Common Sense Security Measures for Voice-Activated Assistant Devices (English)
- New search for: Badhwar, Raj
- New search for: Badhwar, Raj
In:
The CISO’s Next Frontier
: AI, Post-Quantum Cryptography and Advanced Security Paradigms
;
Chapter: 31
;
253-258
;
2021
- Article/Chapter (Book) / Electronic Resource
-
Title:Common Sense Security Measures for Voice-Activated Assistant Devices
-
Contributors:Badhwar, Raj ( author )
-
Published in:The CISO’s Next Frontier : AI, Post-Quantum Cryptography and Advanced Security Paradigms ; Chapter: 31 ; 253-258
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2021-08-06
-
Size:6 pages
-
ISBN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Are You Ready for Quantum ComputingQuantum-computing?Badhwar, Raj et al. | 2021
- 2
-
The Need for Post-Quantum CryptographyPost-quantum cryptography (PQC)Badhwar, Raj et al. | 2021
- 3
-
Quantum Encryption Is Not a ParadoxBadhwar, Raj et al. | 2021
- 4
-
AI Code of EthicsCode of ethics for CybersecurityBadhwar, Raj et al. | 2021
- 5
-
The Case for AIArtificial intelligence (AI)/MLMachine learning (ML) in CybersecurityBadhwar, Raj et al. | 2021
- 6
-
Security for Work-From-Home TechnologiesBadhwar, Raj et al. | 2021
- 7
-
Secure Video Conferencing and Online CollaborationBadhwar, Raj et al. | 2021
- 8
-
If You Must Work from Home, Do It Securely!Badhwar, Raj et al. | 2021
- 9
-
Security Controls for Remote Access TechnologiesBadhwar, Raj et al. | 2021
- 10
-
Specialty MalwareMalware and BackdoorsBackdoors for VDIVirtual desktop infrastructure (VDI)Badhwar, Raj et al. | 2021
- 11
-
The Future State of Data SecurityData securityBadhwar, Raj et al. | 2021
- 12
-
Cybersecurity Enabled by Zero TrustZero trustBadhwar, Raj et al. | 2021
- 13
-
Advanced Active Directory AttacksActive directory attacks and PreventionBadhwar, Raj et al. | 2021
- 14
-
Cyber Deception SystemsBadhwar, Raj et al. | 2021
- 15
-
The Cybersecurity-Driven Need for Hypervisor IntrospectionHypervisor introspectionBadhwar, Raj et al. | 2021
- 16
-
Bitcoin Is a Decade Old, and So Are the Threats to the Various BlockchainBlockchains EcosystemsBadhwar, Raj et al. | 2021
- 17
-
The Advanced MalwareMalware Prevention PlaybookBadhwar, Raj et al. | 2021
- 18
-
The 768K768k PrecipiceBadhwar, Raj et al. | 2021
- 19
-
MAC Address Randomization to Limit User/Device TrackingBadhwar, Raj et al. | 2021
- 20
-
Transport Layer Security 1.3Badhwar, Raj et al. | 2021
- 21
-
The Use of ESNIEncrypted server name indication (ESNI) with TLSTransport Layer Security (TLS) 1.3: Is It a Boon to Privacy, or Does It Raise Security Concerns?Badhwar, Raj et al. | 2021
- 22
-
Using FQDNFully qualified domain names (FQDN) vs IP Addresses in FW Rules and App ConfigsBadhwar, Raj et al. | 2021
- 23
-
Network Time Protocol (NTPNetwork time protocol (NTP)) SecurityBadhwar, Raj et al. | 2021
- 24
-
Domain Name System (DNS) SecurityBadhwar, Raj et al. | 2021
- 25
-
Next Gen Wi-Fi and SecurityBadhwar, Raj et al. | 2021
- 26
-
The Next Frontier for CA/Certificate Security - DANE and Certificate TransparencyBadhwar, Raj et al. | 2021
- 27
-
Man-in-the-Middle Attack PreventionBadhwar, Raj et al. | 2021
- 28
-
Distributed Denial of Service (DDoS) ProtectionBadhwar, Raj et al. | 2021
- 29
-
Intro to API Security - Issues and Some Solutions!Badhwar, Raj et al. | 2021
- 30
-
Windows Subsystem for Linux – Security Risk and MitigationBadhwar, Raj et al. | 2021
- 31
-
Common Sense Security Measures for Voice-Activated Assistant DevicesBadhwar, Raj et al. | 2021
- 32
-
The Case for Code Signing and Dynamic White-ListingBadhwar, Raj et al. | 2021
- 33
-
Biometrics – Commentary on Data Breach Notification, Threats, and Data SecurityBadhwar, Raj et al. | 2021
- 34
-
Security Requirements for RPA BotsBadhwar, Raj et al. | 2021
- 35
-
Polymorphic and Metamorphic MalwareBadhwar, Raj et al. | 2021
- 36
-
Introduction to Cloud Monitoring Security ControlsBadhwar, Raj et al. | 2021
- 37
-
Cloud Monitoring Security Controls for AWSBadhwar, Raj et al. | 2021
- 38
-
Cloud Monitoring Security Controls for AzureBadhwar, Raj et al. | 2021
- 39
-
Cloud Policy Enforcement PointBadhwar, Raj et al. | 2021
- 40
-
Dynamic Measurement of Cyber RiskBadhwar, Raj et al. | 2021
- 41
-
OEM and Third-Party Sourced Application and Services RiskBadhwar, Raj et al. | 2021
- 42
-
Commentary on Insider ThreatBadhwar, Raj et al. | 2021
- 43
-
Simplified Approach to Calculate the Probability of a Cyber EventBadhwar, Raj et al. | 2021
- 44
-
Privacy Concerns from Publicly Available Meta-dataBadhwar, Raj et al. | 2021
- 45
-
Dark Web & Dark netDark NetDark netBadhwar, Raj et al. | 2021
- 46
-
Risk-Based Vulnerability ManagementBadhwar, Raj et al. | 2021