SlideShare a Scribd company logo
AVINASH SHARMA
20BCYN021
BCA - CYBER SECURITY
Jecrc University
IoT Security
Overview
• Introduction of IoT (Internet of Things)
• Definition of IoT Security
• Importance of IoT Security
• Key Elements of IoT Security
• Problems of IoT Security
• Solutions of IoT Security
• Attacks in IoT Security
• Career in IoT Security
Introduction of iot
• What Is IoT?
• The Internet of Things (IoT) describes the network of
physical objects—“things”—that are embedded with
sensors, software, and other technologies for the
purpose of connecting and exchanging data with
other devices and systems over the internet.
Internet of things
Definition of
IoT Security
What is IoT Security ?
IoT security is the act of securing Internet of Things
devices and the objects and everything which is
connected through internet from attackers.
Importance of
iot security
• It is very important to secure Iot devices from the
attackers or hackers.
• Hardware, software and connectivity will all need to
be secure for IoT objects to work effectively.
Without security, any connected object or device can be
hacked easily.
• Once hackers gain control, they can perform any activity
and steal the user's digital data.
IoT Security
Key elements
of iot security
1. Authentication - It helps to build trust between the
identity of IoT machines and devices to protect data and
control access.
2. Access Control - It is a security technique that
regulates who or what can view or use resources in a
computing environment
Key elements
of iot security
3. Data Security - to the process of protecting data
from unauthorized access and data corruption
throughout its lifecycle.
4. Non Repudiation - is the assurance that someone
cannot deny something.It means that the data receiver
cannot deny that he or she have not received the data
yet.
Key elements
of iot security
5. Data availability - means that information is
accessible to authorized users. It provides an
assurance that your system and data can be accessed
by authenticated users whenever they're needed.
Problems of
iot security
1. Hijacking Of IoT Devices - IoT devices that have weak
security measures can become a target of attackers and
attackers performs many attacks to hijack them.
2. Insufficient Testing And Lack Of Updates - One of the
security issues with IoT devices is that companies
producing them are often too careless when it comes to
proper testing and providing timely software updates.
Problems of
iot security
3. Botnet Attacks - a hacker creates an army of bots by
infecting them with malware and directs them to send
thousands of requests per second to bring down the
target.
4. Lack Of User Awareness - IoT is new technology,
so the users are not so much aware about the threats
of the IoT security.
Problems of
iot security
5. Issue of default passwords – many devices are
comes with the default passwords, which will be easily
guessed by the bruteforce attacks.
6. Remote vehicles access – hijack of your car is
also one of the threat possessed by the IoT. A skilled
hacker might hijack by getting the access of your
smart car through the remote access.
Solutions of
iot security
1. Change passwords often and make them
strong -
Changing passwords, on a regular basis, on internets
accounts, computers and mobile devices is a norm
nowadays.
2. Don’t connect insecure networks - It is unsafe
to connect your devices to insecure networks because attackers
might steal your data, passwords and sensitive information.
Solutions of
iot security
3. Update firmware timely – updates installs security
patches on your devices and stops hackers or attackers to
gain access of the system.
4. Don’t rely on cloud technology – Cloud
technology is very convenient for sure, but it is also a
quite vulnerable emerging technology prone to attacks.
Solutions of
iot security
5. Strong physical security – Providing physical security
means, to keep the IoT devices and objects at safe place
so that no one can breach sensitive information and
informational data.
6. Use Private Networks – always connect to private
networks only and create unique passwords for that
connection.
Attacks in
iot security
1. Botnet Attack - A botnet is a network that combines
various systems together to remotely take control over
a victim’s system and distribute malware.
2. Denial of service Attack(DOS) - A denial-of-service
(DoS) attack deliberately tries to cause a capacity
overload in the target system by sending multiple
requests.
Attacks in
iot security
3. Man-in-the-Middle Attack - In a Man-in-the-Middle
(MiTM) attack, a hacker breaches the communication
channel between two individual systems in an attempt to
intercept messages among them.
4. Social engineering Attack -Hackers use social
engineering to manipulate people into giving up their
sensitive information such as passwords and bank details.
Attacks in
iot security
5. Ransomware - In this attack, a hacker uses malware
to encrypt data that may be required for business
operations.
6. Advanced persistent threat - is a targeted cyber
attack, where an intruder gains illegal access to a
network and stays undetected.
Career in
iot security
The Internet of Things offers a range of career
opportunities in embedded systems cybersecurity,
software development, and more. Some of the top IoT
industries include healthcare, manufacturing, utilities,
transportation, agriculture, and consumer products. Jobs
are expected to increase in the coming years across
industries, though growth may be slower in some sectors
than others.
Career in
iot security
Thank you
Thank you everyone

More Related Content

What's hot

Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
Jinia Bhowmik
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
Intel® Software
 
IoT security
IoT securityIoT security
IoT security
YashKesharwani2
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
Anastasios Economides
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
Koenig Solutions Ltd.
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
Somasundaram Jambunathan
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
University of Ontario Institute of Technology (UOIT)
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
Pierluigi Paganini
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
sreelekha appakondappagari
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
Ahmed Mohamed Mahmoud
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and Solutions
Ulf Mattsson
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
Shreya Pohekar
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
CableLabs
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
Bryan Len
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
Vasco Veloso
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
Radouane Mrabet
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
EC-Council
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT Security
SHAAMILIVARSAGV
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
Liwei Ren任力偉
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
Ravindra Dastikop
 

What's hot (20)

Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
IoT security
IoT securityIoT security
IoT security
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and Solutions
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT Security
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 

Similar to Presentation on IOT SECURITY

IoT Security.pdf
IoT Security.pdfIoT Security.pdf
IoT Security.pdf
SudhanshiBakre1
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
online Marketing
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
Renu875977
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
tjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
lmelaine
 
COMPUTER NETWORKS IOT BASED.pptx
COMPUTER NETWORKS IOT BASED.pptxCOMPUTER NETWORKS IOT BASED.pptx
COMPUTER NETWORKS IOT BASED.pptx
1230200206
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
Usman Anjum
 
The Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT SecurityThe Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT Security
Dr. Mohamed Torky
 
The shift from social network security to the social iot security
The shift from social network security to the social iot securityThe shift from social network security to the social iot security
The shift from social network security to the social iot security
Aboul Ella Hassanien
 
The shift from social network security to the social iot security
The shift from social network security to the social iot securityThe shift from social network security to the social iot security
The shift from social network security to the social iot security
Aboul Ella Hassanien
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
vrickens
 
A Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptxA Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptx
TurboAnchor
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital Footprint
SurfWatch Labs
 
IoT Device Security: Best Practices for Enhanced Protection
IoT Device Security: Best Practices for Enhanced ProtectionIoT Device Security: Best Practices for Enhanced Protection
IoT Device Security: Best Practices for Enhanced Protection
Syscraft Information System Pvt. Ltd.
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
IJSRED
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdf
SeasiaInfotech2
 
BMI.pptx
BMI.pptxBMI.pptx
BMI.pptx
ANIKETRAJ40474
 
sample assignment
sample assignmentsample assignment
sample assignment
#essaywriting
 
Security Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfSecurity Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdf
JPLoft Solutions
 

Similar to Presentation on IOT SECURITY (20)

mypresentation.pdf
mypresentation.pdfmypresentation.pdf
mypresentation.pdf
 
IoT Security.pdf
IoT Security.pdfIoT Security.pdf
IoT Security.pdf
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
COMPUTER NETWORKS IOT BASED.pptx
COMPUTER NETWORKS IOT BASED.pptxCOMPUTER NETWORKS IOT BASED.pptx
COMPUTER NETWORKS IOT BASED.pptx
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
The Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT SecurityThe Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT Security
 
The shift from social network security to the social iot security
The shift from social network security to the social iot securityThe shift from social network security to the social iot security
The shift from social network security to the social iot security
 
The shift from social network security to the social iot security
The shift from social network security to the social iot securityThe shift from social network security to the social iot security
The shift from social network security to the social iot security
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
A Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptxA Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptx
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital Footprint
 
IoT Device Security: Best Practices for Enhanced Protection
IoT Device Security: Best Practices for Enhanced ProtectionIoT Device Security: Best Practices for Enhanced Protection
IoT Device Security: Best Practices for Enhanced Protection
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdf
 
BMI.pptx
BMI.pptxBMI.pptx
BMI.pptx
 
sample assignment
sample assignmentsample assignment
sample assignment
 
Security Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfSecurity Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdf
 

More from The Avi Sharma

Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
The Avi Sharma
 
Information Security Fundamentals
Information Security FundamentalsInformation Security Fundamentals
Information Security Fundamentals
The Avi Sharma
 
Presentation on - Processors
Presentation on - Processors Presentation on - Processors
Presentation on - Processors
The Avi Sharma
 
Robotics
RoboticsRobotics
Robotics
The Avi Sharma
 
Sql injection
Sql injectionSql injection
Sql injection
The Avi Sharma
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
The Avi Sharma
 

More from The Avi Sharma (6)

Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
Information Security Fundamentals
Information Security FundamentalsInformation Security Fundamentals
Information Security Fundamentals
 
Presentation on - Processors
Presentation on - Processors Presentation on - Processors
Presentation on - Processors
 
Robotics
RoboticsRobotics
Robotics
 
Sql injection
Sql injectionSql injection
Sql injection
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Presentation on IOT SECURITY

  • 1. AVINASH SHARMA 20BCYN021 BCA - CYBER SECURITY Jecrc University IoT Security
  • 2. Overview • Introduction of IoT (Internet of Things) • Definition of IoT Security • Importance of IoT Security • Key Elements of IoT Security • Problems of IoT Security • Solutions of IoT Security • Attacks in IoT Security • Career in IoT Security
  • 3. Introduction of iot • What Is IoT? • The Internet of Things (IoT) describes the network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
  • 5. Definition of IoT Security What is IoT Security ? IoT security is the act of securing Internet of Things devices and the objects and everything which is connected through internet from attackers.
  • 6. Importance of iot security • It is very important to secure Iot devices from the attackers or hackers. • Hardware, software and connectivity will all need to be secure for IoT objects to work effectively. Without security, any connected object or device can be hacked easily. • Once hackers gain control, they can perform any activity and steal the user's digital data.
  • 8. Key elements of iot security 1. Authentication - It helps to build trust between the identity of IoT machines and devices to protect data and control access. 2. Access Control - It is a security technique that regulates who or what can view or use resources in a computing environment
  • 9. Key elements of iot security 3. Data Security - to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. 4. Non Repudiation - is the assurance that someone cannot deny something.It means that the data receiver cannot deny that he or she have not received the data yet.
  • 10. Key elements of iot security 5. Data availability - means that information is accessible to authorized users. It provides an assurance that your system and data can be accessed by authenticated users whenever they're needed.
  • 11. Problems of iot security 1. Hijacking Of IoT Devices - IoT devices that have weak security measures can become a target of attackers and attackers performs many attacks to hijack them. 2. Insufficient Testing And Lack Of Updates - One of the security issues with IoT devices is that companies producing them are often too careless when it comes to proper testing and providing timely software updates.
  • 12. Problems of iot security 3. Botnet Attacks - a hacker creates an army of bots by infecting them with malware and directs them to send thousands of requests per second to bring down the target. 4. Lack Of User Awareness - IoT is new technology, so the users are not so much aware about the threats of the IoT security.
  • 13. Problems of iot security 5. Issue of default passwords – many devices are comes with the default passwords, which will be easily guessed by the bruteforce attacks. 6. Remote vehicles access – hijack of your car is also one of the threat possessed by the IoT. A skilled hacker might hijack by getting the access of your smart car through the remote access.
  • 14. Solutions of iot security 1. Change passwords often and make them strong - Changing passwords, on a regular basis, on internets accounts, computers and mobile devices is a norm nowadays. 2. Don’t connect insecure networks - It is unsafe to connect your devices to insecure networks because attackers might steal your data, passwords and sensitive information.
  • 15. Solutions of iot security 3. Update firmware timely – updates installs security patches on your devices and stops hackers or attackers to gain access of the system. 4. Don’t rely on cloud technology – Cloud technology is very convenient for sure, but it is also a quite vulnerable emerging technology prone to attacks.
  • 16. Solutions of iot security 5. Strong physical security – Providing physical security means, to keep the IoT devices and objects at safe place so that no one can breach sensitive information and informational data. 6. Use Private Networks – always connect to private networks only and create unique passwords for that connection.
  • 17. Attacks in iot security 1. Botnet Attack - A botnet is a network that combines various systems together to remotely take control over a victim’s system and distribute malware. 2. Denial of service Attack(DOS) - A denial-of-service (DoS) attack deliberately tries to cause a capacity overload in the target system by sending multiple requests.
  • 18. Attacks in iot security 3. Man-in-the-Middle Attack - In a Man-in-the-Middle (MiTM) attack, a hacker breaches the communication channel between two individual systems in an attempt to intercept messages among them. 4. Social engineering Attack -Hackers use social engineering to manipulate people into giving up their sensitive information such as passwords and bank details.
  • 19. Attacks in iot security 5. Ransomware - In this attack, a hacker uses malware to encrypt data that may be required for business operations. 6. Advanced persistent threat - is a targeted cyber attack, where an intruder gains illegal access to a network and stays undetected.
  • 20. Career in iot security The Internet of Things offers a range of career opportunities in embedded systems cybersecurity, software development, and more. Some of the top IoT industries include healthcare, manufacturing, utilities, transportation, agriculture, and consumer products. Jobs are expected to increase in the coming years across industries, though growth may be slower in some sectors than others.