasn’t very good with data at that time, so the incredible
advance in those kinds of technologies are far faster than we
expected. In other areas things have been a lot slower.
WHERE WILL THE BIGGEST DISRUPTIONS HAPPEN? (5:076:16)
The Internet of Things is really like a 100-year project and we’re kind of into the 70th year and I
don’t think it’s gonna be a linear progression, I think we’ll see things continue to increase in
terms if the _____________________ the Internet of Things has. So you’re gonna see impact
everywhere there are things, which is kind of everywhere, but some of the most visible
transformations, there have been things like the smartphone and sensing on the smartphone, I
think what’s coming next and the big visible transformation everyone will notice will be in
transportation.
We’re gonna see a rapid deployment of
self-driving vehicles both passenger
vehicles like cars, but also commercial
vehicles like trucks. And so in the next 20
years or so there will be this huge
___________________________________ in
transportation, and the interesting thing about that to me is when you look at history if you see
changes in transportation you see _________________________ changes in society and massive
_____________________ in geography, meaning how human beings use land, so we have a really
_______________________________ couple of decades coming.
HOW WILL WE MANAGE ALL THE DATA? (6:17 7:58)
When I think about the Internet of Things, I don’t think about it in terms of devices as much as
in terms of ________________________ , ok? So every smartphone represents 8 to 10 networked
sensors, and there are about 10 billion smartphones in the world or something, so that’s a
hundred billion sensors right there, so the challenge with ________________________ and data
__________________________ is really the most interesting aspect of the Internet of Things right now,
because we need more and more software that will ____________________________ that data for us.
Using a technology that some people call Artificial Intelligence but I prefer to call it machine
learning, which is really having a system look at data, find patterns, figure out whether the
patterns it found are meaningful, and if they are, like learn to do that more, and if they have
false positives in them, learn not to make that mistake again,
that’s what we lean when we mean machine learning.
The only way to handle this data coming from the Internet of
Things, you know these tens of billions of sensors, is with better
and better algorithms, with better and better
______________________________. And right now, that’s one of the
hardest things to do because there are so few people who know how to do it. People who are
__________________________ in machine learning today are in huge demand because there are so few
of them. But as more machine learning experts enter the workforce, as we learn more about
how to analyse data algorithmically we’ll see better and better solutions to turn __________
_________________ into big value.
WHAT ABOUT OUR PRIVACY? (8:00 end)
Whenever you talk about the Internet of Things, ________________________ is one of the first things
that people want to know about, and I think it’s worth understanding what we mean by privacy
first of all. Privacy is the ability to ____________________________ who sees your
__________________________. So you may want to share some information with some people and not
with the world, or not with certain people. That’s what privacy is. It’s kind of
_______________________________ around ___________________. And there are a couple of components to
providing people with privacy. The first one is helping them understand what data is being
captured and how it’s going to be used. If you don’t do that you’re not giving people the
__________________ of how their data is used. This is a big problem right now. So, there are a lot of
Internet of Things systems, like in these in-home microphone systems for example where you
ask a device to order you some milk or something. Right? So, people have to understand that
those are _________________________ all the time; they have to be listening all the time, because
otherwise they won’t hear you when you tell them you need some milk. So communicating
what a __________________________ does, and what happens to the information that it gathers is very
important. Today, the way that it’s handled is with these complicated terms and
_______________________ you know, whenever you want to use any kind of data service, you have to
check these boxes that I’ve read the terms and conditions. You didn’t read the terms and
conditions, and nobody reads the terms and conditions, and if you did read them you wouldn’t
really understand what they’re trying to tell you anyway. They’re designed to be
____________________________.
So my view is: the first thing we need is kind of
like a privacy label on the product, a little bit like
we have a nutrition label on a food product,
right? It tells you how many calories and what
ingredients, well, we need a very simple, easy
to-understand, and clearly regulated way for
consumers to understand what data is being gathered by whatever technology they use.
Beyond that, there’s another problem which is, even if I promise to keep your data
______________________ , I have to deliver on that promise with good _______________________
technology. Good security technology properly implemented. And that’s turning out to be
challenging for many governments and corporations today. The technology exists to keep data
___________________. The technology exists to keep data very very secure. But a lot of corporations
and governments don’t use it and don’t implement it properly. They take shortcuts. And those
shortcuts lead to __________________________________. So to my mind, everything around privacy and
security is in the realm of ________________________. Either government policy or corporate policy.
Are you doing the things you could be doing to keep people’s data private? And sooner or later,
the organizations that don’t do it are going to suffer because people won’t buy their products or
won’t vote for those governments anymore.
Task : Summarize each part of the interview in your own words, to define the IoT.
What is the IoT?
What has changed since 1999?
Where will the biggest disruptions happen?
How will we manage the data?
What about our privacy?
What is the internet of things?
Nicole Kobie, The Guardian , May 2015 (adapted)
Tech companies and pundits have been discussing the IoT for decades, and the first internetconnected toaster was unveiled at a conference in 1989. The IoT is simple: it’s about connecting devices over the internet, letting them talk to us, to applications, and to each other. The popular example is the smart fridge: your fridge can text you if its internal cameras see there is no milk left. In Britain, the IoT is most common in energy use. Smart meters are equipped with sensors and have clever functions that let you turn the heating on and off remotely. The IoT is more than smart homes and connected appliances , however. It includes smart cities (think of connected traffic signals that monitor utility use, or smart bins that signal when they need to be emptied) and industry (with connected sensors for tracking parts). All that data and automated use is more efficient , meaning we use less energy.
Is it safe? Can the internet of things be secured?
Everything has downsides , and security and privacy are the biggest challenges for the IoT. All these devices collect a lot of personal data , and it’s shared with other devices and held in databases by companies.
How will the internet of things affect business and work?
Manufacturing is perhaps the furthest ahead in terms of IoT, as it’s useful for organising tools, machines and people, and tracking where they are. Farmers have also been turning to connected sensors to monitor both crops and cattle, in the hopes of boosting production, efficiency and tracking the health of their herds.
But when it’s office workers who are being squeezed for more productivity , it could take on a bit of a dystopian shade: imagine your security access card being used to track where you are in the building, so your boss can know about your every move?
What does the internet of things mean for healthcare?
Smart pills and connected monitoring patches are already available, highlighting the life-saving potential of the IoT, and many people strap smart watches or fitness bands to their wrists to track their steps or heartbeat. Intel made a smart band that accurately tracks how much patients with Parkinsons shake; Sonamba monitors daily activities of senior or ill people, to watch for dangerous anomalies; and people with heart disease can use AliveCore to detect abnormal heart rhythms. Healthcare is one area where more data has the potential to save lives, by preventing disease, monitoring it and analysing it to create new treatments.
-
Find the French equivalents to the words in bold.
-
What does the Internet of Things consist in?
- Where/in what fields can the IoT operate? Why is it important?
____________________________________________________________________________________________________________
____________________________________________________________________________________________________________
____________________________________________________________________________________________________________
____________________________________________________________________________________________________________
- What are the downsides of the IoT? Why?
____________________________________________________________________________________________________________
____________________________________________________________________________________________________________
- How useful is the IoT in the field of health?
____________________________________________________________________________________________________________
____________________________________________________________________________________________________________
APPLICATIONS
The little-known story of the first IoT device
Jordan Teicher, http://www.ibm.com, February 2018 (adapted)
Before there were Internet-connected umbrellas and juicers, water bottles and factories — before there was even a modern Internet — there was a humble Coke machine in Pittsburgh, Pennsylvania that could report its contents through a network. Though it was primitive by today’s standards, it holds a unique distinction: It was, as far as anyone knows, the world’s first IoT device.
One day in the early 1980s, David Nichols, a student in Carnegie Mellon University’s computer science department, was craving a soda. But his office was “a relatively long way” from the Coke machine, and considering his fellow students’ substantial caffeine habits, Nichols knew there was a good chance it would be empty — or that, if the machine had recently been refilled, the sodas inside would be tragically warm. Nichols wrote a few friends about his idea to track the machine’s contents remotely and put an end to unsatisfying soda runs. Mike Kazar, Ivor Durham, and John Zsarnay, began working with him.
The key to determining the contents of the Coke machine from afar was keeping close tabs on its lights. The machine had six columns of glass soda bottles. When someone purchased a Coke, a red indicator light for the corresponding column would flash for a few seconds before turning back off. When a column was empty, the light stayed on until the sodas were replaced. To pull data from the machine, Zsarnay installed a board that sensed the status of each of the indicator lights. A line from the board ran to a gateway for the department’s main computer, which was connected to the ARPANET — a precursor to today’s Internet.Kazar wrote a program for the gateway that checked the status of each column’s light a few times per second. If a light went on but then went off again a few seconds later, it knew that a Coke had been purchased. If the light stayed on more than five seconds, it assumed the column was empty. The program tracked how many minutes the bottles had been in the machine after restocking. After three hours, the bottles simply registered as “cold.” Finally, the group added code to the main computer’s finger program, which allowed anyone on a computer connected to the ARPANET or the local Ethernet to access information about the machine. With a few simple keystrokes, they could find out if there were Cokes in the machine, andwhich ones were cold. At some point, another graduate student set up a similar system to monitor the status of the nearby M&M machine.
Some years later, the local Coke distributor stopped selling the glass bottles that fit into the department’s machine, and eventually the device was replaced with a newer model that students never got around to connecting to the Internet.
While the history of the computer science department’s Coke machine is preserved on the Carnegie Mellon website, Kazar said the university didn’t formally celebrate the original invention at the time, and it never occurred to him in the 80s that the device was particularly groundbreaking. “I never thought anyone would be asking me about it 30 years later,” Kazar said. He certainly never imagined the Coke machine would be just the first of billions of everyday devices connected to the Internet. Today, there are more than 8 billion connected things in use worldwide and by 2020, that number is expected to grow to 30.7 billion. The market for IoT sensors alone is expected to be worth more than $27 billion by 2022. But back in 1982, when computers cost a million dollars and the ARPANET was still the only game in town, Kazar said a world dominated by IoT seemed like a far-off fantasy. “There was a running joke about how your toaster was one day going to be on the Internet,” he said. “People laughed at that.”
-
Find the French equivalents to the words in bold.
-
What was Nichols’s idea to put an end to “unsatisfying soda runs”?
- How did the inventors pull data from the machine?
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
- How did they make it possible for everyone to access information about the contents of the Coke machine?
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
-
According to Kazar, what was people’s opinion on connected things in the 1980s?
-
How has science evolved since the 1980s, with regards to connected things?
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
Future smart homes will have roll-up TVs, a brain-wave bath
Rachel Tepper Paley, The Independent , March 2018 (adapted)
In the not-so-distant future, cars will drive themselves and men may become obsolete , but home will always be home. It will just be a lot smarter. What will the home of the future look like? We took stock of the most exciting tech-forward home products on the market.
The high-tech living room
Thirty-nine million Americans (1/6) now have a smart speaker in their homes. In the living room of the future, smart speakers will be a central feature , with new models connected to every element in your home, from the lightbulbs to the lock on your front door to the thermostat. They will become so essential you won’t think twice about plunking down £200 for one.
Watching TV and movies will be a wildly different experience. Why devote precious square footage in your living room to a giant screen when you could have one that effortlessly rolls up? Or you may choose not to have a TV at all and opt instead for a superhigh-resolution shortthrow projector that turns any white wall into your own personal movie theatre. Sony’s new £20,000 model would fit the bill.
It will be much easier to design your living space. Apps and online platforms such as Modsy and Hutch will use virtual and augmented reality to help you visualise how a couch or chair will look in your home. Modular, open-source furniture will dominate interior design trends.
And don’t think ultramodern gadgetry is only for young people; homes for the elderly will be outfitted with internet-connected gear that allows adult children to monitor their ageing parents.
Smart cooking
The ultimate goal of kitchen technology is not to do the cooking for you but to make you a better cook. Smart ovens will be outfitted with cameras and digital thermometers, helping you monitor your food as it bakes. Smart skillets will sizzle food at a precise temperature that you’ll set on a connected app.
Smart refrigerators will help reduce waste by letting you know when the carrots in your fridge are about to go bad, and offer several recipes. The smart fridge from LG will even send cooking instructions to your smart oven.
Tech enters the bedroom
The latest wave of home-focused technology is about making everyday life better and easier , and that begins with a good night’s sleep. Sleep trackers will use sensors to measure your sleep metrics, while smart alarm clocks will help you begin your day on the right foot with time, weather and news.
Need a gentler wake-up? The smart aromatherapy alarm clocks from Nox Aroma will sense when you’ve reached your sleep cycle’s lightest point and release a wake-up scent of your choice.
Once you’re up and moving, it’s time to get dressed. Your closet will be filled with clothes that interact with you, tracking health markers and habits. Your clothes might even change shape or colour based on your feelings, as will the Sensoree mood sweater.
And if you want a new wardrobe, you won’t have to even leave the house to find the best-fitting clothes because Amazon’s patented mirror will let you virtually try on outfits from the comfort of your own bedroom.
Yes, even in the bathroom
Spa-like experiences at home will be the norm. No need to run your own bath, your digital assistant can do that for you with smart shower systems. High-tech tubs will induce relaxed brain waves, while gadgets like Olfinity will let you programme and control your own aromatherapy session from your iPhone while you soak.
-
Find the French equivalents to the words in bold.
-
What is the essential feature of the smart home? What does it allow you to do?
-
How does the development of smart home technology influence how we use space inside the house? _____________________________________________________________________________________________________________
-
List 2 advantages of smart cooking (NOT examples, but general advantages).
- How does smart home technology adapt to you in terms of sleep? clothes? shopping?
- REACT. “With time, even the strangest things can become normal”. What do you think of the predicted development of smart home technology in the various rooms of the house, and in relation to our daily activities? Reflect upon the usefulness (or pointlessness) of connected things in the smart homes of the future.
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
Aruba: The Rise of IoT in Healthcare (Video)
https://www.youtube.com/watch?v=Y8288eEEsmc
- How could the IoT improve the system of patient care?
-
By __________________________ data from bedside ______________________________
-
Viewing patient _________________________________
-
_____________________________________ in real time
- “Over a third of healthcare organizations don’t apply data from connected devices to other business processes”. What consequences do healthcare organizations face when they don’t use IoT?
An issue that creates _______________________________________, potential for __________________
_____________, and ____________________________ in diagnosis.
- What does effective healthcare depend on? (give two nouns)
_______________________ and ____________________
- What are the predictions for the future, regarding the development of the IoT in healthcare? _____________________________________________________________________________________________________________
- What are the advantages of IoT?
- For caregivers, the ability to easily ____________________ and ________________ patients’ health can save precious minutes every day. Without having to mannily visit each patient, the expert can give a remote ___________________ and track medical assets, providing quality care more _______________ and managing the healthcare environment more _____________________.
- Using _________________ and ___________________, the ability to __________________ the right department in the hospital while retrieving essential ______________________ becomes straightforward for both caregivers and patients.
- What is the key advantage of the IoT?
Nearly ¾ of healthcare leaders who have adopted the IoT believe its key _________________________
will be to ________________________ and _______________________ medical ____________________ and
______________________. From patients’ heart monitor to temperature gauges, real-time
__________________ already exists in healthcare, and now it can be used to create a
_____________________ and more ____________________________ environment. Through a single
____________________________ on a mobile device, patients and staff can securely ______________________
IoT data. IoT means an __________________________ and more ________________________ patient care
______________________, allowing staff to ____________ ____________ ______________ _______________.
Could the care we need come from the internet of things?
Gaby Hinsliff, The Guardian , October 2016 (adapted)
When you’re alone, routine is comforting, which is why the old and the housebound cleave to the familiar: lunch at one o’clock, bed after News at ten. It’s easy for the young to mock. But what if that boring , predictable routine could one day be a lifesaver? Who needs to be able to switch on their kettle remotely via their mobile phone, for god’s sake?
Yet the so-called “internet of things” – the current mania for connecting smart white goods to the internet, so that you can turn the kettle on via your phone as you’re walking downstairs, or rely on your printer ordering its own ink when it runs out – is nowhere near as pointless as it sounds.
It may look as if young designers were simply inventing apps to replace things their mums used to do for them, from calling cabs to delivering pizza. But if a so-called “smart home” can look after a lazy 20-something who can’t be bothered getting off the sofa to switch on the kettle, what could it do for people who actually need help? What if your house could actually look after you in your old age?
New apps monitor light, temperature, movement and the use of everyday electrical devices in an elderly person’s home thanks to sensors , and send alerts to their children if it notices an unusual pattern of behaviour that might indicate they are sick, had a domestic accident, and need help.
It’s easy to see the potential for friction between anxious grownup children who want the house wired up to watch over a parent, and older people who are offended or hurt that their children would rather monitor them from a distance. For every family who finds it reassuring to know someone’s tracking Granny on their phones, there will be one who finds the whole idea horribly cold and impersonal.
Nor, of course, is this an answer in itself to the yawning gap in social care funding. It’s going to take more than fancy apps to tackle the fact that by 2030 there will be half as many pensioners again as there were in 2010. But if what most people want is to be able to stay in their own homes for as long as possible, then it’s sheer madness not to use every weapon at our disposal. Why not bend technology to socially useful ends? And yes, of course it would help if families could just look after their elderly relatives themselves. But that’s not the world in which we live.
-
Find the French equivalents to the words in bold.
-
How useful can the IoT be for elderly people?
- Summarize how the new apps work and explain how helpful they are for elderly people.
- What are the two opinions people can have of such apps?
- How can these apps provide an answer to future demographic evolutions?
- DISCUSS : “It’s true that technology sounds like a horribly clinical answer to what is at root a very personal dilemma”. What do you think of the development of apps to monitor elderly people from a distance? According to you, what do these inventions reveal about the evolution of society?
_________________________________________________________________________________________________________
_________________________________________________________________________________________________________
_________________________________________________________________________________________________________
_________________________________________________________________________________________________________
_________________________________________________________________________________________________________
_________________________________________________________________________________________________________
_________________________________________________________________________________________________________
_________________________________________________________________________________________________________
_________________________________________________________________________________________________________
_________________________________________________________________________________________________________
_________________________________________________________________________________________________________
_________________________________________________________________________________________________________
_________________________________________________________________________________________________________
_________________________________________________________________________________________________________
_________________________________________________________________________________________________________
_________________________________________________________________________________________________________
Smart Cities: Step into the city of the future! (Video)
https://www.youtube.com/watch?v=RKWuj1OlDPo
-
What demographic evolution triggered the reflection on smart cities?
-
Make a list of the issues raised by the development of cities.
-
What is the definition of smart cities given in the video?
-
Explain how smart MEXICO is:
Measure: ______________________________________________________________________________________________________
Result: __________________________________________________________________________________________________________
- Explain how smart BRISTOL is:
Measure: ______________________________________________________________________________________________________
Result: __________________________________________________________________________________________________________
The smart cities of tomorrow are already here (Video)
https://www.youtube.com/watch?v=THiQtn9hVB8
0:13 1:19
Recent projections show that by 2050, two thirds of the global population will live in
________________, which makes it imperative that our future cities aren’t vast urban hell-scapes,
but are instead ____________________________________________________ with a dash of sci-fi, devices,
roads and lamp-posts all talking to each other, making life in cities safer and smoother. And this
_______________________ is already beginning. A smart city is a place where items around town are
__________________________. Streets, buildings, personal devices, car, power grids, all sending
_______________________ back and forth, passively working together to ______________________________
the community. Imagine public buses that trigger sensor in the roads, providing a real time
ETA; street-lights that dim or brighten depending on foot track. Stop lights warning of an
accident ahead. At the core a smart city needs two things:___________________ to collect data and
_____________________________ to send and receive it.
1:35 2:30
Sensors have become smaller, cheaper and more _________________________ giving rise to the
Internet of Things. It’s no wonder that the number of connected ________________________ jumped
to 8.4 billion in 2017, an increase of 1/3 in a single year. With these two
major___________________________ pieces in place, spots around the globe are launching large scale
smart city projects. In Barcelona, sensor-embedded parking spots connect with an app that
directs drivers to available spaces. Street lamps brighten automatically, and they’re part of
Barcelona’s wifi network, providing free _____________________ access across the city. Similar smart
city projects are under way in cities like Stockholm, Amsterdam, Copenhagen and Columbus,
Ohio, some focusing on _______________________ usage, others on ____________________ or public
_________________________________, but all hoping to make life in cities that much
________________________.
- How must cities evolve to absorb the demographic transformations ahead?
- What definition of smart cities is given in the video?
- List the 3 pieces of connected urban equipment mentioned in the document.
- What does a city need to become a smart city? (2 requirements)
- What aspects of life can various cities focus on?
- DISCUSS. You are an urban developer or a city dweller. Write an op-ed for SuperSmart Magazine , in which you discuss the benefits and inconveniences of smart cities. Explain how urban planning makes a city smart, how inhabitants benefit from smart infrastructure, and express your concerns and/or hopes for the future.
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
QUESTIONS AND CRITICISM
The IoT: how your TV, car and toys could spy on you
Sam Thielman, The Guardian , February 2017 (adapted)
Can your smart TV spy on you? Absolutely, says the US director of national intelligence. “In the future, intelligence services might use the IoT for identification , surveillance , monitoring , or location tracking ,” James Clapper told the Senate in public testimony on Tuesday.
There are a wide variety of devices that can be used to listen in, and some compound devices (like cars) that have enough hardware to form a very effective surveillance suite all by themselves, and consumers often make themselves more vulnerable than they should. “[E]ven if you bought the machine, it’s not necessarily truly yours
- it may need to talk to the vendor’s machines to work, handing over data about you or those around you (if it has sensors); it may have features you don’t know about or don’t know how to control or can’t control.”
Intelligence officials are not the only ones interested in cracking our hi-tech homes. Knowing when you are in and out, what you have and where you keep it is invaluable information for thieves. And just think what tales your devices could tell divorce lawyers.
What’s watching you in today’s houses:
Smart TVs: Samsung’s voice recognition software in its smart TVs has to routinely send various commands “home” to a server where they are processed for relevant information; their microphones are also always on, in case you’re trying to talk to them. Televisions are also much easier to turn on than they used to be: a feature creeping into higher-end TVs called “wake on LAN” allows users to power on televisions over the internet.
Full-home automation: Amazon Echo, Google Nest, and many other suites of home technology sync up everything from your thermostat to your refrigerator. The data tells a lot about the people who generate it and is vulnerable.
Toys: A cyberattack on toymaker VTech exposed the personal data of 6.4m children last year; it was a reminder of the vulnerability of kids on the web. Mattel’s Hello Barbie doll works by passing kids’ interactions into the cloud and returning verbal responses through a speaker in the doll. HereO manufactures a watch for kids with a GPS chip in it. Security researchers found that they were easy to compromise on company databases, and easy to use to locate the wearer.
Your car: The FBI has been aware of this possibility for a long while: “During the course of an investigation, the FBI sought to use the microphone in a car equipped with an emergency response system to capture conversations taking place in the car’s cabin between two alleged senior members of organized crime.”
-
Find the French equivalents to the words in bold.
-
According to James Clapper, how could the IoT be used by intelligence services?
- Who else could be interested in your IoT?
- How can smart TVs be used for surveillance?
- Why are toys particularly sensitive, with regards to safety and privacy?
- How useful can smart cars be for intelligence and law enforcement agencies?
Rise of the machines: who is the ‘internet of things’ good for?
Adam Greenfield, The Guardian , February2019 (adapted)
The end goal of the IoT is to capture data that can then be used to measure and control the world around us. It is vital that we ask just what ideas underpin it and whose interests it serves.
SMART HOME
The colonisation of the domestic environment by networked products and services is intended to deliver a very different experience: convenience. Right now, the perfect example of this is a gadget being sold by Amazon: “Amazon Dash Button is a Wi-Fi-connected device that reorders your favourite item with the press of a button.” I don’t want to downplay the value of such a product for people who have ageing parents to look after, or for whom simply getting in the car to pick up some cat food may take an hour or more out of their day. But the benefit to the individual customer is tiny compared with what Amazon gains. Amazon gets data on the time and place of your need, as well as its frequency and intensity, and that data has value. Amazon will exploit it in every way its terms and conditions permit – including by using it to develop behavioural models that map our desires, so as to target them with even greater efficiency in the future. Again, the aim of devices such as the Dash Button is to allow the user to accomplish commercial transactions with as little conscious thought as possible.
The primary job of smart speakers is to function as a “virtual assistant”, providing a simple, integrated way to access the numerous digital controls scattered throughout the contemporary home – from lighting and entertainment to security, heating, cooling and ventilation systems. At first, such devices seem harmless enough. We only speak to them when we need them. But when we consider them more carefully, a more problematic picture emerges. The main problem with the virtual assistant is that it fosters an approach to the world that is thoughtless , leaving users less critical about the processes that result in gratification. Virtual assistants are listening to everything that transpires in their presence, and are doing so at all times. As voice-activated interfaces, they must be constantly attentive in order to detect when the “wake word” that rouses them is spoken. In this way, they are able to harvest data that might be used to refine targeted advertising.
SMART CITY
Our mobile phones are constantly harvesting information about our whereabouts and activities. But we tend to be relatively ignorant of the degree to which the contemporary streetscape has also been enabled to collect information. The ambition at the heart of the smart city is nothing other than control – the desire to achieve a more efficient use of space, energy and other resources.
A broad range of networked information-gathering devices are increasingly being deployed in public space, including CCTV cameras; advertisements and vending machines equipped with
biometric sensors ; and the indoor micropositioning systems which, when combined with a smartphone app, send signals providing information about nearby products and services.
There is a clear philosophical position behind all of this: that the world is in principle perfectly knowable, its contents enumerable and their relations capable of being meaningfully encoded in a technical system, without bias or distortion. But however thoroughly sensors might be deployed in a city, they will not be able to pick up every single piece of information necessary to the formulation of sound civic policy.
Other human distortions inevitably colour the data collected. A police officer under pressure to “make quota” may focus on infractions that she would ordinarily overlook. There is also the question of interpretation. Different values for air pollution in a given location can be produced by varying the height at which a sensor is mounted by a few metres. Perceptions of risk in a neighbourhood can be transformed by slightly altering the taxonomy used to classify reported crimes.
-
Find the French equivalents to the words in bold.
-
According to the journalist, how is data used with the IoT?
- What is the benefit of the “smart home” for the users?
- What warning does the journalist formulate with regards to the collection of data by the “smart home”?
- What is the problem with certain apps installed in smart speakers?
- What are the main issues with virtual assistants, with regards to user behavior and privacy?
- What is the goal of “smart cities”, according to the journalist?
- What are the two limits of the “smart city” mentioned in the article?
The IoT opened up a new frontier of domestic abuse
John Naughton, The Guardian , July 2018(adapted)
Standing on a tube platform the other day, I found myself looking at a huge ad for the Nest Hello. “It replaces your existing wired doorbell and delivers HD video even at night. It’s designed to show you everything on your doorstep – people head to toe or packages on the ground. And with 24/7 streaming, you can check in any time. Or go back and look at a three-hour snapshot history to see what happened.” The industry’s spiel for having all these networked devices in your home is that they make your life easier. Instead of having to go online to find a recipe or the weather forecast you can simply ask Alexa. If you go out and forget to turn the central heating off, then hooking up to your Nest device via a smartphone will do the trick.
There are, however, two things that are conveniently omitted from this uplifting narrative. The first is that there is no such thing as a secure networked device. The second is that the motivation for many manufacturers of these “smart” gadgets is to collect data about what goes on in your home. This is particularly important for three of the companies who are deep into the home device game – Google, Facebook and Amazon.
The big downside is that if you can turn on your shower or central heating from your smartphone, then so can a hacker who has penetrated your home network. This has been obvious to anyone who understands network security from the beginning. What has been less obvious until now is that it doesn’t have to be a hacker who can control “your” home devices. It could be a former partner, a stalker, a former lodger or just someone you know who has a grievance.
The people who are particularly at risk are survivors of domestic abuse. Abusers employ networked home devices to control , harass and stalk their targets. The perpetrators not only spy on their ex-partners, but can cause havoc with bursts of music, sudden changes in lighting or temperature and other attempts at intimidation. Victims of this kind of abuse reported air conditioners being remotely switched off, code numbers of digital front door locks being mysteriously changed every day, doorbells that ring incessantly without anyone being outside and so on. These stories, says the NYT , are part of a new pattern of behaviour in domestic abuse cases in which “the newest conveniences are now also being used as a means for harassment , monitoring , revenge and control ”.
Most of the victims are women, while the abusers are predominately men. Guess why? Most networked devices are still bought and installed by males. They are the ones who know the passwords, which means that most of their victims will be unable to change them. It’s yet another depressing illustration of how the power imbalances of the real world are faithfully reproduced in the virtual one.
-
Find the French equivalents to the words in bold.
-
What are the benefits of Nest Hello, according to the ad and the journalist?
- Which two problems are not mentioned by the ad, according to the journalist?
- In your own words, explain how the Internet of Things is linked to domestic abuse.
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
- REACT. “It’s yet another depressing illustration of how the power imbalances of the real world are faithfully reproduced in the virtual one”. Discuss how new technological conveniences may in fact be harmful. Give examples of how technology can be used to perpetuate power relations.
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
REGULATIONS AND GOVERNANCE
IoT: Are Smart Devices Helping or Harming? (Video)
https://www.youtube.com/watch?v=ipdTLJcIkWI
- Summarize the hacking story told by Rose Barker at the beginning of the video.
- How does she define the Internet of Things?
- What is the problem with IoT devices, with regards to hacking?
- What are the effects of identity theft on personal lives?
- “Companies and thieves are ______________________ _____________________ off of every kind of _________________________ ________________________________ you can imagine. Essentially, ______________ is the new oil. Data _________________________ is one of the top revenue- generating ______________________ in the world internationally, and the problem is just getting worse”.
-
We think that if we buy an IoT device like a light-bulb or a thermostat or a baby monitor, that object is ours and whatever we do with it is ours. Here’s the thinking error. The data that we think is _____________________is intentionally ________________________ by _________________________ or _____________________ by __________________________ and that information that we thought was private is now _________________________ or available on the _____________________ _______________. There are no ___________________ on almost any consumer devices or the data that they collect. Currently companies don’t have to tell us what data they’re _______________________________, who they’re _______________________ it to, what third-party companies they’re _______________________ our information with, how they’re _________________________ our information. Most don’t even have to tell us when they or their partner software companies have been _________________________; and that information that we thought was private is now. The bottom line is this: we have no clue what information is being sold and who is __________________________, ___________________________, and _____________________________ it.
-
What are the two circumstances in which companies will take measures to protect the consumers?
- What is the link between the cost of a device and user privacy?
- What advice does Rose Barker give to customers?
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
Alexa should be banned from the bedroom, privacy expert says
The Independent, December 2019
A prominent privacy expert has warned against allowing Amazon’s voice assistant Alexa into the bedroom. Hannah Fry, a mathematician with expertise in the algorithms tech companies use, said she did not use the smart speaker in upstairs rooms of her house due to revelations that it was eavesdropping on private conversations.
Amazon previously denied that its Echo devices were used to spy on people but earlier this year admitted that employees listen to customer voice recordings in order to improve speech recognition.
It was also revealed that recordings of personal moments were inadvertently caught up after the smart speaker was triggered by words that sounded similar to “Alexa”.
After requesting audio data from Amazon that had been recorded by her Echo speaker, Dr Fry discovered it had picked up conversations that were never directed at the voice assistant.
With an estimated two million UK households owning Alexa devices, the associate professor warned people to be careful how they use them. “I think there are some spaces in your home, like the bedroom and bathroom, which should remain completely private. This technology is activated by a trigger word, but it keeps recording for a short period afterwards. People accept that, but we should all spend more time thinking about what it means for us,” she told the Mail Online. “There are people who are very senior in the tech world who will not have so much as a smartphone in their bedroom. If a company is offering you a device with an internet-connected microphone at a low price, you have to think about that very carefully.”
Amazon is not the only company that collects audio recordings from smart speakers, with Apple’s HomePod also found to be sending voice data to employees for review. “This information helps us train our speech recognition and natural language understanding systems,” Amazon previously said regarding its collection of voice data. “We have strict technical and operational safeguards, and have a zero tolerance policy for the abuse of our system. Employees do not have direct access to information that can identify the person or account as part of this workflow.”
Despite these assurances, some employees admitted earlier this year to sharing amusing recordings with other employees via an internal chat room. The tech giant has also been the subject of legal requests to hand over Alexa data as part of criminal investigations in the US.
DISCUSS. Are you worried about the potential privacy and security breaches implied by the development of the IoT? Discuss the vulnerability of connected devices in a SPEECH you will deliver at the 2022 IoT forum. You will be speaking in front of experts, technicians, citizens and politicians. Make sure your speech provides precise EXAMPLES of the dangers of the IoT, and that your opinion is clearly expressed.
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
_____________________________________________________________________________________________________________
How is the Internet of Things affected by GDPR? (Video)
https://www.youtube.com/watch?v=Ji53_8vPVjo
-
The Internet of Things has been built on the premise that a huge amount of _____________ will be generated and that can be _______________ and __________________________ for the benefit of the __________________, the ______________________, for the _____________________, for the product ________________________ and for the _________________________ provider. Everyone wants a piece of it.
-
What was the result of the explosion of data?
-
What does “GDPR” stand for?____________________________________________________________
-
What does “personal data” now refer to?
- How does the GDPR protect personal data?
The GDPR _________________________ the ________________________ of the _____________________ when it
comes to their ___________________ ________________, how it’s _______________ and who ______________ it.
- What are companies now required to do?
Transparent:______________________________________________________________________________________________
Clear:_______________________________________________________________________________________________________
Accountable:______________________________________________________________________________________________
Regulating the IoT: Impact and new considerations for
cybersecurity and new regulations
Nitzan Daube, http://www.helpnetsecurity.com, April 2019 (adapted)
As the IoT continues to gain popularity and more devices and data move online, lawmakers and legislators around the globe are taking note. An often-critiqued part of IoT growth is its impact on cybersecurity and concerns around the ability to keep networks secure from cyber-attacks.
Last year, California became the first state in the U.S. to pass a cybersecurity law covering IoT devices: SB-327. The law requires that manufacturers of a device that connects directly or indirectly to the internet must be equipped with “reasonable” security features that are designed to prevent unauthorized access, modification or information disclosure. However, many cybersecurity experts argue that the bill is too vague and could allow for manufacturers to leave security holes.
The UK and Japan have made commitments to developing guidelines and regulations. In 2018, the UK government launched a Code of Practice (CoP) for the Internet of Things security, which encourages manufacturers to develop IoT devices with security as a central component of its use, rather than working backwards to try to create security measures via software updates.
Japan’s recent measures are more radical and designed to aggressively approach the issue of unsecured IoT devices across the country. In February 2019 , Japanese officials announced that they would start an investigation into 200 million IP addresses across the country in an attempt to find devices that have poor or compromised security. Its goal is to help Internet Service Providers and telecoms better understand vulnerabilities in their networks and devices, so they can more effectively create revised cybersecurity measures.
An IoT device can either be protected by the network using tools such as router rules and firewalls or by using the security built into the CPU^2 to detect and block attacks, authenticate access, or analyze communication. Today’s device security is dependent on the CPU to protect against multiple vectors of attack and adapt to a dynamic environment that introduces new risk all the time. In many cases a security breach comes from simple oversight by the manufacturer or the user. Network protection is vulnerable since it’s impossible to identify all entry points to an IoT edge device.
An innovative approach is to create a gatekeeper in the secured flash that blocks write operations to the protected memory blocks, making it impossible for attackers to alter the firmware with any malicious code. Protecting the flash creates a secure channel between the device’s flash and the cloud that neither the network nor the software and processor within the device can breach, thereby extending the trust beyond cloud-to-processor to cloud-to-flash.
2 CPU = Central Processing Unit = Un processeur
-
Find the French equivalents to the words in bold.
-
What are the main worries arising with the development of IoT?
- Make a list of the solutions offered by the various laws and bills mentioned here.
California:_________________________________________________________________________________________________
The UK:____________________________________________________________________________________________________
Japan: _____________________________________________________________________________________________________
- What are the two current ways of protecting an IoT device?
- What new form of protection does the article present, and why is it more efficient than the current protections?