SlideShare a Scribd company logo
Darkside of Internet of Things
Aad van Rijn
Sept 2016
Disclaimer
IoT Homes
IoT smart city’s
IoT smart industrien
Aantallen en statistieken
http://www.internetlivestats.com/
50 billion (miljard)
• 50×109
• 50000000000
• 50 met 9 nullen
• 50.000.000.000
https://www.checkpoint.com/threat-prevention-resources
Darkside of Internet
https://cybermap.kaspersky.com/
Ontwikkeling van fun tot kwaad naar business
25 Years Ago:
Invention of
Firewall
20 Years Ago:
Invention of
Stateful Inspection
10 Years Ago:
URL Filtering,
UTM
5 Years Ago:
NGFW,
Mobile Security
Now:
Threat Intelligence
Threat Prevention
15 Years Ago:
Prevalent use of
Antivirus, VPN, IPS
2010:
DDoS
attack
s:
Stuxne
t
SCAD
A
1988:
Morri
s
Wor
m
1994
:
Gree
n
Card
Lotte
ry
2000:
I Love You
2003:
Anonymous
Formed
2012:
Flame
Malware
2017:
Driverless Cars
Hacked?
2006:
WikiLeaks
2013:
Dragon
fly
2011:
Stolen
authentication
information
20
14:
Bit
coi
n 2020:
IoT
Everyw
here
1998:
Melissa
2007:
Zeus Trojan
Business Case
Wat kan er mis gaan ?
Technology en leveranciers
Consumenten
Industrie
Techniek
Opletten!!
Opletten!!
Gebruik je gezonde verstand !

More Related Content

Similar to The daskside of Internet of Things

Cyber security and user privacy
Cyber security and user privacyCyber security and user privacy
Cyber security and user privacy
Jay Tripathy
 

Similar to The daskside of Internet of Things (20)

Connect your industry to cloud using IoT and Salesforce
Connect your industry to cloud using IoT and SalesforceConnect your industry to cloud using IoT and Salesforce
Connect your industry to cloud using IoT and Salesforce
 
Interoperabilità e Big Data
Interoperabilità e Big DataInteroperabilità e Big Data
Interoperabilità e Big Data
 
EURO BEINAT | Big Data e Intelligenza Artificiale | Ecosistemi Digitali | 2 d...
EURO BEINAT | Big Data e Intelligenza Artificiale | Ecosistemi Digitali | 2 d...EURO BEINAT | Big Data e Intelligenza Artificiale | Ecosistemi Digitali | 2 d...
EURO BEINAT | Big Data e Intelligenza Artificiale | Ecosistemi Digitali | 2 d...
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Third Industrial Revolution May/June 2015
Third Industrial Revolution May/June 2015Third Industrial Revolution May/June 2015
Third Industrial Revolution May/June 2015
 
Third Industrial Revolution for Nordic Financial Unions
Third Industrial Revolution for Nordic Financial UnionsThird Industrial Revolution for Nordic Financial Unions
Third Industrial Revolution for Nordic Financial Unions
 
EIA2017Portugal - Duncan Davidson - The Future of VC
EIA2017Portugal - Duncan Davidson - The Future of VCEIA2017Portugal - Duncan Davidson - The Future of VC
EIA2017Portugal - Duncan Davidson - The Future of VC
 
EIA2017Italy - Duncan Davidson - The Future of VC
EIA2017Italy - Duncan Davidson - The Future of VCEIA2017Italy - Duncan Davidson - The Future of VC
EIA2017Italy - Duncan Davidson - The Future of VC
 
Botnets used for ad fraud spam ddos attacks
Botnets used for ad fraud spam ddos attacksBotnets used for ad fraud spam ddos attacks
Botnets used for ad fraud spam ddos attacks
 
Seedstars World - Top trends in Emerging Markets
Seedstars World - Top trends in Emerging MarketsSeedstars World - Top trends in Emerging Markets
Seedstars World - Top trends in Emerging Markets
 
Internet of Things - From hype to reality
Internet of Things - From hype to realityInternet of Things - From hype to reality
Internet of Things - From hype to reality
 
Vladislav Iliushin: Dark side of IoT
Vladislav Iliushin: Dark side of IoTVladislav Iliushin: Dark side of IoT
Vladislav Iliushin: Dark side of IoT
 
IBM BC2015 - Internet of Things - from hype to reality
IBM BC2015 - Internet of Things - from hype to realityIBM BC2015 - Internet of Things - from hype to reality
IBM BC2015 - Internet of Things - from hype to reality
 
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, HamonsSecurity workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
 
A World Without Cookies by Jochen Schlosser
A World Without Cookies by Jochen SchlosserA World Without Cookies by Jochen Schlosser
A World Without Cookies by Jochen Schlosser
 
IoT: The T is for Telco, Isn't it?
IoT: The T is for Telco, Isn't it?IoT: The T is for Telco, Isn't it?
IoT: The T is for Telco, Isn't it?
 
Research Issues, Challenges and Directions in IoT (Internet of Things)
 Research Issues, Challenges and Directions in IoT (Internet of Things) Research Issues, Challenges and Directions in IoT (Internet of Things)
Research Issues, Challenges and Directions in IoT (Internet of Things)
 
Entering the Third Industrial Revolution?
Entering the Third Industrial Revolution?Entering the Third Industrial Revolution?
Entering the Third Industrial Revolution?
 
Cyber security and user privacy
Cyber security and user privacyCyber security and user privacy
Cyber security and user privacy
 
Korea squared internet squared by josanku wehome 201903
Korea squared internet squared by josanku wehome 201903Korea squared internet squared by josanku wehome 201903
Korea squared internet squared by josanku wehome 201903
 

Recently uploaded

一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
aagad
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
abhinandnam9997
 

Recently uploaded (12)

一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
The Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI StudioThe Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI Studio
 

The daskside of Internet of Things

Editor's Notes

  1. Disclaimer: Deze presentatie is tot stand gekomen met informatie van leveranciers en met behulp van informatie gevonden via diverse zoekmachines met name google. De plaatjes en gegevens zijn niet gecheckt op enige vorm van rechten. Het is ook nooit de intentie geweest om ook maar enige vorm van rechten te schenden. Dank gaat uit naar met name de leveranciers Cisco, Checkpoint en Kaspersky.