SlideShare a Scribd company logo
1 of 16
The Internet of Things
(IoT)
PPT by:Sanyogta Rajput
RollNo:3258
The IoT Concept
What is IoT?
The Internet of Things (IoT) is the network of physical objects—
devices, vehicles, buildings and other items embedded with electronics,
software, sensors, and network connectivity—that enables these
objects to collect and exchange data.
IoT is everywhere!
Why IoT Matters
When something is connected to the internet, that means that it can send
information or receive information, or both. This ability to send and/or
receive information makes things smart, and smart is good.
To be smart, a thing doesn’t need to have super storage or a super computer
inside of it. All a thing has to do is connect to super storage or to a super
computer. Being connected is awesome.
In the Internet of Things, all the things that are being connected to the
internet can be put into three categories:
1.Things that collect information and then send it.
2.Things that receive information and then act on it.
3.Things that do both.
Example
Cupcake Conveyor —
Yes, an actual cupcake ATM
that Davis called a
“confectionery 3D printer.”
There are Sprinkles’
cupcakes ATMs in several
cities in the United States,
including Beverly Hills,
Chicago, New York and
Atlanta.
Driving Forces of IoT
1. Sensor Technology – Tiny, Cheap, Variety
2. Cheap Miniature Computers
3. Low Power Connectivity
4. Capable Mobile Devices
5. Power of the Cloud
SMART IOT DEVICES
Sensor Technology
Accelerometer
(4mm diameter)
Pulse Sensor
$25
Force Sensor
(0.1N – 10N)
Low Power Connectivity
Bluetooth Smart (4.0)
(Up to 2 years with a single
Coin-cell battery)
IoT security is an area of growing importance for Research &
Education
->IoT is everywhere on campus...and growing
->Scientific instruments – old unpatched systems, “custom” instruments, new devices, etc.
->The devices in the buildings of the e-infrastructures are hackable – cameras, BMS, etc.
->Are we using networking segmentation for the Things and air-gapped? Always?
->Students are bringing 7-10 devices to campus, connecting to the network
->Multiple scientific domains – physics, healthcare & life sciences, genomics (human, plant &
animal), etc.
->Risks include scientific data integrity / availability, reputation, financial, physical,
operational, confidentiality
The IoT Market
As of 2013, 9.1 billion IoT units
Expected to grow to 28.1 billion IoT devices by 2020
Revenue growth from $1.9 trillion in 2013 to $7.1 trillion in 2020
Threat vs. Opportunity
If misunderstood and misconfigured, IoT poses risk to our data, privacy, and
safety
If understood and secured, IoT will enhance communications, lifestyle, and
delivery of services
Why be concerned about IoT?
It’s just another computer, right?
◦ All of the same issues we have with access control, vulnerability
management, patching, monitoring, etc.
◦ Imagine your network with 1,000,000 more devices
◦ Any compromised device is a foothold on the network
Attacking IoT
-> Default, weak, and hardcoded credentials
-> Difficult to update firmware and OS
-> Lack of vendor support for repairing vulnerabilities
-> Vulnerable web interfaces (SQL injection, XSS)
-> Coding errors (buffer overflow)
-> Clear text protocols and unnecessary open ports
-> DoS / DDoS
-> Physical theft and tampering
Questions and Discussion
THANKYOU........

More Related Content

What's hot

What's hot (20)

Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet Of Things
 Internet Of Things Internet Of Things
Internet Of Things
 
Internet of Things Overview
Internet of Things OverviewInternet of Things Overview
Internet of Things Overview
 
10 min IoT ppt
10 min IoT ppt10 min IoT ppt
10 min IoT ppt
 
FUTURE OF IOT
FUTURE OF IOTFUTURE OF IOT
FUTURE OF IOT
 
IoT ppt
IoT pptIoT ppt
IoT ppt
 
IOT - internet of Things - August 2017
IOT - internet of Things - August 2017IOT - internet of Things - August 2017
IOT - internet of Things - August 2017
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
Internet of things (IOT) | Future Trends
Internet of things (IOT) | Future TrendsInternet of things (IOT) | Future Trends
Internet of things (IOT) | Future Trends
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
 
IoT for Healthcare
IoT for HealthcareIoT for Healthcare
IoT for Healthcare
 
iot seminar topic
iot seminar topic iot seminar topic
iot seminar topic
 
IOT Presentation Seminar PPT
IOT Presentation Seminar PPTIOT Presentation Seminar PPT
IOT Presentation Seminar PPT
 
Introduction to IOT
Introduction to IOTIntroduction to IOT
Introduction to IOT
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)
 
Internet of things (IOT)
Internet of things (IOT)Internet of things (IOT)
Internet of things (IOT)
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 

Similar to Iot audit

The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy AnkitThakkar46
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)shashankvaidyar2
 
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGINTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGAYESHA JAVED
 
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOTAmberSinghal1
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...LouisFrederickRakoto
 
The Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The InternetThe Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The InternetMichelle Singh
 
Application and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information TechnologyApplication and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information TechnologyDr. Amarjeet Singh
 
The future of IoT paper
The future of IoT paperThe future of IoT paper
The future of IoT paperJayanth Vinay
 
Comparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoTComparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoTijtsrd
 
IOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxIOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxrupasharma39
 
Emergig-Technology-ch-4.ppt
Emergig-Technology-ch-4.pptEmergig-Technology-ch-4.ppt
Emergig-Technology-ch-4.pptLammiiGurmeessaa
 
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...IRJET Journal
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutionsijtsrd
 

Similar to Iot audit (20)

The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)
 
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGINTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
 
Internet Of Things(IoT).pptx
Internet Of Things(IoT).pptxInternet Of Things(IoT).pptx
Internet Of Things(IoT).pptx
 
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOT
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...
 
The Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The InternetThe Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The Internet
 
Application and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information TechnologyApplication and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information Technology
 
The future of IoT paper
The future of IoT paperThe future of IoT paper
The future of IoT paper
 
Comparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoTComparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoT
 
IOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxIOT LADEN GHISING.pptx
IOT LADEN GHISING.pptx
 
IoT Intro.pptx
IoT Intro.pptxIoT Intro.pptx
IoT Intro.pptx
 
Emergig-Technology-ch-4.ppt
Emergig-Technology-ch-4.pptEmergig-Technology-ch-4.ppt
Emergig-Technology-ch-4.ppt
 
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Iot
IotIot
Iot
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
 
IoT
IoTIoT
IoT
 
Internet of Things(IOT)
Internet of Things(IOT)Internet of Things(IOT)
Internet of Things(IOT)
 

Recently uploaded

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 

Recently uploaded (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 

Iot audit

  • 1. The Internet of Things (IoT) PPT by:Sanyogta Rajput RollNo:3258
  • 3. What is IoT? The Internet of Things (IoT) is the network of physical objects— devices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivity—that enables these objects to collect and exchange data. IoT is everywhere!
  • 4. Why IoT Matters When something is connected to the internet, that means that it can send information or receive information, or both. This ability to send and/or receive information makes things smart, and smart is good. To be smart, a thing doesn’t need to have super storage or a super computer inside of it. All a thing has to do is connect to super storage or to a super computer. Being connected is awesome. In the Internet of Things, all the things that are being connected to the internet can be put into three categories: 1.Things that collect information and then send it. 2.Things that receive information and then act on it. 3.Things that do both.
  • 5.
  • 6. Example Cupcake Conveyor — Yes, an actual cupcake ATM that Davis called a “confectionery 3D printer.” There are Sprinkles’ cupcakes ATMs in several cities in the United States, including Beverly Hills, Chicago, New York and Atlanta.
  • 7. Driving Forces of IoT 1. Sensor Technology – Tiny, Cheap, Variety 2. Cheap Miniature Computers 3. Low Power Connectivity 4. Capable Mobile Devices 5. Power of the Cloud
  • 9. Sensor Technology Accelerometer (4mm diameter) Pulse Sensor $25 Force Sensor (0.1N – 10N)
  • 10. Low Power Connectivity Bluetooth Smart (4.0) (Up to 2 years with a single Coin-cell battery)
  • 11. IoT security is an area of growing importance for Research & Education ->IoT is everywhere on campus...and growing ->Scientific instruments – old unpatched systems, “custom” instruments, new devices, etc. ->The devices in the buildings of the e-infrastructures are hackable – cameras, BMS, etc. ->Are we using networking segmentation for the Things and air-gapped? Always? ->Students are bringing 7-10 devices to campus, connecting to the network ->Multiple scientific domains – physics, healthcare & life sciences, genomics (human, plant & animal), etc. ->Risks include scientific data integrity / availability, reputation, financial, physical, operational, confidentiality
  • 12. The IoT Market As of 2013, 9.1 billion IoT units Expected to grow to 28.1 billion IoT devices by 2020 Revenue growth from $1.9 trillion in 2013 to $7.1 trillion in 2020
  • 13. Threat vs. Opportunity If misunderstood and misconfigured, IoT poses risk to our data, privacy, and safety If understood and secured, IoT will enhance communications, lifestyle, and delivery of services
  • 14. Why be concerned about IoT? It’s just another computer, right? ◦ All of the same issues we have with access control, vulnerability management, patching, monitoring, etc. ◦ Imagine your network with 1,000,000 more devices ◦ Any compromised device is a foothold on the network
  • 15. Attacking IoT -> Default, weak, and hardcoded credentials -> Difficult to update firmware and OS -> Lack of vendor support for repairing vulnerabilities -> Vulnerable web interfaces (SQL injection, XSS) -> Coding errors (buffer overflow) -> Clear text protocols and unnecessary open ports -> DoS / DDoS -> Physical theft and tampering