hyper-connectivity: cyber security threats and concerns
DESCRIPTION
Cyber-attacks happen on all types of organizations and individuals. They can start in many different places, including any device that’s connected to the Internet. This becomes highly problematic in our modern society when we have devices such as copy machines that are hooked up to the Internet in order to update themselves report usage, install software, etc. Having all these devices connected to the Internet increases our exposure and vulnerability. With so many targets we need to create an orderly way to look for threats. Learning Outcomes: • Define Mixed Reality • Understand Associated Risks with Mixed Reality • Gain Awareness in Emerging Cyber Threats in Mixed Reality, Virtual Reality, and Augmented Reality • Understand Applicability to Doctoral ResearchTRANSCRIPT
![Page 1: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/1.jpg)
![Page 2: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/2.jpg)
![Page 3: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/3.jpg)
![Page 5: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/5.jpg)
![Page 6: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/6.jpg)
![Page 7: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/7.jpg)
![Page 8: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/8.jpg)
![Page 9: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/9.jpg)
![Page 10: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/10.jpg)
![Page 11: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/11.jpg)
![Page 12: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/12.jpg)
![Page 13: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/13.jpg)
![Page 14: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/14.jpg)
![Page 15: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/15.jpg)
![Page 16: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/16.jpg)
![Page 17: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/17.jpg)
![Page 18: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/18.jpg)
![Page 19: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/19.jpg)
![Page 20: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/20.jpg)
![Page 22: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/22.jpg)
![Page 23: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/23.jpg)
![Page 24: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/24.jpg)
![Page 25: Hyper-connectivity: Cyber Security Threats and Concerns](https://reader034.vdocuments.mx/reader034/viewer/2022051611/54b70de14a79594a478b47c8/html5/thumbnails/25.jpg)