SlideShare a Scribd company logo
Complying with new IMDA IoT
Cyber Security Guide
#ISSLearningDay
Mr. Ng Kok Leong, NUS-ISS
2 August 2018
#ISSLearningDay
• Published in Jan/2019.
• Google to download the PDF soft copy.
Agenda
• Current efforts of IoT security guidelines
• IoT: Brief definition
• IoT ecosystem
• IMDA baseline recommendations
#ISSLearningDay
Current Efforts
#ISSLearningDay
#ISSLearningDay
#ISSLearningDay
Microsoft Azure IoT Hub
#ISSLearningDay
Source: https://docs.microsoft.com/en-us/azure/iot-hub/iot-hub-security-deployment
Microsoft Azure IoT Hub
#ISSLearningDay
Source: https://catalog.azureiotsuite.com/
#ISSLearningDay
Source:
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160.pdf
https://downloads.cloudsecurityalliance.org/whitepapers/Security_Guidance_for_Early_Adopters_of_the_Internet_of_Things.pdf
& others…
IoT: Brief Definition
#ISSLearningDay
What is IoT?
#ISSLearningDay
IMDA IoT Security Guide states
7 Categories of things (IoT Security Foundation)
1. Consumer domestic
2. Enterprise
3. Industrial
4. Medical
5. Automotive
6. Public agency
7. Critical infrastructure
#ISSLearningDay
https://www.iotsecurityfoundation.org/
Things with connectivity
#ISSLearningDay
Source: https://sg.element14.com/switch-on-iot-connected-lighting
Things with connectivity
#ISSLearningDay
Image: www.auzuranatural.sg
Things with connectivity
#ISSLearningDay
Image source:
https://www.aboutkidshealth.ca/Article?contentid=980&language=English
http://caifl.com/cardiac-devices/pacemakers/
https://www.sciencedirect.com/topics/nursing-and-health-professions/pacemaker-battery
Moving IoT: NUSmart shuttle
#ISSLearningDay
Source: https://www.straitstimes.com/singapore/transport/driverless-shuttle-on-trial-at-nus-starts-taking-passengers
Flying IoT
#ISSLearningDay
Source: https://www.straitstimes.com/singapore/transport/plan-for-drones-to-deliver-parcels-takes-flight
https://www.airbus.com/newsroom/press-releases/en/2018/02/airbus-completes-first-flight-demonstration-for-its-commercial-p.html
Smart Lamps project
#ISSLearningDay
IoT ecosystem
#ISSLearningDay
IoT ecosystem: AWS IoT as illustration
#ISSLearningDay
https://www.amazonaws.cn/en/iot-core/
IoT ecosystem block diagram
#ISSLearningDay
https://qulsar.com/Applications/IoT/Industrial_IoT.html
Device
Network
Application
IoT ecosystem block diagram
#ISSLearningDay
Device Network Application
Short range
Long range
IoT connects direct or via gateway to backend
#ISSLearningDay
https://thingsboard.io/fleet-tracking/
IoT connects direct or via gateway to backend
#ISSLearningDay
https://www.mdpi.com/1424-8220/18/8/2581/htm
End-to-End Encryption
#ISSLearningDay
Image source: https://www.intrinsic-id.com/markets/connectivity-ics/
IMDA Baseline Recommendations
11 clauses – 6 conventional IT security practice, 5 IoT specific.
#ISSLearningDay
#ISSLearningDay
Section 6:
Baseline recommendations for implementation phase
What is constrained IoT device?
#ISSLearningDay
Image source: https://www.cisoplatform.com/profiles/blogs/classification-of-iot-devices
Classes of Constrained Devices (1)
#ISSLearningDay
Image source:
https://www.cisoplatform.com/profiles/blogs/classification-of-iot-devices
https://tools.ietf.org/html/rfc7228
IETF’s RFC 7228 classifies the constrained devices into 3 categories
Examples of constraints:-
• Processing power
• Size of memory
• Availability of power source
Classes of Constrained Devices (2)
#ISSLearningDay
Class 2 – not so constrained
• Less constrained and can perform at par with
mobiles phones / notebooks, supporting most
protocol stacks.
Class 1 – quite constrained
• Quite constrained in code space and processing
capabilities to employ full protocol stack such as
HTTP, TLS. Hence, use IoT stack like UDP, CoAP, DTLS
• Interact with other devices without the need of
gateway.
• Do not communicate with server.
• Battery operated.
• Take care of single sensor.
Class 0 – too small to securely run on Internet
• Constrains in memory and processing capabilities.
• Use Gateway for basic communication need.
Image source: https://www.rfwireless-world.com/Terminology/COAP-vs-MQTT.html
Constrained Device Class 0 – medical device
#ISSLearningDay
Image source:
https://pdfs.semanticscholar.org/6a25/e93587dde53966b
3f0830ed9b78023c2cadd.pdf
Constrained Device Class 0 - pacemarker
#ISSLearningDay
Image source:
https://www.aboutkidshealth.ca/Article?contentid=980&language=English
http://caifl.com/cardiac-devices/pacemakers/
https://www.sciencedirect.com/topics/nursing-and-health-professions/pacemaker-battery
#ISSLearningDay
Section 6:
Baseline recommendations for implementation phase
#ISSLearningDay
Section 6:
Baseline recommendations for implementation phase
#ISSLearningDay
https://www.theguardian.com/technology/2018/may/24/amazon-alexa-recorded-conversation
#ISSLearningDay
https://usa.streetsblog.org/2019/03/08/uber-got-off-the-hook-for-killing-a-pedestrian-with-its-self-driving-car/
Misuse case
Whose responsibility?
#ISSLearningDay
#ISSLearningDay
1. Identify the assets
2. Create an IoT system architecture overview
3. Decompose the IoT system
4. Identify threats
5. Document threats
6. Rate the threats
#ISSLearningDay
https://download.microsoft.com/download/9/3/5/935520EC-D9E2-413E-
BEA7-0B865A79B18C/Introduction_to_Threat_Modeling.ppsx
#ISSLearningDay
Section 6:
Baseline recommendations for implementation phase
Root of Trust
#ISSLearningDayImage source: https://www.slideshare.net/linaroorg/sfo17-304-
demystifying-ro-tfinallc-83555369
Root of Trust (RoT) is a source that can always be trusted within a cryptographic system. It
generally includes a hardened hardware module.
How Raspberry Pi stores its data?
#ISSLearningDay
ARM Cortex A53 (ARMv8) inside Broadcom BCM2837 SoC
TPM (Trust Platform Module)
#ISSLearningDaySource: https://en.wikipedia.org/wiki/Trusted_Platform_Module
Source: https://docs.microsoft.com/en-us/windows/device-security/tpm/trusted-platform-module-overview
TPM (Trust Platform Module)
#ISSLearningDaySource: https://docs.microsoft.com/en-us/windows/device-security/tpm/trusted-platform-module-overview
Source: https://en.wikipedia.org/wiki/Trusted_Platform_Module
Trusted Platform Module installed on a motherboard
In the context of constrained device,
TPM is not a suitable solutions
Recommendations include IoT gateways and IoT platforms…
#ISSLearningDay
HSM (or TPM) in IoT circuit board
#ISSLearningDay
HSM
Use of ARM processor design
#ISSLearningDay
Image source: https://hexus.net/static/techdrive/?sf32731391=1
Fitbit Flex
ARM Cortex M3 processor
Apple Watch
#ISSLearningDay
abiresearch.com
chipworks.com
Nest Thermostats
#ISSLearningDay
techdesignforums.com
https://nest.com
ARM Cortex-M3: Pebble watch
#ISSLearningDay
https://community.arm.com
ARM Cortex-M4: GoPro
#ISSLearningDay
https://hexus.net/
Who is ARM?
#ISSLearningDay
Image source:
https://www.fudzilla.com/news/processors/40000-arm-
cortex-r8-processor-design-is-out
1) ARM creates processor designs
but it does not produce any
physical products.
2) The technology (IP) is licensed to
other companies who design and
build their own processors based
on ARM’s design, e.g. Texas
Instruments, Samsung.
Cortex-Me sold by ST Microelectronics
#ISSLearningDay
digikey.sg
ARM Processors
#ISSLearningDay
Image source: https://www.arm.com/products/silicon-ip-cpu
Cortex-M series for IoT
ARM IoT
SoC solutions
#ISSLearningDay
Image source: https://www.arm.com/products/silicon-ip-cpu
Cortex-M Processor: Architecture
#ISSLearningDay
• ARMv6-M architecture
• Cortex-M0, Cortex-M0+, Cortex-M1
• ARMv7-M architecture
• Cortex-M3, Cortex-M4, Cortex-M7
• ARMv8-M architecture
• Cortex-M23, Cortex-M33, Cortex-M35P
ARMv8-M processor architecture differentiates from security
perspective because it has “trustzone” technology
Trustzone Technology
#ISSLearningDay
Image source: https://www.arm.com/why-arm/technologies/trustzone-for-cortex-m
Trustzone Technology
#ISSLearningDay
Source: K5_Addressing_IoT_and_Embedded_Security_at_the_Chip_Level_Roni.pdf
Creating isolation in
single processor, resulting
in one trusted zone and
one non-trusted zone,
which previously requires
2 processors to achieve.
Illustration of Isolation:
trusted zone vs non-trusted zone
#ISSLearningDay
Image source: https://www.kwtrain.com/blog/network-security-zones
Trusted zone Non-trusted zone
HSM – one secure zone
#ISSLearningDay
• HSM
• Hardware Security Module
• Tamper resistance
• One secure zone in physical hardware -
the HSM
• The non-secure zone (application in
another system) accesses its services by
application interface.
https://aws.amazon.com/cloudhsm/
Smart Card – one secure zone
#ISSLearningDay
• One secure zone – the smart card chip
• Tamper resistance
• The external host/application accesses it’s services by application
Interface
ARM launches anti-tampering processor, M35P
#ISSLearningDay
Image source: https://venturebeat.com/2018/05/02/arm-designs-anti-tampering-
and-software-isolation-into-its-processors/
Since M35p design was announced a year ago, no chip developer has announced any product yet.
#ISSLearningDay
Section 6:
Baseline recommendations for implementation phase
TLS (or SSL, which is still commonly known as)
#ISSLearningDay
Image source:
https://www.cloudflare.com/learning/ssl/what-is-ssl/
https://yourshop.com/security-b19.html
TLS: Transport Layer Security
SSL: Secure Sockets Layer
TLS utilized by IoT
#ISSLearningDay
Image source: https://www.digi.com/videos/connecting-digi-xbee3-cellular-to-aws-with-mqtt
MQTT: Message Queueing Telemetry Transport
#ISSLearningDay
Image source: https://aws.amazon.com/iot-core/
MQTT protocol recommends use of TLS for more sensitive MQTT implementations
MQTT: a publish / subscribe protocol
#ISSLearningDay
Image source: https://www.hivemq.com/blog/how-to-get-started-with-mqtt
MQTT protocol was invented by IBM back in 1999 for satellite communications with oil-field equipment.
#ISSLearningDay
Problem: TLS is not lightweight
• TLS adds additional two round trips to the start of every session
• TLS certificates are large files, and device memory is limited in IoT
TLS v1.3 – improved version
#ISSLearningDay
Image source: https://blog.cloudflare.com/why-iot-is-insecure/
TLS 1.3 eliminates a complete round trip in the TLS handshake, which makes TLS
much lighter and faster
If the same IoT device talks to the same server again, there is no round trip at all, as
the parameters chosen in the initial handshake are sent alongside application data.
CoAP: Constrained Application Protocol
#ISSLearningDay
Image source: https://www.rfwireless-world.com/Terminology/COAP-vs-MQTT.html
CoAP was created by IETF.
It was designed for use by constrained devices on constrained network (low-power, lossy networks).
CoAP utilizes DTLS
#ISSLearningDay
Image source: https://www.semanticscholar.org/paper/Lightweight-
DTLS-Implementation-in-CoAP-based-IoT-Lakkundi-Singh
UDP is more lightweight than TCP
#ISSLearningDayImage source: https://www.pubnub.com/blog/why-you-should-run-your-
game-servers-separate-from-your-chat/
No ordering of messages
No tracking connections
DTLS: session initialization not any lighter
#ISSLearningDay
Image source: https://blog.cloudflare.com/why-iot-is-insecure/
Problem:
IoT Gateway breaks end-to-end encryption
#ISSLearningDay
Image source: https://cloud.google.com/iot/docs/how-tos/gateways/
Object Security for Constrained RESTful Environments
(OSCORE)
#ISSLearningDay
• A method for application-layer protection of the
Constrained Application Protocol, using object signing
and encryption. (under Internet draft)
• OSCORE provides end-to-end protection between
endpoints communicating using CoAP.
• Designed for constrained nodes.
Image source: https://tools.ietf.org/id/draft-ietf-core-object-security-15.html
#ISSLearningDay
Section 6:
Baseline recommendations for implementation phase
#ISSLearningDay
Section 6:
Baseline recommendations for implementation phase
#ISSLearningDay
Section 7:
Baseline recommendations for operational phase
#ISSLearningDay
Section 7:
Baseline recommendations for operational phase
Data Diode
#ISSLearningDaywww.sans.org
Data Diode, creating air gap
#ISSLearningDay
https://owlcyberdefense.com/learn-about-data-diodes
#ISSLearningDay
Section 7:
Baseline recommendations for operational phase
Over the Air Update
#ISSLearningDay
Image source: https://blog.particle.io/2019/05/09/ota-firmware-updates/
Over the Air Update
#ISSLearningDay
Image source:
http://www.iphonehacks.com/install-ios-7-0-4-update-iphone-ipad
https://searchmobilecomputing.techtarget.com/definition/OTA-update-over-the-air-update
Previously, user needed to connect iphone to computer using
USB cable to update OS through iTunes.
With OTA, Apple can deliver updates remotely
#ISSLearningDay
Section 7:
Baseline recommendations for operational phase
Section 7:
Baseline recommendations for operational phase
#ISSLearningDay
In summary, the key words
• Tamper protected hardware module
• Hardware root-of-trust
• Over-the-air update
• Digital signature, encryption
#ISSLearningDay
Thank You!
kokleong@nus.edu.sg
#ISSLearningDay

More Related Content

What's hot

How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
scoopnewsgroup
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Burton Lee
 
Arm the World with SPN based Security
Arm the World with SPN based SecurityArm the World with SPN based Security
Arm the World with SPN based Security
Liwei Ren任力偉
 
5 benefits that ai gives to cloud security venkat k - medium
5 benefits that ai gives to cloud security   venkat k - medium5 benefits that ai gives to cloud security   venkat k - medium
5 benefits that ai gives to cloud security venkat k - medium
usmsystem
 
Null who and_where (1)
Null who and_where (1)Null who and_where (1)
Null who and_where (1)
Prajwal Panchmahalkar
 
Manjula security for startups
Manjula security for startupsManjula security for startups
Manjula security for startups
Kesava Reddy
 
Close the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote WorkforceClose the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote Workforce
jlieberman07
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
360mnbsu
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
Peter Wood
 
The 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for CybersecurityThe 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for Cybersecurity
nathan-axonius
 
AI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey GordeychikAI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey Gordeychik
Sergey Gordeychik
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
DevOps.com
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Mighty Guides, Inc.
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
DexterJanPineda
 
Silicon Valley top 20
Silicon Valley top 20Silicon Valley top 20
Silicon Valley top 20
802 Secure, Inc
 
NUS-ISS Learning Day 2019- RPA and IPA –Strategy and Management
NUS-ISS Learning Day 2019- RPA and IPA –Strategy and ManagementNUS-ISS Learning Day 2019- RPA and IPA –Strategy and Management
NUS-ISS Learning Day 2019- RPA and IPA –Strategy and Management
NUS-ISS
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platform
Vertex Holdings
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
IRJET Journal
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
Zscaler
 
OA_Cyber security course with AI
OA_Cyber security course with AIOA_Cyber security course with AI
OA_Cyber security course with AI
Object Automation
 

What's hot (20)

How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
 
Arm the World with SPN based Security
Arm the World with SPN based SecurityArm the World with SPN based Security
Arm the World with SPN based Security
 
5 benefits that ai gives to cloud security venkat k - medium
5 benefits that ai gives to cloud security   venkat k - medium5 benefits that ai gives to cloud security   venkat k - medium
5 benefits that ai gives to cloud security venkat k - medium
 
Null who and_where (1)
Null who and_where (1)Null who and_where (1)
Null who and_where (1)
 
Manjula security for startups
Manjula security for startupsManjula security for startups
Manjula security for startups
 
Close the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote WorkforceClose the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote Workforce
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
The 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for CybersecurityThe 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for Cybersecurity
 
AI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey GordeychikAI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey Gordeychik
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
 
Silicon Valley top 20
Silicon Valley top 20Silicon Valley top 20
Silicon Valley top 20
 
NUS-ISS Learning Day 2019- RPA and IPA –Strategy and Management
NUS-ISS Learning Day 2019- RPA and IPA –Strategy and ManagementNUS-ISS Learning Day 2019- RPA and IPA –Strategy and Management
NUS-ISS Learning Day 2019- RPA and IPA –Strategy and Management
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platform
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 
OA_Cyber security course with AI
OA_Cyber security course with AIOA_Cyber security course with AI
OA_Cyber security course with AI
 

Similar to NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide

Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
IRJET Journal
 
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Amélie Gyrard
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET Journal
 
Io t trends
Io t trendsIo t trends
Io t trends
Dr Ganesh Iyer
 
Xprize Think Tank Phoenix IoT Presentation 4/18/16
Xprize Think Tank Phoenix IoT Presentation 4/18/16Xprize Think Tank Phoenix IoT Presentation 4/18/16
Xprize Think Tank Phoenix IoT Presentation 4/18/16
Mark Goldstein
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS )
GICTTraining
 
A Reference Architecture for IoT
A Reference Architecture for IoT A Reference Architecture for IoT
A Reference Architecture for IoT
WSO2
 
Cloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research ChallengesCloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research Challenges
Dr. Rajesh P Barnwal
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
 
IEEE Radio & Wireless Week IoT Powered by Wireless Presentation
IEEE Radio & Wireless Week IoT Powered by Wireless PresentationIEEE Radio & Wireless Week IoT Powered by Wireless Presentation
IEEE Radio & Wireless Week IoT Powered by Wireless Presentation
Mark Goldstein
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
IRJET Journal
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CloudIDSummit
 
SIMA AZ: Emerging Information Technology Innovations & Trends 11/15/17
SIMA AZ: Emerging Information Technology Innovations & Trends 11/15/17SIMA AZ: Emerging Information Technology Innovations & Trends 11/15/17
SIMA AZ: Emerging Information Technology Innovations & Trends 11/15/17
Mark Goldstein
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
 
security_assessment_slides
security_assessment_slidessecurity_assessment_slides
security_assessment_slides
Steve Arnold
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
Eurotech
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
Getting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj ShahGetting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj Shah
momoahmedabad
 
IRJET- Sandbox Technology
IRJET- Sandbox TechnologyIRJET- Sandbox Technology
IRJET- Sandbox Technology
IRJET Journal
 

Similar to NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide (20)

Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
 
Io t trends
Io t trendsIo t trends
Io t trends
 
Xprize Think Tank Phoenix IoT Presentation 4/18/16
Xprize Think Tank Phoenix IoT Presentation 4/18/16Xprize Think Tank Phoenix IoT Presentation 4/18/16
Xprize Think Tank Phoenix IoT Presentation 4/18/16
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS )
 
A Reference Architecture for IoT
A Reference Architecture for IoT A Reference Architecture for IoT
A Reference Architecture for IoT
 
Cloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research ChallengesCloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research Challenges
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
IEEE Radio & Wireless Week IoT Powered by Wireless Presentation
IEEE Radio & Wireless Week IoT Powered by Wireless PresentationIEEE Radio & Wireless Week IoT Powered by Wireless Presentation
IEEE Radio & Wireless Week IoT Powered by Wireless Presentation
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
SIMA AZ: Emerging Information Technology Innovations & Trends 11/15/17
SIMA AZ: Emerging Information Technology Innovations & Trends 11/15/17SIMA AZ: Emerging Information Technology Innovations & Trends 11/15/17
SIMA AZ: Emerging Information Technology Innovations & Trends 11/15/17
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
 
security_assessment_slides
security_assessment_slidessecurity_assessment_slides
security_assessment_slides
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1
 
Getting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj ShahGetting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj Shah
 
IRJET- Sandbox Technology
IRJET- Sandbox TechnologyIRJET- Sandbox Technology
IRJET- Sandbox Technology
 

More from NUS-ISS

Designing Impactful Services and User Experience - Lim Wee Khee
Designing Impactful Services and User Experience - Lim Wee KheeDesigning Impactful Services and User Experience - Lim Wee Khee
Designing Impactful Services and User Experience - Lim Wee Khee
NUS-ISS
 
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
NUS-ISS
 
How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...
NUS-ISS
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
NUS-ISS
 
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
NUS-ISS
 
Understanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix Goh
NUS-ISS
 
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeDigital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
NUS-ISS
 
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
NUS-ISS
 
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
NUS-ISS
 
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnSupply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
NUS-ISS
 
Future of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdfFuture of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdf
NUS-ISS
 
Future of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan MengFuture of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan Meng
NUS-ISS
 
Site Reliability Engineer (SRE), We Keep The Lights On 24/7
Site Reliability Engineer (SRE), We Keep The Lights On 24/7Site Reliability Engineer (SRE), We Keep The Lights On 24/7
Site Reliability Engineer (SRE), We Keep The Lights On 24/7
NUS-ISS
 
Product Management in The Trenches for a Cloud Service
Product Management in The Trenches for a Cloud ServiceProduct Management in The Trenches for a Cloud Service
Product Management in The Trenches for a Cloud Service
NUS-ISS
 
Overview of Data and Analytics Essentials and Foundations
Overview of Data and Analytics Essentials and FoundationsOverview of Data and Analytics Essentials and Foundations
Overview of Data and Analytics Essentials and Foundations
NUS-ISS
 
Predictive Analytics
Predictive AnalyticsPredictive Analytics
Predictive Analytics
NUS-ISS
 
Feature Engineering for IoT
Feature Engineering for IoTFeature Engineering for IoT
Feature Engineering for IoT
NUS-ISS
 
Master of Technology in Software Engineering
Master of Technology in Software EngineeringMaster of Technology in Software Engineering
Master of Technology in Software Engineering
NUS-ISS
 
Master of Technology in Enterprise Business Analytics
Master of Technology in Enterprise Business AnalyticsMaster of Technology in Enterprise Business Analytics
Master of Technology in Enterprise Business Analytics
NUS-ISS
 
Diagnosing Complex Problems Using System Archetypes
Diagnosing Complex Problems Using System ArchetypesDiagnosing Complex Problems Using System Archetypes
Diagnosing Complex Problems Using System Archetypes
NUS-ISS
 

More from NUS-ISS (20)

Designing Impactful Services and User Experience - Lim Wee Khee
Designing Impactful Services and User Experience - Lim Wee KheeDesigning Impactful Services and User Experience - Lim Wee Khee
Designing Impactful Services and User Experience - Lim Wee Khee
 
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
 
How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
 
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
 
Understanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix Goh
 
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeDigital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
 
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
 
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
 
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnSupply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
 
Future of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdfFuture of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdf
 
Future of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan MengFuture of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan Meng
 
Site Reliability Engineer (SRE), We Keep The Lights On 24/7
Site Reliability Engineer (SRE), We Keep The Lights On 24/7Site Reliability Engineer (SRE), We Keep The Lights On 24/7
Site Reliability Engineer (SRE), We Keep The Lights On 24/7
 
Product Management in The Trenches for a Cloud Service
Product Management in The Trenches for a Cloud ServiceProduct Management in The Trenches for a Cloud Service
Product Management in The Trenches for a Cloud Service
 
Overview of Data and Analytics Essentials and Foundations
Overview of Data and Analytics Essentials and FoundationsOverview of Data and Analytics Essentials and Foundations
Overview of Data and Analytics Essentials and Foundations
 
Predictive Analytics
Predictive AnalyticsPredictive Analytics
Predictive Analytics
 
Feature Engineering for IoT
Feature Engineering for IoTFeature Engineering for IoT
Feature Engineering for IoT
 
Master of Technology in Software Engineering
Master of Technology in Software EngineeringMaster of Technology in Software Engineering
Master of Technology in Software Engineering
 
Master of Technology in Enterprise Business Analytics
Master of Technology in Enterprise Business AnalyticsMaster of Technology in Enterprise Business Analytics
Master of Technology in Enterprise Business Analytics
 
Diagnosing Complex Problems Using System Archetypes
Diagnosing Complex Problems Using System ArchetypesDiagnosing Complex Problems Using System Archetypes
Diagnosing Complex Problems Using System Archetypes
 

Recently uploaded

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 

Recently uploaded (20)

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 

NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide