SlideShare a Scribd company logo
1 of 8
Risks in Internet-Of-Things (IoT)
Presentation By
Ravi Namboori
Visit us: http://ravinamboori.net
What Is IoT?
Internet of Things :
It is an avant-garde technology where it will be
possible to link physical objects of all types possible to
the Internet by embedding them with sensors having a
unique Internet protocol (IP) address.
http://ravinamboori.net
IoT Benefits:
 It will turn all physical objects into
computing devices, so that we can
perform everyday tasks remotely.
 For e.g., with IoT, we can switch on our refrigerators, AC's,
TVs in our homes while driving a car.
http://ravinamboori.net
But What About Risks...
 May cause some unpleasantness
 Many of us do not want to be automatons
 Violation of privacy is having many of us
worried
 security can sometimes be compromised
http://ravinamboori.net
Mainly Hackers Problems:
 How can normal citizens be
guaranteed safety?
 coz, even government
websites have had
Distributed Denial of
Service (DDoS) attacks.
http://ravinamboori.net
Few More Risks
 Over-dependence on technology
 Lack of control
 Monopoly & destroy competition problems.
 Where will this entire information be stored?
 Effect of IoT could be the loss of jobs as
everything will be automated, making human
intervention superfluous.
http://ravinamboori.net
Conclusion:
 Finally before IoT can be a reality,
it is necessary that devices of one
brand, with a proprietary
technology, are able to talk to
another brand's devices.
 And organizations need to come to
a consensus on an international
standard of compatibility.
http://ravinamboori.net
Thank You
Presentation By
Ravi Namboori
Visit us: http://ravinamboori.in

More Related Content

What's hot

Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
AkshetPatel
 
Mobile security trends
Mobile security trendsMobile security trends
Mobile security trends
Ken Huang
 

What's hot (19)

IOT
IOT IOT
IOT
 
Internet of everything #IoE
Internet of everything #IoEInternet of everything #IoE
Internet of everything #IoE
 
IoT in Home Automation: Create an Ultimate IoT Smart Home
IoT in Home Automation: Create an Ultimate IoT Smart HomeIoT in Home Automation: Create an Ultimate IoT Smart Home
IoT in Home Automation: Create an Ultimate IoT Smart Home
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
 
Internet Of Things Uses & Applications In Various Industries | IOT
Internet Of Things Uses & Applications In Various Industries | IOTInternet Of Things Uses & Applications In Various Industries | IOT
Internet Of Things Uses & Applications In Various Industries | IOT
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Advanced Domestic Alarms With IOT
Advanced Domestic Alarms With IOTAdvanced Domestic Alarms With IOT
Advanced Domestic Alarms With IOT
 
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
 
Internet of things-Sky is not the limit, Its only the begining for IoT !!
Internet of things-Sky is not the limit, Its only the begining for IoT !!Internet of things-Sky is not the limit, Its only the begining for IoT !!
Internet of things-Sky is not the limit, Its only the begining for IoT !!
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
A DISA Presentaion
A DISA PresentaionA DISA Presentaion
A DISA Presentaion
 
A Technical Introduction to The Internet of Things
A Technical Introduction to The Internet of ThingsA Technical Introduction to The Internet of Things
A Technical Introduction to The Internet of Things
 
O'Reilly Big Data Week London - Maarten Ectors - Internet of Things
O'Reilly Big Data Week London - Maarten Ectors - Internet of ThingsO'Reilly Big Data Week London - Maarten Ectors - Internet of Things
O'Reilly Big Data Week London - Maarten Ectors - Internet of Things
 
Top 10 Biggest Mobile Operator in 2020
Top 10 Biggest Mobile Operator in 2020Top 10 Biggest Mobile Operator in 2020
Top 10 Biggest Mobile Operator in 2020
 
Mobile security trends
Mobile security trendsMobile security trends
Mobile security trends
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet Of Things (IoT)
Internet Of Things (IoT)Internet Of Things (IoT)
Internet Of Things (IoT)
 
What is IoT?
What is IoT?What is IoT?
What is IoT?
 

Similar to IoT Risks and Conclusion by Ravi namboori Equinix

IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
mariuse18nolet
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a Solution
Dr Laurent Guiraud
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
vrickens
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
voversbyobersby
 

Similar to IoT Risks and Conclusion by Ravi namboori Equinix (20)

beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
 
Iot
IotIot
Iot
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a Solution
 
Internet of Things(IOT)
Internet of Things(IOT)Internet of Things(IOT)
Internet of Things(IOT)
 
COMPUTER NETWORKS IOT BASED.pptx
COMPUTER NETWORKS IOT BASED.pptxCOMPUTER NETWORKS IOT BASED.pptx
COMPUTER NETWORKS IOT BASED.pptx
 
All about io t
All about io tAll about io t
All about io t
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
pptt.pptx
pptt.pptxpptt.pptx
pptt.pptx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptx
 
IoT Is Changing The World Rapidly
IoT Is Changing The World RapidlyIoT Is Changing The World Rapidly
IoT Is Changing The World Rapidly
 
Enterprise IT and the Internet of Things
Enterprise IT and the Internet of ThingsEnterprise IT and the Internet of Things
Enterprise IT and the Internet of Things
 
A Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptxA Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptx
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
 
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacksSIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
 
IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and Challenges
 

More from Ravi namboori

More from Ravi namboori (16)

Copy Data Management & Storage Efficiency - Ravi Namboori
Copy Data Management & Storage Efficiency - Ravi NambooriCopy Data Management & Storage Efficiency - Ravi Namboori
Copy Data Management & Storage Efficiency - Ravi Namboori
 
Cloud Computing Risks by Ravi Namboori Cisco Evangelist
Cloud Computing Risks by Ravi Namboori Cisco EvangelistCloud Computing Risks by Ravi Namboori Cisco Evangelist
Cloud Computing Risks by Ravi Namboori Cisco Evangelist
 
Ravi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security Risks
 
Hadoop Mapreduce Job Execution By Ravi Namboori Babson
Hadoop Mapreduce Job Execution By Ravi Namboori BabsonHadoop Mapreduce Job Execution By Ravi Namboori Babson
Hadoop Mapreduce Job Execution By Ravi Namboori Babson
 
Cloud Computing Basics by Ravi Namboori Cisco Evangelist
Cloud Computing Basics by Ravi Namboori Cisco EvangelistCloud Computing Basics by Ravi Namboori Cisco Evangelist
Cloud Computing Basics by Ravi Namboori Cisco Evangelist
 
Ravi Namboori Hadoop & HDFS Architecture
Ravi Namboori Hadoop & HDFS ArchitectureRavi Namboori Hadoop & HDFS Architecture
Ravi Namboori Hadoop & HDFS Architecture
 
Ravi Namboori - Developing Cloud Applications In The New IT Era
Ravi Namboori - Developing Cloud Applications In The New IT EraRavi Namboori - Developing Cloud Applications In The New IT Era
Ravi Namboori - Developing Cloud Applications In The New IT Era
 
Role Of Software Defined Networking (SDN) in Present Complex Network Arena
Role Of Software Defined Networking (SDN) in Present Complex Network ArenaRole Of Software Defined Networking (SDN) in Present Complex Network Arena
Role Of Software Defined Networking (SDN) in Present Complex Network Arena
 
Sap hana
Sap hanaSap hana
Sap hana
 
Ravi Namboori 's Open stack framework introduction
Ravi Namboori 's Open stack framework introductionRavi Namboori 's Open stack framework introduction
Ravi Namboori 's Open stack framework introduction
 
Ravi namboori switching
Ravi namboori   switchingRavi namboori   switching
Ravi namboori switching
 
Ravi namboori subnetting
Ravi namboori   subnettingRavi namboori   subnetting
Ravi namboori subnetting
 
Ravi Namboori's Network topologies
Ravi Namboori's Network topologiesRavi Namboori's Network topologies
Ravi Namboori's Network topologies
 
What Is Modem presentation by Ravi namboori
What Is Modem presentation by Ravi nambooriWhat Is Modem presentation by Ravi namboori
What Is Modem presentation by Ravi namboori
 
Iaa s ravi namboori
Iaa s   ravi nambooriIaa s   ravi namboori
Iaa s ravi namboori
 
Ravi Namboori Cloud computing
Ravi Namboori Cloud computingRavi Namboori Cloud computing
Ravi Namboori Cloud computing
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

IoT Risks and Conclusion by Ravi namboori Equinix

  • 1. Risks in Internet-Of-Things (IoT) Presentation By Ravi Namboori Visit us: http://ravinamboori.net
  • 2. What Is IoT? Internet of Things : It is an avant-garde technology where it will be possible to link physical objects of all types possible to the Internet by embedding them with sensors having a unique Internet protocol (IP) address. http://ravinamboori.net
  • 3. IoT Benefits:  It will turn all physical objects into computing devices, so that we can perform everyday tasks remotely.  For e.g., with IoT, we can switch on our refrigerators, AC's, TVs in our homes while driving a car. http://ravinamboori.net
  • 4. But What About Risks...  May cause some unpleasantness  Many of us do not want to be automatons  Violation of privacy is having many of us worried  security can sometimes be compromised http://ravinamboori.net
  • 5. Mainly Hackers Problems:  How can normal citizens be guaranteed safety?  coz, even government websites have had Distributed Denial of Service (DDoS) attacks. http://ravinamboori.net
  • 6. Few More Risks  Over-dependence on technology  Lack of control  Monopoly & destroy competition problems.  Where will this entire information be stored?  Effect of IoT could be the loss of jobs as everything will be automated, making human intervention superfluous. http://ravinamboori.net
  • 7. Conclusion:  Finally before IoT can be a reality, it is necessary that devices of one brand, with a proprietary technology, are able to talk to another brand's devices.  And organizations need to come to a consensus on an international standard of compatibility. http://ravinamboori.net
  • 8. Thank You Presentation By Ravi Namboori Visit us: http://ravinamboori.in