The Internet of Things (IoT) - Welcome to The Caribbean ... Internet of Things (IoT) ... Type of perpetrator (criminals, anarchists, hackers, revolutionaries, ... •Growth in devices
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
3. Type of target (individuals, private companies, civil society organizations,
media entities, public institutions, critical infrastructures etc.
8
Malicious Software (Malware)-viruses, spyware and other unwanted software
Cybersecurity threats(malware)
9
Botnets: networks or hijacked devices that perform remotely commanded tasks without
the knowledge of their owners
Cybersecurity threats(Botnets)
10
Denial of Service (DoS) flooding a computer or website with requests for
information, preventing them functioning properly
Cybersecurity threats(DoS)
11
Phishing a form of social engineering through which a person is tricked
into doing something that they normally should not do
Cybersecurity threats(Phishing)
12
E-scams fraud schemes in which scammers use one or more online
services- such as emails or websites to contact potential victims
Cybersecurity threats(E-scams)
13
Because the scope of cybersecurity is so broad, it is helpful to break
it down into these categories
Cyber Security Themes & Solutions
14
Collaborative Security Approach:
See http://www.internetsociety.org/collaborativesecurity
Fostering Confidence / Protecting
OpportunitiesOpportunities for individuals, business, economy and and society will only be realized if there is
confidence in the Internet, systems, and technologies (including IoT).
Collective ResponsibilityNo security threats or solutions exist in isolation. Requires collective responsibility, a common
understanding of problems, shared solutions, common benefits, and open communication channels.
Uphold Fundamental Properties and
ValuesSecurity solutions should be fully integrated with the important objectives of preserving the fundamental
properties of the Internet and fundamental rights.
Evolution and ConsensusSecurity solutions need to be flexible enough to evolve over time & responsive to new challenges. Focus
needed on defining agreed problems and finding solutions, including incremental ones.
Think Globally, Act LocallyCreating security and trust requires different players (within their respective roles / responsibilities) to take
action and close to where the issues are occurring.
Developing Solutions in the Context of Principles
15
• Despite the buzz, no single definition!
refers to scenarios where network connectivity and computing capability extends to
objects, sensors and everyday items not normally considered computers, allowing
these devices to generate, exchange and consume data with minimal human
intervention.
• Functionally: The extension of network connectivity and computing capability to a variety
of objects, devices, sensors and everyday items allowing them to generate/exchange
data, often with remote with data analytic/management capabilities.
• As Value: Data & what can be done with it.
• As a Vision: The realization of a “hyper-connected” world.
• This is why it matters• This is why it’s hard!
What is IoT really?
16
Internet of Things Beginning
Computers, Networks, and “Things”
17
Machine to Machine” (M2M)(~1970s +)
Carnegie Mellon InternetCoke Machine (1982,
1990)
Trojan Room Coffee Pot
(first webcam) (1991)
Internet Toaster(1990)
If it’s not new, why now?: A confluence of market trends
18
UBIQUITOUS CONNECTIVITY
WIDESPREADADOPTION OF IP
COMPUTING ECONOMICS
MINIATURIZATION
ADVANCES IN DATA ANALYTICSUBIQUITOUS
CONNECTIVITY
WIDESPREAD ADOPTION OF
IP
COMPUTING ECONOMICS
MINIATURIZATION
ADVANCES IN DATA
ANALYTICS
RISE OF CLOUD COMPUTING
• Security
• Privacy
• Interoperability & Standards
• Legal Regulatory & Rights
• Emerging Economies and Development
Key IoT Challenges
19
The Security
Implications
20
•Security is the most pressing and important IoT challenge for industry, users, and the Internet.
•Growth in devices increases the surface available for cyberattack
•Poorly secured devices affect the security of the Internet and other devices globally, not just locally
•Developers and users of IoTdevices and systems have a collective obligation to ensure they do not expose others and the Internet itself to potential harm!
The Security
Implications
21
•Cost/Size/Functionality
•Volume of Identical Devices
•Limited Visibility into Internal Workings
•Embedded Devices
•Physical Security Vulnerabilities
A Spectrum of Unique Smart Object Security
Challenges
22
•Unintended Use & BYOIoT
•Deployment at Mass Scale
•Long Service Life
•No / Limited Upgradability
A Spectrum of Unique Smart Object Security
Challenges
23
•Both cybersecurity problems specifically and other criminal
activities carried out using the Internet are not going to be
solved with technology alone!
•Close cooperation and coordination by all stakeholders is key!