Submit Search
Upload
Fundamentals of IoT Security
•
Download as PPTX, PDF
•
0 likes
•
3 views
AI-enhanced title
M
MhndHTaani
Follow
info-sys-security
Read less
Read more
Technology
Report
Share
Report
Share
1 of 29
Download now
Recommended
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Lesson 2The I.docx
Fundamentals of Information Systems Security Lesson 2The I.docx
shericehewat
Aalto cyber-10.4.18
Aalto cyber-10.4.18
japijapi
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
Dr. Ahmed Al Zaidy
Dr_Kamal_ch01.pptx
Dr_Kamal_ch01.pptx
MhndHTaani
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
The Economist Media Businesses
CCC-Internet of Things Foundation
CCC-Internet of Things Foundation
ITpreneurs
Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12
Dr. Ahmed Al Zaidy
Recommended
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Lesson 2The I.docx
Fundamentals of Information Systems Security Lesson 2The I.docx
shericehewat
Aalto cyber-10.4.18
Aalto cyber-10.4.18
japijapi
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
Dr. Ahmed Al Zaidy
Dr_Kamal_ch01.pptx
Dr_Kamal_ch01.pptx
MhndHTaani
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
The Economist Media Businesses
CCC-Internet of Things Foundation
CCC-Internet of Things Foundation
ITpreneurs
Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12
Dr. Ahmed Al Zaidy
Digital Velocity London - What's The Future for Data Orchestration, Tealium D...
Digital Velocity London - What's The Future for Data Orchestration, Tealium D...
Tealium
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
Judith Beckhard Cardoso
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Global Business Events
Funsec3e ppt ch03
Funsec3e ppt ch03
Skillspire LLC
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
John Boruvka
Will Edge Computing IoT Solutions be a Real Trend in 2019?
Will Edge Computing IoT Solutions be a Real Trend in 2019?
Tyrone Systems
Middle East IoT Workshop
Middle East IoT Workshop
Haider Iqbal
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
superintendingengine17
IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020
Takayuki Yamazaki
Who will buy IOT products and why.
Who will buy IOT products and why.
Atanu Roy Chowdhury
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
8 trends of IoT in 2018
8 trends of IoT in 2018
Ahmed Banafa
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3
Dr. Ahmed Al Zaidy
ict.......pptx
ict.......pptx
Sushilpoudel15
Information system
Information system
Mohamed Ali
Ch 1.pdf
Ch 1.pdf
Mohamed Ali
Fundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docx
shericehewat
What's the future for data orchestration
What's the future for data orchestration
IIHEvents
Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015
Nikhil Dikshit
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Lounge47
Assig. Three PHP final presentation.pptx
Assig. Three PHP final presentation.pptx
MhndHTaani
computer-history-powerpoint revised 1-20-13.pptx
computer-history-powerpoint revised 1-20-13.pptx
MhndHTaani
More Related Content
Similar to Fundamentals of IoT Security
Digital Velocity London - What's The Future for Data Orchestration, Tealium D...
Digital Velocity London - What's The Future for Data Orchestration, Tealium D...
Tealium
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
Judith Beckhard Cardoso
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Global Business Events
Funsec3e ppt ch03
Funsec3e ppt ch03
Skillspire LLC
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
John Boruvka
Will Edge Computing IoT Solutions be a Real Trend in 2019?
Will Edge Computing IoT Solutions be a Real Trend in 2019?
Tyrone Systems
Middle East IoT Workshop
Middle East IoT Workshop
Haider Iqbal
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
superintendingengine17
IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020
Takayuki Yamazaki
Who will buy IOT products and why.
Who will buy IOT products and why.
Atanu Roy Chowdhury
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
8 trends of IoT in 2018
8 trends of IoT in 2018
Ahmed Banafa
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3
Dr. Ahmed Al Zaidy
ict.......pptx
ict.......pptx
Sushilpoudel15
Information system
Information system
Mohamed Ali
Ch 1.pdf
Ch 1.pdf
Mohamed Ali
Fundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docx
shericehewat
What's the future for data orchestration
What's the future for data orchestration
IIHEvents
Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015
Nikhil Dikshit
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Lounge47
Similar to Fundamentals of IoT Security
(20)
Digital Velocity London - What's The Future for Data Orchestration, Tealium D...
Digital Velocity London - What's The Future for Data Orchestration, Tealium D...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Funsec3e ppt ch03
Funsec3e ppt ch03
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
Will Edge Computing IoT Solutions be a Real Trend in 2019?
Will Edge Computing IoT Solutions be a Real Trend in 2019?
Middle East IoT Workshop
Middle East IoT Workshop
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020
Who will buy IOT products and why.
Who will buy IOT products and why.
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
8 trends of IoT in 2018
8 trends of IoT in 2018
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3
ict.......pptx
ict.......pptx
Information system
Information system
Ch 1.pdf
Ch 1.pdf
Fundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docx
What's the future for data orchestration
What's the future for data orchestration
Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
More from MhndHTaani
Assig. Three PHP final presentation.pptx
Assig. Three PHP final presentation.pptx
MhndHTaani
computer-history-powerpoint revised 1-20-13.pptx
computer-history-powerpoint revised 1-20-13.pptx
MhndHTaani
cryptography.pptx
cryptography.pptx
MhndHTaani
IOT technology.pptx
IOT technology.pptx
MhndHTaani
Chapter 2 - HTML5.pdf
Chapter 2 - HTML5.pdf
MhndHTaani
EER-database.ppt
EER-database.ppt
MhndHTaani
info-sys-security3.pptx
info-sys-security3.pptx
MhndHTaani
More from MhndHTaani
(7)
Assig. Three PHP final presentation.pptx
Assig. Three PHP final presentation.pptx
computer-history-powerpoint revised 1-20-13.pptx
computer-history-powerpoint revised 1-20-13.pptx
cryptography.pptx
cryptography.pptx
IOT technology.pptx
IOT technology.pptx
Chapter 2 - HTML5.pdf
Chapter 2 - HTML5.pdf
EER-database.ppt
EER-database.ppt
info-sys-security3.pptx
info-sys-security3.pptx
Recently uploaded
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
gurkirankumar98700
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
Recently uploaded
(20)
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Fundamentals of IoT Security
1.
Fundamentals of Information Systems
Security © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 1 Lesson 2 The Internet of Things Is Changing How We Live
2.
Learning Objective(s) © 2018
Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 2 Explain information systems security and its effect on people and businesses.
3.
Key Concepts © 2018
Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 3 The evolution of the Internet of Things (IoT) from the late 1990s to present The impact that the Internet and IoT have on human and business life How bricks-and-mortar businesses transform into e- business models with e-commerce and an IoT strategy How IP mobility is driving IoT to include both personal and business environments New challenges created by IoT
4.
The Internet of
Things Is Changing How We Live Facebook® Twitter® LinkedIn® Pinterest® Google+® Instagram® Social Media Mediums VoIP IM chat Audio conference Video conference Collaboration Digital Media © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 4
5.
Drivers for Internet
of Things (IoT) IP-based networking Connectivity Smaller and faster computing Cloud computing Data analytics © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 5
6.
Evolution of IoT ©
2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 6 Internet service providers (ISPs) Radio frequency identification (RFID) Application service providers (ASPs) Software as a Service (SaaS)
7.
How the Internet
and TCP/IP Transform Our Lives • The transition to a Transmission Control Protocol/Internet Protocol (TCP/IP) world changed our way of life. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 7 • People, families, businesses, educators, and government all communicate differently than they did before. • Nearly everyone has easy access to the Internet.
8.
IoT’s Impact on
Human and Business Life © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 8 The Internet has changed our day-to-day lives • Personally • Socially • Professionally Use the Internet to: • Check weather, news, and social media sites at home • Check business emails at work
9.
Store-and-Forward vs. Real-Time Communications •
Occurs instantaneously Real-time • Acceptable delay in transmitting communication Store-and- forward © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 9
10.
IoT’s Impact on
Humans Health monitoring and updating Home security and smart home control systems Online family member calendars Near real-time tracking and monitoring via GPS Online banking, bill paying, and financial transactions Online e-commerce purchases © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 10
11.
IoT’s Impact on
Business Retail stores Virtual workplace Remote sensors Traffic-monitoring applications B2C service delivery model “Anything as a Service” IoT applications © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 11
12.
Evolution from Bricks
and Mortar to E-Commerce © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 12 E-commerce • Sale of goods and services on the Internet Business-to-consumer (B2C) • Customers purchase goods and services directly from their website Business-to-business (B2B) • Businesses conduct sales with other businesses Payment Card Industry Data Security Standard (PCI DSS) • Protects private customer data
13.
Evolution from Bricks
and Mortar to E-Commerce (cont.) © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 13 Internet business challenges: • Growing the business through the Internet • Changing an existing conventional business into an e-business • Building secure and highly available websites and e-commerce portals • Building a web-enabled customer-service strategy • Finding new customers with Internet marketing
14.
E-business Strategy Elements ©
2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 14 E-commerce solution Internet marketing strategy E-customer service-delivery strategy Payment and credit card transaction processing
15.
Why Businesses Must
Have an Internet and IoT Marketing Strategy © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 15 Must remain competitive Bricks-and-mortar business model out of date in global market Customers require continuous access to information, products, and services
16.
IP Mobility © 2018
Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 16 Personal communication devices and mobile phones are powerful Cell phones are used to extend mobility Mobile phones, smartphones, and PDAs match the power and flexibility of small computers Tablets, smartphones, and netbooks fill need for lightweight portable devices
17.
Mobile Users and
Bring Your Own Device (BYOD) Employees and contractors use their own personal devices to connect to network at office Issues with Mobile Computing • Network • Usability • Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 17
18.
Mobile Applications © 2018
Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 18 Limited web browsers can’t run some traditional applications Bad interface design causes application failure on mobile devices Many users from multiple domains found uses for mobile applications Medical applications were a good fit for mobile applications
19.
Mobile Applications (cont.) ©
2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 19 4G & 5G networks provide true IP communications. Mobile IP enables users to: • Move between LAN segments and stay connected without interruption. • Maintain a connection to the network as long as the mobile device stays within network coverage.
20.
New Challenges Created
by the IoT © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 20 Security Privacy Interoperability Legal and regulatory compliance E-commerce and economic dev issues
21.
New Challenges Created
by the IoT © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 21 Security Privacy Interoperability Legal and regulatory compliance E-commerce and economic dev issues Security: How do you keep the bad guys out if you enable the IoT for your personal and professional life? Privacy: How do you protect your family’s identity and privacy data from theft or unauthorized access that can lead to identity theft? Interoperability and standards: How well do IoT manufacturers and ASP developers ensure that devices communicate securely? Legal and regulatory compliance E-commerce and economic development issues
22.
Security Challenges of
IT Devices © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 22 Deployed in large quantities (such as sensors or consumer items) Not maintained or updated devices allow vulnerabilities Upgrades can be difficult to distribute and deploy No owner visibility of how the device connects to the Internet Not physically secure Capture readings and measurements in the open
23.
Privacy Challenges © 2018
Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 23 Privacy policy statement. Definition of data, metadata, or analytical data use and rights. Ability for a user to provide consent to a manufacturer’s or application service provider’s privacy policy statement. Determine the domain of privacy.
24.
Interoperability and Standards ©
2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 24 Internet Engineering Task Force (IETF) ensures interoperability and standards can be pursued for IoT solutions. Interoperability has significant financial impacts if not properly addressed. Goal is to bring the cost of IoT devices and supporting applications down so they are affordable.
25.
Interoperability and Standards Challenges ©
2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 25 Some manufacturers want to design and deploy proprietary IoT devices and solutions. Cost factors to implement functional, operational, technical, and security capabilities into IoT devices and applications. Time-to-market risk. Technology outdated risk A void in interoperability and standards for IoT devices can create an environment of bad IoT devices
26.
Legal and Regulatory
Issues © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 26 Proper handling and protection of sensitive data Privacy data subject to privacy laws of state you live in as well as state that the IoT hosting company resides in IoT vendor or solutions provider required to adhere to security control requirements and data protection laws
27.
Legal and Regulatory
IoT Questions Who is collecting data? Who is collecting behavior patterns? Are they selling this data? Do they have the right to sell it? Is there liability associated with the data? © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 27
28.
E-Commerce and Economic Development Issues Infrastructure resources Foundational investments Technical and industry development Policy and regulatory definitions ©
2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 28
29.
Summary © 2018 Jones
and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 29 The evolution of the Internet of Things (IoT) from the late 1990s to present The impact that the Internet and IoT have on human and business life How bricks-and-mortar businesses transform into e-business models with e-commerce and an IoT strategy How IP mobility is driving IoT to include both personal and business environments New challenges created by IoT
Download now