cloud computing

 


internet of things

The Internet of Things refers to “smart” devices that can connect, exchange data and work together. Some devices sold today, such as cars , doorbells, thermostats, and refrigerators, have them.

 

Smart home devices can be convenient and safe, such as doorbells with built-in video cameras and remotely adjustable thermostats. On the other hand, they can threaten security when hacked or used to invade privacy. They can also be difficult to maintain; a smart fridge can keep a grocery list up to date, but is nearly impossible to fix due to a lack of trained technicians.

 

Cities are also using the Internet of Things. For example, Toronto has traffic lights that vary their cycles depending on traffic congestion.

 

Did you know ?

In the late 2010s, Toronto is the planned site for the establishment of the world's first smart neighborhood. The development, called Quayside, would have been built from the ground up from the internet. However, critics worry about who owns the data collected through numerous devices and sensors. The stakes are especially high because Quayside is said to have set a precedent for similar projects to follow. Sidewalk Labs, which is owned by the same company as Google, withdraws its proposal during the pandemicoutbreak of 2020. The company says uncertain economic conditions have made Quayside less financially viable.

 

 

Cybercrime in Canada

Widespread use of the internet has led to increased crime in terms of information theft, exploitation, harassment and commerce. In 2015, the Protecting Canadians from Online Crime Act was passed, which amended the Criminal Code and other laws to help law enforcement investigate cases of child sexual exploitation and organized crime in line.

 

The most common online crimes involve the breach of information belonging to individuals or organizations. Hackers often attack e-commerce sites. They mainly target credit card numbers , which can be sold or used to defraud other companies. Other targets are usernames and passwords, which can be used to hack other sites. These kinds of attacks underscore the importance of the privacy protections set out in the Personal Information Protection and Electronic Documents Act (PIPEDA), which compels private companies to notify people whose data has been stolen.

 

Some people are targeted for phishing scams, which are emails that appear to come from a legitimate sender, such as a bank , and contain a link to a website .

 

Pedophiles use the internet to access and distribute child pornography . Sexual predators use it to lure their potential victims into meeting them. To this end, they use social media, email and other online communication tools. Several cases of online stalking, or harassment through these tools, have also been reported. Hateful posts and comments against religious and ethnic minorities are also commonplace.

 

Cyberbullying is a serious problem among young people. It sometimes leads to those who are victims of mental health problems , isolation and lack of self-esteem that can lead to suicide . For example, Amanda Todd, a teenager from British Columbia , committed suicide in 2012 after several years of cyberbullying due to a photo showing her topless, forcibly taken and posted on the web by her attacker. Another teenage girl, Rehtaeh Parsons, of Nova Scotia , took her own life in 2013 after a video of her sexual assault emergedon social media. After his death, several investigations are carried out. A provincial law was then proposed to protect children from cyberbullying, but the Supreme Court of Nova Scotia struck it down in 2015 because it violated the freedom of expression section of the Charter of Rights and Freedoms . .

Comments

Popular posts from this blog

The Advantages of Cloud Computing to Both Individual Consumers and Large Businesses

How to increase the security of data in the cloud?

Private Cloud Computing: A Game Changer for Disaster Recovery