Fundamentals of Information
Systems Security
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security
Page 1
Lesson 2
The Internet of Things
Is Changing How We Live
Learning Objective(s)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security
Page
2
 Explain information systems security and
its effect on people and businesses.
Key Concepts
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security
Page 3
 The evolution of the Internet of Things (IoT) from
the late 1990s to present
 The impact that the Internet and IoT have on
human and business life
 How bricks-and-mortar businesses transform into e-
business models with e-commerce and an IoT
strategy
 How IP mobility is driving IoT to include both
personal and business environments
 New challenges created by IoT
The Internet of Things Is Changing
How We Live
Facebook®
Twitter®
LinkedIn®
Pinterest®
Google+®
Instagram®
Social Media Mediums
VoIP
IM chat
Audio conference
Video conference
Collaboration
Digital Media
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security
Page 4
Drivers for Internet of Things
(IoT)
IP-based networking
Connectivity
Smaller and faster computing
Cloud computing
Data analytics
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 5
Evolution of IoT
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 6
 Internet service providers (ISPs)
 Radio frequency identification (RFID)
 Application service providers (ASPs)
 Software as a Service (SaaS)
How the Internet and TCP/IP
Transform Our Lives
• The transition to a Transmission
Control Protocol/Internet
Protocol (TCP/IP) world changed
our way of life.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 7
• People, families, businesses,
educators, and government all
communicate differently than
they did before.
• Nearly everyone has easy
access to the Internet.
IoT’s Impact on Human and
Business Life
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 8
The Internet has changed our day-to-day
lives
• Personally
• Socially
• Professionally
Use the Internet to:
• Check weather, news, and social media sites at
home
• Check business emails at work
Store-and-Forward vs. Real-Time
Communications
• Occurs instantaneously
Real-time
• Acceptable delay in
transmitting communication
Store-and-
forward
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 9
IoT’s Impact on Humans
Health monitoring and updating
Home security and smart home control systems
Online family member calendars
Near real-time tracking and monitoring via GPS
Online banking, bill paying, and financial transactions
Online e-commerce purchases
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 10
IoT’s Impact on Business
Retail stores
Virtual workplace
Remote sensors
Traffic-monitoring applications B2C
service delivery model
“Anything as a Service” IoT applications
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 11
Evolution from Bricks and Mortar to
E-Commerce
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 12
 E-commerce
• Sale of goods and services on the Internet
 Business-to-consumer (B2C)
• Customers purchase goods and services directly from their
website
 Business-to-business (B2B)
• Businesses conduct sales with other businesses
 Payment Card Industry Data Security Standard (PCI
DSS)
• Protects private customer data
Evolution from Bricks and Mortar to
E-Commerce (cont.)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 13
 Internet business challenges:
• Growing the business through the Internet
• Changing an existing conventional business into
an e-business
• Building secure and highly available websites and
e-commerce portals
• Building a web-enabled customer-service strategy
• Finding new customers with Internet marketing
E-business Strategy Elements
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 14
E-commerce solution
Internet marketing strategy
E-customer service-delivery strategy
Payment and credit card transaction
processing
Why Businesses Must Have an
Internet and IoT Marketing Strategy
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 15
Must remain competitive
Bricks-and-mortar business model out of
date in global market
Customers require continuous access to
information, products, and services
IP Mobility
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 16
 Personal communication devices and mobile
phones are powerful
 Cell phones are used to extend mobility
 Mobile phones, smartphones, and PDAs
match the power and flexibility of small
computers
 Tablets, smartphones, and netbooks fill need
for lightweight portable devices
Mobile Users and Bring Your
Own Device (BYOD)
 Employees and contractors use their own personal
devices to connect to network at office
Issues with Mobile Computing
• Network
• Usability
• Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 17
Mobile Applications
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 18
Limited web browsers can’t run some
traditional applications
Bad interface design causes application
failure on mobile devices
Many users from multiple domains found
uses for mobile applications
Medical applications were a good fit for
mobile applications
Mobile Applications (cont.)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 19
4G & 5G networks provide true IP
communications.
Mobile IP enables users to:
• Move between LAN segments and stay
connected without interruption.
• Maintain a connection to the network as long
as the mobile device stays within network
coverage.
New Challenges Created by the IoT
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 20
Security Privacy Interoperability
Legal and
regulatory
compliance
E-commerce
and economic
dev issues
New Challenges Created by the IoT
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 21
Security Privacy Interoperability
Legal and
regulatory
compliance
E-commerce
and economic
dev issues
 Security: How do you keep the bad guys out if you enable the IoT for
your personal and professional life?
 Privacy: How do you protect your family’s identity and privacy data
from theft or unauthorized access that can lead to identity theft?
 Interoperability and standards: How well do IoT manufacturers and
ASP developers ensure that devices communicate securely?
 Legal and regulatory compliance
 E-commerce and economic development issues
Security Challenges of IT Devices
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 22
 Deployed in large quantities (such as sensors or
consumer items)
 Not maintained or updated devices allow
vulnerabilities
 Upgrades can be difficult to distribute and deploy
 No owner visibility of how the device connects to the
Internet
 Not physically secure
 Capture readings and measurements in the open
Privacy Challenges
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 23
 Privacy policy statement.
 Definition of data, metadata, or analytical data
use and rights.
 Ability for a user to provide consent to a
manufacturer’s or application service
provider’s privacy policy statement.
 Determine the domain of privacy.
Interoperability and Standards
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 24
Internet Engineering Task Force (IETF)
ensures interoperability and standards can
be pursued for IoT solutions.
Interoperability has significant financial
impacts if not properly addressed.
Goal is to bring the cost of IoT devices and
supporting applications down so they are
affordable.
Interoperability and Standards
Challenges
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 25
 Some manufacturers want to design and deploy
proprietary IoT devices and solutions.
 Cost factors to implement functional, operational,
technical, and security capabilities into IoT
devices and applications.
 Time-to-market risk.
 Technology outdated risk
 A void in interoperability and standards for IoT
devices can create an environment of bad IoT
devices
Legal and Regulatory Issues
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 26
Proper handling and protection of sensitive
data
Privacy data subject to privacy laws of state
you live in as well as state that the IoT
hosting company resides in
IoT vendor or solutions provider required to
adhere to security control requirements and
data protection laws
Legal and Regulatory IoT Questions
Who is collecting data?
Who is collecting behavior patterns?
Are they selling this data?
Do they have the right to sell it?
Is there liability associated with the data?
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 27
E-Commerce
and
Economic
Development
Issues
Infrastructure
resources
Foundational
investments
Technical and
industry
development
Policy and
regulatory
definitions
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 28
Summary
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 29
 The evolution of the Internet of Things (IoT)
from the late 1990s to present
 The impact that the Internet and IoT have on
human and business life
 How bricks-and-mortar businesses transform
into e-business models with e-commerce and
an IoT strategy
 How IP mobility is driving IoT to include both
personal and business environments
 New challenges created by IoT

info-sys-security.pptx

  • 1.
    Fundamentals of Information SystemsSecurity © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 1 Lesson 2 The Internet of Things Is Changing How We Live
  • 2.
    Learning Objective(s) © 2018Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 2  Explain information systems security and its effect on people and businesses.
  • 3.
    Key Concepts © 2018Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 3  The evolution of the Internet of Things (IoT) from the late 1990s to present  The impact that the Internet and IoT have on human and business life  How bricks-and-mortar businesses transform into e- business models with e-commerce and an IoT strategy  How IP mobility is driving IoT to include both personal and business environments  New challenges created by IoT
  • 4.
    The Internet ofThings Is Changing How We Live Facebook® Twitter® LinkedIn® Pinterest® Google+® Instagram® Social Media Mediums VoIP IM chat Audio conference Video conference Collaboration Digital Media © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 4
  • 5.
    Drivers for Internetof Things (IoT) IP-based networking Connectivity Smaller and faster computing Cloud computing Data analytics © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 5
  • 6.
    Evolution of IoT ©2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 6  Internet service providers (ISPs)  Radio frequency identification (RFID)  Application service providers (ASPs)  Software as a Service (SaaS)
  • 7.
    How the Internetand TCP/IP Transform Our Lives • The transition to a Transmission Control Protocol/Internet Protocol (TCP/IP) world changed our way of life. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 7 • People, families, businesses, educators, and government all communicate differently than they did before. • Nearly everyone has easy access to the Internet.
  • 8.
    IoT’s Impact onHuman and Business Life © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 8 The Internet has changed our day-to-day lives • Personally • Socially • Professionally Use the Internet to: • Check weather, news, and social media sites at home • Check business emails at work
  • 9.
    Store-and-Forward vs. Real-Time Communications •Occurs instantaneously Real-time • Acceptable delay in transmitting communication Store-and- forward © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 9
  • 10.
    IoT’s Impact onHumans Health monitoring and updating Home security and smart home control systems Online family member calendars Near real-time tracking and monitoring via GPS Online banking, bill paying, and financial transactions Online e-commerce purchases © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 10
  • 11.
    IoT’s Impact onBusiness Retail stores Virtual workplace Remote sensors Traffic-monitoring applications B2C service delivery model “Anything as a Service” IoT applications © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 11
  • 12.
    Evolution from Bricksand Mortar to E-Commerce © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 12  E-commerce • Sale of goods and services on the Internet  Business-to-consumer (B2C) • Customers purchase goods and services directly from their website  Business-to-business (B2B) • Businesses conduct sales with other businesses  Payment Card Industry Data Security Standard (PCI DSS) • Protects private customer data
  • 13.
    Evolution from Bricksand Mortar to E-Commerce (cont.) © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 13  Internet business challenges: • Growing the business through the Internet • Changing an existing conventional business into an e-business • Building secure and highly available websites and e-commerce portals • Building a web-enabled customer-service strategy • Finding new customers with Internet marketing
  • 14.
    E-business Strategy Elements ©2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 14 E-commerce solution Internet marketing strategy E-customer service-delivery strategy Payment and credit card transaction processing
  • 15.
    Why Businesses MustHave an Internet and IoT Marketing Strategy © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 15 Must remain competitive Bricks-and-mortar business model out of date in global market Customers require continuous access to information, products, and services
  • 16.
    IP Mobility © 2018Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 16  Personal communication devices and mobile phones are powerful  Cell phones are used to extend mobility  Mobile phones, smartphones, and PDAs match the power and flexibility of small computers  Tablets, smartphones, and netbooks fill need for lightweight portable devices
  • 17.
    Mobile Users andBring Your Own Device (BYOD)  Employees and contractors use their own personal devices to connect to network at office Issues with Mobile Computing • Network • Usability • Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 17
  • 18.
    Mobile Applications © 2018Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 18 Limited web browsers can’t run some traditional applications Bad interface design causes application failure on mobile devices Many users from multiple domains found uses for mobile applications Medical applications were a good fit for mobile applications
  • 19.
    Mobile Applications (cont.) ©2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 19 4G & 5G networks provide true IP communications. Mobile IP enables users to: • Move between LAN segments and stay connected without interruption. • Maintain a connection to the network as long as the mobile device stays within network coverage.
  • 20.
    New Challenges Createdby the IoT © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 20 Security Privacy Interoperability Legal and regulatory compliance E-commerce and economic dev issues
  • 21.
    New Challenges Createdby the IoT © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 21 Security Privacy Interoperability Legal and regulatory compliance E-commerce and economic dev issues  Security: How do you keep the bad guys out if you enable the IoT for your personal and professional life?  Privacy: How do you protect your family’s identity and privacy data from theft or unauthorized access that can lead to identity theft?  Interoperability and standards: How well do IoT manufacturers and ASP developers ensure that devices communicate securely?  Legal and regulatory compliance  E-commerce and economic development issues
  • 22.
    Security Challenges ofIT Devices © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 22  Deployed in large quantities (such as sensors or consumer items)  Not maintained or updated devices allow vulnerabilities  Upgrades can be difficult to distribute and deploy  No owner visibility of how the device connects to the Internet  Not physically secure  Capture readings and measurements in the open
  • 23.
    Privacy Challenges © 2018Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 23  Privacy policy statement.  Definition of data, metadata, or analytical data use and rights.  Ability for a user to provide consent to a manufacturer’s or application service provider’s privacy policy statement.  Determine the domain of privacy.
  • 24.
    Interoperability and Standards ©2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 24 Internet Engineering Task Force (IETF) ensures interoperability and standards can be pursued for IoT solutions. Interoperability has significant financial impacts if not properly addressed. Goal is to bring the cost of IoT devices and supporting applications down so they are affordable.
  • 25.
    Interoperability and Standards Challenges ©2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 25  Some manufacturers want to design and deploy proprietary IoT devices and solutions.  Cost factors to implement functional, operational, technical, and security capabilities into IoT devices and applications.  Time-to-market risk.  Technology outdated risk  A void in interoperability and standards for IoT devices can create an environment of bad IoT devices
  • 26.
    Legal and RegulatoryIssues © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 26 Proper handling and protection of sensitive data Privacy data subject to privacy laws of state you live in as well as state that the IoT hosting company resides in IoT vendor or solutions provider required to adhere to security control requirements and data protection laws
  • 27.
    Legal and RegulatoryIoT Questions Who is collecting data? Who is collecting behavior patterns? Are they selling this data? Do they have the right to sell it? Is there liability associated with the data? © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 27
  • 28.
    E-Commerce and Economic Development Issues Infrastructure resources Foundational investments Technical and industry development Policy and regulatory definitions ©2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 28
  • 29.
    Summary © 2018 Jonesand Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 29  The evolution of the Internet of Things (IoT) from the late 1990s to present  The impact that the Internet and IoT have on human and business life  How bricks-and-mortar businesses transform into e-business models with e-commerce and an IoT strategy  How IP mobility is driving IoT to include both personal and business environments  New challenges created by IoT