SlideShare a Scribd company logo
1 of 31
Internet of Things
All your privacy are belong to us
What is the Internet of
Things?
The Internet of Things (IoT) is the network of physical
devices, vehicles, home appliances and other
items embedded with electronics, software, sensors,
actuators, and connectivity which enables these
things to connect and exchange data, creating
opportunities for more direct integration of the
physical world into computer-based systems,
resulting in efficiency improvements, economic
benefits and reduced human intervention
What?
• Its mostly a bunch of devices that record data,
send it somewhere for processing, and then
often return data back to the original device.
• These devices are supposed to make it easier
to bridge the gap between the physical and
logical world
• These devices can basically, suuuuuuuupppper
basically, be broken down into three categories
• Personal Devices
• Smart City/Business
• Industrial
Personal IoT
• Personal IoT is usually the first thing we think
of when considering IoT devices
• These are generally made to make it easier for
us to interact with the world around us on a
personal level.
• These devices could include things like:
• Personal Assistants (Alexa, Google Home,
HomePod)
• Smart Devices: Refrigerators, TV’s,
Toothbrushes, condoms, etc.
• Smart Cars
• Smart Home Devices: Thermostats, locks, video
cameras, lights, etc.
Smart City/Business
• Smart City can mean a lot of different things,
but mostly it involves using an expanded
network of sensors to enhance a cities
livability.
• Same same for a business, but shop-ability vs.
livability.
• Examples:
• Drones that clean building or deliver defib to a
heart attack victim.
• Smart cars in a neural network
• Facial recognition software, shot sensors, side
walks that create power, etc.
Industrial IoT
Similar to what smart cities want to achieve, a lot
of these sensors fall under the acronym SCADA
(Supervisory Control and Data Acquisition)
• These systems usually use a network of
sensors to supervise and some times manage
physical systems:
• Utilities like Water and Electricity
• Manufacturing
• Food production
Some Background Knowledge
Stats, definitions, concepts and other such nonsense
IoT Stats
• In 2015, there were about 15.4 billion
connected devices. According to IHS, this
number will grow to 30.7 billion in 2020, and
75.4 billion by 2025
• In 2016, global spending on the IoT across
markets was $737 billion. IDC predicts that by
2020, this number will reach $1.29 trillion, a
compound annual growth rate of 15.6 percent.
• This year, 60 percent of global manufacturers
will use analytics data recorded from connected
devices to analyze processes and identify
optimization possibilities, according to IDC and
SAP.
• It's thought as much as 2.5 quintillion bytes of
data is being generated by the technology each
day, according to IBM.
What really is the cloud?
• It layman's terms it means your data resides on
someone else's computer
• In more technical terms, it means the server
used for your data storage belongs to a third
party and you are ”renting” that storage space.
US Third Party Doctrine
• The third-party doctrine is a United States legal
theory that holds that people who voluntarily
give information to third parties—such as
banks, phone companies, internet service
providers (ISPs), and e-mail servers—have "no
reasonable expectation of privacy." A lack of
privacy protection allows the United States
government to obtain information from third
parties without a legal warrant and without
otherwise complying with the Fourth
Amendment prohibition against search and
seizure without probable cause and a
judicial search warrant.
• Right now, this doctrine applies to most data
collected by IoT devices.
Privacy Concerns
How much data is enough?
Deep Dive
• All of this interconnected data can give us a
deeper look at our daily lives in a way previously
not possible.
• Healthcare
• Fitness
• Driving patterns
• Daily Habits (Smart home stuff)
• Daily spending habits and trends
What's my “Public
Profile?”
• Could a company buy my health data and make
an employment decision based off of that?
• Could an insurance company deny me
competitive rates using data collected from
”smart city” installations like license plate
readers?
• Driving after dark?
• Long distance driving
• Hard braking?
• What about a credit score based off of my
spending habits?
• Home insurance and mortgage rates based off
of smart home telemetry?
• Lights on while on vacation?
• Locks and password security?
IoT Data exchanges
• How valuable is your information?
• Data is considered to be “digital gold”
• “Data exchanges are where IoT-generated data
sets are combined and then refined through
data analytics, and all this information takes on
real value. These exchanges are places where
organizations partner to identify patterns and
draw conclusions about the information or see
ways they can monetize the data.”
• Like Cambridge Analytica on crack.
Exercise: Your Smart Life
• Wake up
• Get ready to go work
• Work all day
• Lunch
• Work some more
• Maybe hit the Gym
• Dinner.
• Drinks with friends?
• Sleep
Security Concerns?
Ah shit. It gets worse.
Big profile IoT Hacks
• Mirai Bot Net
• Largest recorded DDoS attack in history
• Used default usernames and passwords to
spread the malware
• Trendnet Webcam Hack
• Many of these webcams were enumerated on
popular sites like shodan
• Any one could view or even listen to these
exposed endpoints
• The Jeep Hack
• Researchers took control of a Jeep on the
highway, could speed it up and slow it down,
even cause it to veer.
• Used the Jeeps cellular network connectivity to
establish remote control
• Hackable Cardio Devices from St. Judes
• Devices could administer shocks and change
heart rhythms
Designed with low
Security
• Because security is expensive
• More power
• More expensive components
• Research
• Updates
IoT device manufacturers, for their part, see
security as a costly alternative to other factors
that small, low power connected devices need.
For instance, said Marc Bown, senior director of
security at Fitbit, many connected device
manufacturers would prefer to use low power,
cheaper chips as opposed to ones that come with
higher levels of security.
“Manufacturers are trading off encryption for low
power chips, lower prices, storage space, and
battery life,” Bown said.
Maintenance and
Updates
• How long will a device continue to receive
updates?
• What about legitimate products and the
company goes out of business?
• Nest
• Security update and patch cycle for your car?
• Untrained or lazy consumers?
• What about medical devices?
• AT&T's Cybersecurity Insights Report surveyed
more than 5,000 enterprises around the world
and found that 85% of enterprises are in the
process of or intend to deploy IoT devices. Yet
a mere 10% of those surveyed feel confident
that they could secure those devices against
hackers.
What Can I do?
Securing your personal Internet of Crap
Do your product research
• Is this a reputable company?
• Do they offer a routine patching cycle?
• Is there already a hack available for that
device?
• What kind of built in security is available?
• Avoid devices with P2P capabilities.
Secure it immediately
• Change the default settings
• Passwords and Usernames
• Wake words for voice driven devices
• Apply all security patches available from the
manufacturer
• Set your device to check for and apply new
firmware and software updates from the
manufacturer automatically
• Ensure if you use cloud services with the
device that they are secure
• Disable UPnP (Universal Plug n Play)
Security is an Onion.
• Create a separate network for your IoT devices
if you can.
• Use proper wi-fi security practices when creating
this network!
• Even better, put a firewall on this separate
network.
• Remove old devices
• Avoid single points of failure
Some examples of bad IoT
Because if we don’t laugh we’re all gonna cry
… and sex toys
• Condoms, vibrators, all sorts of stuff
• We-Vibe recently had to settle a 3.75 million
dollar suit after it became apparent that the Wi-
Fi source it gave off was easily hackable so
strangers could control the device?
• Bug or feature?
Thank you again for coming!
Check out Free Geeks other courses!
Sources
• https://www.slideshare.net/harborresearch/ha
rbor-researchs-infographic-on-the-internet-of-
things-and-smart-services
• https://www.visioncritical.com/internet-of-
things-stats/
• https://iotnews.asia/85/iotinfographics/infogra
phic-internet-things/
• https://en.wikipedia.org/wiki/Third-
party_doctrine
• https://blog.equinix.com/blog/2018/02/21/the
-rise-of-iot-data-exchanges/
• https://threatpost.com/iot-security-concerns-
peaking-with-no-end-in-sight/131308/
• http://www.businessinsider.com/internet-of-
things-security-privacy-2016-8
• https://www.albert.io/blog/data-collection-
methods-statistics/

More Related Content

What's hot

AI is the Catalyst of IoT
AI is the Catalyst of IoTAI is the Catalyst of IoT
AI is the Catalyst of IoTAhmed Banafa
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Sudha Jamthe
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)SecPod Technologies
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaionMdShahinAlam25
 
Internet of Things- An Introduction
Internet of Things- An IntroductionInternet of Things- An Introduction
Internet of Things- An IntroductionRavindra Dastikop
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesAhmed Banafa
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT Ahmed Banafa
 
The Internet of Things and You - A Developers Guide to IoT
The Internet of Things and You - A Developers Guide to IoTThe Internet of Things and You - A Developers Guide to IoT
The Internet of Things and You - A Developers Guide to IoTJim McKeeth
 
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...sandhibhide
 
IoT with only your Laptop - Build Stuff 2021
IoT with only your Laptop - Build Stuff 2021IoT with only your Laptop - Build Stuff 2021
IoT with only your Laptop - Build Stuff 2021Peter Gallagher
 
The Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your FacilityThe Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your FacilitySenseware
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionDr Laurent Guiraud
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019Ahmed Banafa
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain ConvergenceAhmed Banafa
 

What's hot (20)

AI is the Catalyst of IoT
AI is the Catalyst of IoTAI is the Catalyst of IoT
AI is the Catalyst of IoT
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
 
Internet of Things- An Introduction
Internet of Things- An IntroductionInternet of Things- An Introduction
Internet of Things- An Introduction
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
 
The Internet of Things and You - A Developers Guide to IoT
The Internet of Things and You - A Developers Guide to IoTThe Internet of Things and You - A Developers Guide to IoT
The Internet of Things and You - A Developers Guide to IoT
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
 
Technical landscape of IoT
Technical landscape of IoTTechnical landscape of IoT
Technical landscape of IoT
 
IoT with only your Laptop - Build Stuff 2021
IoT with only your Laptop - Build Stuff 2021IoT with only your Laptop - Build Stuff 2021
IoT with only your Laptop - Build Stuff 2021
 
The Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your FacilityThe Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your Facility
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a Solution
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
INTERNET OF THINGS
INTERNET OF THINGSINTERNET OF THINGS
INTERNET OF THINGS
 

Similar to IoT -Internet of Things

IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesAsim Rais Siddiqui
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentJustin Grammens
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxSelva914004
 
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)Rui Miguel Feio
 
The internet of things.pptx
The internet of things.pptxThe internet of things.pptx
The internet of things.pptxLamisaFaria
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoTAhmed Banafa
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)FabianM11
 
Embracing iot in the enterprise
Embracing iot in the enterpriseEmbracing iot in the enterprise
Embracing iot in the enterpriseGabriella Davis
 
Cisco data analytics in ioe_rajiv niles_2015 nov
Cisco data analytics in ioe_rajiv niles_2015 novCisco data analytics in ioe_rajiv niles_2015 nov
Cisco data analytics in ioe_rajiv niles_2015 novCiscoKorea
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfezzAyman1
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptxssuserc5ee4c
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptxJanasudhan1
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptxSourajitMaity1
 

Similar to IoT -Internet of Things (20)

IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and Challenges
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is Different
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
The internet of things
The internet of thingsThe internet of things
The internet of things
 
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
 
The internet of things.pptx
The internet of things.pptxThe internet of things.pptx
The internet of things.pptx
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
 
The Dawn of a new era: Internet of Things
The Dawn of a new era: Internet of ThingsThe Dawn of a new era: Internet of Things
The Dawn of a new era: Internet of Things
 
Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Embracing iot in the enterprise
Embracing iot in the enterpriseEmbracing iot in the enterprise
Embracing iot in the enterprise
 
Cisco data analytics in ioe_rajiv niles_2015 nov
Cisco data analytics in ioe_rajiv niles_2015 novCisco data analytics in ioe_rajiv niles_2015 nov
Cisco data analytics in ioe_rajiv niles_2015 nov
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 

More from Joshua Johnston

More from Joshua Johnston (7)

Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacy
 
Holiday scams
Holiday scamsHoliday scams
Holiday scams
 
Wireless v2
Wireless v2Wireless v2
Wireless v2
 
FreeGeek -Cryptocurrency and Blockchain
FreeGeek -Cryptocurrency and BlockchainFreeGeek -Cryptocurrency and Blockchain
FreeGeek -Cryptocurrency and Blockchain
 
Holiday scams
Holiday scamsHoliday scams
Holiday scams
 
Home computing security
Home computing securityHome computing security
Home computing security
 
Intro to firewalls
Intro to firewallsIntro to firewalls
Intro to firewalls
 

Recently uploaded

Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfMilind Agarwal
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 

Recently uploaded (20)

Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 

IoT -Internet of Things

  • 1. Internet of Things All your privacy are belong to us
  • 2. What is the Internet of Things? The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data, creating opportunities for more direct integration of the physical world into computer-based systems, resulting in efficiency improvements, economic benefits and reduced human intervention
  • 3. What? • Its mostly a bunch of devices that record data, send it somewhere for processing, and then often return data back to the original device. • These devices are supposed to make it easier to bridge the gap between the physical and logical world • These devices can basically, suuuuuuuupppper basically, be broken down into three categories • Personal Devices • Smart City/Business • Industrial
  • 4. Personal IoT • Personal IoT is usually the first thing we think of when considering IoT devices • These are generally made to make it easier for us to interact with the world around us on a personal level. • These devices could include things like: • Personal Assistants (Alexa, Google Home, HomePod) • Smart Devices: Refrigerators, TV’s, Toothbrushes, condoms, etc. • Smart Cars • Smart Home Devices: Thermostats, locks, video cameras, lights, etc.
  • 5. Smart City/Business • Smart City can mean a lot of different things, but mostly it involves using an expanded network of sensors to enhance a cities livability. • Same same for a business, but shop-ability vs. livability. • Examples: • Drones that clean building or deliver defib to a heart attack victim. • Smart cars in a neural network • Facial recognition software, shot sensors, side walks that create power, etc.
  • 6. Industrial IoT Similar to what smart cities want to achieve, a lot of these sensors fall under the acronym SCADA (Supervisory Control and Data Acquisition) • These systems usually use a network of sensors to supervise and some times manage physical systems: • Utilities like Water and Electricity • Manufacturing • Food production
  • 7. Some Background Knowledge Stats, definitions, concepts and other such nonsense
  • 8. IoT Stats • In 2015, there were about 15.4 billion connected devices. According to IHS, this number will grow to 30.7 billion in 2020, and 75.4 billion by 2025 • In 2016, global spending on the IoT across markets was $737 billion. IDC predicts that by 2020, this number will reach $1.29 trillion, a compound annual growth rate of 15.6 percent. • This year, 60 percent of global manufacturers will use analytics data recorded from connected devices to analyze processes and identify optimization possibilities, according to IDC and SAP. • It's thought as much as 2.5 quintillion bytes of data is being generated by the technology each day, according to IBM.
  • 9. What really is the cloud? • It layman's terms it means your data resides on someone else's computer • In more technical terms, it means the server used for your data storage belongs to a third party and you are ”renting” that storage space.
  • 10. US Third Party Doctrine • The third-party doctrine is a United States legal theory that holds that people who voluntarily give information to third parties—such as banks, phone companies, internet service providers (ISPs), and e-mail servers—have "no reasonable expectation of privacy." A lack of privacy protection allows the United States government to obtain information from third parties without a legal warrant and without otherwise complying with the Fourth Amendment prohibition against search and seizure without probable cause and a judicial search warrant. • Right now, this doctrine applies to most data collected by IoT devices.
  • 11. Privacy Concerns How much data is enough?
  • 12. Deep Dive • All of this interconnected data can give us a deeper look at our daily lives in a way previously not possible. • Healthcare • Fitness • Driving patterns • Daily Habits (Smart home stuff) • Daily spending habits and trends
  • 13. What's my “Public Profile?” • Could a company buy my health data and make an employment decision based off of that? • Could an insurance company deny me competitive rates using data collected from ”smart city” installations like license plate readers? • Driving after dark? • Long distance driving • Hard braking? • What about a credit score based off of my spending habits? • Home insurance and mortgage rates based off of smart home telemetry? • Lights on while on vacation? • Locks and password security?
  • 14. IoT Data exchanges • How valuable is your information? • Data is considered to be “digital gold” • “Data exchanges are where IoT-generated data sets are combined and then refined through data analytics, and all this information takes on real value. These exchanges are places where organizations partner to identify patterns and draw conclusions about the information or see ways they can monetize the data.” • Like Cambridge Analytica on crack.
  • 15. Exercise: Your Smart Life • Wake up • Get ready to go work • Work all day • Lunch • Work some more • Maybe hit the Gym • Dinner. • Drinks with friends? • Sleep
  • 16. Security Concerns? Ah shit. It gets worse.
  • 17. Big profile IoT Hacks • Mirai Bot Net • Largest recorded DDoS attack in history • Used default usernames and passwords to spread the malware • Trendnet Webcam Hack • Many of these webcams were enumerated on popular sites like shodan • Any one could view or even listen to these exposed endpoints • The Jeep Hack • Researchers took control of a Jeep on the highway, could speed it up and slow it down, even cause it to veer. • Used the Jeeps cellular network connectivity to establish remote control • Hackable Cardio Devices from St. Judes • Devices could administer shocks and change heart rhythms
  • 18. Designed with low Security • Because security is expensive • More power • More expensive components • Research • Updates IoT device manufacturers, for their part, see security as a costly alternative to other factors that small, low power connected devices need. For instance, said Marc Bown, senior director of security at Fitbit, many connected device manufacturers would prefer to use low power, cheaper chips as opposed to ones that come with higher levels of security. “Manufacturers are trading off encryption for low power chips, lower prices, storage space, and battery life,” Bown said.
  • 19. Maintenance and Updates • How long will a device continue to receive updates? • What about legitimate products and the company goes out of business? • Nest • Security update and patch cycle for your car? • Untrained or lazy consumers? • What about medical devices? • AT&T's Cybersecurity Insights Report surveyed more than 5,000 enterprises around the world and found that 85% of enterprises are in the process of or intend to deploy IoT devices. Yet a mere 10% of those surveyed feel confident that they could secure those devices against hackers.
  • 20. What Can I do? Securing your personal Internet of Crap
  • 21. Do your product research • Is this a reputable company? • Do they offer a routine patching cycle? • Is there already a hack available for that device? • What kind of built in security is available? • Avoid devices with P2P capabilities.
  • 22. Secure it immediately • Change the default settings • Passwords and Usernames • Wake words for voice driven devices • Apply all security patches available from the manufacturer • Set your device to check for and apply new firmware and software updates from the manufacturer automatically • Ensure if you use cloud services with the device that they are secure • Disable UPnP (Universal Plug n Play)
  • 23. Security is an Onion. • Create a separate network for your IoT devices if you can. • Use proper wi-fi security practices when creating this network! • Even better, put a firewall on this separate network. • Remove old devices • Avoid single points of failure
  • 24. Some examples of bad IoT Because if we don’t laugh we’re all gonna cry
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. … and sex toys • Condoms, vibrators, all sorts of stuff • We-Vibe recently had to settle a 3.75 million dollar suit after it became apparent that the Wi- Fi source it gave off was easily hackable so strangers could control the device? • Bug or feature?
  • 30. Thank you again for coming! Check out Free Geeks other courses!
  • 31. Sources • https://www.slideshare.net/harborresearch/ha rbor-researchs-infographic-on-the-internet-of- things-and-smart-services • https://www.visioncritical.com/internet-of- things-stats/ • https://iotnews.asia/85/iotinfographics/infogra phic-internet-things/ • https://en.wikipedia.org/wiki/Third- party_doctrine • https://blog.equinix.com/blog/2018/02/21/the -rise-of-iot-data-exchanges/ • https://threatpost.com/iot-security-concerns- peaking-with-no-end-in-sight/131308/ • http://www.businessinsider.com/internet-of- things-security-privacy-2016-8 • https://www.albert.io/blog/data-collection- methods-statistics/