SlideShare a Scribd company logo
1 of 29
Download to read offline
IoT: the dream
and the nightmare…
Kate Carruthers #eIoT2015
Slides are online:
http://www.slideshare.net/carruthk
Oct-2015 © 2015 Kate Carruthers 2
Oct-2015 © 2015 Kate Carruthers 3
IoT is part of the
digital
transformation of
business, the
economy, and
society
Oct-2015 © 2015 Kate Carruthers 4
Industrial
revolution
Digital
revolution
IoT
revolution
Industrial
internet. Rise of
networked
industry.
Convergence of
industrial, digital,
analytics, &
connectivity.
Distributed
information and
communication
networks. Rise of
networked economy
powered by apps.
Harnessing
machines to drive
economies of scale.
Shift away from
agriculture based
economies.
Oct-2015 © 2015 Kate Carruthers 5
Source: Matt Turck, Internet of Things Landscape (Version 3.0), http://www.slideshare.net/mjft01/internet-of-things-42280078/1
Source: IOT Philippines Inc.
http://www.iotphils.com/solutions/smart-home/
Oct-2015 © 2015 Kate Carruthers 6
Oct-2015 © 2015 Kate Carruthers 7
Source: http://blog.csiro.au/a-much-smarter-watch-how-our-flexible-batteries-and-electrified-fabrics-can-improve-wearables/
Oct-2015 © 2015 Kate Carruthers 8
“The real role of wearables
that no one talks about is all
these smart things around
you have no idea what’s
happening with you…”
- Hosain Rahman, CEO Jawbone
Source: 'Ingestibles' could become the new wearables faster than you think, Alicia Marie Tan, Mashable, Oct 2015, http://mashable.com/2015/10/14/jawbone-ingestibles/#RqDiEDnH3Sql
Oct-2015 © 2015 Kate Carruthers 9
“I always use the example of,
no matter how smart my
thermostat is, it has no idea if
I’m hot or cold.”
- Hosain Rahman, CEO Jawbone
Source: 'Ingestibles' could become the new wearables faster than you think, Alicia Marie Tan, Mashable, Oct 2015, http://mashable.com/2015/10/14/jawbone-ingestibles/#RqDiEDnH3Sql
Oct-2015 © 2015 Kate Carruthers 10
Robyn Lewis
founder and CEO
VisitVineyards.com
Thin film write-protected
NFC that enables post sale
communication between
seller & customer about the
product
Oct-2015 © 2015 Kate Carruthers 11
Source: GE 2013 http://gelookahead.economist.com/infograph/industrial-internet-the-power-of-1-2/
Oct-2015 © 2015 Kate Carruthers 12
Source: http://gelookahead.economist.com/infograph/the-industrial-internet-oil-and-gas/
Oct-2015 © 2015 Kate Carruthers 13Source: Industrial Internet: Pushing the Boundaries of Minds and Machines, Evans, Peter and Annunziata, Marco, GE, 2012, p. 10
Oct-2015 © 2015 Kate Carruthers 14
Source: A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems, Jay Lee, Behrad Bagheri, Hung-An Kao, 2015,
http://www.sciencedirect.com/science/article/pii/S221384631400025X
Cisco says US$14 trillion IoE value
• asset utilization (reduced costs) of $2.5 trillion
• employee productivity (greater labor
efficiencies) of $2.5 trillion
• supply chain and logistics (eliminating waste)
of $2.7 trillion
• customer experience (addition of more
customers) of $3.7 trillion
• innovation (reducing time to market) of $3.0
trillion
Oct-2015 © 2015 Kate Carruthers 15
Source: CISCO White paper: Embracing the Internet of Everything for your Share of $14 trillion, 2013
Oct-2015 © 2015 Kate Carruthers 16
Source: Greenberg, A., Hackers Remotely Kill a Jeep on the Highway—With Me in It, Wired , July 2015 http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
Source: http://readwrite.com/2014/04/30/connected-home-hackers-stop-yelling-at-babies-foscam#feed=/tag/internet-of-things&awesm=~oEe6yipkTkz40o
Oct-2015 © 2015 Kate Carruthers 17
Last August, a hacker infiltrated a wireless camera owned by the Gilbert family, living in
Houston, Texas. The stranger took control of the unit and used it to scream obscenities
at a two-year-old toddler. Fortunately, the hearing-impaired child didn’t have her
cochlear implant turned on at the time, otherwise she would have heard the stranger
yelling, “Wake up Allyson, you little slut!”
Oct-2015 © 2015 Kate Carruthers 18
Oct-2015 © 2015 Kate Carruthers 19
Bloomberg, Data Breaches in the US, at 4 Sep 2014
Oct-2015 © 2015 Kate Carruthers 20
• 3rd party HVAC
firm attack
vector
• Security
software
disabled
• PCI DSS didn’t
save them
Oct-2015 © 2015 Kate Carruthers 21
Bloomberg, Oct 2014
JP Morgan
• Sarbanes-Oxley Act (SOX)
• Payment Card Industry Data Security
Standard (PCI DSS)
• Gramm-Leach-Bliley Act (GLB) Act
• Electronic Fund Transfer Act, Regulation E
(EFTA)
• Free and Secure Trade Program (FAST)
• Fair and Accurate Credit Transaction Act
(FACTA), including Red Flags Rule
• Federal Rules of Civil Procedure (FRCP)
Oct-2015 © 2015 Kate Carruthers 22
Oct-2015 © 2015 Kate Carruthers 23
“How do consumers know
that the products and
services are protected”
David Kleidermacher, Blackberry CSO
Source: IoT security forcing business model changes, panel says, Oct 2015 http://www.scmagazine.com/iot-security-forcing-
business-model-changes-panel-says/article/448668/
Oct-2015 © 2015 Kate Carruthers 24
Miller Newton, CEO of PKWare:
“there's not a lot of
authentication on the IoT.
It is easy to impersonate”
Source: IoT security forcing business model changes, panel says, Oct 2015 http://www.scmagazine.com/iot-security-forcing-
business-model-changes-panel-says/article/448668/
Oct-2015 © 2015 Kate Carruthers 25
Source: CCTV Botnet In Our Own Back Yard, Ofer Gayer, Or Wilder, Igal Zeifman, Incapsula blog 2015, https://www.incapsula.com/blog/cctv-ddos-botnet-back-yard.html
CCTV Botnet at the local mall
Oct-2015 © 2015 Kate Carruthers 26
“Business models will have
to change. We used to build
them [products], ship them and
forget about them until we had
to service them,”
“We've moved to a new world
where we have to ship and
remember.” Source: John Ellis, Ellis & Associates, IoT security forcing business model changes, panel says, Oct 2015
http://www.scmagazine.com/iot-security-forcing-business-model-changes-panel-says/article/448668/
Oct-2015 © 2015 Kate Carruthers 27
“Targeted Intrusions By
Nation-State Actors Pose A
Major Cyber Threat Going
Into 2015”
Source: Targeted Intrusions By Nation-State Actors Pose A Major Cyber Threat Going Into 2015, Amanda Vicinanzo, 02/12/2015, Homeland Security Today,
http://www.hstoday.us/single-article/targeted-intrusions-by-nation-state-actors-pose-a-major-cyber-threat-going-into-2015/1f96ee7a4b2867f1b1511387660bb4b8.html
Oct-2015 © 2015 Kate Carruthers 28
Security
Privacy
Geopolitics
Oct-2015 © 2015 Kate Carruthers 29
Thank you
Kate Carruthers
UNSW Australia
k.carruthers@unsw.edu.au
@kcarruthers
http://www.slideshare.net/carruthk

More Related Content

More from Kate Carruthers

Info Sec, AI, and Ethics
Info Sec, AI, and EthicsInfo Sec, AI, and Ethics
Info Sec, AI, and EthicsKate Carruthers
 
Internet of Things and Governance
Internet of Things and GovernanceInternet of Things and Governance
Internet of Things and GovernanceKate Carruthers
 
Digital Marketing and your startup
Digital Marketing and your startupDigital Marketing and your startup
Digital Marketing and your startupKate Carruthers
 
Data at the centre of a complex world
Data at the centre of a complex world Data at the centre of a complex world
Data at the centre of a complex world Kate Carruthers
 
Data & Digital Ethics - CDAO Conference Sydney 2018
Data & Digital Ethics - CDAO Conference Sydney 2018Data & Digital Ethics - CDAO Conference Sydney 2018
Data & Digital Ethics - CDAO Conference Sydney 2018Kate Carruthers
 
Data Governance - a work in progress
Data Governance - a work in progressData Governance - a work in progress
Data Governance - a work in progressKate Carruthers
 
Future proof your career
Future proof your career  Future proof your career
Future proof your career Kate Carruthers
 
Data & Digital Ethics: some thoughts
Data & Digital Ethics: some thoughts Data & Digital Ethics: some thoughts
Data & Digital Ethics: some thoughts Kate Carruthers
 
Implementing Data Governance & ISMS in a University
Implementing Data Governance & ISMS in a UniversityImplementing Data Governance & ISMS in a University
Implementing Data Governance & ISMS in a UniversityKate Carruthers
 
The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...Kate Carruthers
 
Social media: balancing risk and control
Social media: balancing risk and controlSocial media: balancing risk and control
Social media: balancing risk and controlKate Carruthers
 
Building the sharing economy
Building the sharing economy Building the sharing economy
Building the sharing economy Kate Carruthers
 
Hardware is Hard - Products are Hard Melbourne 2013
Hardware is Hard - Products are Hard Melbourne 2013Hardware is Hard - Products are Hard Melbourne 2013
Hardware is Hard - Products are Hard Melbourne 2013Kate Carruthers
 
Social and technology trends for banking
Social and technology trends for bankingSocial and technology trends for banking
Social and technology trends for bankingKate Carruthers
 
Internet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsInternet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsKate Carruthers
 
Your blog your brand - tips on getting started with your blog
Your blog your brand - tips on getting started with your blogYour blog your brand - tips on getting started with your blog
Your blog your brand - tips on getting started with your blogKate Carruthers
 
Social media for social good 2012
Social media for social good 2012Social media for social good 2012
Social media for social good 2012Kate Carruthers
 
Whats the big idea with social media media140-2012
Whats the big idea with social media media140-2012Whats the big idea with social media media140-2012
Whats the big idea with social media media140-2012Kate Carruthers
 
Failing in the right direction
Failing in the right directionFailing in the right direction
Failing in the right directionKate Carruthers
 

More from Kate Carruthers (20)

Info Sec, AI, and Ethics
Info Sec, AI, and EthicsInfo Sec, AI, and Ethics
Info Sec, AI, and Ethics
 
Internet of Things and Governance
Internet of Things and GovernanceInternet of Things and Governance
Internet of Things and Governance
 
Digital Marketing and your startup
Digital Marketing and your startupDigital Marketing and your startup
Digital Marketing and your startup
 
Data at the centre of a complex world
Data at the centre of a complex world Data at the centre of a complex world
Data at the centre of a complex world
 
Data & Digital Ethics - CDAO Conference Sydney 2018
Data & Digital Ethics - CDAO Conference Sydney 2018Data & Digital Ethics - CDAO Conference Sydney 2018
Data & Digital Ethics - CDAO Conference Sydney 2018
 
Data Governance - a work in progress
Data Governance - a work in progressData Governance - a work in progress
Data Governance - a work in progress
 
Future proof your career
Future proof your career  Future proof your career
Future proof your career
 
Data & Digital Ethics: some thoughts
Data & Digital Ethics: some thoughts Data & Digital Ethics: some thoughts
Data & Digital Ethics: some thoughts
 
Implementing Data Governance & ISMS in a University
Implementing Data Governance & ISMS in a UniversityImplementing Data Governance & ISMS in a University
Implementing Data Governance & ISMS in a University
 
The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...
 
Social media: balancing risk and control
Social media: balancing risk and controlSocial media: balancing risk and control
Social media: balancing risk and control
 
Building the sharing economy
Building the sharing economy Building the sharing economy
Building the sharing economy
 
Hardware is Hard - Products are Hard Melbourne 2013
Hardware is Hard - Products are Hard Melbourne 2013Hardware is Hard - Products are Hard Melbourne 2013
Hardware is Hard - Products are Hard Melbourne 2013
 
Social and technology trends for banking
Social and technology trends for bankingSocial and technology trends for banking
Social and technology trends for banking
 
Internet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsInternet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business Models
 
Crowdfunding
CrowdfundingCrowdfunding
Crowdfunding
 
Your blog your brand - tips on getting started with your blog
Your blog your brand - tips on getting started with your blogYour blog your brand - tips on getting started with your blog
Your blog your brand - tips on getting started with your blog
 
Social media for social good 2012
Social media for social good 2012Social media for social good 2012
Social media for social good 2012
 
Whats the big idea with social media media140-2012
Whats the big idea with social media media140-2012Whats the big idea with social media media140-2012
Whats the big idea with social media media140-2012
 
Failing in the right direction
Failing in the right directionFailing in the right direction
Failing in the right direction
 

Recently uploaded

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 

Recently uploaded (20)

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 

Internet of Things - the dream and the nightmare

  • 1. IoT: the dream and the nightmare… Kate Carruthers #eIoT2015
  • 3. Oct-2015 © 2015 Kate Carruthers 3 IoT is part of the digital transformation of business, the economy, and society
  • 4. Oct-2015 © 2015 Kate Carruthers 4 Industrial revolution Digital revolution IoT revolution Industrial internet. Rise of networked industry. Convergence of industrial, digital, analytics, & connectivity. Distributed information and communication networks. Rise of networked economy powered by apps. Harnessing machines to drive economies of scale. Shift away from agriculture based economies.
  • 5. Oct-2015 © 2015 Kate Carruthers 5 Source: Matt Turck, Internet of Things Landscape (Version 3.0), http://www.slideshare.net/mjft01/internet-of-things-42280078/1
  • 6. Source: IOT Philippines Inc. http://www.iotphils.com/solutions/smart-home/ Oct-2015 © 2015 Kate Carruthers 6
  • 7. Oct-2015 © 2015 Kate Carruthers 7 Source: http://blog.csiro.au/a-much-smarter-watch-how-our-flexible-batteries-and-electrified-fabrics-can-improve-wearables/
  • 8. Oct-2015 © 2015 Kate Carruthers 8 “The real role of wearables that no one talks about is all these smart things around you have no idea what’s happening with you…” - Hosain Rahman, CEO Jawbone Source: 'Ingestibles' could become the new wearables faster than you think, Alicia Marie Tan, Mashable, Oct 2015, http://mashable.com/2015/10/14/jawbone-ingestibles/#RqDiEDnH3Sql
  • 9. Oct-2015 © 2015 Kate Carruthers 9 “I always use the example of, no matter how smart my thermostat is, it has no idea if I’m hot or cold.” - Hosain Rahman, CEO Jawbone Source: 'Ingestibles' could become the new wearables faster than you think, Alicia Marie Tan, Mashable, Oct 2015, http://mashable.com/2015/10/14/jawbone-ingestibles/#RqDiEDnH3Sql
  • 10. Oct-2015 © 2015 Kate Carruthers 10 Robyn Lewis founder and CEO VisitVineyards.com Thin film write-protected NFC that enables post sale communication between seller & customer about the product
  • 11. Oct-2015 © 2015 Kate Carruthers 11 Source: GE 2013 http://gelookahead.economist.com/infograph/industrial-internet-the-power-of-1-2/
  • 12. Oct-2015 © 2015 Kate Carruthers 12 Source: http://gelookahead.economist.com/infograph/the-industrial-internet-oil-and-gas/
  • 13. Oct-2015 © 2015 Kate Carruthers 13Source: Industrial Internet: Pushing the Boundaries of Minds and Machines, Evans, Peter and Annunziata, Marco, GE, 2012, p. 10
  • 14. Oct-2015 © 2015 Kate Carruthers 14 Source: A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems, Jay Lee, Behrad Bagheri, Hung-An Kao, 2015, http://www.sciencedirect.com/science/article/pii/S221384631400025X
  • 15. Cisco says US$14 trillion IoE value • asset utilization (reduced costs) of $2.5 trillion • employee productivity (greater labor efficiencies) of $2.5 trillion • supply chain and logistics (eliminating waste) of $2.7 trillion • customer experience (addition of more customers) of $3.7 trillion • innovation (reducing time to market) of $3.0 trillion Oct-2015 © 2015 Kate Carruthers 15 Source: CISCO White paper: Embracing the Internet of Everything for your Share of $14 trillion, 2013
  • 16. Oct-2015 © 2015 Kate Carruthers 16 Source: Greenberg, A., Hackers Remotely Kill a Jeep on the Highway—With Me in It, Wired , July 2015 http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
  • 17. Source: http://readwrite.com/2014/04/30/connected-home-hackers-stop-yelling-at-babies-foscam#feed=/tag/internet-of-things&awesm=~oEe6yipkTkz40o Oct-2015 © 2015 Kate Carruthers 17 Last August, a hacker infiltrated a wireless camera owned by the Gilbert family, living in Houston, Texas. The stranger took control of the unit and used it to scream obscenities at a two-year-old toddler. Fortunately, the hearing-impaired child didn’t have her cochlear implant turned on at the time, otherwise she would have heard the stranger yelling, “Wake up Allyson, you little slut!”
  • 18. Oct-2015 © 2015 Kate Carruthers 18
  • 19. Oct-2015 © 2015 Kate Carruthers 19 Bloomberg, Data Breaches in the US, at 4 Sep 2014
  • 20. Oct-2015 © 2015 Kate Carruthers 20 • 3rd party HVAC firm attack vector • Security software disabled • PCI DSS didn’t save them
  • 21. Oct-2015 © 2015 Kate Carruthers 21 Bloomberg, Oct 2014
  • 22. JP Morgan • Sarbanes-Oxley Act (SOX) • Payment Card Industry Data Security Standard (PCI DSS) • Gramm-Leach-Bliley Act (GLB) Act • Electronic Fund Transfer Act, Regulation E (EFTA) • Free and Secure Trade Program (FAST) • Fair and Accurate Credit Transaction Act (FACTA), including Red Flags Rule • Federal Rules of Civil Procedure (FRCP) Oct-2015 © 2015 Kate Carruthers 22
  • 23. Oct-2015 © 2015 Kate Carruthers 23 “How do consumers know that the products and services are protected” David Kleidermacher, Blackberry CSO Source: IoT security forcing business model changes, panel says, Oct 2015 http://www.scmagazine.com/iot-security-forcing- business-model-changes-panel-says/article/448668/
  • 24. Oct-2015 © 2015 Kate Carruthers 24 Miller Newton, CEO of PKWare: “there's not a lot of authentication on the IoT. It is easy to impersonate” Source: IoT security forcing business model changes, panel says, Oct 2015 http://www.scmagazine.com/iot-security-forcing- business-model-changes-panel-says/article/448668/
  • 25. Oct-2015 © 2015 Kate Carruthers 25 Source: CCTV Botnet In Our Own Back Yard, Ofer Gayer, Or Wilder, Igal Zeifman, Incapsula blog 2015, https://www.incapsula.com/blog/cctv-ddos-botnet-back-yard.html CCTV Botnet at the local mall
  • 26. Oct-2015 © 2015 Kate Carruthers 26 “Business models will have to change. We used to build them [products], ship them and forget about them until we had to service them,” “We've moved to a new world where we have to ship and remember.” Source: John Ellis, Ellis & Associates, IoT security forcing business model changes, panel says, Oct 2015 http://www.scmagazine.com/iot-security-forcing-business-model-changes-panel-says/article/448668/
  • 27. Oct-2015 © 2015 Kate Carruthers 27 “Targeted Intrusions By Nation-State Actors Pose A Major Cyber Threat Going Into 2015” Source: Targeted Intrusions By Nation-State Actors Pose A Major Cyber Threat Going Into 2015, Amanda Vicinanzo, 02/12/2015, Homeland Security Today, http://www.hstoday.us/single-article/targeted-intrusions-by-nation-state-actors-pose-a-major-cyber-threat-going-into-2015/1f96ee7a4b2867f1b1511387660bb4b8.html
  • 28. Oct-2015 © 2015 Kate Carruthers 28 Security Privacy Geopolitics
  • 29. Oct-2015 © 2015 Kate Carruthers 29 Thank you Kate Carruthers UNSW Australia k.carruthers@unsw.edu.au @kcarruthers http://www.slideshare.net/carruthk