SlideShare a Scribd company logo
1 of 32
Download to read offline
UX and Security for the IoT
By Kevin Rohling
Who is this guy?
Kevin Rohling
Co-Founder/VP of Product at Emberlight
Advisor at Ship.io/Electric Cloud
@kevinrohling
I help make Emberlight.
What makes IoT Hard/Fun?
Connected devices are complicated.
How do you keep the experience simple and secure for your users?
User Experience at Home
The bar is pretty high.
User Experience at Home
Keys
-Portable
-Durable
-Cheap to replace
-Never run out of batteries
User Experience at Home
Keys
-Portable
-Durable
-Cheap to replace
-Never run out of batteries
User Experience at Home
Keys
-Portable
-Durable
-Cheap to replace
-Never run out of batteries
User Experience at Home
Keys
-Portable
-Durable
-Cheap to replace
-Never run out of batteries
User Experience at Home
Keys
-Portable
-Durable
-Cheap to replace
-Never run out of batteries
User Experience at Home
The Light Switch
-Easy to understand
-Tactile feedback
-Inexpensive
-Conveniently located
User Experience at Home
The Light Switch
-Easy to understand
-Tactile feedback
-Inexpensive
-Conveniently located
User Experience at Home
The Light Switch
-Easy to understand
-Tactile feedback
-Inexpensive
-Conveniently located
User Experience at Home
The Light Switch
-Easy to understand
-Tactile feedback
-Inexpensive
-Conveniently located
User Experience at Home
The Light Switch
-Easy to understand
-Tactile feedback
-Inexpensive
-Conveniently located
User Experience in the Connected Home
Smart Phone vs Light Switch.
User Experience in the Connected Home
Smart Phone vs Light Switch.
1. Find your phone
2. Turn it on
3. Unlock it (passcode)
4. Locate the “lights” app
5. Turn light on
6. Put your phone away
1. Walk up to the light switch
2. Flip the switch
3. Go back to bed
User Experience in the Connected Home
1) The smartphone is not the right answer.
2) If it’s not broken, don’t fix it.
3) New interaction models are possible.
User Experience in the Connected Home
1) The smartphone is not the right answer.
2) If it’s not broken, don’t fix it.
3) New interaction models are possible.
User Experience in the Connected Home
1) The smartphone is not the right answer.
2) If it’s not broken, don’t fix it.
3) New interaction models must be very low friction.
New Connected Home User Experiences
Voice Control
New Connected Home User Experiences
Dashboards
New Connected Home User Experiences
Remote Control
2.0
SENIC
IoT and Security
IoT devices are harder to secure.
-Limited hardware resources
-Intermittent or no cloud connectivity
-3rd Party Platform Integrations
-Potentially multiple RF access points (i.e. Wifi,
BLE, Zigbee, etc.)
IoT and Security
IoT devices are harder to secure.
-Limited hardware resources
-Intermittent or no cloud connectivity
-3rd Party Platform Integrations
-Potentially multiple RF access points (i.e. Wifi,
BLE, Zigbee, etc.)
IoT and Security
IoT devices are harder to secure.
-Limited hardware resources
-Intermittent or no cloud connectivity
-3rd Party Platform Integrations
-Potentially multiple RF access points (i.e. Wifi,
BLE, Zigbee, etc.)
IoT and Security
IoT devices are harder to secure.
-Limited hardware resources
-Intermittent or no cloud connectivity
-3rd Party Platform Integrations
-Potentially multiple RF access points (i.e. Wifi,
BLE, Zigbee, etc.)
IoT and Security
IoT devices are harder to secure.
-Limited hardware resources
-Intermittent or no cloud connectivity
-3rd Party Platform Integrations
-Potentially multiple RF access points (i.e. Wifi,
BLE, Zigbee, etc.)
2 Common IoT Device Vulnerabilities
1. Open BLE/LAN APIs
Interacting with a device over the LAN or BLE
should require authentication. Many devices
allow unrestricted access via the same WiFi
network or over BLE.
All access points should be secured.
2 Common IoT Device Vulnerabilities
2. Unrestricted ‘Reset To Factory’
Devices should be protected against physical
theft or access. Changes to the network
connection or re-assignment to another user
account should be restricted.
IoT in the Cloud
Users are very sensitive about
what information you store
about them.
This makes sense, you are in their home.
Don’t be creepy.
Kevin Rohling
@kevinrohling
kevinr@emberlight.co
kevinrohling.com
UX and Security for the IoT

More Related Content

What's hot

Residential Gateways- The First Mile Solution to the Last Mile Problem - Javi...
Residential Gateways- The First Mile Solution to the Last Mile Problem - Javi...Residential Gateways- The First Mile Solution to the Last Mile Problem - Javi...
Residential Gateways- The First Mile Solution to the Last Mile Problem - Javi...
mfrancis
 
Innovative's History
Innovative's HistoryInnovative's History
Innovative's History
Nabil Takla
 

What's hot (19)

Pavel stessin - building and selecting hardware for connected devices
Pavel stessin - building and selecting hardware for connected devicesPavel stessin - building and selecting hardware for connected devices
Pavel stessin - building and selecting hardware for connected devices
 
Softimize - Connecting Devices to Gateways
Softimize - Connecting Devices to GatewaysSoftimize - Connecting Devices to Gateways
Softimize - Connecting Devices to Gateways
 
Residential Gateways- The First Mile Solution to the Last Mile Problem - Javi...
Residential Gateways- The First Mile Solution to the Last Mile Problem - Javi...Residential Gateways- The First Mile Solution to the Last Mile Problem - Javi...
Residential Gateways- The First Mile Solution to the Last Mile Problem - Javi...
 
One Stop iBeacon Solution and Implementation
One Stop iBeacon Solution and ImplementationOne Stop iBeacon Solution and Implementation
One Stop iBeacon Solution and Implementation
 
Wibree ppt
Wibree pptWibree ppt
Wibree ppt
 
Innovative's History
Innovative's HistoryInnovative's History
Innovative's History
 
Wireless USB
Wireless USBWireless USB
Wireless USB
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
IoT13: Electric Imp showcase
IoT13: Electric Imp showcaseIoT13: Electric Imp showcase
IoT13: Electric Imp showcase
 
Wibree Technology New Version 2017
Wibree Technology New Version 2017Wibree Technology New Version 2017
Wibree Technology New Version 2017
 
Estimote q3-demo-betaworks ja00044-dosada
Estimote q3-demo-betaworks ja00044-dosadaEstimote q3-demo-betaworks ja00044-dosada
Estimote q3-demo-betaworks ja00044-dosada
 
Brief introduction of geeklink company and products
Brief introduction of geeklink company and productsBrief introduction of geeklink company and products
Brief introduction of geeklink company and products
 
home networking
home networkinghome networking
home networking
 
APIs for the physical world
APIs for the physical worldAPIs for the physical world
APIs for the physical world
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellary
 
Talk at the Landelijk Architecure Congress (NL)
Talk at the Landelijk Architecure Congress (NL)Talk at the Landelijk Architecure Congress (NL)
Talk at the Landelijk Architecure Congress (NL)
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Connected home - market evolution & protocol wars
Connected home - market evolution & protocol warsConnected home - market evolution & protocol wars
Connected home - market evolution & protocol wars
 
Wireless usb
Wireless usbWireless usb
Wireless usb
 

Viewers also liked

CLOUDIFICATION FOR INTERNET OF THINGS - THE ROAD AHEAD
CLOUDIFICATION FOR INTERNET OF THINGS - THE ROAD AHEADCLOUDIFICATION FOR INTERNET OF THINGS - THE ROAD AHEAD
CLOUDIFICATION FOR INTERNET OF THINGS - THE ROAD AHEAD
Harbinger Systems - HRTech Builder of Choice
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoT
Sukumar Nayak
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Zoltan Balazs
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
Julien Vermillard
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
Mhae Lyn
 

Viewers also liked (20)

Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
 
IoT Meets Security
IoT Meets SecurityIoT Meets Security
IoT Meets Security
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you Spam
 
Internet of Things and Future Internet
Internet of Things and Future InternetInternet of Things and Future Internet
Internet of Things and Future Internet
 
BKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T SystemsBKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T Systems
 
CLOUDIFICATION FOR INTERNET OF THINGS - THE ROAD AHEAD
CLOUDIFICATION FOR INTERNET OF THINGS - THE ROAD AHEADCLOUDIFICATION FOR INTERNET OF THINGS - THE ROAD AHEAD
CLOUDIFICATION FOR INTERNET OF THINGS - THE ROAD AHEAD
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoT
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
 
A reference architecture for the internet of things
A reference architecture for the internet of thingsA reference architecture for the internet of things
A reference architecture for the internet of things
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay Kumar
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 

Similar to UX and Security for the IoT

Bluetooth
BluetoothBluetooth
Bluetooth
shwet28
 
Bus Off DeviceNet June-FINAL
Bus Off DeviceNet June-FINALBus Off DeviceNet June-FINAL
Bus Off DeviceNet June-FINAL
Thomas O Connell
 

Similar to UX and Security for the IoT (20)

Developing Hardware: APIs for the physical world
Developing Hardware: APIs for the physical worldDeveloping Hardware: APIs for the physical world
Developing Hardware: APIs for the physical world
 
The First Wave of IoT—Blood in the Water
The First Wave of IoT—Blood in the WaterThe First Wave of IoT—Blood in the Water
The First Wave of IoT—Blood in the Water
 
Introduction to Home Automation
Introduction to Home AutomationIntroduction to Home Automation
Introduction to Home Automation
 
Technical Volume 1.7
Technical Volume 1.7Technical Volume 1.7
Technical Volume 1.7
 
How to Build Out a Tech Eco-System | Dan Cregg | Lunch & Learn
How to Build Out a Tech Eco-System | Dan Cregg | Lunch & Learn How to Build Out a Tech Eco-System | Dan Cregg | Lunch & Learn
How to Build Out a Tech Eco-System | Dan Cregg | Lunch & Learn
 
Wi-Fi vs Bluetooth
Wi-Fi vs BluetoothWi-Fi vs Bluetooth
Wi-Fi vs Bluetooth
 
OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
GOOGLE ASSISTANT SMART HOME USING A MULTI-LINGUAL SPEECH RECOGNITION SYSTEM
GOOGLE ASSISTANT SMART HOME USING A MULTI-LINGUAL SPEECH RECOGNITION SYSTEMGOOGLE ASSISTANT SMART HOME USING A MULTI-LINGUAL SPEECH RECOGNITION SYSTEM
GOOGLE ASSISTANT SMART HOME USING A MULTI-LINGUAL SPEECH RECOGNITION SYSTEM
 
Bus Off DeviceNet June-FINAL
Bus Off DeviceNet June-FINALBus Off DeviceNet June-FINAL
Bus Off DeviceNet June-FINAL
 
Network Trends
Network TrendsNetwork Trends
Network Trends
 
Bluetooth ppt
Bluetooth pptBluetooth ppt
Bluetooth ppt
 
Webinar: Secure Offline and Online Updates for Linux Devices
Webinar: Secure Offline and Online Updates for Linux DevicesWebinar: Secure Offline and Online Updates for Linux Devices
Webinar: Secure Offline and Online Updates for Linux Devices
 
Router CPU Load in Home Networks
Router CPU Load in Home NetworksRouter CPU Load in Home Networks
Router CPU Load in Home Networks
 
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsWHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of Things
 
smart switchboard pcu.pptx
smart switchboard pcu.pptxsmart switchboard pcu.pptx
smart switchboard pcu.pptx
 
Iot devices
Iot devicesIot devices
Iot devices
 
Creating an Internet of Everything
Creating an Internet of Everything Creating an Internet of Everything
Creating an Internet of Everything
 
New world of Wireless
New world of WirelessNew world of Wireless
New world of Wireless
 
IoT Hetero - split
IoT Hetero - splitIoT Hetero - split
IoT Hetero - split
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

UX and Security for the IoT

  • 1. UX and Security for the IoT By Kevin Rohling
  • 2. Who is this guy? Kevin Rohling Co-Founder/VP of Product at Emberlight Advisor at Ship.io/Electric Cloud @kevinrohling
  • 3. I help make Emberlight.
  • 4. What makes IoT Hard/Fun? Connected devices are complicated. How do you keep the experience simple and secure for your users?
  • 5. User Experience at Home The bar is pretty high.
  • 6. User Experience at Home Keys -Portable -Durable -Cheap to replace -Never run out of batteries
  • 7. User Experience at Home Keys -Portable -Durable -Cheap to replace -Never run out of batteries
  • 8. User Experience at Home Keys -Portable -Durable -Cheap to replace -Never run out of batteries
  • 9. User Experience at Home Keys -Portable -Durable -Cheap to replace -Never run out of batteries
  • 10. User Experience at Home Keys -Portable -Durable -Cheap to replace -Never run out of batteries
  • 11. User Experience at Home The Light Switch -Easy to understand -Tactile feedback -Inexpensive -Conveniently located
  • 12. User Experience at Home The Light Switch -Easy to understand -Tactile feedback -Inexpensive -Conveniently located
  • 13. User Experience at Home The Light Switch -Easy to understand -Tactile feedback -Inexpensive -Conveniently located
  • 14. User Experience at Home The Light Switch -Easy to understand -Tactile feedback -Inexpensive -Conveniently located
  • 15. User Experience at Home The Light Switch -Easy to understand -Tactile feedback -Inexpensive -Conveniently located
  • 16. User Experience in the Connected Home Smart Phone vs Light Switch.
  • 17. User Experience in the Connected Home Smart Phone vs Light Switch. 1. Find your phone 2. Turn it on 3. Unlock it (passcode) 4. Locate the “lights” app 5. Turn light on 6. Put your phone away 1. Walk up to the light switch 2. Flip the switch 3. Go back to bed
  • 18. User Experience in the Connected Home 1) The smartphone is not the right answer. 2) If it’s not broken, don’t fix it. 3) New interaction models are possible.
  • 19. User Experience in the Connected Home 1) The smartphone is not the right answer. 2) If it’s not broken, don’t fix it. 3) New interaction models are possible.
  • 20. User Experience in the Connected Home 1) The smartphone is not the right answer. 2) If it’s not broken, don’t fix it. 3) New interaction models must be very low friction.
  • 21. New Connected Home User Experiences Voice Control
  • 22. New Connected Home User Experiences Dashboards
  • 23. New Connected Home User Experiences Remote Control 2.0 SENIC
  • 24. IoT and Security IoT devices are harder to secure. -Limited hardware resources -Intermittent or no cloud connectivity -3rd Party Platform Integrations -Potentially multiple RF access points (i.e. Wifi, BLE, Zigbee, etc.)
  • 25. IoT and Security IoT devices are harder to secure. -Limited hardware resources -Intermittent or no cloud connectivity -3rd Party Platform Integrations -Potentially multiple RF access points (i.e. Wifi, BLE, Zigbee, etc.)
  • 26. IoT and Security IoT devices are harder to secure. -Limited hardware resources -Intermittent or no cloud connectivity -3rd Party Platform Integrations -Potentially multiple RF access points (i.e. Wifi, BLE, Zigbee, etc.)
  • 27. IoT and Security IoT devices are harder to secure. -Limited hardware resources -Intermittent or no cloud connectivity -3rd Party Platform Integrations -Potentially multiple RF access points (i.e. Wifi, BLE, Zigbee, etc.)
  • 28. IoT and Security IoT devices are harder to secure. -Limited hardware resources -Intermittent or no cloud connectivity -3rd Party Platform Integrations -Potentially multiple RF access points (i.e. Wifi, BLE, Zigbee, etc.)
  • 29. 2 Common IoT Device Vulnerabilities 1. Open BLE/LAN APIs Interacting with a device over the LAN or BLE should require authentication. Many devices allow unrestricted access via the same WiFi network or over BLE. All access points should be secured.
  • 30. 2 Common IoT Device Vulnerabilities 2. Unrestricted ‘Reset To Factory’ Devices should be protected against physical theft or access. Changes to the network connection or re-assignment to another user account should be restricted.
  • 31. IoT in the Cloud Users are very sensitive about what information you store about them. This makes sense, you are in their home. Don’t be creepy.