SlideShare a Scribd company logo
1 of 17
IOT
INTERNET OF THINGS
What is
IoT? The Internet of Things
(IoT) is the network of
physical objects—
devices, vehicles,
buildings and other
items embedded with
electronics, software,
sensors, and network
connectivity—that
enables these objects to
collect and exchange
data.
VARIOUS NAMES, ONE
CONCEPT
M2M (MACHINE TO MACHINE)
“INTERNET OF EVERYTHING” (CISCO SYSTEMS)
“WORLD SIZE WEB” (BRUCE SCHNEIER)
“SKYNET” (TERMINATOR MOVIE)
WHERE IS IOT?
IT’S EVERYWHERE
THE IOT MARKET
WHY BE CONCERNED ABOUT IOT?
IT’S JUST ANOTHER COMPUTER, RIGHT?
ALL OF THE SAME ISSUES WE HAVE WITH ACCESS CONTROL, VULNERABILITY MANAGEMENT, PATCHING,
MONITORING, ETC.
IMAGINE YOUR NETWORK WITH 1,000,000 MORE DEVICES
ANY COMPROMISED DEVICE IS A FOOTHOLD ON THE NETWORK
DOES IOT ADD ADDITIONAL
RISK?
ARE HIGHLY PORTABLE DEVICES CAPTURED DURING VULNERABILITY SCANS?
WHERE IS YOUR NETWORK PERIMETER?
ARE CONSUMER DEVICES BEING USED IN AREAS – LIKE HEALTH CARE – WHERE RELIABILITY IS
CRITICAL?
DO USERS INSTALL DEVICE MANAGEMENT SOFTWARE ON OTHER COM
ATTACKING IOT
DEFAULT, WEAK, AND HARDCODED CREDENTIALS
DIFFICULT TO UPDATE FIRMWARE AND OS
LACK OF VENDOR SUPPORT FOR REPAIRING VULNERABILITIES
VULNERABLE WEB INTERFACES (SQL INJECTION, XSS)
CODING ERRORS (BUFFER OVERFLOW)
CLEAR TEXT PROTOCOLS AND UNNECESSARY OPEN PORTS
DOS / DDOS
PHYSICAL THEFT AND TAMPERING
CASE STUDY: LESSONS LEARNED
ALL SOFTWARE CAN CONTAIN VULNERABILITIES
PUBLIC NOT INFORMED FOR MONTHS
VENDORS MAY DELAY OR IGNORE ISSUES
PRODUCT LIFECYCLES AND END-OF-SUPPORT
PATCHING IOT DEVICES MAY NOT SCALE IN LARGE ENVIRONMENTS
RECOMMENDATIONS 01
ACCOMMODATE IOT WITH EXISTING PRACTICES:
POLICIES, PROCEDURES, & STANDARDS
AWARENESS TRAINING
RISK MANAGEMENT
VULNERABILITY MANAGEMENT
FORENSICS
RECOMMENDATIONS 02
PLAN FOR IOT GROWTH:
ADDITIONAL TYPES OF LOGGING, LOG STORAGE: CAN YOU FIND THE NEEDLE IN THE HAYSTACK?
INCREASED NETWORK TRAFFIC: WILL YOUR FIREWALL / IDS / IPS BE COMPATIBLE AND KEEP UP?
INCREASED DEMAND FOR IP ADDRESSES BOTH IPV4 AND IPV6
INCREASED NETWORK COMPLEXITY – SHOULD THESE DEVICES BE ISOLATED OR SEGMENTED?
RECOMMENDATIONS 03
STRENGTHEN PARTNERSHIPS WITH
RESEARCHERS, VENDORS, AND
PROCUREMENT DEPARTMENT
THREAT VS. OPPORTUNITY
IF MISUNDERSTOOD AND MISCONFIGURED, IOT POSES RISK TO OUR DATA,
PRIVACY, AND SAFETY
IF UNDERSTOOD AND SECURED, IOT WILL ENHANCE COMMUNICATIONS,
LIFESTYLE, AND DELIVERY OF SERVICES
THANK YOU!
R.M.LAHIRU RUWAN WIJESINGHE
STUDENT OF ICT NVQ LEVEL IV
DEPARTMENT OF TECHNICAL EDUCATION & TRANING
QUESTIONS AND DISCUSSION
DESCRIPTION DISTRICT COORDINATOR OF INFORMATION & COMMUNICATION
AGENCY OF SRILANKA
Internet of things by Lahiru Ruwan wijesinghe

More Related Content

What's hot

The Internet of Things (and the myth of the “Smart” Fridge)
The Internet of Things (and the myth of the “Smart” Fridge)The Internet of Things (and the myth of the “Smart” Fridge)
The Internet of Things (and the myth of the “Smart” Fridge)Avi Itzkovitch
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTautomatskicorporation
 
Internet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginnersInternet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginnersFIITJEE PU College
 
secureIoT Presentation #1
secureIoT Presentation #1secureIoT Presentation #1
secureIoT Presentation #1Mel Savich
 
Internet Of Things Introduction
Internet Of Things Introduction Internet Of Things Introduction
Internet Of Things Introduction AARYAN GUPTA
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of ThingsRohan M
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...AkshetPatel
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the EnterpriseDaniel Miessler
 
Ubiquitous Computing A Next Generation Perspective
Ubiquitous Computing A Next Generation PerspectiveUbiquitous Computing A Next Generation Perspective
Ubiquitous Computing A Next Generation PerspectiveSharbani Bhattacharya
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsChromeInfo Technologies
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystemrahulbindra
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at ScaleWinston Morton
 

What's hot (20)

IoT
IoTIoT
IoT
 
Internet of Things Webinar
Internet of Things WebinarInternet of Things Webinar
Internet of Things Webinar
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
The Internet of Things (and the myth of the “Smart” Fridge)
The Internet of Things (and the myth of the “Smart” Fridge)The Internet of Things (and the myth of the “Smart” Fridge)
The Internet of Things (and the myth of the “Smart” Fridge)
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoT
 
What is IoT?
What is IoT?What is IoT?
What is IoT?
 
Internet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginnersInternet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginners
 
secureIoT Presentation #1
secureIoT Presentation #1secureIoT Presentation #1
secureIoT Presentation #1
 
Internet Of Things Introduction
Internet Of Things Introduction Internet Of Things Introduction
Internet Of Things Introduction
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
internet of things
internet of thingsinternet of things
internet of things
 
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
 
Ubiquitous Computing A Next Generation Perspective
Ubiquitous Computing A Next Generation PerspectiveUbiquitous Computing A Next Generation Perspective
Ubiquitous Computing A Next Generation Perspective
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystem
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at Scale
 

Similar to Internet of things by Lahiru Ruwan wijesinghe

IOT presentation.pptx
IOT presentation.pptxIOT presentation.pptx
IOT presentation.pptxchWaqasZahid
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)sandhibhide
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy AnkitThakkar46
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)shashankvaidyar2
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB
 
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGINTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGAYESHA JAVED
 
The Internet of Things (IoT)
The Internet of Things (IoT)The Internet of Things (IoT)
The Internet of Things (IoT)Dadhaniya Renish
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)GOPAL BASAK
 
Toastmaster Speech - Internet of Things
Toastmaster Speech - Internet of Things Toastmaster Speech - Internet of Things
Toastmaster Speech - Internet of Things Hasani Jaali
 

Similar to Internet of things by Lahiru Ruwan wijesinghe (20)

IOT presentation.pptx
IOT presentation.pptxIOT presentation.pptx
IOT presentation.pptx
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
Internet of Things(IOT)
Internet of Things(IOT)Internet of Things(IOT)
Internet of Things(IOT)
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of Things
 
IoT
IoTIoT
IoT
 
Internet Of Things ppt
Internet Of Things pptInternet Of Things ppt
Internet Of Things ppt
 
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGINTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
 
The Internet of Things (IoT)
The Internet of Things (IoT)The Internet of Things (IoT)
The Internet of Things (IoT)
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
What is the internet of things v3
What is the internet of things v3What is the internet of things v3
What is the internet of things v3
 
Questions in iot
Questions in iotQuestions in iot
Questions in iot
 
IOT.pptx
IOT.pptxIOT.pptx
IOT.pptx
 
Toastmaster Speech - Internet of Things
Toastmaster Speech - Internet of Things Toastmaster Speech - Internet of Things
Toastmaster Speech - Internet of Things
 

Recently uploaded

Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfakankshagupta7348026
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrsaastr
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 

Recently uploaded (20)

Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdf
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 

Internet of things by Lahiru Ruwan wijesinghe

  • 2. What is IoT? The Internet of Things (IoT) is the network of physical objects— devices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivity—that enables these objects to collect and exchange data.
  • 3. VARIOUS NAMES, ONE CONCEPT M2M (MACHINE TO MACHINE) “INTERNET OF EVERYTHING” (CISCO SYSTEMS) “WORLD SIZE WEB” (BRUCE SCHNEIER) “SKYNET” (TERMINATOR MOVIE)
  • 4. WHERE IS IOT? IT’S EVERYWHERE
  • 5.
  • 7. WHY BE CONCERNED ABOUT IOT? IT’S JUST ANOTHER COMPUTER, RIGHT? ALL OF THE SAME ISSUES WE HAVE WITH ACCESS CONTROL, VULNERABILITY MANAGEMENT, PATCHING, MONITORING, ETC. IMAGINE YOUR NETWORK WITH 1,000,000 MORE DEVICES ANY COMPROMISED DEVICE IS A FOOTHOLD ON THE NETWORK
  • 8. DOES IOT ADD ADDITIONAL RISK? ARE HIGHLY PORTABLE DEVICES CAPTURED DURING VULNERABILITY SCANS? WHERE IS YOUR NETWORK PERIMETER? ARE CONSUMER DEVICES BEING USED IN AREAS – LIKE HEALTH CARE – WHERE RELIABILITY IS CRITICAL? DO USERS INSTALL DEVICE MANAGEMENT SOFTWARE ON OTHER COM
  • 9. ATTACKING IOT DEFAULT, WEAK, AND HARDCODED CREDENTIALS DIFFICULT TO UPDATE FIRMWARE AND OS LACK OF VENDOR SUPPORT FOR REPAIRING VULNERABILITIES VULNERABLE WEB INTERFACES (SQL INJECTION, XSS) CODING ERRORS (BUFFER OVERFLOW) CLEAR TEXT PROTOCOLS AND UNNECESSARY OPEN PORTS DOS / DDOS PHYSICAL THEFT AND TAMPERING
  • 10. CASE STUDY: LESSONS LEARNED ALL SOFTWARE CAN CONTAIN VULNERABILITIES PUBLIC NOT INFORMED FOR MONTHS VENDORS MAY DELAY OR IGNORE ISSUES PRODUCT LIFECYCLES AND END-OF-SUPPORT PATCHING IOT DEVICES MAY NOT SCALE IN LARGE ENVIRONMENTS
  • 11. RECOMMENDATIONS 01 ACCOMMODATE IOT WITH EXISTING PRACTICES: POLICIES, PROCEDURES, & STANDARDS AWARENESS TRAINING RISK MANAGEMENT VULNERABILITY MANAGEMENT FORENSICS
  • 12. RECOMMENDATIONS 02 PLAN FOR IOT GROWTH: ADDITIONAL TYPES OF LOGGING, LOG STORAGE: CAN YOU FIND THE NEEDLE IN THE HAYSTACK? INCREASED NETWORK TRAFFIC: WILL YOUR FIREWALL / IDS / IPS BE COMPATIBLE AND KEEP UP? INCREASED DEMAND FOR IP ADDRESSES BOTH IPV4 AND IPV6 INCREASED NETWORK COMPLEXITY – SHOULD THESE DEVICES BE ISOLATED OR SEGMENTED?
  • 13. RECOMMENDATIONS 03 STRENGTHEN PARTNERSHIPS WITH RESEARCHERS, VENDORS, AND PROCUREMENT DEPARTMENT
  • 14. THREAT VS. OPPORTUNITY IF MISUNDERSTOOD AND MISCONFIGURED, IOT POSES RISK TO OUR DATA, PRIVACY, AND SAFETY IF UNDERSTOOD AND SECURED, IOT WILL ENHANCE COMMUNICATIONS, LIFESTYLE, AND DELIVERY OF SERVICES
  • 15. THANK YOU! R.M.LAHIRU RUWAN WIJESINGHE STUDENT OF ICT NVQ LEVEL IV DEPARTMENT OF TECHNICAL EDUCATION & TRANING
  • 16. QUESTIONS AND DISCUSSION DESCRIPTION DISTRICT COORDINATOR OF INFORMATION & COMMUNICATION AGENCY OF SRILANKA