SlideShare a Scribd company logo
HTTPS://WWW.GEEKSFO
RGEEKS.ORG/CHALLENG
ES-IN-INTERNET-OF-
THINGS-IOT/
The Internet of Things (IoT)
describes the network of physical
objects—“things”—that are
embedded with sensors, software,
and other technologies for the
purpose of connecting and
exchanging data with other
devices and systems over the
internet. These devices range from
ordinary household objects to
sophisticated industrial tools. With
more than 7 billion connected IoT
devices today, experts are
expecting this number to grow to
10 billion by 2020 and 22 billion
by 2025.
The Internet of Things (IoT) refers to the interconnectivity
of physical devices, vehicles, home appliances, and other
items embedded with electronics, software, sensors, and
connectivity, enabling these objects to connect and
exchange data. The IoT concept involves extending
Internet connectivity beyond traditional devices like
desktop and laptop computers, smartphones, and tablets
to a diverse range of instruments and everyday things. The
ultimate goal of IoT is to offer advanced connectivity of
devices, systems, and services that goes beyond machine-
to-machine communications and covers a variety of
protocols, domains, and applications.
The Internet of Things (IoT) has grown to be a large part of
how humans live, communicate and do business. All
across the world, web-enabled devices are turning our
global rights into a greater switched-on area to live in.
There are various types of challenges in front of IoT.
What is IoT?
challenges
https://elearningindustry.com/internet-of-things-is-
changing-elearning-6-ways
https://www.youtube.com/watch?v=Fj02iTrWUx0
https://www.youtube.com/watch?v=b4GBBb438Hs
https://www.youtube.com/watch?v=7qDvpjWu3Fo
Over the past few years, IoT has become one of the most important technologies of the
21st century. Now that we can connect everyday objects—kitchen appliances, cars,
thermostats, baby monitors—to the internet via embedded devices, seamless
communication is possible between people, processes, and things.
By means of low-cost computing, the cloud, big data, analytics, and mobile technologies,
physical things can share and collect data with minimal human intervention. In this
hyperconnected world, digital systems can record, monitor, and adjust each interaction
between connected things. The physical world meets the digital world—and they
cooperate.
Why is Internet of Things (IoT) so important?
What technologies have made IoT possible?
While the idea of IoT has been in existence for a long time, a collection of recent advances in a
number of different technologies has made it practical.
•Access to low-cost, low-power sensor technology. Affordable and reliable sensors are making IoT
technology possible for more manufacturers.
•Connectivity. A host of network protocols for the internet has made it easy to connect sensors to
the cloud and to other “things” for efficient data transfer.
•Cloud computing platforms. The increase in the availability of cloud platforms enables both
businesses and consumers to access the infrastructure they need to scale up without actually
having to manage it all.
•Machine learning and analytics. With advances in machine learning and analytics, along with
access to varied and vast amounts of data stored in the cloud, businesses can gather insights faster
and more easily. The emergence of these allied technologies continues to push the boundaries of
IoT and the data produced by IoT also feeds these technologies.
•Conversational artificial intelligence (AI). Advances in neural networks have brought natural-
language processing (NLP) to IoT devices (such as digital personal assistants Alexa, Cortana, and
Siri) and made them appealing, affordable, and viable for home use.
What You Should Know About IoT In The Education
Industry
Now the time has come. You must go through these
fantastic six things about the Internet of Things in the
education industry.
IoT devices such as intelligent whiteboards, tablets, and laptops can facilitate real-time
communication and collaboration between teachers and students, as well as between
students themselves. For example, a teacher could use an intelligent whiteboard to
present material to the class. Students could use their tablets to ask questions, share
ideas, or collaborate on group projects. This technology can make it easier for teachers
to connect with their students and for students to work together, regardless of their
location. It can also help to break down geographical barriers, allowing students from
different parts of the world to connect and collaborate in real time. To create software
using IoT, you must hire mobile application development services.
1. Improved Communication And Collaboration
With IoT devices, teachers and administrators can collect data about a student's
learning style, progress, and areas of difficulty. This information can be used to create
customized lesson plans and learning experiences tailored to each student's individual
needs. For example, a student struggling with a particular concept might be provided
with additional resources and support to help them better understand the material. On
the other hand, a student who is excelling in a subject might be challenged with more
advanced content to help them continue to grow and develop. Overall, personalized
learning can help ensure that each student receives the support and guidance they
need to succeed in their studies. It can also help to engage and motivate students by
providing them with learning experiences that are relevant and meaningful to their
needs and interests.
2. Personalized Learning
With IoT devices, such as interactive whiteboards and tablets, teachers can create
more engaging and interactive lessons that keep students interested and motivated.
For example, a teacher might use an interactive whiteboard to present multimedia
content, such as videos and graphics, to help illustrate a concept. Students can then
use tablets or other devices to respond to questions, participate in discussions, or
complete interactive activities related to the lesson. eLearning solutions with IoT
technologies can also facilitate collaboration and communication between students,
allowing them to collaborate on projects and share ideas and resources in real time.
It can help create a more dynamic and engaging learning environment conducive to
active learning and problem-solving. Overall, using IoT technologies in the
classroom can help increase student engagement and participation, leading to
better learning outcomes and a more positive learning experience.
3. Enhanced Classroom Engagement
With IoT systems, teachers and administrators can more efficiently monitor and manage
classroom resources, such as textbooks and materials. For example, an IoT school
management solution can track the use and availability of books and other materials,
alerting teachers when supplies need replenishment. It can help ensure that students
have the resources they need to succeed and can reduce waste by eliminating the need
for unnecessary duplication of materials. In addition, IoT technologies can monitor and
manage school facilities and equipment, such as classrooms, laboratories, and athletic
facilities. It can help optimize these resources' use and ensure they are efficient and
effective. Overall, using IoT systems in the education industry can help improve resource
management, leading to cost savings and more efficient and effective use of resources.
4. Improved Resource Management
With IoT devices, schools can monitor and secure their buildings, grounds, and buses,
helping to ensure the safety and well-being of students and staff. For example, IoT-enabled
security cameras can monitor school grounds and buildings, alerting authorities to potential
threats or suspicious activity. Similarly, IoT-enabled GPS tracking systems can monitor the
location and movement of school buses, helping to ensure the safety of students as they
travel to and from school. IoT technologies can also monitor and control access to school
buildings, using smart locks and other security systems to restrict access to authorized
personnel only. As a result, it can help to prevent unauthorized access and protect against
potential threats. Overall, using IoT technologies in the education industry can help enhance
safety and security, providing schools with the tools they need to protect their students and
staff.
5. Enhanced Safety And Security
With IoT systems, teachers and administrators can streamline many administrative tasks
that take up their time, such as attendance tracking and grading. It can free up more time
for teaching and learning and allow educators to focus on the core functions of their job.
For example, an IoT system to automate attendance tracking eliminates teachers' need to
take attendance every day manually. Similarly, an IoT system to grade assignments and
exams reduces the time and effort required to provide feedback to students. IoT
technologies can automate other administrative tasks, such as scheduling and
communication. It can help improve the education system's overall efficiency by reducing
the time and effort required to complete routine tasks. Overall, using IoT systems in the
education industry can help increase efficiency, allowing educators to focus on teaching
and learning and providing students with a more effective and efficient learning
experience.
6. Increased Efficiency
Although encryption is a great way to prevent hackers from accessing data, it is also one of
the leading IoT security challenges.
These drives like the storage and processing capabilities that would be found on a
traditional computer.
The result is an increase in attacks where hackers can easily manipulate the algorithms that
were designed for protection.
Lack of encryption –
With the increase in the number of IoT(internet of things) devices, IoT manufacturers are
more eager to produce and deliver their device as fast as they can without giving
security too much of although.
Most of these devices and IoT products do not get enough testing and updates and are
prone to hackers and other security issues.
Insufficient testing and updating –
Weak credentials and login details leave nearly all IoT devices vulnerable to
password hacking and brute force.
Any company that uses factory default credentials on their devices is placing both
their business and its assets and the customer and their valuable information at risk
of being susceptible to a brute force attack.
Brute forcing and the risk of default passwords –
Increases with increase in devices.
Ransomware uses encryption to effectively lock out users from various devices and
platforms and still use a user’s valuable data and info.
Example –
A hacker can hijack a computer camera and take pictures.
By using malware access points, the hackers can demand ransom to unlock the device and
return the data.
IoT Malware and ransomware –
IoT botnet workers can manipulate data privacy, which could be massive risks for an open
Crypto market. The exact value and creation of cryptocurrencies code face danger from mal-
intentioned hackers.
The blockchain companies are trying to boost security. Blockchain technology itself is not
particularly vulnerable, but the app development process is.
IoT botnet aiming at cryptocurrency –
Inadequate device security refers to the lack of proper measures to protect electronic
devices such as computers, smartphones, and IoT devices from cyber attacks,
hacking, data theft, and unauthorized access. This can happen due to outdated
software, weak passwords, unpatched vulnerabilities, lack of encryption, and other
security risks. It is important to regularly update the software and implement strong
security measures to ensure the security and privacy of sensitive information stored
on these devices. Many IoT devices have weak security features and can be easily
hacked.
Inadequate device security :
: Lack of standardization refers to the absence of agreed-upon specifications or protocols in
a particular field or industry. This can result in different systems, products, or processes being
incompatible with each other, leading to confusion, inefficiency, and decreased
interoperability. For example, in the context of technology, a lack of standardization can
cause difficulties in communication and data exchange between different devices and
systems. Establishing standards and protocols can help overcome this and ensure uniformity
and compatibility. There is a lack of standardization in IoT devices, making it difficult to
secure them consistently.
Lack of standardization
Vulnerability to network attacks refers to the susceptibility of a network, system or device to
being compromised or exploited by cyber criminals. This can happen due to weaknesses in the
network infrastructure, unpatched software, poor password management, or a lack of
appropriate security measures. Network attacks can result in data theft, loss of privacy,
disruption of services, and financial loss. To reduce vulnerability to network attacks, it’s
important to implement strong security measures such as firewalls, encryption, and regular
software updates, as well as educate users on safe internet practices. IoT devices rely on
networks, making them vulnerable to attacks like denial-of-service (DoS) attacks.
Vulnerability to network attacks:
Unsecured data transmission refers to the transfer of data over a network or the internet without
adequate protection. This can leave the data vulnerable to interception, tampering, or theft by
malicious actors. Unsecured data transmission can occur when data is transmitted over an
unencrypted network connection or when insecure protocols are used. To protect sensitive data
during transmission, it is important to use secure protocols such as SSL/TLS or VPN, and to encrypt
the data before sending it. This can help to ensure the confidentiality and integrity of the data, even if
it is intercepted during transmission. IoT devices often transmit sensitive data, which may be
vulnerable to eavesdropping or tampering if not properly secured.
Unsecured data transmission:
Privacy concerns refer to issues related to the collection, storage, use, and sharing of personal
information. This can include concerns about who has access to personal information, how it is being
used, and whether it is being protected from unauthorized access or misuse. In the digital age, privacy
concerns have become increasingly important as personal information is being collected and stored
on an unprecedented scale. To address privacy concerns, individuals and organizations need to
implement appropriate security measures to protect personal information, be transparent about how
it is being used, and respect individuals’ rights to control their own information. Additionally, privacy
laws and regulations have been established to provide guidelines and protections for individuals’
personal information. The vast amount of data generated by IoT devices raises privacy concerns, as
personal information could be collected and used without consent.
Privacy concerns:
Software vulnerabilities are weaknesses or flaws in software code that can be exploited by attackers
to gain unauthorized access, steal sensitive information, or carry out malicious activities. Software
vulnerabilities can arise from errors or mistakes made during the development process, or from the
use of outdated or unsupported software. Attackers can exploit these vulnerabilities to gain control
over a system, install malware, or steal sensitive information. To reduce the risk of software
vulnerabilities, it is important for software developers to follow secure coding practices and for users
to keep their software up-to-date and properly configured. Additionally, organizations and
individuals should implement robust security measures, such as firewalls, antivirus software, and
intrusion detection systems, to protect against potential threats. IoT devices often have software
vulnerabilities, which can be exploited by attackers to gain access to devices and networks.
Software vulnerabilities:
Insider threats refer to security risks that come from within an organization, rather than from
external sources such as hackers or cyber criminals. These threats can take many forms, such
as employees who intentionally or unintentionally cause harm to the organization,
contractors who misuse their access privileges, or insiders who are coerced into
compromising the security of the organization. Insider threats can result in data breaches,
theft of intellectual property, and damage to the reputation of the organization. To mitigate
the risk of insider threats, organizations should implement strict access controls, monitor
employee activity, and provide regular training on security and privacy policies. Additionally,
organizations should have a plan in place to detect, respond to, and recover from security
incidents involving insiders. Employees or contractors with access to IoT systems can pose a
security risk if they intentionally or unintentionally cause harm.
Insider threats:

More Related Content

Similar to Internet of Things IoT.pptx

Presentation (1).pptx
Presentation (1).pptxPresentation (1).pptx
Presentation (1).pptx
Kamilasharmin
 
IRJET- Smart Learning using IoT
IRJET-  	  Smart Learning using IoTIRJET-  	  Smart Learning using IoT
IRJET- Smart Learning using IoT
IRJET Journal
 
Campus Network.pptx
Campus Network.pptxCampus Network.pptx
Campus Network.pptx
ChetanGaurkar2
 
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdf
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdfhahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdf
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdf
Ramiz ALI
 
Internet of Things: Implications for Open and Distance Learning
Internet of Things: Implications for Open and Distance LearningInternet of Things: Implications for Open and Distance Learning
Internet of Things: Implications for Open and Distance Learning
Ramesh C. Sharma
 
Fog computing and data concurrency
Fog computing and data concurrencyFog computing and data concurrency
Fog computing and data concurrency
Priyanka Goswami
 
Assignment Template.docx
Assignment Template.docxAssignment Template.docx
Assignment Template.docx
MufizulIslam
 
Module 2 History and evolution of computer
Module 2 History and evolution of computerModule 2 History and evolution of computer
Module 2 History and evolution of computer
jcgevana
 
smart automation system
smart automation systemsmart automation system
smart automation system
Abhishek Bhadoria
 
Internet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingInternet of Things ( IoT ) Training
Internet of Things ( IoT ) Training
Tonex
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
IOT connected with e-learning
IOT connected with e-learningIOT connected with e-learning
IOT connected with e-learning
SubmissionResearchpa
 
IoT
IoTIoT
IoT
Mphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
Internet of Things
Internet of Things Internet of Things
Internet of Things
Mphasis
 
Internet of everything ppt
Internet of everything pptInternet of everything ppt
Internet of everything ppt
Lavanya Sharma
 
Research issues in IoT for education
Research issues in IoT for educationResearch issues in IoT for education
Research issues in IoT for education
Radouane Mrabet
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
Ijet v5 i6p12
Ijet v5 i6p12Ijet v5 i6p12
The Internet of Things (IoT) in Everyday Life.pdf
The Internet of Things (IoT) in Everyday Life.pdfThe Internet of Things (IoT) in Everyday Life.pdf
The Internet of Things (IoT) in Everyday Life.pdf
NIET Greater Noida ..
 

Similar to Internet of Things IoT.pptx (20)

Presentation (1).pptx
Presentation (1).pptxPresentation (1).pptx
Presentation (1).pptx
 
IRJET- Smart Learning using IoT
IRJET-  	  Smart Learning using IoTIRJET-  	  Smart Learning using IoT
IRJET- Smart Learning using IoT
 
Campus Network.pptx
Campus Network.pptxCampus Network.pptx
Campus Network.pptx
 
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdf
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdfhahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdf
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdf
 
Internet of Things: Implications for Open and Distance Learning
Internet of Things: Implications for Open and Distance LearningInternet of Things: Implications for Open and Distance Learning
Internet of Things: Implications for Open and Distance Learning
 
Fog computing and data concurrency
Fog computing and data concurrencyFog computing and data concurrency
Fog computing and data concurrency
 
Assignment Template.docx
Assignment Template.docxAssignment Template.docx
Assignment Template.docx
 
Module 2 History and evolution of computer
Module 2 History and evolution of computerModule 2 History and evolution of computer
Module 2 History and evolution of computer
 
smart automation system
smart automation systemsmart automation system
smart automation system
 
Internet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingInternet of Things ( IoT ) Training
Internet of Things ( IoT ) Training
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IOT connected with e-learning
IOT connected with e-learningIOT connected with e-learning
IOT connected with e-learning
 
IoT
IoTIoT
IoT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of Things
Internet of Things Internet of Things
Internet of Things
 
Internet of everything ppt
Internet of everything pptInternet of everything ppt
Internet of everything ppt
 
Research issues in IoT for education
Research issues in IoT for educationResearch issues in IoT for education
Research issues in IoT for education
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Ijet v5 i6p12
Ijet v5 i6p12Ijet v5 i6p12
Ijet v5 i6p12
 
The Internet of Things (IoT) in Everyday Life.pdf
The Internet of Things (IoT) in Everyday Life.pdfThe Internet of Things (IoT) in Everyday Life.pdf
The Internet of Things (IoT) in Everyday Life.pdf
 

More from Nirmala Rothinam

ducational Psychology provides an intern
ducational Psychology provides an internducational Psychology provides an intern
ducational Psychology provides an intern
Nirmala Rothinam
 
Behaviourism.pptx
Behaviourism.pptxBehaviourism.pptx
Behaviourism.pptx
Nirmala Rothinam
 
Constructivism Learning Theory.pptx
Constructivism Learning Theory.pptxConstructivism Learning Theory.pptx
Constructivism Learning Theory.pptx
Nirmala Rothinam
 
Branches of Philosophy.pptx
Branches of Philosophy.pptxBranches of Philosophy.pptx
Branches of Philosophy.pptx
Nirmala Rothinam
 
Humanistic Learning Theory.pptx
Humanistic Learning Theory.pptxHumanistic Learning Theory.pptx
Humanistic Learning Theory.pptx
Nirmala Rothinam
 
epistemology.ppt
epistemology.pptepistemology.ppt
epistemology.ppt
Nirmala Rothinam
 
Behaviourism.pptx
Behaviourism.pptxBehaviourism.pptx
Behaviourism.pptx
Nirmala Rothinam
 
HOTS_and_Questioning_Black_and_White.ppt
HOTS_and_Questioning_Black_and_White.pptHOTS_and_Questioning_Black_and_White.ppt
HOTS_and_Questioning_Black_and_White.ppt
Nirmala Rothinam
 
Inductive Learning Examples.ppt
Inductive Learning Examples.pptInductive Learning Examples.ppt
Inductive Learning Examples.ppt
Nirmala Rothinam
 
Cooperative Learning Model.pptx
Cooperative Learning Model.pptxCooperative Learning Model.pptx
Cooperative Learning Model.pptx
Nirmala Rothinam
 
ELT_methods_Dendrinos_testing.pptx
ELT_methods_Dendrinos_testing.pptxELT_methods_Dendrinos_testing.pptx
ELT_methods_Dendrinos_testing.pptx
Nirmala Rothinam
 
Blue and Green Business infographic.pptx
Blue and Green Business infographic.pptxBlue and Green Business infographic.pptx
Blue and Green Business infographic.pptx
Nirmala Rothinam
 
Trial perlis spm 2010 english
Trial perlis spm 2010 englishTrial perlis spm 2010 english
Trial perlis spm 2010 english
Nirmala Rothinam
 
Skema english p12 trial spm 2013 kedah set b cy
Skema english p12 trial spm 2013 kedah set b cySkema english p12 trial spm 2013 kedah set b cy
Skema english p12 trial spm 2013 kedah set b cy
Nirmala Rothinam
 
Pahang spm trial 2010 english
Pahang spm trial 2010 englishPahang spm trial 2010 english
Pahang spm trial 2010 english
Nirmala Rothinam
 
Kertas 2 pep percubaan spm terengganu 2013 soalan
Kertas 2 pep percubaan spm terengganu 2013 soalanKertas 2 pep percubaan spm terengganu 2013 soalan
Kertas 2 pep percubaan spm terengganu 2013 soalan
Nirmala Rothinam
 
Kertas 1 pep percubaan spm sbp 2012 soalan
Kertas 1 pep percubaan spm sbp 2012 soalanKertas 1 pep percubaan spm sbp 2012 soalan
Kertas 1 pep percubaan spm sbp 2012 soalan
Nirmala Rothinam
 
Johor spm trial 2010 english
Johor spm trial 2010 englishJohor spm trial 2010 english
Johor spm trial 2010 english
Nirmala Rothinam
 

More from Nirmala Rothinam (20)

ducational Psychology provides an intern
ducational Psychology provides an internducational Psychology provides an intern
ducational Psychology provides an intern
 
Behaviourism.pptx
Behaviourism.pptxBehaviourism.pptx
Behaviourism.pptx
 
Constructivism Learning Theory.pptx
Constructivism Learning Theory.pptxConstructivism Learning Theory.pptx
Constructivism Learning Theory.pptx
 
Branches of Philosophy.pptx
Branches of Philosophy.pptxBranches of Philosophy.pptx
Branches of Philosophy.pptx
 
Humanistic Learning Theory.pptx
Humanistic Learning Theory.pptxHumanistic Learning Theory.pptx
Humanistic Learning Theory.pptx
 
epistemology.ppt
epistemology.pptepistemology.ppt
epistemology.ppt
 
Behaviourism.pptx
Behaviourism.pptxBehaviourism.pptx
Behaviourism.pptx
 
HOTS_and_Questioning_Black_and_White.ppt
HOTS_and_Questioning_Black_and_White.pptHOTS_and_Questioning_Black_and_White.ppt
HOTS_and_Questioning_Black_and_White.ppt
 
Inductive Learning Examples.ppt
Inductive Learning Examples.pptInductive Learning Examples.ppt
Inductive Learning Examples.ppt
 
Cooperative Learning Model.pptx
Cooperative Learning Model.pptxCooperative Learning Model.pptx
Cooperative Learning Model.pptx
 
ELT_methods_Dendrinos_testing.pptx
ELT_methods_Dendrinos_testing.pptxELT_methods_Dendrinos_testing.pptx
ELT_methods_Dendrinos_testing.pptx
 
Blue and Green Business infographic.pptx
Blue and Green Business infographic.pptxBlue and Green Business infographic.pptx
Blue and Green Business infographic.pptx
 
Trial perlis spm 2010 english
Trial perlis spm 2010 englishTrial perlis spm 2010 english
Trial perlis spm 2010 english
 
Skema english p12 trial spm 2013 kedah set b cy
Skema english p12 trial spm 2013 kedah set b cySkema english p12 trial spm 2013 kedah set b cy
Skema english p12 trial spm 2013 kedah set b cy
 
Pahang spm trial 2010 english
Pahang spm trial 2010 englishPahang spm trial 2010 english
Pahang spm trial 2010 english
 
Mrsm bi201 o
Mrsm bi201 oMrsm bi201 o
Mrsm bi201 o
 
Kertas 2 pep percubaan spm terengganu 2013 soalan
Kertas 2 pep percubaan spm terengganu 2013 soalanKertas 2 pep percubaan spm terengganu 2013 soalan
Kertas 2 pep percubaan spm terengganu 2013 soalan
 
Kertas 1 pep percubaan spm sbp 2012 soalan
Kertas 1 pep percubaan spm sbp 2012 soalanKertas 1 pep percubaan spm sbp 2012 soalan
Kertas 1 pep percubaan spm sbp 2012 soalan
 
Kedah 2012 vvip
Kedah 2012 vvipKedah 2012 vvip
Kedah 2012 vvip
 
Johor spm trial 2010 english
Johor spm trial 2010 englishJohor spm trial 2010 english
Johor spm trial 2010 english
 

Recently uploaded

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 

Recently uploaded (20)

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 

Internet of Things IoT.pptx

  • 2.
  • 3.
  • 4. The Internet of Things (IoT) describes the network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet. These devices range from ordinary household objects to sophisticated industrial tools. With more than 7 billion connected IoT devices today, experts are expecting this number to grow to 10 billion by 2020 and 22 billion by 2025. The Internet of Things (IoT) refers to the interconnectivity of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, and connectivity, enabling these objects to connect and exchange data. The IoT concept involves extending Internet connectivity beyond traditional devices like desktop and laptop computers, smartphones, and tablets to a diverse range of instruments and everyday things. The ultimate goal of IoT is to offer advanced connectivity of devices, systems, and services that goes beyond machine- to-machine communications and covers a variety of protocols, domains, and applications. The Internet of Things (IoT) has grown to be a large part of how humans live, communicate and do business. All across the world, web-enabled devices are turning our global rights into a greater switched-on area to live in. There are various types of challenges in front of IoT. What is IoT?
  • 6. Over the past few years, IoT has become one of the most important technologies of the 21st century. Now that we can connect everyday objects—kitchen appliances, cars, thermostats, baby monitors—to the internet via embedded devices, seamless communication is possible between people, processes, and things. By means of low-cost computing, the cloud, big data, analytics, and mobile technologies, physical things can share and collect data with minimal human intervention. In this hyperconnected world, digital systems can record, monitor, and adjust each interaction between connected things. The physical world meets the digital world—and they cooperate. Why is Internet of Things (IoT) so important?
  • 7. What technologies have made IoT possible? While the idea of IoT has been in existence for a long time, a collection of recent advances in a number of different technologies has made it practical. •Access to low-cost, low-power sensor technology. Affordable and reliable sensors are making IoT technology possible for more manufacturers. •Connectivity. A host of network protocols for the internet has made it easy to connect sensors to the cloud and to other “things” for efficient data transfer. •Cloud computing platforms. The increase in the availability of cloud platforms enables both businesses and consumers to access the infrastructure they need to scale up without actually having to manage it all. •Machine learning and analytics. With advances in machine learning and analytics, along with access to varied and vast amounts of data stored in the cloud, businesses can gather insights faster and more easily. The emergence of these allied technologies continues to push the boundaries of IoT and the data produced by IoT also feeds these technologies. •Conversational artificial intelligence (AI). Advances in neural networks have brought natural- language processing (NLP) to IoT devices (such as digital personal assistants Alexa, Cortana, and Siri) and made them appealing, affordable, and viable for home use.
  • 8. What You Should Know About IoT In The Education Industry Now the time has come. You must go through these fantastic six things about the Internet of Things in the education industry.
  • 9. IoT devices such as intelligent whiteboards, tablets, and laptops can facilitate real-time communication and collaboration between teachers and students, as well as between students themselves. For example, a teacher could use an intelligent whiteboard to present material to the class. Students could use their tablets to ask questions, share ideas, or collaborate on group projects. This technology can make it easier for teachers to connect with their students and for students to work together, regardless of their location. It can also help to break down geographical barriers, allowing students from different parts of the world to connect and collaborate in real time. To create software using IoT, you must hire mobile application development services. 1. Improved Communication And Collaboration
  • 10. With IoT devices, teachers and administrators can collect data about a student's learning style, progress, and areas of difficulty. This information can be used to create customized lesson plans and learning experiences tailored to each student's individual needs. For example, a student struggling with a particular concept might be provided with additional resources and support to help them better understand the material. On the other hand, a student who is excelling in a subject might be challenged with more advanced content to help them continue to grow and develop. Overall, personalized learning can help ensure that each student receives the support and guidance they need to succeed in their studies. It can also help to engage and motivate students by providing them with learning experiences that are relevant and meaningful to their needs and interests. 2. Personalized Learning
  • 11. With IoT devices, such as interactive whiteboards and tablets, teachers can create more engaging and interactive lessons that keep students interested and motivated. For example, a teacher might use an interactive whiteboard to present multimedia content, such as videos and graphics, to help illustrate a concept. Students can then use tablets or other devices to respond to questions, participate in discussions, or complete interactive activities related to the lesson. eLearning solutions with IoT technologies can also facilitate collaboration and communication between students, allowing them to collaborate on projects and share ideas and resources in real time. It can help create a more dynamic and engaging learning environment conducive to active learning and problem-solving. Overall, using IoT technologies in the classroom can help increase student engagement and participation, leading to better learning outcomes and a more positive learning experience. 3. Enhanced Classroom Engagement
  • 12. With IoT systems, teachers and administrators can more efficiently monitor and manage classroom resources, such as textbooks and materials. For example, an IoT school management solution can track the use and availability of books and other materials, alerting teachers when supplies need replenishment. It can help ensure that students have the resources they need to succeed and can reduce waste by eliminating the need for unnecessary duplication of materials. In addition, IoT technologies can monitor and manage school facilities and equipment, such as classrooms, laboratories, and athletic facilities. It can help optimize these resources' use and ensure they are efficient and effective. Overall, using IoT systems in the education industry can help improve resource management, leading to cost savings and more efficient and effective use of resources. 4. Improved Resource Management
  • 13. With IoT devices, schools can monitor and secure their buildings, grounds, and buses, helping to ensure the safety and well-being of students and staff. For example, IoT-enabled security cameras can monitor school grounds and buildings, alerting authorities to potential threats or suspicious activity. Similarly, IoT-enabled GPS tracking systems can monitor the location and movement of school buses, helping to ensure the safety of students as they travel to and from school. IoT technologies can also monitor and control access to school buildings, using smart locks and other security systems to restrict access to authorized personnel only. As a result, it can help to prevent unauthorized access and protect against potential threats. Overall, using IoT technologies in the education industry can help enhance safety and security, providing schools with the tools they need to protect their students and staff. 5. Enhanced Safety And Security
  • 14. With IoT systems, teachers and administrators can streamline many administrative tasks that take up their time, such as attendance tracking and grading. It can free up more time for teaching and learning and allow educators to focus on the core functions of their job. For example, an IoT system to automate attendance tracking eliminates teachers' need to take attendance every day manually. Similarly, an IoT system to grade assignments and exams reduces the time and effort required to provide feedback to students. IoT technologies can automate other administrative tasks, such as scheduling and communication. It can help improve the education system's overall efficiency by reducing the time and effort required to complete routine tasks. Overall, using IoT systems in the education industry can help increase efficiency, allowing educators to focus on teaching and learning and providing students with a more effective and efficient learning experience. 6. Increased Efficiency
  • 15. Although encryption is a great way to prevent hackers from accessing data, it is also one of the leading IoT security challenges. These drives like the storage and processing capabilities that would be found on a traditional computer. The result is an increase in attacks where hackers can easily manipulate the algorithms that were designed for protection. Lack of encryption –
  • 16. With the increase in the number of IoT(internet of things) devices, IoT manufacturers are more eager to produce and deliver their device as fast as they can without giving security too much of although. Most of these devices and IoT products do not get enough testing and updates and are prone to hackers and other security issues. Insufficient testing and updating –
  • 17. Weak credentials and login details leave nearly all IoT devices vulnerable to password hacking and brute force. Any company that uses factory default credentials on their devices is placing both their business and its assets and the customer and their valuable information at risk of being susceptible to a brute force attack. Brute forcing and the risk of default passwords –
  • 18. Increases with increase in devices. Ransomware uses encryption to effectively lock out users from various devices and platforms and still use a user’s valuable data and info. Example – A hacker can hijack a computer camera and take pictures. By using malware access points, the hackers can demand ransom to unlock the device and return the data. IoT Malware and ransomware –
  • 19. IoT botnet workers can manipulate data privacy, which could be massive risks for an open Crypto market. The exact value and creation of cryptocurrencies code face danger from mal- intentioned hackers. The blockchain companies are trying to boost security. Blockchain technology itself is not particularly vulnerable, but the app development process is. IoT botnet aiming at cryptocurrency –
  • 20. Inadequate device security refers to the lack of proper measures to protect electronic devices such as computers, smartphones, and IoT devices from cyber attacks, hacking, data theft, and unauthorized access. This can happen due to outdated software, weak passwords, unpatched vulnerabilities, lack of encryption, and other security risks. It is important to regularly update the software and implement strong security measures to ensure the security and privacy of sensitive information stored on these devices. Many IoT devices have weak security features and can be easily hacked. Inadequate device security :
  • 21. : Lack of standardization refers to the absence of agreed-upon specifications or protocols in a particular field or industry. This can result in different systems, products, or processes being incompatible with each other, leading to confusion, inefficiency, and decreased interoperability. For example, in the context of technology, a lack of standardization can cause difficulties in communication and data exchange between different devices and systems. Establishing standards and protocols can help overcome this and ensure uniformity and compatibility. There is a lack of standardization in IoT devices, making it difficult to secure them consistently. Lack of standardization
  • 22. Vulnerability to network attacks refers to the susceptibility of a network, system or device to being compromised or exploited by cyber criminals. This can happen due to weaknesses in the network infrastructure, unpatched software, poor password management, or a lack of appropriate security measures. Network attacks can result in data theft, loss of privacy, disruption of services, and financial loss. To reduce vulnerability to network attacks, it’s important to implement strong security measures such as firewalls, encryption, and regular software updates, as well as educate users on safe internet practices. IoT devices rely on networks, making them vulnerable to attacks like denial-of-service (DoS) attacks. Vulnerability to network attacks:
  • 23. Unsecured data transmission refers to the transfer of data over a network or the internet without adequate protection. This can leave the data vulnerable to interception, tampering, or theft by malicious actors. Unsecured data transmission can occur when data is transmitted over an unencrypted network connection or when insecure protocols are used. To protect sensitive data during transmission, it is important to use secure protocols such as SSL/TLS or VPN, and to encrypt the data before sending it. This can help to ensure the confidentiality and integrity of the data, even if it is intercepted during transmission. IoT devices often transmit sensitive data, which may be vulnerable to eavesdropping or tampering if not properly secured. Unsecured data transmission:
  • 24. Privacy concerns refer to issues related to the collection, storage, use, and sharing of personal information. This can include concerns about who has access to personal information, how it is being used, and whether it is being protected from unauthorized access or misuse. In the digital age, privacy concerns have become increasingly important as personal information is being collected and stored on an unprecedented scale. To address privacy concerns, individuals and organizations need to implement appropriate security measures to protect personal information, be transparent about how it is being used, and respect individuals’ rights to control their own information. Additionally, privacy laws and regulations have been established to provide guidelines and protections for individuals’ personal information. The vast amount of data generated by IoT devices raises privacy concerns, as personal information could be collected and used without consent. Privacy concerns:
  • 25. Software vulnerabilities are weaknesses or flaws in software code that can be exploited by attackers to gain unauthorized access, steal sensitive information, or carry out malicious activities. Software vulnerabilities can arise from errors or mistakes made during the development process, or from the use of outdated or unsupported software. Attackers can exploit these vulnerabilities to gain control over a system, install malware, or steal sensitive information. To reduce the risk of software vulnerabilities, it is important for software developers to follow secure coding practices and for users to keep their software up-to-date and properly configured. Additionally, organizations and individuals should implement robust security measures, such as firewalls, antivirus software, and intrusion detection systems, to protect against potential threats. IoT devices often have software vulnerabilities, which can be exploited by attackers to gain access to devices and networks. Software vulnerabilities:
  • 26. Insider threats refer to security risks that come from within an organization, rather than from external sources such as hackers or cyber criminals. These threats can take many forms, such as employees who intentionally or unintentionally cause harm to the organization, contractors who misuse their access privileges, or insiders who are coerced into compromising the security of the organization. Insider threats can result in data breaches, theft of intellectual property, and damage to the reputation of the organization. To mitigate the risk of insider threats, organizations should implement strict access controls, monitor employee activity, and provide regular training on security and privacy policies. Additionally, organizations should have a plan in place to detect, respond to, and recover from security incidents involving insiders. Employees or contractors with access to IoT systems can pose a security risk if they intentionally or unintentionally cause harm. Insider threats: