MODULE 6: IT, SOCIETY
AND CULTURE
BAAO COMMUNITY COLLEGE
San Juan, Baao, Camarines Sur
COLLEGE OF EDUCATION
GE 10 – LIVING IN THE IT ERA
M A R IC O N B . R A N C E S , M A E d
I n s t r u c t o r, B a a o C o m m u n i t y C o l l e g e
LAYCA JOY A. LOMA
STUDENT
 When the weight of living hangs heavy on
your spine you must remind yourself:
Other people feel this, too.
GE 10 Living in the IT Era – Module 1: Introduction to Information and Communications Technology
At the end of the discussion, students are expected to:
A. Identify what are the current and emerging trends in
technology;
B. Understand how technology affects culture and society
through the different advancements in technology.
C. Asses the positive and negative effects of said
advancement.
Objectives:
Overview
 Technology is changing every aspect of our lives. The
benefits provided by new digital approaches are
having a huge impact on our societies. However, one
of the greatest business challenges is not about the
devices, software or solutions – it is about how we
manage the process of cultural change and its effect
to our society. In this module we will learn what are
the different technological advancements and future
trends in technology that could potentially change
and shaped the way we live our lives.
GE 10 Living in the IT Era – Module 1: Introduction to Information and Communications Technology
Lesson 1: Internet of things
 The Internet of Things can include anything with a
sensor that is assigned a unique identifier (UID). The
primary goal of the IoT is to create self-reporting
devices that can communicate with each other (and
users) in real time.
 Just about anything with network connectivity
belongs to the internet of things, from security
cameras, speakers, smart watches/ wearable
technology, connected cars,and smart home.
How IoT works
 An IoT ecosystem consists of web-enabled smart devices that use embedded
systems, such as processors, sensors and communication hardware, to
collect, send and act on data they acquire from their environments. IoT
devices share the sensor data they collect by connecting to an IoT gateway
or other edge device where data is either sent to the cloud to be analyzed or
analyzed locally. Sometimes, these devices communicate with other related
devices and act on the information they get from one another. The devices
do most of the work without human intervention, although people can
interact with the devices -- for instance, to set them up, give them
instructions or access the data.
 The connectivity, networking and communication protocols used with
these web-enabled devices largely depend on the specific IoT applications
deployed. IoT can also make use of artificial intelligence (AI) and machine
learning to aid in making data collecting processes easier and more dynamic
Why IoT is important?
Why IoT is important
The internet of things helps people live and
work smarter, as well as gain complete control
over their lives. In addition to offering smart
devices to automate homes, IoT is essential to
business. IoT provides businesses with a real-
time look into how their systems really work,
delivering insights into everything from the
performance of machines to supply chain and
logistics operations.
As such, IoT is one of the most
important technologies of
everyday life, and it will
continue to pick up steam as
more businesses realize the
potential of connected devices
to keep them competitive.
IoT enables companies to
automate processes and reduce
labor costs. It also cuts down on
waste and improves service
delivery, making it less expensive
to manufacture and deliver goods,
as well as offering transparency
into customer transactions.
Iot Through the years
1990 John Romkey creates the first Iot device: a toaster that he controls with his computer.
1999 Kevin Ashton coins the term “internet of things” to describe the eyes and ears of a computer.
2000 LG introduce its first connected refrigerator with a $20,000 pricetag.
2008 the world’s first Iot conference is held in Zurich,Switzerland.
2010 Tony Fadell founds Nest, maker of the smart thermostant.
2013 Oxford Dictionary adds the term “ Internet of things.”
2014 Amazon introduces the Echo speaker, along with the Axeza voice assistant - a new way to control the
smart home.
2016 The Mirai botnet infects over 600,000 Iot device with malware.
2020 The number of internet - connected devices, by some estimates,exceeds 20 billion.
T HE I N T E R N E T O F T HI N G S O FF E R S S E VE R A L B E N E F IT S T O
OR GA N IZ A T I ON S . S OM E B E N E F I T S A R E I N D U S T R Y-
S PE C I F I C , A N D S OM E A R E A PP L I C A B L E A C R O S S M U L T IP L E
IN D U S T R I E S . S O M E O F T HE C O M M O N B E N E F IT S OF IO T
E N A B L E B U S I N E S S E S T O: • M O N I T O R T HE I R O VE R A L L
B U S IN E S S PR O C E S S E S ; • IM P R O VE T HE C U S T O M E R
E X PE R I E N C E ; • S A VE T I M E A N D M O N E Y ; • E N HA N C E
E M P L O YE E PR O D U C T IVI T Y ; • IN T E GR A T E A N D A D A P T
B U S I N E S S M O D E L S ; • M A K E B E T T E R B U S IN E S S
D E C I S I O N S ; A N D • G E N E R A T E M OR E R E VE N U E .
IoT benefits to organizations
- E N H A N C E D M O N I T O R I N G : B U S I N E S S E S C A N M O R E E F F E C T I V E L Y M O N I T O R T H E I R
O V E R A L L B U S I N E S S P R O C E S S E S T H R O U G H C O N N E C T E D D E V I C E S .
- I M P R O V E D C U S T O M E R E X P E R I E N C E : I O T C A N E N H A N C E T H E C U S T O M E R E X P E R I E N C E B Y
P R O V I D I N G M O R E P E R S O N A L I Z E D A N D E F F I C I E N T S E R V I C E
- T I M E A N D C O S T S A V I N G S : A U T O M A T E D P R O C E S S E S A N D E F F I C I E N T R E S O U R C E
M A N A G E M E N T E N A B L E D B Y I O T C A N H E L P S A V E T I M E A N D M O N E Y
- I N C R E A S E D E M P L O Y E E P R O D U C T I V I T Y : I N T E R N E T - C O N N E C T E D T O O L S A N D
T E C H N O L O G I E S C A N H E L P E M P L O Y E E S B E C O M E M O R E P R O D U C T I V E I N T H E I R T A S K S
.
- I N T E G R A T I O N A N D A D A P T A T I O N O F B U S I N E S S M O D E L S : I O T A L L O W S B U S I N E S S E S T O
I N T E G R A T E A N D A D A P T T H E I R B U S I N E S S M O D E L S T O B E M O R E F L E X I B L E A N D
R E S P O N S I V E T O M A R K E T C H A N G E S .
- B E T T E R B U S I N E S S D E C I S I O N S : D A T A C O L L E C T E D F R O M I O T D E V I C E S P R O V I D E S B E T T E R
I N S I G H T S F O R M A K I N G I N F O R M E D B U S I N E S S D E C I S I O N S .
- I N C R E A S E D R E V E N U E : E N H A N C I N G P R O C E S S E S A N D C U S T O M E R E X P E R I E N C E S T H R O U G H
I O T C A N L E A D T O I N C R E A S E D R E V E N U E .
HERE ARE SOME COMMON
BENEFITS OF Iot FOR
BUSINESSES
Pros and cons of loT
Advantages of loT
•ability to access information from anywhere at any
time on any device;
• improved communication between connected
electronic devices;
• transferring data packets over a connected network
saving time and money; and
•automating tasks helping to improve the quality of a
business's services and reducing the need for human
intervention..
Disadvantages of loT
• As the number of connected devices increases and more
information is shared between devices, the potential that a
hacker could steal confidential information also increases
.. Enterprises may eventually have to deal with massive numbers
-- maybe even millions -- of lot devices, and collecting and
managing the data from all those devices will be challenging.
• If there's a bug in the system, it's likely that every connected
device will become corrupted.
• Since there's no international standard of compatibility for loT,
it's difficult for devices from different manufacturers to
communicate with each other.
Consumer and enterprise HoT applications
 There are numerous real-world applications of the
internet of things, ranging from coper lo enterprise
lot to manufacturing and industrial IoT (1
automotive, tel Talons span numerous verticals,
including and
 Wearable devices with sensors and software can
collect and analyze user data, sending messages to
other technologies about the users with the aim of
making users' lives easier and more comfortable.
Wearable devices are also used for public safety for
example, improving first responders' response times
during emergencies by providing optimized routes to
A R E L I GHT S T H A T Y O U C A N
CO N T R O L U S I N G YO U R P HO N E .
YO U C A N T U R N T H E M ON OR O F F
E VE N W HE N Y OU ' R E N O T A T
HO M E B E C A U S E YO U U S E Y OU R
S M A R T P HO N E T O C ON T R O L
T HE M .
SMART LIGHT
T HI S I S A D O O R B E L L W I T H A
C A M E R A T HA T A L L O W S Y O U T O
S E E A N D S P E A K WI T H Y O U R
VIS IT O R S U S IN G YO U R P HON E ,
E VE N I F Y OU ' R E N O T A T HO M E
SMART DOORBELL
T HE E N T E R PR IS E L OT A P PL I C A T IO N I S A
T E C HN O L O GY U S E D I N B U S I N E S S E S T O
M A K E T HE I R O PE R A T IO N S O R W O R K M O R E
OR GA N IZ E D L A N D E F F I C IE N T .
ENTERPRISE IOT
APPLICATION
T H E S E A R E S E N S O R S C O N N E C T E D T O T H E
I N T E R N E T , A L L O W I N G R E A L - T I M E
M O N I T O R I N G O F L O C A T I O N S F R O M
A N Y W H E R E U S I N G A S M A R T P H O N E O R
C O M P U T E R . T H E S E C U R I T Y C A M E R A
S Y S T E M I S O N E W H E R E A L E R T S A R E
T R I G G E R E D F O R S U S P I C I O U S A C T I V I T I E S
O R S E C U R I T Y B R E A C H E S , S U C H A S
U N A U T H O R I Z E D E N T R Y , A N D C A N A L S O
S E N D N O T I F I C A T I O N S T O S E C U R I T Y
P E R S O N N E L .
SECURITY CAMERA
WHAT IS THE
DIFFERENCE
BETWEEN
CONSUMER AND
ENTERPRISE LOT
APPLICATIONS?
THE ENTERPRISE LOT APPLICATION
IS A TECHNOLOGY USED IN
BUSINESSES TO MAKE THEIR
OPERATIONS OR WORK MORE
ORGANIZED AND EFFICIENT.
AUTOMOTIVE
IOT, IN AUTOMOTIVE, IT IS
POSSIBLE TO PREDICT THE NEED
FOR MAINTENANCE BEFORE A
BREAKDOWN OCCURS, HELPING
TO PREVENT SUDDEN ISSUES.
How does loT (Internet of Things)
help various industries such as
automotive, telecom, and energy?
IN TELECOM LOT DEVICES COLLECT DATA
ON NETWORK PERFORMANCE, SUCH AS
CONNECTION SPEED AND SIGNAL
QUALITY, IF THERE'S AN AREA THAT
FREQUENTLY EXPERIENCES SLOW
CONNECTIONS, THIS ISSUE WILL BE
VISIBLE IN THE DATA FROM THE LOT
DEVICES. THIS HELPS TELECOM
COMPANIES TO ADDRESS AND IMPROVE
THEIR NETWORK FOR BETTER SERVICE
TELECOM
S M A R T H OM E -
T E C HN OL OG Y, W HI C H
S I M PL I F I E S A N D E N H A N C E S
L I VIN G B Y U S I N G T E C HN O L O GY
FO R M O R E C O N VE N IE N T ,
S E C U R E , A N D E F F I CI E N T
M A N A G E M E N T O F YO U R HO M E .
YO U C A N C ON T R O L L I GHT I N G ,
T E M P E R A T U R E , A N D A PP L I A N C E S
U S I N G YO U R P HO N E O R V OI C E
C OM M A N D S , N O M A T T E R W H E R E
YO U A R E .
EXAMPLE:
ENERGY
IN THE ENERGY SECTOR, LOT
DEVICES CAN MONITOR
ELECTRICITY USAGE AND GRID
CONDITIONS.
How does he internet of help various
industries such as energy?
S M A R T M E T E R S -
IN H OM E S M E A S U R E H OW M U C H
E L E C T R I C I T Y I S U S E D , W HI CH
HE L P S YO U S A VE A N D R E D U C E
C OS T S . E N E R GY C OM P A N I E S C A N
A L S O U S E L O T T O B E T T E R
M A N A G E A N D O PT I M I Z E T HE
D I S T R I B U T I O N OF E N E R GY.
EXAMPLE'
W E A R A B L E D E VIC E S WI T H S E N S O R S A N D
S O FT W A R E C A N C OL L E C T A N D A N A L YZ E U S E R
D A T A , S E N D I N G M E S S A G E S T O O T HE R
T E C HN O L O GI E S A B O U T T H E U S E R S W I T H T HE A I M
OF M A K I N G U S E R S ' L IV E S E A S I E R A N D M O R E
CO M F O R T A B L E
Consumer and enterprise loT
applications
S M A R T W A T C H -
I T I S P R O V I D E S C O N V E N I E N C E B Y
A L L O W I N G Q U I C K A C C E S S T O
N O T I F I C A T I O N S , H E A L T H T R A C K I N G ,
A N D O T H E R A P P S R I G H T O N Y O U R
W R I S T . I T A L S O S E R V E S A S A N
E X T E N S I O N O F Y O U R C E L L P H O N E ,
L E T T I N G Y O U M A K E C A L L S , S E N D
T E X T S , A N D C H E C K H E A L T H M E T R I C S
W I T H O U T H A V I N G T O T A K E O U T
Y O U R P H O N E .
EXAMPLE:
W E A R A B L E D E VI C E S W IT H S E N S O R S A N D
S O FT W A R E CA N C O L L E C T A N D A N A L YZ E U S E R
D A T A , S E N D IN G M E S S A GE S T O OT HE R
T E C HN O L O GI E S A B OU T T H E U S E R S W I T H T HE
A I M OF M A K I N G U S E R S ' L IV E S E A S I E R A N D M O R E
C O MF O R T A B L E
Consumer and enterprise loT
applications
W E A R A B L E D E V I C E S -
A R E A L S O U S E D F O R P U B L I C S A F E T Y ,
D U R I N G E M E R G E N C I E S , T H E S E D E V I C E S
H E L P . F I R S T R E S P O N D E R S L I K E
F I R E F I G H T E R S O R P O L I C E
O F F I C E R S B Y P R O V I D I N G T H E F A S T E S T
R O U T E T O T H E I N C I D E N T L O C A T I O N .
T H E Y A R E U S E D I N H A Z A R D O U S A R E A S
L I K E C O N S T R U C T I O N S I T E S O R F I R E S ,
W H E R E W E A R A B L E D E V I C E S C A N
M O N I T O R W O R K E R S V I T A L S I G N S , S U C H
A S H E A R T R A T E O R T E M P E R A T U R E , T O
D E T E R M I N E I F T H E Y A R E I N D A N G E R .
T H I S W A Y , T H E Y C A N C O M P L E T E T H E I R
W O R K M O R E Q U I C K L Y A N D S A F E L Y .
EXAMPLE:
Iot security and privacy issues
 internet of things brings all the benefits of the internet to items like lightbulbs
and thermostats, but it brings all the problems of the internet, too. Now that
people have their speakers, television sets, refrigerators, alarm clocks,
toothbrushes, light bulbs, doorbells, baby monitors, and security cameras
connected to the Wi-Fi, nearly every device in the house can be compromised,
or rendered useless. Consider the whims of internet connectivity:
 The threat to internet-connected devices comes not just because they’re
connected to the internet, but because device manufacturers have not always
designed their products with security as a priority. In 2016, malware called
Mirai exploited these kinds of vulnerabilities in over 600,000 IoT devices to
create a massive distributed denial of service (DDoS) attack. The following year,
an attack called Krack infected nearly every internet-connected device
connected to Wi-Fi.
Here are some examples of security and
privacy issues related to Iot device;
 1. Smart Camera Hacking
- Example:There have been instances where hackers
gain access to smart security cameras and use them to
spy inside the home. If the camera is not secure,
hackers can watch live footage or record it without
permission.
Here are some examples of security and privacy issues
related to Iot device;
 1. Smart Camera Hacking
- Example:There have
been instances where
hackers gain access to
smart security cameras and
use them to spy inside the
home. If the camera is not
secure, hackers can watch
live footage or record it
without permission.
 2. Vulnerability of Smart
Door Locks
- Example: Smart door
locks connected to Wi-Fi
can be hacked. When this
happens, a hacker can
unlock the door without a
physical key, putting the
residents at risk of theft or
unauthorized entry.
 3. DDoS Attacks Using IoT
Devices
- Example: In 2016, the Mirai
malware was used to control
hundreds of thousands of IoT
devices, such as security
cameras and routers. These
devices were used to carry out
a large-scale distributed
denial of service (DDoS)
attack, which caused major
websites like Twitter and
Netflix to go offline.
 4. Data Collection in Smart
Assistants
- Example:Voice-activated
smart assistants like Amazon
Alexa or Google Assistant
record users' voices and
collect information. If privacy
settings are not configured
correctly, companies or third
parties may use this
information for advertising or
other unexpected purposes.
 5. Privacy Breach in Baby
Monitor
- Example: Some smart
baby monitors** have been
reported to be hacked,
allowing hackers to access
the camera and watch or
even communicate with the
baby. This is a major risk to
the family's privacy.
THE FUTURE OF THE INTERNET OF THINGS
 One day, the internet of things will become the internet of everything. The
objects in our world might sense and react to us individually all the time, so
that a smart thermostat automatically adjusts based on your body temperature
or the house automatically locks itself when you get into bed. Your clothes
might come with connected sensors, too, so that the things around you can
respond to your movements in real time. That’s already starting to happen: In
2017, Google announced Project Jacquard, an effort to create the connected
wardrobe of the future.
 This vision extends far beyond your clothes, a Autonomous vehicles will
connect to the internet and drive along roads studded with sensors, and
governments will manage the demands on their energy grids by tracking
household energy consumption through the internet of things. The growth of
the internet of things could also lead to new kinds of cyber warfare; imagine a
bad actor disabling every smart thermostat in the dead of winter, or hacking
into internet-connected pacemakers and insulin pumps.
Thank you!

2425-GE-10-M1-G6-IT-CULTURE-AND-THE-SOCIETY-1-1_085926.pptx

  • 1.
    MODULE 6: IT,SOCIETY AND CULTURE BAAO COMMUNITY COLLEGE San Juan, Baao, Camarines Sur COLLEGE OF EDUCATION GE 10 – LIVING IN THE IT ERA M A R IC O N B . R A N C E S , M A E d I n s t r u c t o r, B a a o C o m m u n i t y C o l l e g e LAYCA JOY A. LOMA STUDENT
  • 2.
     When theweight of living hangs heavy on your spine you must remind yourself: Other people feel this, too.
  • 3.
    GE 10 Livingin the IT Era – Module 1: Introduction to Information and Communications Technology At the end of the discussion, students are expected to: A. Identify what are the current and emerging trends in technology; B. Understand how technology affects culture and society through the different advancements in technology. C. Asses the positive and negative effects of said advancement. Objectives:
  • 4.
    Overview  Technology ischanging every aspect of our lives. The benefits provided by new digital approaches are having a huge impact on our societies. However, one of the greatest business challenges is not about the devices, software or solutions – it is about how we manage the process of cultural change and its effect to our society. In this module we will learn what are the different technological advancements and future trends in technology that could potentially change and shaped the way we live our lives. GE 10 Living in the IT Era – Module 1: Introduction to Information and Communications Technology
  • 5.
    Lesson 1: Internetof things  The Internet of Things can include anything with a sensor that is assigned a unique identifier (UID). The primary goal of the IoT is to create self-reporting devices that can communicate with each other (and users) in real time.  Just about anything with network connectivity belongs to the internet of things, from security cameras, speakers, smart watches/ wearable technology, connected cars,and smart home.
  • 6.
    How IoT works An IoT ecosystem consists of web-enabled smart devices that use embedded systems, such as processors, sensors and communication hardware, to collect, send and act on data they acquire from their environments. IoT devices share the sensor data they collect by connecting to an IoT gateway or other edge device where data is either sent to the cloud to be analyzed or analyzed locally. Sometimes, these devices communicate with other related devices and act on the information they get from one another. The devices do most of the work without human intervention, although people can interact with the devices -- for instance, to set them up, give them instructions or access the data.  The connectivity, networking and communication protocols used with these web-enabled devices largely depend on the specific IoT applications deployed. IoT can also make use of artificial intelligence (AI) and machine learning to aid in making data collecting processes easier and more dynamic
  • 7.
    Why IoT isimportant?
  • 8.
    Why IoT isimportant The internet of things helps people live and work smarter, as well as gain complete control over their lives. In addition to offering smart devices to automate homes, IoT is essential to business. IoT provides businesses with a real- time look into how their systems really work, delivering insights into everything from the performance of machines to supply chain and logistics operations. As such, IoT is one of the most important technologies of everyday life, and it will continue to pick up steam as more businesses realize the potential of connected devices to keep them competitive. IoT enables companies to automate processes and reduce labor costs. It also cuts down on waste and improves service delivery, making it less expensive to manufacture and deliver goods, as well as offering transparency into customer transactions.
  • 9.
    Iot Through theyears 1990 John Romkey creates the first Iot device: a toaster that he controls with his computer. 1999 Kevin Ashton coins the term “internet of things” to describe the eyes and ears of a computer. 2000 LG introduce its first connected refrigerator with a $20,000 pricetag. 2008 the world’s first Iot conference is held in Zurich,Switzerland. 2010 Tony Fadell founds Nest, maker of the smart thermostant. 2013 Oxford Dictionary adds the term “ Internet of things.” 2014 Amazon introduces the Echo speaker, along with the Axeza voice assistant - a new way to control the smart home. 2016 The Mirai botnet infects over 600,000 Iot device with malware. 2020 The number of internet - connected devices, by some estimates,exceeds 20 billion.
  • 10.
    T HE IN T E R N E T O F T HI N G S O FF E R S S E VE R A L B E N E F IT S T O OR GA N IZ A T I ON S . S OM E B E N E F I T S A R E I N D U S T R Y- S PE C I F I C , A N D S OM E A R E A PP L I C A B L E A C R O S S M U L T IP L E IN D U S T R I E S . S O M E O F T HE C O M M O N B E N E F IT S OF IO T E N A B L E B U S I N E S S E S T O: • M O N I T O R T HE I R O VE R A L L B U S IN E S S PR O C E S S E S ; • IM P R O VE T HE C U S T O M E R E X PE R I E N C E ; • S A VE T I M E A N D M O N E Y ; • E N HA N C E E M P L O YE E PR O D U C T IVI T Y ; • IN T E GR A T E A N D A D A P T B U S I N E S S M O D E L S ; • M A K E B E T T E R B U S IN E S S D E C I S I O N S ; A N D • G E N E R A T E M OR E R E VE N U E . IoT benefits to organizations
  • 11.
    - E NH A N C E D M O N I T O R I N G : B U S I N E S S E S C A N M O R E E F F E C T I V E L Y M O N I T O R T H E I R O V E R A L L B U S I N E S S P R O C E S S E S T H R O U G H C O N N E C T E D D E V I C E S . - I M P R O V E D C U S T O M E R E X P E R I E N C E : I O T C A N E N H A N C E T H E C U S T O M E R E X P E R I E N C E B Y P R O V I D I N G M O R E P E R S O N A L I Z E D A N D E F F I C I E N T S E R V I C E - T I M E A N D C O S T S A V I N G S : A U T O M A T E D P R O C E S S E S A N D E F F I C I E N T R E S O U R C E M A N A G E M E N T E N A B L E D B Y I O T C A N H E L P S A V E T I M E A N D M O N E Y - I N C R E A S E D E M P L O Y E E P R O D U C T I V I T Y : I N T E R N E T - C O N N E C T E D T O O L S A N D T E C H N O L O G I E S C A N H E L P E M P L O Y E E S B E C O M E M O R E P R O D U C T I V E I N T H E I R T A S K S . - I N T E G R A T I O N A N D A D A P T A T I O N O F B U S I N E S S M O D E L S : I O T A L L O W S B U S I N E S S E S T O I N T E G R A T E A N D A D A P T T H E I R B U S I N E S S M O D E L S T O B E M O R E F L E X I B L E A N D R E S P O N S I V E T O M A R K E T C H A N G E S . - B E T T E R B U S I N E S S D E C I S I O N S : D A T A C O L L E C T E D F R O M I O T D E V I C E S P R O V I D E S B E T T E R I N S I G H T S F O R M A K I N G I N F O R M E D B U S I N E S S D E C I S I O N S . - I N C R E A S E D R E V E N U E : E N H A N C I N G P R O C E S S E S A N D C U S T O M E R E X P E R I E N C E S T H R O U G H I O T C A N L E A D T O I N C R E A S E D R E V E N U E . HERE ARE SOME COMMON BENEFITS OF Iot FOR BUSINESSES
  • 13.
    Pros and consof loT Advantages of loT •ability to access information from anywhere at any time on any device; • improved communication between connected electronic devices; • transferring data packets over a connected network saving time and money; and •automating tasks helping to improve the quality of a business's services and reducing the need for human intervention..
  • 14.
    Disadvantages of loT •As the number of connected devices increases and more information is shared between devices, the potential that a hacker could steal confidential information also increases .. Enterprises may eventually have to deal with massive numbers -- maybe even millions -- of lot devices, and collecting and managing the data from all those devices will be challenging. • If there's a bug in the system, it's likely that every connected device will become corrupted. • Since there's no international standard of compatibility for loT, it's difficult for devices from different manufacturers to communicate with each other.
  • 16.
    Consumer and enterpriseHoT applications  There are numerous real-world applications of the internet of things, ranging from coper lo enterprise lot to manufacturing and industrial IoT (1 automotive, tel Talons span numerous verticals, including and  Wearable devices with sensors and software can collect and analyze user data, sending messages to other technologies about the users with the aim of making users' lives easier and more comfortable. Wearable devices are also used for public safety for example, improving first responders' response times during emergencies by providing optimized routes to
  • 17.
    A R EL I GHT S T H A T Y O U C A N CO N T R O L U S I N G YO U R P HO N E . YO U C A N T U R N T H E M ON OR O F F E VE N W HE N Y OU ' R E N O T A T HO M E B E C A U S E YO U U S E Y OU R S M A R T P HO N E T O C ON T R O L T HE M . SMART LIGHT
  • 18.
    T HI SI S A D O O R B E L L W I T H A C A M E R A T HA T A L L O W S Y O U T O S E E A N D S P E A K WI T H Y O U R VIS IT O R S U S IN G YO U R P HON E , E VE N I F Y OU ' R E N O T A T HO M E SMART DOORBELL
  • 19.
    T HE EN T E R PR IS E L OT A P PL I C A T IO N I S A T E C HN O L O GY U S E D I N B U S I N E S S E S T O M A K E T HE I R O PE R A T IO N S O R W O R K M O R E OR GA N IZ E D L A N D E F F I C IE N T . ENTERPRISE IOT APPLICATION
  • 20.
    T H ES E A R E S E N S O R S C O N N E C T E D T O T H E I N T E R N E T , A L L O W I N G R E A L - T I M E M O N I T O R I N G O F L O C A T I O N S F R O M A N Y W H E R E U S I N G A S M A R T P H O N E O R C O M P U T E R . T H E S E C U R I T Y C A M E R A S Y S T E M I S O N E W H E R E A L E R T S A R E T R I G G E R E D F O R S U S P I C I O U S A C T I V I T I E S O R S E C U R I T Y B R E A C H E S , S U C H A S U N A U T H O R I Z E D E N T R Y , A N D C A N A L S O S E N D N O T I F I C A T I O N S T O S E C U R I T Y P E R S O N N E L . SECURITY CAMERA
  • 21.
    WHAT IS THE DIFFERENCE BETWEEN CONSUMERAND ENTERPRISE LOT APPLICATIONS?
  • 22.
    THE ENTERPRISE LOTAPPLICATION IS A TECHNOLOGY USED IN BUSINESSES TO MAKE THEIR OPERATIONS OR WORK MORE ORGANIZED AND EFFICIENT.
  • 23.
    AUTOMOTIVE IOT, IN AUTOMOTIVE,IT IS POSSIBLE TO PREDICT THE NEED FOR MAINTENANCE BEFORE A BREAKDOWN OCCURS, HELPING TO PREVENT SUDDEN ISSUES. How does loT (Internet of Things) help various industries such as automotive, telecom, and energy?
  • 24.
    IN TELECOM LOTDEVICES COLLECT DATA ON NETWORK PERFORMANCE, SUCH AS CONNECTION SPEED AND SIGNAL QUALITY, IF THERE'S AN AREA THAT FREQUENTLY EXPERIENCES SLOW CONNECTIONS, THIS ISSUE WILL BE VISIBLE IN THE DATA FROM THE LOT DEVICES. THIS HELPS TELECOM COMPANIES TO ADDRESS AND IMPROVE THEIR NETWORK FOR BETTER SERVICE TELECOM
  • 25.
    S M AR T H OM E - T E C HN OL OG Y, W HI C H S I M PL I F I E S A N D E N H A N C E S L I VIN G B Y U S I N G T E C HN O L O GY FO R M O R E C O N VE N IE N T , S E C U R E , A N D E F F I CI E N T M A N A G E M E N T O F YO U R HO M E . YO U C A N C ON T R O L L I GHT I N G , T E M P E R A T U R E , A N D A PP L I A N C E S U S I N G YO U R P HO N E O R V OI C E C OM M A N D S , N O M A T T E R W H E R E YO U A R E . EXAMPLE:
  • 26.
    ENERGY IN THE ENERGYSECTOR, LOT DEVICES CAN MONITOR ELECTRICITY USAGE AND GRID CONDITIONS. How does he internet of help various industries such as energy?
  • 27.
    S M AR T M E T E R S - IN H OM E S M E A S U R E H OW M U C H E L E C T R I C I T Y I S U S E D , W HI CH HE L P S YO U S A VE A N D R E D U C E C OS T S . E N E R GY C OM P A N I E S C A N A L S O U S E L O T T O B E T T E R M A N A G E A N D O PT I M I Z E T HE D I S T R I B U T I O N OF E N E R GY. EXAMPLE'
  • 28.
    W E AR A B L E D E VIC E S WI T H S E N S O R S A N D S O FT W A R E C A N C OL L E C T A N D A N A L YZ E U S E R D A T A , S E N D I N G M E S S A G E S T O O T HE R T E C HN O L O GI E S A B O U T T H E U S E R S W I T H T HE A I M OF M A K I N G U S E R S ' L IV E S E A S I E R A N D M O R E CO M F O R T A B L E Consumer and enterprise loT applications
  • 29.
    S M AR T W A T C H - I T I S P R O V I D E S C O N V E N I E N C E B Y A L L O W I N G Q U I C K A C C E S S T O N O T I F I C A T I O N S , H E A L T H T R A C K I N G , A N D O T H E R A P P S R I G H T O N Y O U R W R I S T . I T A L S O S E R V E S A S A N E X T E N S I O N O F Y O U R C E L L P H O N E , L E T T I N G Y O U M A K E C A L L S , S E N D T E X T S , A N D C H E C K H E A L T H M E T R I C S W I T H O U T H A V I N G T O T A K E O U T Y O U R P H O N E . EXAMPLE:
  • 30.
    W E AR A B L E D E VI C E S W IT H S E N S O R S A N D S O FT W A R E CA N C O L L E C T A N D A N A L YZ E U S E R D A T A , S E N D IN G M E S S A GE S T O OT HE R T E C HN O L O GI E S A B OU T T H E U S E R S W I T H T HE A I M OF M A K I N G U S E R S ' L IV E S E A S I E R A N D M O R E C O MF O R T A B L E Consumer and enterprise loT applications
  • 31.
    W E AR A B L E D E V I C E S - A R E A L S O U S E D F O R P U B L I C S A F E T Y , D U R I N G E M E R G E N C I E S , T H E S E D E V I C E S H E L P . F I R S T R E S P O N D E R S L I K E F I R E F I G H T E R S O R P O L I C E O F F I C E R S B Y P R O V I D I N G T H E F A S T E S T R O U T E T O T H E I N C I D E N T L O C A T I O N . T H E Y A R E U S E D I N H A Z A R D O U S A R E A S L I K E C O N S T R U C T I O N S I T E S O R F I R E S , W H E R E W E A R A B L E D E V I C E S C A N M O N I T O R W O R K E R S V I T A L S I G N S , S U C H A S H E A R T R A T E O R T E M P E R A T U R E , T O D E T E R M I N E I F T H E Y A R E I N D A N G E R . T H I S W A Y , T H E Y C A N C O M P L E T E T H E I R W O R K M O R E Q U I C K L Y A N D S A F E L Y . EXAMPLE:
  • 32.
    Iot security andprivacy issues  internet of things brings all the benefits of the internet to items like lightbulbs and thermostats, but it brings all the problems of the internet, too. Now that people have their speakers, television sets, refrigerators, alarm clocks, toothbrushes, light bulbs, doorbells, baby monitors, and security cameras connected to the Wi-Fi, nearly every device in the house can be compromised, or rendered useless. Consider the whims of internet connectivity:  The threat to internet-connected devices comes not just because they’re connected to the internet, but because device manufacturers have not always designed their products with security as a priority. In 2016, malware called Mirai exploited these kinds of vulnerabilities in over 600,000 IoT devices to create a massive distributed denial of service (DDoS) attack. The following year, an attack called Krack infected nearly every internet-connected device connected to Wi-Fi.
  • 33.
    Here are someexamples of security and privacy issues related to Iot device;  1. Smart Camera Hacking - Example:There have been instances where hackers gain access to smart security cameras and use them to spy inside the home. If the camera is not secure, hackers can watch live footage or record it without permission.
  • 34.
    Here are someexamples of security and privacy issues related to Iot device;  1. Smart Camera Hacking - Example:There have been instances where hackers gain access to smart security cameras and use them to spy inside the home. If the camera is not secure, hackers can watch live footage or record it without permission.
  • 35.
     2. Vulnerabilityof Smart Door Locks - Example: Smart door locks connected to Wi-Fi can be hacked. When this happens, a hacker can unlock the door without a physical key, putting the residents at risk of theft or unauthorized entry.
  • 36.
     3. DDoSAttacks Using IoT Devices - Example: In 2016, the Mirai malware was used to control hundreds of thousands of IoT devices, such as security cameras and routers. These devices were used to carry out a large-scale distributed denial of service (DDoS) attack, which caused major websites like Twitter and Netflix to go offline.
  • 37.
     4. DataCollection in Smart Assistants - Example:Voice-activated smart assistants like Amazon Alexa or Google Assistant record users' voices and collect information. If privacy settings are not configured correctly, companies or third parties may use this information for advertising or other unexpected purposes.
  • 38.
     5. PrivacyBreach in Baby Monitor - Example: Some smart baby monitors** have been reported to be hacked, allowing hackers to access the camera and watch or even communicate with the baby. This is a major risk to the family's privacy.
  • 39.
    THE FUTURE OFTHE INTERNET OF THINGS  One day, the internet of things will become the internet of everything. The objects in our world might sense and react to us individually all the time, so that a smart thermostat automatically adjusts based on your body temperature or the house automatically locks itself when you get into bed. Your clothes might come with connected sensors, too, so that the things around you can respond to your movements in real time. That’s already starting to happen: In 2017, Google announced Project Jacquard, an effort to create the connected wardrobe of the future.  This vision extends far beyond your clothes, a Autonomous vehicles will connect to the internet and drive along roads studded with sensors, and governments will manage the demands on their energy grids by tracking household energy consumption through the internet of things. The growth of the internet of things could also lead to new kinds of cyber warfare; imagine a bad actor disabling every smart thermostat in the dead of winter, or hacking into internet-connected pacemakers and insulin pumps.
  • 40.