SlideShare a Scribd company logo
1 of 29
Fundamentals of Information
Systems Security
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security
Page 1
Lesson 2
The Internet of Things
Is Changing How We Live
Learning Objective(s)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security
Page
2
 Explain information systems security and
its effect on people and businesses.
Key Concepts
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security
Page 3
 The evolution of the Internet of Things (IoT) from
the late 1990s to present
 The impact that the Internet and IoT have on
human and business life
 How bricks-and-mortar businesses transform into e-
business models with e-commerce and an IoT
strategy
 How IP mobility is driving IoT to include both
personal and business environments
 New challenges created by IoT
The Internet of Things Is Changing
How We Live
Facebook®
Twitter®
LinkedIn®
Pinterest®
Google+®
Instagram®
Social Media Mediums
VoIP
IM chat
Audio conference
Video conference
Collaboration
Digital Media
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security
Page 4
Drivers for Internet of Things
(IoT)
IP-based networking
Connectivity
Smaller and faster computing
Cloud computing
Data analytics
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 5
Evolution of IoT
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 6
 Internet service providers (ISPs)
 Radio frequency identification (RFID)
 Application service providers (ASPs)
 Software as a Service (SaaS)
How the Internet and TCP/IP
Transform Our Lives
• The transition to a Transmission
Control Protocol/Internet
Protocol (TCP/IP) world changed
our way of life.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 7
• People, families, businesses,
educators, and government all
communicate differently than
they did before.
• Nearly everyone has easy
access to the Internet.
IoT’s Impact on Human and
Business Life
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 8
The Internet has changed our day-to-day
lives
• Personally
• Socially
• Professionally
Use the Internet to:
• Check weather, news, and social media sites at
home
• Check business emails at work
Store-and-Forward vs. Real-Time
Communications
• Occurs instantaneously
Real-time
• Acceptable delay in
transmitting communication
Store-and-
forward
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 9
IoT’s Impact on Humans
Health monitoring and updating
Home security and smart home control systems
Online family member calendars
Near real-time tracking and monitoring via GPS
Online banking, bill paying, and financial transactions
Online e-commerce purchases
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 10
IoT’s Impact on Business
Retail stores
Virtual workplace
Remote sensors
Traffic-monitoring applications B2C
service delivery model
“Anything as a Service” IoT applications
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 11
Evolution from Bricks and Mortar to
E-Commerce
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 12
 E-commerce
• Sale of goods and services on the Internet
 Business-to-consumer (B2C)
• Customers purchase goods and services directly from their
website
 Business-to-business (B2B)
• Businesses conduct sales with other businesses
 Payment Card Industry Data Security Standard (PCI
DSS)
• Protects private customer data
Evolution from Bricks and Mortar to
E-Commerce (cont.)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 13
 Internet business challenges:
• Growing the business through the Internet
• Changing an existing conventional business into
an e-business
• Building secure and highly available websites and
e-commerce portals
• Building a web-enabled customer-service strategy
• Finding new customers with Internet marketing
E-business Strategy Elements
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 14
E-commerce solution
Internet marketing strategy
E-customer service-delivery strategy
Payment and credit card transaction
processing
Why Businesses Must Have an
Internet and IoT Marketing Strategy
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 15
Must remain competitive
Bricks-and-mortar business model out of
date in global market
Customers require continuous access to
information, products, and services
IP Mobility
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 16
 Personal communication devices and mobile
phones are powerful
 Cell phones are used to extend mobility
 Mobile phones, smartphones, and PDAs
match the power and flexibility of small
computers
 Tablets, smartphones, and netbooks fill need
for lightweight portable devices
Mobile Users and Bring Your
Own Device (BYOD)
 Employees and contractors use their own personal
devices to connect to network at office
Issues with Mobile Computing
• Network
• Usability
• Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 17
Mobile Applications
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 18
Limited web browsers can’t run some
traditional applications
Bad interface design causes application
failure on mobile devices
Many users from multiple domains found
uses for mobile applications
Medical applications were a good fit for
mobile applications
Mobile Applications (cont.)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 19
4G & 5G networks provide true IP
communications.
Mobile IP enables users to:
• Move between LAN segments and stay
connected without interruption.
• Maintain a connection to the network as long
as the mobile device stays within network
coverage.
New Challenges Created by the IoT
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 20
Security Privacy Interoperability
Legal and
regulatory
compliance
E-commerce
and economic
dev issues
New Challenges Created by the IoT
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 21
Security Privacy Interoperability
Legal and
regulatory
compliance
E-commerce
and economic
dev issues
 Security: How do you keep the bad guys out if you enable the IoT for
your personal and professional life?
 Privacy: How do you protect your family’s identity and privacy data
from theft or unauthorized access that can lead to identity theft?
 Interoperability and standards: How well do IoT manufacturers and
ASP developers ensure that devices communicate securely?
 Legal and regulatory compliance
 E-commerce and economic development issues
Security Challenges of IT Devices
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 22
 Deployed in large quantities (such as sensors or
consumer items)
 Not maintained or updated devices allow
vulnerabilities
 Upgrades can be difficult to distribute and deploy
 No owner visibility of how the device connects to the
Internet
 Not physically secure
 Capture readings and measurements in the open
Privacy Challenges
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 23
 Privacy policy statement.
 Definition of data, metadata, or analytical data
use and rights.
 Ability for a user to provide consent to a
manufacturer’s or application service
provider’s privacy policy statement.
 Determine the domain of privacy.
Interoperability and Standards
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 24
Internet Engineering Task Force (IETF)
ensures interoperability and standards can
be pursued for IoT solutions.
Interoperability has significant financial
impacts if not properly addressed.
Goal is to bring the cost of IoT devices and
supporting applications down so they are
affordable.
Interoperability and Standards
Challenges
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 25
 Some manufacturers want to design and deploy
proprietary IoT devices and solutions.
 Cost factors to implement functional, operational,
technical, and security capabilities into IoT
devices and applications.
 Time-to-market risk.
 Technology outdated risk
 A void in interoperability and standards for IoT
devices can create an environment of bad IoT
devices
Legal and Regulatory Issues
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 26
Proper handling and protection of sensitive
data
Privacy data subject to privacy laws of state
you live in as well as state that the IoT
hosting company resides in
IoT vendor or solutions provider required to
adhere to security control requirements and
data protection laws
Legal and Regulatory IoT Questions
Who is collecting data?
Who is collecting behavior patterns?
Are they selling this data?
Do they have the right to sell it?
Is there liability associated with the data?
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 27
E-Commerce
and
Economic
Development
Issues
Infrastructure
resources
Foundational
investments
Technical and
industry
development
Policy and
regulatory
definitions
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 28
Summary
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 29
 The evolution of the Internet of Things (IoT)
from the late 1990s to present
 The impact that the Internet and IoT have on
human and business life
 How bricks-and-mortar businesses transform
into e-business models with e-commerce and
an IoT strategy
 How IP mobility is driving IoT to include both
personal and business environments
 New challenges created by IoT

More Related Content

Similar to Fundamentals of IoT Security

Digital Velocity London - What's The Future for Data Orchestration, Tealium D...
Digital Velocity London - What's The Future for Data Orchestration, Tealium D...Digital Velocity London - What's The Future for Data Orchestration, Tealium D...
Digital Velocity London - What's The Future for Data Orchestration, Tealium D...Tealium
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...Global Business Events
 
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...John Boruvka
 
Will Edge Computing IoT Solutions be a Real Trend in 2019?
Will Edge Computing IoT Solutions be a Real Trend in 2019?Will Edge Computing IoT Solutions be a Real Trend in 2019?
Will Edge Computing IoT Solutions be a Real Trend in 2019?Tyrone Systems
 
Middle East IoT Workshop
Middle East IoT WorkshopMiddle East IoT Workshop
Middle East IoT WorkshopHaider Iqbal
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internetsuperintendingengine17
 
IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020Takayuki Yamazaki
 
Who will buy IOT products and why.
Who will buy IOT products and why.Who will buy IOT products and why.
Who will buy IOT products and why.Atanu Roy Chowdhury
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018Ahmed Banafa
 
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3Dr. Ahmed Al Zaidy
 
Information system
Information systemInformation system
Information systemMohamed Ali
 
Fundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docxFundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docxshericehewat
 
What's the future for data orchestration
What's the future for data orchestrationWhat's the future for data orchestration
What's the future for data orchestrationIIHEvents
 
Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Nikhil Dikshit
 
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...Lounge47
 

Similar to Fundamentals of IoT Security (20)

Digital Velocity London - What's The Future for Data Orchestration, Tealium D...
Digital Velocity London - What's The Future for Data Orchestration, Tealium D...Digital Velocity London - What's The Future for Data Orchestration, Tealium D...
Digital Velocity London - What's The Future for Data Orchestration, Tealium D...
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
 
Funsec3e ppt ch03
Funsec3e ppt ch03Funsec3e ppt ch03
Funsec3e ppt ch03
 
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
 
Will Edge Computing IoT Solutions be a Real Trend in 2019?
Will Edge Computing IoT Solutions be a Real Trend in 2019?Will Edge Computing IoT Solutions be a Real Trend in 2019?
Will Edge Computing IoT Solutions be a Real Trend in 2019?
 
Middle East IoT Workshop
Middle East IoT WorkshopMiddle East IoT Workshop
Middle East IoT Workshop
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
 
IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020
 
Who will buy IOT products and why.
Who will buy IOT products and why.Who will buy IOT products and why.
Who will buy IOT products and why.
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3
 
ict.......pptx
ict.......pptxict.......pptx
ict.......pptx
 
Information system
Information systemInformation system
Information system
 
Ch 1.pdf
Ch 1.pdfCh 1.pdf
Ch 1.pdf
 
Fundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docxFundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docx
 
What's the future for data orchestration
What's the future for data orchestrationWhat's the future for data orchestration
What's the future for data orchestration
 
Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015
 
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
 

More from MhndHTaani

Assig. Three PHP final presentation.pptx
Assig. Three PHP final presentation.pptxAssig. Three PHP final presentation.pptx
Assig. Three PHP final presentation.pptxMhndHTaani
 
computer-history-powerpoint revised 1-20-13.pptx
computer-history-powerpoint revised 1-20-13.pptxcomputer-history-powerpoint revised 1-20-13.pptx
computer-history-powerpoint revised 1-20-13.pptxMhndHTaani
 
cryptography.pptx
cryptography.pptxcryptography.pptx
cryptography.pptxMhndHTaani
 
IOT technology.pptx
IOT technology.pptxIOT technology.pptx
IOT technology.pptxMhndHTaani
 
Chapter 2 - HTML5.pdf
Chapter 2 - HTML5.pdfChapter 2 - HTML5.pdf
Chapter 2 - HTML5.pdfMhndHTaani
 
EER-database.ppt
EER-database.pptEER-database.ppt
EER-database.pptMhndHTaani
 
info-sys-security3.pptx
info-sys-security3.pptxinfo-sys-security3.pptx
info-sys-security3.pptxMhndHTaani
 

More from MhndHTaani (7)

Assig. Three PHP final presentation.pptx
Assig. Three PHP final presentation.pptxAssig. Three PHP final presentation.pptx
Assig. Three PHP final presentation.pptx
 
computer-history-powerpoint revised 1-20-13.pptx
computer-history-powerpoint revised 1-20-13.pptxcomputer-history-powerpoint revised 1-20-13.pptx
computer-history-powerpoint revised 1-20-13.pptx
 
cryptography.pptx
cryptography.pptxcryptography.pptx
cryptography.pptx
 
IOT technology.pptx
IOT technology.pptxIOT technology.pptx
IOT technology.pptx
 
Chapter 2 - HTML5.pdf
Chapter 2 - HTML5.pdfChapter 2 - HTML5.pdf
Chapter 2 - HTML5.pdf
 
EER-database.ppt
EER-database.pptEER-database.ppt
EER-database.ppt
 
info-sys-security3.pptx
info-sys-security3.pptxinfo-sys-security3.pptx
info-sys-security3.pptx
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Fundamentals of IoT Security

  • 1. Fundamentals of Information Systems Security © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 1 Lesson 2 The Internet of Things Is Changing How We Live
  • 2. Learning Objective(s) © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 2  Explain information systems security and its effect on people and businesses.
  • 3. Key Concepts © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 3  The evolution of the Internet of Things (IoT) from the late 1990s to present  The impact that the Internet and IoT have on human and business life  How bricks-and-mortar businesses transform into e- business models with e-commerce and an IoT strategy  How IP mobility is driving IoT to include both personal and business environments  New challenges created by IoT
  • 4. The Internet of Things Is Changing How We Live Facebook® Twitter® LinkedIn® Pinterest® Google+® Instagram® Social Media Mediums VoIP IM chat Audio conference Video conference Collaboration Digital Media © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 4
  • 5. Drivers for Internet of Things (IoT) IP-based networking Connectivity Smaller and faster computing Cloud computing Data analytics © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 5
  • 6. Evolution of IoT © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 6  Internet service providers (ISPs)  Radio frequency identification (RFID)  Application service providers (ASPs)  Software as a Service (SaaS)
  • 7. How the Internet and TCP/IP Transform Our Lives • The transition to a Transmission Control Protocol/Internet Protocol (TCP/IP) world changed our way of life. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 7 • People, families, businesses, educators, and government all communicate differently than they did before. • Nearly everyone has easy access to the Internet.
  • 8. IoT’s Impact on Human and Business Life © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 8 The Internet has changed our day-to-day lives • Personally • Socially • Professionally Use the Internet to: • Check weather, news, and social media sites at home • Check business emails at work
  • 9. Store-and-Forward vs. Real-Time Communications • Occurs instantaneously Real-time • Acceptable delay in transmitting communication Store-and- forward © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 9
  • 10. IoT’s Impact on Humans Health monitoring and updating Home security and smart home control systems Online family member calendars Near real-time tracking and monitoring via GPS Online banking, bill paying, and financial transactions Online e-commerce purchases © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 10
  • 11. IoT’s Impact on Business Retail stores Virtual workplace Remote sensors Traffic-monitoring applications B2C service delivery model “Anything as a Service” IoT applications © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 11
  • 12. Evolution from Bricks and Mortar to E-Commerce © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 12  E-commerce • Sale of goods and services on the Internet  Business-to-consumer (B2C) • Customers purchase goods and services directly from their website  Business-to-business (B2B) • Businesses conduct sales with other businesses  Payment Card Industry Data Security Standard (PCI DSS) • Protects private customer data
  • 13. Evolution from Bricks and Mortar to E-Commerce (cont.) © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 13  Internet business challenges: • Growing the business through the Internet • Changing an existing conventional business into an e-business • Building secure and highly available websites and e-commerce portals • Building a web-enabled customer-service strategy • Finding new customers with Internet marketing
  • 14. E-business Strategy Elements © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 14 E-commerce solution Internet marketing strategy E-customer service-delivery strategy Payment and credit card transaction processing
  • 15. Why Businesses Must Have an Internet and IoT Marketing Strategy © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 15 Must remain competitive Bricks-and-mortar business model out of date in global market Customers require continuous access to information, products, and services
  • 16. IP Mobility © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 16  Personal communication devices and mobile phones are powerful  Cell phones are used to extend mobility  Mobile phones, smartphones, and PDAs match the power and flexibility of small computers  Tablets, smartphones, and netbooks fill need for lightweight portable devices
  • 17. Mobile Users and Bring Your Own Device (BYOD)  Employees and contractors use their own personal devices to connect to network at office Issues with Mobile Computing • Network • Usability • Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 17
  • 18. Mobile Applications © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 18 Limited web browsers can’t run some traditional applications Bad interface design causes application failure on mobile devices Many users from multiple domains found uses for mobile applications Medical applications were a good fit for mobile applications
  • 19. Mobile Applications (cont.) © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 19 4G & 5G networks provide true IP communications. Mobile IP enables users to: • Move between LAN segments and stay connected without interruption. • Maintain a connection to the network as long as the mobile device stays within network coverage.
  • 20. New Challenges Created by the IoT © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 20 Security Privacy Interoperability Legal and regulatory compliance E-commerce and economic dev issues
  • 21. New Challenges Created by the IoT © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 21 Security Privacy Interoperability Legal and regulatory compliance E-commerce and economic dev issues  Security: How do you keep the bad guys out if you enable the IoT for your personal and professional life?  Privacy: How do you protect your family’s identity and privacy data from theft or unauthorized access that can lead to identity theft?  Interoperability and standards: How well do IoT manufacturers and ASP developers ensure that devices communicate securely?  Legal and regulatory compliance  E-commerce and economic development issues
  • 22. Security Challenges of IT Devices © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 22  Deployed in large quantities (such as sensors or consumer items)  Not maintained or updated devices allow vulnerabilities  Upgrades can be difficult to distribute and deploy  No owner visibility of how the device connects to the Internet  Not physically secure  Capture readings and measurements in the open
  • 23. Privacy Challenges © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 23  Privacy policy statement.  Definition of data, metadata, or analytical data use and rights.  Ability for a user to provide consent to a manufacturer’s or application service provider’s privacy policy statement.  Determine the domain of privacy.
  • 24. Interoperability and Standards © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 24 Internet Engineering Task Force (IETF) ensures interoperability and standards can be pursued for IoT solutions. Interoperability has significant financial impacts if not properly addressed. Goal is to bring the cost of IoT devices and supporting applications down so they are affordable.
  • 25. Interoperability and Standards Challenges © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 25  Some manufacturers want to design and deploy proprietary IoT devices and solutions.  Cost factors to implement functional, operational, technical, and security capabilities into IoT devices and applications.  Time-to-market risk.  Technology outdated risk  A void in interoperability and standards for IoT devices can create an environment of bad IoT devices
  • 26. Legal and Regulatory Issues © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 26 Proper handling and protection of sensitive data Privacy data subject to privacy laws of state you live in as well as state that the IoT hosting company resides in IoT vendor or solutions provider required to adhere to security control requirements and data protection laws
  • 27. Legal and Regulatory IoT Questions Who is collecting data? Who is collecting behavior patterns? Are they selling this data? Do they have the right to sell it? Is there liability associated with the data? © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 27
  • 28. E-Commerce and Economic Development Issues Infrastructure resources Foundational investments Technical and industry development Policy and regulatory definitions © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 28
  • 29. Summary © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 29  The evolution of the Internet of Things (IoT) from the late 1990s to present  The impact that the Internet and IoT have on human and business life  How bricks-and-mortar businesses transform into e-business models with e-commerce and an IoT strategy  How IP mobility is driving IoT to include both personal and business environments  New challenges created by IoT