Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Internet of Unsecure Things

Similar presentations


Presentation on theme: "The Internet of Unsecure Things"— Presentation transcript:

1 The Internet of Unsecure Things
Thomas Hayes & Iliandra Gonzalez The Internet of Unsecure Things

2 Internet of insecure things (IoT)
The Internet of insecure things is focused on the risks of having more devices connected to the internet. There are many devices connected to the internet that can easily be attacked or have security holes. Internet of insecure things (IoT)

3 - Term for various kinds of programs used to operate computers and related devices.
System Software Operating System Utility software Application software Microsoft office, Adobe Photoshop, Outlook, Chrome..etc. Software

4 Cloud Data Is a big target for hackers
Sensitive data can be stored on the cloud It is recommended to use your own encryption to encrypt any data that will be uploaded to the cloud

5 Cars Just like most technology cars are able to be hacked
Most modern cars run on technology They are able to be hacked and taken control of This is inefficient for hackers unless they are planning on stealing the car Cars

6 Wi-Fi Wi-fi is very vulnerable TO ATTACKS
The wpa2 protocol that wi-fi uses is unsecure The vulnerablites is in the protocol itself and not any specific device Many different operating systems are at risk, including: Android, Apple, Linux, Windows, OpenBSD, and Linksys

7 Databases are a widely and continuously accessible component which makes it more vulnerable to attacks. Database security requires careful design and requires modifications to all network layers. There are many different ways that hackers will try to gain access to databases to steal any information that the databases contain Database Security

8 Threats on the internet
There are many forms of security risk/ forms of attacks DDoS Botnet Malware Spyware Keylogging Threats on the internet

9 DDoS DDoS stands for distributed denial of service.
Is a form of an attack that involves multiple botnets to overwhelm a target. Does not breach your security perimeter Aims to overcome the computer network by flooding it with data. DDoS

10 Botnet is a network of private computers infected and controlled as a group.
This is done without the owners knowledge. The group is used to send spam messages. Term derived from robot and network Is spread through malware Botnet

11 Software that is intended to damage or disable computers or computer systems.
Can perform different functions, such as : Stealing Encrypting Deleting sensitive data Altering/ hijacking computer functions Malware

12 Malware is a malicious software that can be a program or a file that is harmful to users.
Malware consist of the following: Viruses Worms Trojan horses Spyware Malware Con’t

13 Software that enables a user to obtain covert information about another's computer activity.
Done by transmitting data covertly from their hard drive. Violates end users privacy Can be referred as tracking software Spyware

14 Keylogging is the use of a computer program to record every keystroke made by the user.
Used to get access to passwords or other confidential information. Can be referred to as system monitor, is a type of surveillance technology. Saves the text in a miniature hard drive. Must be physically retrieved later. Keylogging

15 The Internet provides many benefits to users, however, there are many threats on the internet
The more connected we become to the internet the more risk there is involved It is important to be smart about your data to keep it secure To Conclude


Download ppt "The Internet of Unsecure Things"

Similar presentations


Ads by Google