The Internet of Things (IoT) refers to the network of physical devices embedded with electronics, software and sensors that enables them to connect, exchange and analyze data. As IoT devices continue to proliferate, collecting vast amounts of personal and behavioral data, privacy and security concerns have emerged. Due to low costs pressures, many IoT devices are designed without adequate security protections. This exposes them to hacks that could compromise personal privacy or gain control of devices. Users need to carefully research devices, change default passwords, enable automatic updates and isolate IoT networks to help secure their personal data in an increasingly connected world.
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
Much of our technology today is connected to the Internet and communicating information about us, our homes and businesses, back to manufacturers in order to give us something of value in return. It is estimated that by 2025, there may be as many as 80 billion Internet of Things (IoT) devices connected to the Internet. As IoT becomes a normal part of our everyday lives, at home, on the road, and at the office, privacy, security and safety become paramount.
This presentation will set the stage: What is IoT? How is it used today? How will it be used in the future? IoT provides both opportunities and risk to society, and IoT devices need to be secured as this world of connected devices become critical to how society functions.
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014Adrian Wright
Embracing & Securing the Internet of Things
A briefing for CIOs at the CIO Dialogue 9 Oxford. May 2014
Presenter: Adrian Wright
VP of Research - Information Systems Security Association
CEO of Secoda Risk Management
The Devices are Coming! How the “Internet of Things” will affect IT.Spiceworks Ziff Davis
The devices are coming! Think you’re ready for the Internet of Things? We surveyed over 440 IT pros about this latest IT trend and released in this report. Find out what IT pros had to say about this IT shake up and what you can do to prepare.
For the IoT industry to thrive, there are three categories of challenges to overcome: technology, business, and society. The upcoming webinar will shed some on what issues to expect soon.
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace,
Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check,.
In 2018, IoT will see tremendous growth in all directions; the following 8 trends are the main developments we predict for next year:
What is Internet of Things?
History
How IoTWorks?
Few Applications of IoT
Current Status & Future Prospect of IoT
Technological Challenges of IoT
Criticisms & Controversies of IoT
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
Much of our technology today is connected to the Internet and communicating information about us, our homes and businesses, back to manufacturers in order to give us something of value in return. It is estimated that by 2025, there may be as many as 80 billion Internet of Things (IoT) devices connected to the Internet. As IoT becomes a normal part of our everyday lives, at home, on the road, and at the office, privacy, security and safety become paramount.
This presentation will set the stage: What is IoT? How is it used today? How will it be used in the future? IoT provides both opportunities and risk to society, and IoT devices need to be secured as this world of connected devices become critical to how society functions.
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014Adrian Wright
Embracing & Securing the Internet of Things
A briefing for CIOs at the CIO Dialogue 9 Oxford. May 2014
Presenter: Adrian Wright
VP of Research - Information Systems Security Association
CEO of Secoda Risk Management
The Devices are Coming! How the “Internet of Things” will affect IT.Spiceworks Ziff Davis
The devices are coming! Think you’re ready for the Internet of Things? We surveyed over 440 IT pros about this latest IT trend and released in this report. Find out what IT pros had to say about this IT shake up and what you can do to prepare.
For the IoT industry to thrive, there are three categories of challenges to overcome: technology, business, and society. The upcoming webinar will shed some on what issues to expect soon.
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace,
Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check,.
In 2018, IoT will see tremendous growth in all directions; the following 8 trends are the main developments we predict for next year:
What is Internet of Things?
History
How IoTWorks?
Few Applications of IoT
Current Status & Future Prospect of IoT
Technological Challenges of IoT
Criticisms & Controversies of IoT
Businesses across the world are rapidly leveraging the Internet-of-Things (#IoT) to create new products and services that are opening up new business opportunities and creating new business models.
The resulting transformation is ushering in a new era of how companies run their operations and engage with customers. However, tapping into the IoT is only part of the story [6].
For companies to realize the full potential of IoT enablement, they need to combine IoT with rapidly-advancing Artificial Intelligence (#AI) technologies, which enable ‘smart machines’ to simulate intelligent behavior and make well-informed decisions with little or no human intervention [6].
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Sudha Jamthe
Sudha's keynote about IoT Trends Silicon Valley kicking off the new year 2018 at Consumer Electronics Forum on Innovation and Entrepreneurship (silicon valley) on Jan 6th 2018, building up the excitement pre-CES 2018.
Sudha covers IoT from the perspective of Sensors and how they are driving Car Cognition, Connected Car telematics, Robots, Drones, Smart cities, Connected Appliances, Smart homes, with focus on data and machine learning.
This a IOT base ppt slide. It's more describe IOT system history and IOt devices . And also given most valuable and relevant information about IOT and devices.
Internet of Things is a new world order. It is connecting billions of devices to each other and the Internet. These devices capable of sensing, communicating and decision-making are expected to make human environment smarter. This is your first introduction to this emerging world and opportunity
IoT Standardization and Implementation ChallengesAhmed Banafa
The rapid evolution of the IoT market has caused an explosion in the number and variety of IoT solutions.
Additionally, large amounts of funding are being deployed at IoT startups.
Consequently, the focus of the industry has been on manufacturing and producing the right types of hardware to enable those solutions.
Internet of Things (IoT) will enable dramatic society transformation. This seminar presents an introduction to the IoT and explains why IoT Security is important.
Then it presents security issues in wireless sensor networks that constitute a main ingredient of IoT.
Seminar given at Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) on 28 January 2015.
In this talk given at Build Stuff 2021, I demo the various web simulators available to get started with IoT.
Devices include;
BBC Micro:Bit
Arduino Uno
Raspberry Pi + Sense Hat
MX Chip
In this seminar you will listen to in depth explanation of the hottest technologies in 2019 and beyond. Prof. Banafa will discuss each technology its applications and challenges with real life cases. The interaction among all the four technology will be explored with focus on future trends in each of technology. As all technologies can be summarized in one word IBAC (IoT, Blockchain, AI, Cybersecurity) they can be explained with the following words: IoT: senses, Blockchain: remembers, AI: thinks, and Cybersecurity: protects.
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace. Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
As IoT insecurity creates vulnerabilities, policymakers become concerned about the health of the Internet. How can public policy address these concerns in a smart way, targeting their efforts to improve IoT security without imposing unnecessary costs across the Internet ecosystem or creating unintended effects? What is the role of government versus industry?
Gerald Faulhaber
Professor Emeritus, Business Economics & Public Policy, Wharton School
https://www.cablelabs.com/informed/
Understanding the different building blocks of IoT, identifying the areas of vulnerability in each block and exploring technologies needed to counter each of the weaknesses are essential in dealing with the security issue of IoT.
Checkout well known company for BlockChain, Devops, IoT and other cutting edge technologies Product, Consulting & Training in India. Pingala Software India Pvt Ltd is one of the leading company that deals in IoT application development, Blockchain development, Devops, etc. technologies.
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
We are in the age of Cybercrimes and just getting started with Internet of Things. There will be a huge demand for IoT as 50 billion connected devices will be deployed across the globe by 2020. These devices will communicate with each other where the web and the physical world will meet with different set of internet infrastructure and protocols. This in turn, will not only help us in saving money, but also provide us with more options.
Discussion Topics:
• The importance of IoT
• How will they impact in our everyday lives?
• Is Internet of Things Secure?
• Securing Internet of Things
But, the Tech buzz is all about: Security of Things (Security in the Internet of Things). How far these Internet of Things can be trusted? Can these IoT devices be hacked? How they have become the Next Cyber Security Target for hackers? How can we secure Internet of Things?
For more details, please visit www.clictest.com or drop us an email to info@clictest.com
Businesses across the world are rapidly leveraging the Internet-of-Things (#IoT) to create new products and services that are opening up new business opportunities and creating new business models.
The resulting transformation is ushering in a new era of how companies run their operations and engage with customers. However, tapping into the IoT is only part of the story [6].
For companies to realize the full potential of IoT enablement, they need to combine IoT with rapidly-advancing Artificial Intelligence (#AI) technologies, which enable ‘smart machines’ to simulate intelligent behavior and make well-informed decisions with little or no human intervention [6].
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Sudha Jamthe
Sudha's keynote about IoT Trends Silicon Valley kicking off the new year 2018 at Consumer Electronics Forum on Innovation and Entrepreneurship (silicon valley) on Jan 6th 2018, building up the excitement pre-CES 2018.
Sudha covers IoT from the perspective of Sensors and how they are driving Car Cognition, Connected Car telematics, Robots, Drones, Smart cities, Connected Appliances, Smart homes, with focus on data and machine learning.
This a IOT base ppt slide. It's more describe IOT system history and IOt devices . And also given most valuable and relevant information about IOT and devices.
Internet of Things is a new world order. It is connecting billions of devices to each other and the Internet. These devices capable of sensing, communicating and decision-making are expected to make human environment smarter. This is your first introduction to this emerging world and opportunity
IoT Standardization and Implementation ChallengesAhmed Banafa
The rapid evolution of the IoT market has caused an explosion in the number and variety of IoT solutions.
Additionally, large amounts of funding are being deployed at IoT startups.
Consequently, the focus of the industry has been on manufacturing and producing the right types of hardware to enable those solutions.
Internet of Things (IoT) will enable dramatic society transformation. This seminar presents an introduction to the IoT and explains why IoT Security is important.
Then it presents security issues in wireless sensor networks that constitute a main ingredient of IoT.
Seminar given at Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) on 28 January 2015.
In this talk given at Build Stuff 2021, I demo the various web simulators available to get started with IoT.
Devices include;
BBC Micro:Bit
Arduino Uno
Raspberry Pi + Sense Hat
MX Chip
In this seminar you will listen to in depth explanation of the hottest technologies in 2019 and beyond. Prof. Banafa will discuss each technology its applications and challenges with real life cases. The interaction among all the four technology will be explored with focus on future trends in each of technology. As all technologies can be summarized in one word IBAC (IoT, Blockchain, AI, Cybersecurity) they can be explained with the following words: IoT: senses, Blockchain: remembers, AI: thinks, and Cybersecurity: protects.
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace. Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
As IoT insecurity creates vulnerabilities, policymakers become concerned about the health of the Internet. How can public policy address these concerns in a smart way, targeting their efforts to improve IoT security without imposing unnecessary costs across the Internet ecosystem or creating unintended effects? What is the role of government versus industry?
Gerald Faulhaber
Professor Emeritus, Business Economics & Public Policy, Wharton School
https://www.cablelabs.com/informed/
Understanding the different building blocks of IoT, identifying the areas of vulnerability in each block and exploring technologies needed to counter each of the weaknesses are essential in dealing with the security issue of IoT.
Checkout well known company for BlockChain, Devops, IoT and other cutting edge technologies Product, Consulting & Training in India. Pingala Software India Pvt Ltd is one of the leading company that deals in IoT application development, Blockchain development, Devops, etc. technologies.
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
We are in the age of Cybercrimes and just getting started with Internet of Things. There will be a huge demand for IoT as 50 billion connected devices will be deployed across the globe by 2020. These devices will communicate with each other where the web and the physical world will meet with different set of internet infrastructure and protocols. This in turn, will not only help us in saving money, but also provide us with more options.
Discussion Topics:
• The importance of IoT
• How will they impact in our everyday lives?
• Is Internet of Things Secure?
• Securing Internet of Things
But, the Tech buzz is all about: Security of Things (Security in the Internet of Things). How far these Internet of Things can be trusted? Can these IoT devices be hacked? How they have become the Next Cyber Security Target for hackers? How can we secure Internet of Things?
For more details, please visit www.clictest.com or drop us an email to info@clictest.com
This Time, It’s Personal: Why Security and the IoT Is DifferentJustin Grammens
Unfortunately, in recent years we’ve seen a host of incidences where IoT devices were compromised. Sometimes these have been minor with little coverage, while others like Mirai affected millions around the globe a produced serious economic impact. When attacks like this occur, they not only erode the trust of the users of these devices, but cause those who are looking to adopt this new technology to pause. With any new technology, security must be thought of as a first class citizen and when we are talking about IoT, the data is personal. As the IoT matures, I’ll share some mistakes that have happened in the past, where we are today and how I believe we are now finally seeing a maturity of devices that are remotely updated, fault tolerant and secure. When it comes to building an IoT device, security is personal.
V Międzynarodowa Konferencja Naukowa Nauka o informacji (informacja naukowa) w okresie zmian Innowacyjne usługi informacyjne. Wydział Dziennikarstwa, Informacji i Bibliologii Katedra Informatologii, Uniwersytet Warszawski, Warszawa, 15 – 16 maja 2017
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)Rui Miguel Feio
Have you ever thought the perils of smart home devices? In this presentation we discuss the Internet of Things (IoT) and the concept of Bring Your Own Device (BYOD) and the security challenges and risks they can be to companies, systems, and ultimately to the mainframe.
The Internet of Things (IoT) is a concept that describes a totally interconnected world. It’s a world where devices of every shape and size are manufactured with “smart” capabilities that allow them to communicate and interact with other devices, exchange data, make autonomous decisions and perform useful tasks based on preset conditions.
IoT is expected to gross over $19 trillion over the next few years. However, the problem is that these ‘things’ have myths surrounding them, some of which are impacting how organizations develop the apps to support them.
Any new technology involves a certain amount of uncertainty and business risk. In the case of the Internet of Things, however, many of the risks have been exaggerated or misrepresented. While the IoT vision will take years to mature fully, the building blocks to begin this process are already in place.
Key hardware and software are either available today or under development; stakeholders need to address security and privacy concerns, and collaborate to implement the open standards that will make the IoT safe, secure, reliable and interoperable, and allow the delivery of secured services as seamlessly as possible.
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
In a world where convenience is key, consumers are adopting every new connected device that hits the shelves - and doing so with the assumption that due diligence security has been considered. But recent IoT attacks suggest otherwise.
As organizations migrate from a primarily offline to online business model, they are failing to consider IoT’s unique threats which traditional solutions are unable to secure. As a result, steps must be taken to ensure that the device, connections and infrastructure are hardened, especially software which runs IoT devices and is the source of ~90% of attacks.
This webinar is ideal for risk, technology, and security professionals that want to understand why a hacker would want to attack their “harmless” IoT device and what the stealth risk to their organization and consumers is.
Topics covered include:
- IoT security – why it’s so different….and tough
- The IoT ecosystem and attack surface
- Managing liability - IoT risks to consumers and vendors
- Auditing IoT software development
Presentation from IBM InterConnect in Las Vegas March 2017.
Enabling Internet of Things (IoT) so your employees and your customers can have a simplified experience with new services and products sounds exciting. In this session, we will dig into the top ten risks that come with the IoT experience. Due to the rapidly evolving nature of IoT and associated threats, there are risks in allowing access to your enterprise resources. Custom firmware, embedded operating systems and wi-fi connectivity of IoT devices offer many possible areas for exploits and misuse. Come explore current security offerings and get a first look at best practices. Walk away with an immediate checklist to benefit your enterprise as it deploys and offers IoT access.
Cisco data analytics in ioe_rajiv niles_2015 novCiscoKorea
시스코가 소개하는 만물인터넷 시대의 데이터 애널리틱스의 가치!
슬라이드에 대한 자세한 발표 내용은 시스코 코리아 공식 블로그(www.ciscokrblog.com/768) 나 네트워크 사이트(http://apjc.thecisconetwork.com/site/content/lang/ko/id/4537) 확인해 보실 수 있습니다.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
2. What is the Internet of
Things?
The Internet of Things (IoT) is the network of physical
devices, vehicles, home appliances and other
items embedded with electronics, software, sensors,
actuators, and connectivity which enables these
things to connect and exchange data, creating
opportunities for more direct integration of the
physical world into computer-based systems,
resulting in efficiency improvements, economic
benefits and reduced human intervention
3. What?
• Its mostly a bunch of devices that record data,
send it somewhere for processing, and then
often return data back to the original device.
• These devices are supposed to make it easier
to bridge the gap between the physical and
logical world
• These devices can basically, suuuuuuuupppper
basically, be broken down into three categories
• Personal Devices
• Smart City/Business
• Industrial
4. Personal IoT
• Personal IoT is usually the first thing we think
of when considering IoT devices
• These are generally made to make it easier for
us to interact with the world around us on a
personal level.
• These devices could include things like:
• Personal Assistants (Alexa, Google Home,
HomePod)
• Smart Devices: Refrigerators, TV’s,
Toothbrushes, condoms, etc.
• Smart Cars
• Smart Home Devices: Thermostats, locks, video
cameras, lights, etc.
5. Smart City/Business
• Smart City can mean a lot of different things,
but mostly it involves using an expanded
network of sensors to enhance a cities
livability.
• Same same for a business, but shop-ability vs.
livability.
• Examples:
• Drones that clean building or deliver defib to a
heart attack victim.
• Smart cars in a neural network
• Facial recognition software, shot sensors, side
walks that create power, etc.
6. Industrial IoT
Similar to what smart cities want to achieve, a lot
of these sensors fall under the acronym SCADA
(Supervisory Control and Data Acquisition)
• These systems usually use a network of
sensors to supervise and some times manage
physical systems:
• Utilities like Water and Electricity
• Manufacturing
• Food production
8. IoT Stats
• In 2015, there were about 15.4 billion
connected devices. According to IHS, this
number will grow to 30.7 billion in 2020, and
75.4 billion by 2025
• In 2016, global spending on the IoT across
markets was $737 billion. IDC predicts that by
2020, this number will reach $1.29 trillion, a
compound annual growth rate of 15.6 percent.
• This year, 60 percent of global manufacturers
will use analytics data recorded from connected
devices to analyze processes and identify
optimization possibilities, according to IDC and
SAP.
• It's thought as much as 2.5 quintillion bytes of
data is being generated by the technology each
day, according to IBM.
9. What really is the cloud?
• It layman's terms it means your data resides on
someone else's computer
• In more technical terms, it means the server
used for your data storage belongs to a third
party and you are ”renting” that storage space.
10. US Third Party Doctrine
• The third-party doctrine is a United States legal
theory that holds that people who voluntarily
give information to third parties—such as
banks, phone companies, internet service
providers (ISPs), and e-mail servers—have "no
reasonable expectation of privacy." A lack of
privacy protection allows the United States
government to obtain information from third
parties without a legal warrant and without
otherwise complying with the Fourth
Amendment prohibition against search and
seizure without probable cause and a
judicial search warrant.
• Right now, this doctrine applies to most data
collected by IoT devices.
12. Deep Dive
• All of this interconnected data can give us a
deeper look at our daily lives in a way previously
not possible.
• Healthcare
• Fitness
• Driving patterns
• Daily Habits (Smart home stuff)
• Daily spending habits and trends
13. What's my “Public
Profile?”
• Could a company buy my health data and make
an employment decision based off of that?
• Could an insurance company deny me
competitive rates using data collected from
”smart city” installations like license plate
readers?
• Driving after dark?
• Long distance driving
• Hard braking?
• What about a credit score based off of my
spending habits?
• Home insurance and mortgage rates based off
of smart home telemetry?
• Lights on while on vacation?
• Locks and password security?
14. IoT Data exchanges
• How valuable is your information?
• Data is considered to be “digital gold”
• “Data exchanges are where IoT-generated data
sets are combined and then refined through
data analytics, and all this information takes on
real value. These exchanges are places where
organizations partner to identify patterns and
draw conclusions about the information or see
ways they can monetize the data.”
• Like Cambridge Analytica on crack.
15. Exercise: Your Smart Life
• Wake up
• Get ready to go work
• Work all day
• Lunch
• Work some more
• Maybe hit the Gym
• Dinner.
• Drinks with friends?
• Sleep
17. Big profile IoT Hacks
• Mirai Bot Net
• Largest recorded DDoS attack in history
• Used default usernames and passwords to
spread the malware
• Trendnet Webcam Hack
• Many of these webcams were enumerated on
popular sites like shodan
• Any one could view or even listen to these
exposed endpoints
• The Jeep Hack
• Researchers took control of a Jeep on the
highway, could speed it up and slow it down,
even cause it to veer.
• Used the Jeeps cellular network connectivity to
establish remote control
• Hackable Cardio Devices from St. Judes
• Devices could administer shocks and change
heart rhythms
18. Designed with low
Security
• Because security is expensive
• More power
• More expensive components
• Research
• Updates
IoT device manufacturers, for their part, see
security as a costly alternative to other factors
that small, low power connected devices need.
For instance, said Marc Bown, senior director of
security at Fitbit, many connected device
manufacturers would prefer to use low power,
cheaper chips as opposed to ones that come with
higher levels of security.
“Manufacturers are trading off encryption for low
power chips, lower prices, storage space, and
battery life,” Bown said.
19. Maintenance and
Updates
• How long will a device continue to receive
updates?
• What about legitimate products and the
company goes out of business?
• Nest
• Security update and patch cycle for your car?
• Untrained or lazy consumers?
• What about medical devices?
• AT&T's Cybersecurity Insights Report surveyed
more than 5,000 enterprises around the world
and found that 85% of enterprises are in the
process of or intend to deploy IoT devices. Yet
a mere 10% of those surveyed feel confident
that they could secure those devices against
hackers.
20. What Can I do?
Securing your personal Internet of Crap
21. Do your product research
• Is this a reputable company?
• Do they offer a routine patching cycle?
• Is there already a hack available for that
device?
• What kind of built in security is available?
• Avoid devices with P2P capabilities.
22. Secure it immediately
• Change the default settings
• Passwords and Usernames
• Wake words for voice driven devices
• Apply all security patches available from the
manufacturer
• Set your device to check for and apply new
firmware and software updates from the
manufacturer automatically
• Ensure if you use cloud services with the
device that they are secure
• Disable UPnP (Universal Plug n Play)
23. Security is an Onion.
• Create a separate network for your IoT devices
if you can.
• Use proper wi-fi security practices when creating
this network!
• Even better, put a firewall on this separate
network.
• Remove old devices
• Avoid single points of failure
24. Some examples of bad IoT
Because if we don’t laugh we’re all gonna cry
25.
26.
27.
28.
29. … and sex toys
• Condoms, vibrators, all sorts of stuff
• We-Vibe recently had to settle a 3.75 million
dollar suit after it became apparent that the Wi-
Fi source it gave off was easily hackable so
strangers could control the device?
• Bug or feature?
30. Thank you again for coming!
Check out Free Geeks other courses!