SlideShare a Scribd company logo
Internet of Things and the Implications on Business
Information Technology Architecture and Security
Denise E. Ferniza
denise.ferniza@gmail.com
Agenda
• Defining the Internet of Things (IoT)
• Integration of IoT
• Security Risks of IoT
• Benefits of Cloud Computing in Business
• Risks of Cloud Computing in Regards to IoT
• Significance of Research
• Conclusion
• Proposed Further Study
• References
2
Defining the Internet of Things (IOT)
• IoT refers to an object that is connected to the Internet
and has the following unique properties (Yashaswini,
2017)
– Assigned a unique IP address
– Can collect and transfer data
– Does not require human to machine interaction
3
Defining the Internet of Things (IOT)
• IoT consists of four layers, each layer has different
applications and assigned roles (Pai, 2018)
• IoT consists of four layers:
– Perception layer
– Network layer
– Support later
– Application layer (Yashaswini, 2017)
4
Defining the Internet of Things (IOT)
• IoT has been around since before 2000, but did not gain
mainstream popularity until around 2010 (Gilchrist,
2017)
• There were approximately 2.6 million IoT devices as of
2016, which was an increase of 30% from 2015
(Alrawais, 2017)
• 5.5 million devices are projected to join IoT a day
(Gilchrist, 2017)
5
Integration of IoT
• IoT involves wireless sensor networks,
cloud computing, analytical data,
interactive technologies, and smart
devices (Tweneboah-Koduah, 2017;
Alrawais, 2017)
6
Integration of IoT
• IoT is being used across a variety of areas
including
– Smart homes, cities
– Smart energy
– Transport
– Healthcare
– Retail
– Manufacturing (Tweneboah-Koduah,
2017; Yashaswini, 2017)
7
Security Risks of IoT
• Each layer of IoT poses its own risk (Yashaswini, 2017)
IoT Layer Application Support Network Perception
Security Weakness
(countermeasure)
Privacy and
authentication(end-to-end
encryption, privacy
protection)
ID of Malware (secure
communication, cloud
computing, antivirus)
CIA (Certification, hop-by
hop, data encryption)
Authentication
(certification and
access control)
8
Security Risks of IoT
• Most consumers value convenience over security (Gilchrist,
2017)
• Getting users to understand threats of IoT devices (Schneier,
2013)
• Most products are plug and play, and left in default settings
allowing easy access by unauthorized users (Moos, 2017)
– www.insecam.org demonstrates the seriousness of leaving default
settings
– There are thousands of security cameras that have default settings
allowing anyone to view the image 9
Security Risks of IoT
• Lack of regulation of IoT security protocols (Schneier, 2013)
• Computational abilities of IoT devices is low, making it harder to
apply meaningful security (Yashaswini, 2017)
• IoT are particularly vulnerable to wireless scrambling,
eavesdropping, man-in-the-middle attacks, message modification,
and injection attacks (Tweneboah-Koduah, 2017)
• Other Device Manufacturers (ODM)
– Includes software, and firmware
– ODM often uses embedded Linux that has outdated and flawed code
– Software is recycled, providing easy access for hackers (Gilchrist, 2017)
10
Security Risks of IoT
• Malicious attackers can use IoT devices to conduct DDoS
attacks (Cho, 2018)
– The infamous Mirai Botnet brought down most of the Internet on the
East Coast of United States by utilizing the processing power of
unsecured IoT devices
11
Benefits of Cloud Computing in Business
• Cloud Computing will likely be a key
solution to
– Data analytics
– Storage
– Information Diffusion
– IoT data receiver, storage, analytics,
and interpretation (Tweneboah-
Koduah, 2017)
12
Benefits of Cloud Computing in Business
• Cloud Computing is Internet based and
shares hardware, software, and
information (Li, 2011)
• Cloud Computing increases scope of
IT service and efficiency while
limiting operational costs and
encouraging collaboration
13
Benefits of Cloud Computing in Business
• Mircosoft Azure IoT Suite allows
businesses to quickly develop and
integrate IoT applications via cloud
computing (Chatham, 2015)
• Collaborations across various other IT
companies such as Texas Instruments are
making strides for easier, and safer cloud
computing and IoT application (Alrawais,
2017)
14
Risks of Cloud Computing in Regards to IoT
• Cloud computing is growing stagnant in businesses due to the
following security concerns: (Carter, 2015)
– Malicious code is increasingly being hidden in SSL/TLS
and is no longer a safe option for cloud computing
– Eavesdropping, hacks into traffic over networks
– Rogue Firmware is a major threat to IoT and cloud
computing
– Backdoors, many IoT devices are susceptible to backdoor
attacks which in turn can allow hackers to gain access to
the cloud and sensitive date
15
Risks of Cloud Computing in Regards to IoT
• Manufacturers leave address paths open to troubleshoot,
but these address paths are often identified easily.
• IoT devices attacked rose 9050% from 2012 to 2016
(Cho, 2018)
• Privacy leakage in IoT due to the resource constraints of
most products (Alrawais, 2017)
• IoT – Cloud integration faces application service attacks
as well as privacy, trust, identity, and standardization
challenges (Tweneboah-Koduah, 2017)
16
Risks of Cloud Computing in Regards to IoT
• The use of Cloud computing and IoT needs to be
addressed holistically
• Before using Cloud Computing or IoT business/IT
alignment with the Information System goals need to
be considered (Li, 2011)
17
Significance of Research
18
• Utilizing Cloud Computing, within the
perimeters of an IS goal can help businesses
achieve efficiency and lower operating costs
(Li, 2011)
• Correct configurations of firewalls and
implementing multi-layered security are
instrumental in ensuring security on IoT
devices (Moos, 2017)
• Utilize root of trust systems such as
Microsoft Azure (NASDAQ, 2017)
• Increasing integration will increase security
by using pre-integrated software
Conclusion
• By 2020 there is estimated to be over 50 billion IoT
devices (Twenboah-Koduah, 2017)
• Business/IT alignment will play a major role in
sustainability, advantages, and growth of IoT and
Cloud Computing (Carter, 2015)
• IT must be committed to alignment and furthering
businesses processes
19
Conclusion
• Poorly designed, and outdate devices play a key factor in
the vulnerability of IoT
• System applications, firmware, hardware, and software
vulnerabilities are a direct result of the layered nature of
IoT (Twenboah-Koduah, 2017)
• Consumers, especially influential ones, need to insist on
minimum security standards (Schneier, 2013)
• Ensure that IoT complies with CIA trends and
incorporates security architecture from ISO Protocol (Pai,
2018) 20
Proposed Further Study
• Further study should be conducted into:
– ways to rate, and secure IoT devices in a
meaningful way to users (Gilchrist, 2017)
– Ensuring and certifying design and
implementation of IoT devices
(Tweneboah-Koduah, 2017)
– Ways to more efficiently install and
network IoT devices
– Ways in which to make the end user more
educated on the nature of security
vulnerabilities on IoT devices (Gilchrist,
2017) 21
References
Alrawais, A., Abdulrahman, A., Chunqiang, H., & Xiuzhen, C. (2017). Fog Computing for the Internet of Things: Security and Privacy Issues.
IEEE Internet Computing, 21(2), pp. 34-42. Retrieved from https://ieeexplore-ieee-org.ezproxy1.apus.edu/document/7867732
Carter, S. (2015). Impact of cloud-based computing on business-information technology alignment in small businesses (Order No. 3718681).
Available from ProQuest Central; ProQuest Dissertations & Theses Global. (1712374897). Retrieved from https://search-proquest-
com.ezproxy1.apus.edu/docview/1712374897?accountid=8289
Chatham. (2015) Products in the news: Texas instruments collaborates with Microsoft to speed internet of things (IoT) development Retrieved
from https://search-proquest-com.ezproxy1.apus.edu/docview/1718352769?accountid=8289
Cho, S. (2018). System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats. KSII
Transactions on Internet and Information Systems 12(2), pp. 906-920.
Li, Q. (2011). Towards the Business-Information Technology Alignment in Cloud Computing Environment: An Approach based on
collaboration points and agents. International Journal of Computer Integrated Manufacturing 24(11), pp. 1038-1057.
Moos, J. (2017). IoT, Malware and Security. ITNOW 59(1), pp. 28-29.
22
NASDAQ. (2017). Micron and Microsoft announce collaboration to help improve internet of things security. NASDAQ OMX's News Release
Distribution Channel Retrieved from https://search-proquest-com.ezproxy2.apus.edu/docview/1891004823?accountid=8289
Pai, V. (2018). Survey on IoT Security Issues and Security Protocols. International Journal of Computer Applications 180(42), pp. 16-21.
Retrieved from https://www.ijcaonline.org/archives/volume180/number42/29411-2018917108
Schneier, B. (2013). IoT Security: What’s Plan B? IEEE Security & Privacy 15(5), pp. 96-97 Retrieved from https://ieeexplore-ieee-
org.ezproxy1.apus.edu/document/8055681
Tweneboah-Koduah, S. (2017). Cyber Security Threats to IoT Applications and Service Domains. Wireless Personal Communications 95(1), pp.
169-185.
Yashaswini, J. (2017). A Review on IoT Security Issues and Countermeasures. Oriental Journal of Computer Science and Technology 10(2), pp.
454-459. Retrieved from http://www.computerscijournal.org/toc/?vol=10&no=2
23

More Related Content

What's hot

A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
DESMOND YUEN
 
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Tyrone Systems
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
IRJET Journal
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
Usman Anjum
 
Internet of things
Internet of thingsInternet of things
Internet of things
varungoyal98
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
sreelekha appakondappagari
 
Inventory of IoT slide sets
Inventory of IoT slide setsInventory of IoT slide sets
Inventory of IoT slide sets
Bob Marcus
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot device
Mayank Pandey
 
IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018
Mario Drobics
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
Somasundaram Jambunathan
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
Samir SEHIL
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
Ahmed Banafa
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
IJECEIAES
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical Systems
Bob Marcus
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
Radouane Mrabet
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
Ahmed Banafa
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
CableLabs
 
Chariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsChariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_Infosecgirls
Vandana Verma
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET Journal
 
A survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsA survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systems
Vishwesh Nagamalla
 

What's hot (20)

A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Inventory of IoT slide sets
Inventory of IoT slide setsInventory of IoT slide sets
Inventory of IoT slide sets
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot device
 
IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical Systems
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Chariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsChariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_Infosecgirls
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
A survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsA survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systems
 

Similar to IoT and the implications on business IT architecture and security

SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
Cognizant
 
Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...
RSIS International
 
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
RSIS International
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptx
SyedSaqlain32
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
IJNSA Journal
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
IJNSA Journal
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
International Journal of Reconfigurable and Embedded Systems
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
 
A signature-based data security and authentication framework for internet of...
A signature-based data security and authentication framework  for internet of...A signature-based data security and authentication framework  for internet of...
A signature-based data security and authentication framework for internet of...
IJECEIAES
 
IoT Security proposal.pptx
IoT Security proposal.pptxIoT Security proposal.pptx
IoT Security proposal.pptx
saaaatt
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
vivatechijri
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
Skillmine Technology Consulting
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Eswar Publications
 
IoT.pptx
IoT.pptxIoT.pptx
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
vishal dineshkumar soni
 
A Review On Intrusion Detection Systems To Secure IoT Networks
A Review On Intrusion Detection Systems To Secure IoT NetworksA Review On Intrusion Detection Systems To Secure IoT Networks
A Review On Intrusion Detection Systems To Secure IoT Networks
Anna Landers
 
Io t first(1)
Io t first(1)Io t first(1)
Io t first(1)
MuhammadAbduArRahman
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
vrickens
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Scientific Review SR
 

Similar to IoT and the implications on business IT architecture and security (20)

SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...
 
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptx
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
A signature-based data security and authentication framework for internet of...
A signature-based data security and authentication framework  for internet of...A signature-based data security and authentication framework  for internet of...
A signature-based data security and authentication framework for internet of...
 
IoT Security proposal.pptx
IoT Security proposal.pptxIoT Security proposal.pptx
IoT Security proposal.pptx
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
A Review On Intrusion Detection Systems To Secure IoT Networks
A Review On Intrusion Detection Systems To Secure IoT NetworksA Review On Intrusion Detection Systems To Secure IoT Networks
A Review On Intrusion Detection Systems To Secure IoT Networks
 
Io t first(1)
Io t first(1)Io t first(1)
Io t first(1)
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
 

Recently uploaded

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 

Recently uploaded (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 

IoT and the implications on business IT architecture and security

  • 1. Internet of Things and the Implications on Business Information Technology Architecture and Security Denise E. Ferniza denise.ferniza@gmail.com
  • 2. Agenda • Defining the Internet of Things (IoT) • Integration of IoT • Security Risks of IoT • Benefits of Cloud Computing in Business • Risks of Cloud Computing in Regards to IoT • Significance of Research • Conclusion • Proposed Further Study • References 2
  • 3. Defining the Internet of Things (IOT) • IoT refers to an object that is connected to the Internet and has the following unique properties (Yashaswini, 2017) – Assigned a unique IP address – Can collect and transfer data – Does not require human to machine interaction 3
  • 4. Defining the Internet of Things (IOT) • IoT consists of four layers, each layer has different applications and assigned roles (Pai, 2018) • IoT consists of four layers: – Perception layer – Network layer – Support later – Application layer (Yashaswini, 2017) 4
  • 5. Defining the Internet of Things (IOT) • IoT has been around since before 2000, but did not gain mainstream popularity until around 2010 (Gilchrist, 2017) • There were approximately 2.6 million IoT devices as of 2016, which was an increase of 30% from 2015 (Alrawais, 2017) • 5.5 million devices are projected to join IoT a day (Gilchrist, 2017) 5
  • 6. Integration of IoT • IoT involves wireless sensor networks, cloud computing, analytical data, interactive technologies, and smart devices (Tweneboah-Koduah, 2017; Alrawais, 2017) 6
  • 7. Integration of IoT • IoT is being used across a variety of areas including – Smart homes, cities – Smart energy – Transport – Healthcare – Retail – Manufacturing (Tweneboah-Koduah, 2017; Yashaswini, 2017) 7
  • 8. Security Risks of IoT • Each layer of IoT poses its own risk (Yashaswini, 2017) IoT Layer Application Support Network Perception Security Weakness (countermeasure) Privacy and authentication(end-to-end encryption, privacy protection) ID of Malware (secure communication, cloud computing, antivirus) CIA (Certification, hop-by hop, data encryption) Authentication (certification and access control) 8
  • 9. Security Risks of IoT • Most consumers value convenience over security (Gilchrist, 2017) • Getting users to understand threats of IoT devices (Schneier, 2013) • Most products are plug and play, and left in default settings allowing easy access by unauthorized users (Moos, 2017) – www.insecam.org demonstrates the seriousness of leaving default settings – There are thousands of security cameras that have default settings allowing anyone to view the image 9
  • 10. Security Risks of IoT • Lack of regulation of IoT security protocols (Schneier, 2013) • Computational abilities of IoT devices is low, making it harder to apply meaningful security (Yashaswini, 2017) • IoT are particularly vulnerable to wireless scrambling, eavesdropping, man-in-the-middle attacks, message modification, and injection attacks (Tweneboah-Koduah, 2017) • Other Device Manufacturers (ODM) – Includes software, and firmware – ODM often uses embedded Linux that has outdated and flawed code – Software is recycled, providing easy access for hackers (Gilchrist, 2017) 10
  • 11. Security Risks of IoT • Malicious attackers can use IoT devices to conduct DDoS attacks (Cho, 2018) – The infamous Mirai Botnet brought down most of the Internet on the East Coast of United States by utilizing the processing power of unsecured IoT devices 11
  • 12. Benefits of Cloud Computing in Business • Cloud Computing will likely be a key solution to – Data analytics – Storage – Information Diffusion – IoT data receiver, storage, analytics, and interpretation (Tweneboah- Koduah, 2017) 12
  • 13. Benefits of Cloud Computing in Business • Cloud Computing is Internet based and shares hardware, software, and information (Li, 2011) • Cloud Computing increases scope of IT service and efficiency while limiting operational costs and encouraging collaboration 13
  • 14. Benefits of Cloud Computing in Business • Mircosoft Azure IoT Suite allows businesses to quickly develop and integrate IoT applications via cloud computing (Chatham, 2015) • Collaborations across various other IT companies such as Texas Instruments are making strides for easier, and safer cloud computing and IoT application (Alrawais, 2017) 14
  • 15. Risks of Cloud Computing in Regards to IoT • Cloud computing is growing stagnant in businesses due to the following security concerns: (Carter, 2015) – Malicious code is increasingly being hidden in SSL/TLS and is no longer a safe option for cloud computing – Eavesdropping, hacks into traffic over networks – Rogue Firmware is a major threat to IoT and cloud computing – Backdoors, many IoT devices are susceptible to backdoor attacks which in turn can allow hackers to gain access to the cloud and sensitive date 15
  • 16. Risks of Cloud Computing in Regards to IoT • Manufacturers leave address paths open to troubleshoot, but these address paths are often identified easily. • IoT devices attacked rose 9050% from 2012 to 2016 (Cho, 2018) • Privacy leakage in IoT due to the resource constraints of most products (Alrawais, 2017) • IoT – Cloud integration faces application service attacks as well as privacy, trust, identity, and standardization challenges (Tweneboah-Koduah, 2017) 16
  • 17. Risks of Cloud Computing in Regards to IoT • The use of Cloud computing and IoT needs to be addressed holistically • Before using Cloud Computing or IoT business/IT alignment with the Information System goals need to be considered (Li, 2011) 17
  • 18. Significance of Research 18 • Utilizing Cloud Computing, within the perimeters of an IS goal can help businesses achieve efficiency and lower operating costs (Li, 2011) • Correct configurations of firewalls and implementing multi-layered security are instrumental in ensuring security on IoT devices (Moos, 2017) • Utilize root of trust systems such as Microsoft Azure (NASDAQ, 2017) • Increasing integration will increase security by using pre-integrated software
  • 19. Conclusion • By 2020 there is estimated to be over 50 billion IoT devices (Twenboah-Koduah, 2017) • Business/IT alignment will play a major role in sustainability, advantages, and growth of IoT and Cloud Computing (Carter, 2015) • IT must be committed to alignment and furthering businesses processes 19
  • 20. Conclusion • Poorly designed, and outdate devices play a key factor in the vulnerability of IoT • System applications, firmware, hardware, and software vulnerabilities are a direct result of the layered nature of IoT (Twenboah-Koduah, 2017) • Consumers, especially influential ones, need to insist on minimum security standards (Schneier, 2013) • Ensure that IoT complies with CIA trends and incorporates security architecture from ISO Protocol (Pai, 2018) 20
  • 21. Proposed Further Study • Further study should be conducted into: – ways to rate, and secure IoT devices in a meaningful way to users (Gilchrist, 2017) – Ensuring and certifying design and implementation of IoT devices (Tweneboah-Koduah, 2017) – Ways to more efficiently install and network IoT devices – Ways in which to make the end user more educated on the nature of security vulnerabilities on IoT devices (Gilchrist, 2017) 21
  • 22. References Alrawais, A., Abdulrahman, A., Chunqiang, H., & Xiuzhen, C. (2017). Fog Computing for the Internet of Things: Security and Privacy Issues. IEEE Internet Computing, 21(2), pp. 34-42. Retrieved from https://ieeexplore-ieee-org.ezproxy1.apus.edu/document/7867732 Carter, S. (2015). Impact of cloud-based computing on business-information technology alignment in small businesses (Order No. 3718681). Available from ProQuest Central; ProQuest Dissertations & Theses Global. (1712374897). Retrieved from https://search-proquest- com.ezproxy1.apus.edu/docview/1712374897?accountid=8289 Chatham. (2015) Products in the news: Texas instruments collaborates with Microsoft to speed internet of things (IoT) development Retrieved from https://search-proquest-com.ezproxy1.apus.edu/docview/1718352769?accountid=8289 Cho, S. (2018). System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats. KSII Transactions on Internet and Information Systems 12(2), pp. 906-920. Li, Q. (2011). Towards the Business-Information Technology Alignment in Cloud Computing Environment: An Approach based on collaboration points and agents. International Journal of Computer Integrated Manufacturing 24(11), pp. 1038-1057. Moos, J. (2017). IoT, Malware and Security. ITNOW 59(1), pp. 28-29. 22
  • 23. NASDAQ. (2017). Micron and Microsoft announce collaboration to help improve internet of things security. NASDAQ OMX's News Release Distribution Channel Retrieved from https://search-proquest-com.ezproxy2.apus.edu/docview/1891004823?accountid=8289 Pai, V. (2018). Survey on IoT Security Issues and Security Protocols. International Journal of Computer Applications 180(42), pp. 16-21. Retrieved from https://www.ijcaonline.org/archives/volume180/number42/29411-2018917108 Schneier, B. (2013). IoT Security: What’s Plan B? IEEE Security & Privacy 15(5), pp. 96-97 Retrieved from https://ieeexplore-ieee- org.ezproxy1.apus.edu/document/8055681 Tweneboah-Koduah, S. (2017). Cyber Security Threats to IoT Applications and Service Domains. Wireless Personal Communications 95(1), pp. 169-185. Yashaswini, J. (2017). A Review on IoT Security Issues and Countermeasures. Oriental Journal of Computer Science and Technology 10(2), pp. 454-459. Retrieved from http://www.computerscijournal.org/toc/?vol=10&no=2 23