Internet of Things https://www.getcybersafe.gc.ca/cnt/rsks/ntrnt-thngs/index-en.aspx.

Slides:



Advertisements
Similar presentations
Welcome to the Award Winning Easiest to Use & Most Advanced View, Manage, and Control Security, Access Control, Video, Energy & Lighting Systems, & Critical.
Advertisements

Top of Content Box Line Subtitle Line Title Line Right Margin Line Wearables: Panacea or Pandora’s Box – A Security Perspective Gary Davis | Chief Consumer.
Jim Niehaus October 9, Topics No Cost Considerations Systems with 24/7 Monitoring Service Cameras Motion Sensors References & Product Links.
Research Directions for the Internet of Things Supervised by: Dr. Nouh Sabry Presented by: Ahmed Mohamed Sayed.
DUE Security and Fire Alarm Systems LEARNING OUTCOME 7B Describe design overview and location considerations.
A Home Automation Program Eric McGregor. Subject Area ● We have appliances in our dorm rooms and home. – Stereo – Computer – Lamps – Fans ● All appliances.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
IT security By Tilly Gerlack.
Project Presentation Supervisor:Prof Dr Zubair Ahmad Khan Group : Inaamul-Haq-Mansoor (Leader) (S454845) Nadeem (S454843) Kamran Khaliq (S455118) Ghulam.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
Specification section 6.2. What do you need to learn? The application and advantages/disadvantages of the following digital media and new technology in.
CONFIDENTIAL 1. 2 Designing the Intelligent Energy Gateway 2009 CONFIDENTIAL.
The group will focus on the design of a “smart” device. This includes researching the best method of design and fabricating the design to create a working.
John Ansbach General Counsel, GDT October 8,
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
Cevgroup.org C utting E dge V isionaries. cevgroup.org TODAY’s TALK 1) Internet Of Things (IoT) 2) Wi-Fi Controlled Robots 3) Augmented Reality.
The ambient light sensor in a smart phone is what measures how bright the light is. It’s the phones software that adjusts the brightness in the display.
Configuration Guide ---for Alarm device ---for Alarm device.
FREESCALE KINETIS TRANSPORTER (Device that talks to your car, home, phone) An Accessory to your phone and your car ID:FSL35.
AUTOMATING HOME SECURITY RYAN C. KRAUSE. BACKGROUND: HOME SECURITY Many providers including, self-building kits ADT, Gaurdian, Xfinity, LifeShield, Protection.
Internet of Things – Getting Started
Introduction to Mobile-Cloud Computing. What is Mobile Cloud Computing? an infrastructure where both the data storage and processing happen outside of.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Grid Wide IoT Gateway Supports open standards and technologies, with open interfaces that provide support for proprietary gas-meter reading protocols and.
The Connected Home Frank May 10/20/2016.
Home Security Options What can I do to deter Burglars?
THE DIGITAL JOURNEY What IP means for technology enabled care
Technology in Your Life
Managing Windows Security
IP Camera and Doorbell Camera
Internet of Things (IoT)
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Smart home introduction
Configure Instruction
Security and Smart Home Devices: How Safe Is Your Home?
Internet-of-somewhat-dubious-Things
Prepared by: Celeste Ng Updated: May, 2017.
How SCADA Systems Work?.
Computer Hardware-Meeting the machine
Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.
Introduction to Computers
The Making of a Smart Home
"Uberize" Your Remote Equipment
Basic Introduction to Computers
The Internet of Things (IoT) and Analytics
IoT & IIoT - What You Need To Know
The security and vulnerabilities of IoT devices
Cybersecurity Concepts for Engineers
(
Internet of Things (IoT)
Internet of Things Vulnerabilities
Network Security for your Business
An Introduction to Computer Networking
Home Internet Vulnerabilities
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Network Models, Hardware, Protocols and number systems
Purdue University Fort Wayne
Data security in iot devices
Elecbits.
Securing Home IoT Environments with Attribute-Based Access Control
Purdue University Fort Wayne
Tareq Khan, Ph.D. Assistant Professor,
IOT Acronym as “Internet Of Things”
Revision PowerPoint By Nicole Davidson.
Diana Garcia California State University, Chico EECE 490A
Trust by Design: The Internet of Things
IoT: Privacy and Security
Principles of Information Technology
INTERNET OF THINGS BY S DEVA PRIYA. WHAT IS IOT?  The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital.
IOT INTERNET OF THINGS. DEFINITION a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided.
Presentation transcript:

Internet of Things https://www.getcybersafe.gc.ca/cnt/rsks/ntrnt-thngs/index-en.aspx

Internet of Things

What is the Internet of Things? The Internet of Things (IoT) refers to physical devices that are connected to each other or cloud services via the Internet.

What Things? In the home: Mobile: Entertainment systems (television, game console) Heating/cooling (thermostats, fan, smoke alarm) Home security (alarms, locks, baby monitor) Appliances (refrigerator, coffee maker, oven) Mobile: Wearables (fitness tracker, Healthcare devices) Pet tracking collars Smart cars Because of the automatic nature of the IoT, smart devices have many advantages. Coffee starts brewing when your alarm goes off in the morning. Your child forgets their keys, but you can unlock the door from work. You can remotely monitor your home and your family to keep them and your belongings safe. You can streamline your home's functions to make things run more efficiently. The IoT can change how you organize and schedule, and adding convenience and connection. http://www.getroost.com/ smoke detectors https://www.parrot.com/us/connected-garden/parrot-pot#parrot-pot plant watering Garage door openers – grant access to different people

What Things? Industrial: Factory automation Heavy machinery Transportation (buses, trains, airplanes) Healthcare (ambulances, hospital equipment) Helmet concussion sensor http://www.theshockbox.com/ Medical alert watch

What Do These Things Do? Devices collect and transmit information gathered from their surroundings using embedded sensors and software Devices communicate with one another, with smart phones, or with a cloud service Door lock communicates with lights Heart monitor paired with a smart watch Pet tracker connects to cloud service (access via phone app or web) Devices may communicate directly with other devices (require Devices may communicate with a cloud host Devices may communicate with a central controlling device/app

What Could Go Wrong? Personal data could be accessed Health data from health devices Images from web cameras/baby monitors Malicious people could use devices to harass or cause injury Turn lights on/off Activate car brakes Hackers could use your devices to attack your other devices/computers as well as other web sites or services Most devices require an Internet connection to access remotely and can not be accessed if connection is lost Automatic flow of information between IoT devices creates new security risks. For example, a thermostat connected to your home network that is not properly secured could be a gateway to your identity, money, your address and other devices. If you can access all your data remotely, a cybercriminal might be able to as well. Not only is a breach of information a risk, but also someone taking control of a device and its functions. For example, someone hacking your smart lock system may not steal information, but they may be able to unlock the doors and steal your belongings. If you use a single application to control all devices, all are at risk if the application is hacked or if cloud host is hacked.

What You Can Do Change default user names and passwords on all devices Update operating systems and software on all devices Separate your IoT devices from your main network Many new routers allow a guest network Configure security, if available, to limit who can use and what access Turn off cameras and microphones when not being used Review device options to limit information is sent to the cloud Review devices for protocols and management applications to standardize before purchasing and installing Many devices send information to vendor’s cloud to allow you to control them. Extra information may be sent without your knowledge If using multiple networks (default & guest), determine which network to use for each device depending on requirements

Security Awareness Campaign https://brocku.ca/information-technology/security/

Video Life Simplified with Connected Devices https://www.youtube.com/watch?v=NjYTzvAVozo What is The Internet of Things https://www.youtube.com/watch?v=LVlT4sX6uVs

Questions