SlideShare ist ein Scribd-Unternehmen logo
1 von 22
AVINASH SHARMA
20BCYN021
BCA - CYBER SECURITY
Jecrc University
IoT Security
Overview
• Introduction of IoT (Internet of Things)
• Definition of IoT Security
• Importance of IoT Security
• Key Elements of IoT Security
• Problems of IoT Security
• Solutions of IoT Security
• Attacks in IoT Security
• Career in IoT Security
Introduction of iot
• What Is IoT?
• The Internet of Things (IoT) describes the network of
physical objects—“things”—that are embedded with
sensors, software, and other technologies for the
purpose of connecting and exchanging data with
other devices and systems over the internet.
Internet of things
Definition of
IoT Security
What is IoT Security ?
IoT security is the act of securing Internet of Things
devices and the objects and everything which is
connected through internet from attackers.
Importance of
iot security
• It is very important to secure Iot devices from the
attackers or hackers.
• Hardware, software and connectivity will all need to
be secure for IoT objects to work effectively.
Without security, any connected object or device can be
hacked easily.
• Once hackers gain control, they can perform any activity
and steal the user's digital data.
IoT Security
Key elements
of iot security
1. Authentication - It helps to build trust between the
identity of IoT machines and devices to protect data and
control access.
2. Access Control - It is a security technique that
regulates who or what can view or use resources in a
computing environment
Key elements
of iot security
3. Data Security - to the process of protecting data
from unauthorized access and data corruption
throughout its lifecycle.
4. Non Repudiation - is the assurance that someone
cannot deny something.It means that the data receiver
cannot deny that he or she have not received the data
yet.
Key elements
of iot security
5. Data availability - means that information is
accessible to authorized users. It provides an
assurance that your system and data can be accessed
by authenticated users whenever they're needed.
Problems of
iot security
1. Hijacking Of IoT Devices - IoT devices that have weak
security measures can become a target of attackers and
attackers performs many attacks to hijack them.
2. Insufficient Testing And Lack Of Updates - One of the
security issues with IoT devices is that companies
producing them are often too careless when it comes to
proper testing and providing timely software updates.
Problems of
iot security
3. Botnet Attacks - a hacker creates an army of bots by
infecting them with malware and directs them to send
thousands of requests per second to bring down the
target.
4. Lack Of User Awareness - IoT is new technology,
so the users are not so much aware about the threats
of the IoT security.
Problems of
iot security
5. Issue of default passwords – many devices are
comes with the default passwords, which will be easily
guessed by the bruteforce attacks.
6. Remote vehicles access – hijack of your car is
also one of the threat possessed by the IoT. A skilled
hacker might hijack by getting the access of your
smart car through the remote access.
Solutions of
iot security
1. Change passwords often and make them
strong -
Changing passwords, on a regular basis, on internets
accounts, computers and mobile devices is a norm
nowadays.
2. Don’t connect insecure networks - It is unsafe
to connect your devices to insecure networks because attackers
might steal your data, passwords and sensitive information.
Solutions of
iot security
3. Update firmware timely – updates installs security
patches on your devices and stops hackers or attackers to
gain access of the system.
4. Don’t rely on cloud technology – Cloud
technology is very convenient for sure, but it is also a
quite vulnerable emerging technology prone to attacks.
Solutions of
iot security
5. Strong physical security – Providing physical security
means, to keep the IoT devices and objects at safe place
so that no one can breach sensitive information and
informational data.
6. Use Private Networks – always connect to private
networks only and create unique passwords for that
connection.
Attacks in
iot security
1. Botnet Attack - A botnet is a network that combines
various systems together to remotely take control over
a victim’s system and distribute malware.
2. Denial of service Attack(DOS) - A denial-of-service
(DoS) attack deliberately tries to cause a capacity
overload in the target system by sending multiple
requests.
Attacks in
iot security
3. Man-in-the-Middle Attack - In a Man-in-the-Middle
(MiTM) attack, a hacker breaches the communication
channel between two individual systems in an attempt to
intercept messages among them.
4. Social engineering Attack -Hackers use social
engineering to manipulate people into giving up their
sensitive information such as passwords and bank details.
Attacks in
iot security
5. Ransomware - In this attack, a hacker uses malware
to encrypt data that may be required for business
operations.
6. Advanced persistent threat - is a targeted cyber
attack, where an intruder gains illegal access to a
network and stays undetected.
Career in
iot security
The Internet of Things offers a range of career
opportunities in embedded systems cybersecurity,
software development, and more. Some of the top IoT
industries include healthcare, manufacturing, utilities,
transportation, agriculture, and consumer products. Jobs
are expected to increase in the coming years across
industries, though growth may be slower in some sectors
than others.
Career in
iot security
Thank you
Thank you everyone

Weitere ähnliche Inhalte

Was ist angesagt?

Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT SecuritySHAAMILIVARSAGV
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoTJinia Bhowmik
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoTVishnupriya T H
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsForgeRock
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comAravind R
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and SolutionsUlf Mattsson
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoTVasco Veloso
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT securityPriyab Satoshi
 

Was ist angesagt? (20)

A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT Security
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and Solutions
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT security
 

Ähnlich wie Presentation on IOT SECURITY

12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdfonline Marketing
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptxRenu875977
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
COMPUTER NETWORKS IOT BASED.pptx
COMPUTER NETWORKS IOT BASED.pptxCOMPUTER NETWORKS IOT BASED.pptx
COMPUTER NETWORKS IOT BASED.pptx1230200206
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
The Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT SecurityThe Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT SecurityDr. Mohamed Torky
 
The shift from social network security to the social iot security
The shift from social network security to the social iot securityThe shift from social network security to the social iot security
The shift from social network security to the social iot securityAboul Ella Hassanien
 
The shift from social network security to the social iot security
The shift from social network security to the social iot securityThe shift from social network security to the social iot security
The shift from social network security to the social iot securityAboul Ella Hassanien
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxvrickens
 
A Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptxA Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptxTurboAnchor
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintSurfWatch Labs
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmIJSRED
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfSeasiaInfotech2
 
Security Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfSecurity Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfJPLoft Solutions
 

Ähnlich wie Presentation on IOT SECURITY (20)

mypresentation.pdf
mypresentation.pdfmypresentation.pdf
mypresentation.pdf
 
IoT Security.pdf
IoT Security.pdfIoT Security.pdf
IoT Security.pdf
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
COMPUTER NETWORKS IOT BASED.pptx
COMPUTER NETWORKS IOT BASED.pptxCOMPUTER NETWORKS IOT BASED.pptx
COMPUTER NETWORKS IOT BASED.pptx
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
The Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT SecurityThe Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT Security
 
The shift from social network security to the social iot security
The shift from social network security to the social iot securityThe shift from social network security to the social iot security
The shift from social network security to the social iot security
 
The shift from social network security to the social iot security
The shift from social network security to the social iot securityThe shift from social network security to the social iot security
The shift from social network security to the social iot security
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
A Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptxA Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptx
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital Footprint
 
IoT Device Security: Best Practices for Enhanced Protection
IoT Device Security: Best Practices for Enhanced ProtectionIoT Device Security: Best Practices for Enhanced Protection
IoT Device Security: Best Practices for Enhanced Protection
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdf
 
BMI.pptx
BMI.pptxBMI.pptx
BMI.pptx
 
sample assignment
sample assignmentsample assignment
sample assignment
 
Security Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfSecurity Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdf
 

Mehr von The Avi Sharma

Mehr von The Avi Sharma (6)

Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
Information Security Fundamentals
Information Security FundamentalsInformation Security Fundamentals
Information Security Fundamentals
 
Presentation on - Processors
Presentation on - Processors Presentation on - Processors
Presentation on - Processors
 
Robotics
RoboticsRobotics
Robotics
 
Sql injection
Sql injectionSql injection
Sql injection
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 

Kürzlich hochgeladen

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Kürzlich hochgeladen (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Presentation on IOT SECURITY

  • 1. AVINASH SHARMA 20BCYN021 BCA - CYBER SECURITY Jecrc University IoT Security
  • 2. Overview • Introduction of IoT (Internet of Things) • Definition of IoT Security • Importance of IoT Security • Key Elements of IoT Security • Problems of IoT Security • Solutions of IoT Security • Attacks in IoT Security • Career in IoT Security
  • 3. Introduction of iot • What Is IoT? • The Internet of Things (IoT) describes the network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
  • 5. Definition of IoT Security What is IoT Security ? IoT security is the act of securing Internet of Things devices and the objects and everything which is connected through internet from attackers.
  • 6. Importance of iot security • It is very important to secure Iot devices from the attackers or hackers. • Hardware, software and connectivity will all need to be secure for IoT objects to work effectively. Without security, any connected object or device can be hacked easily. • Once hackers gain control, they can perform any activity and steal the user's digital data.
  • 8. Key elements of iot security 1. Authentication - It helps to build trust between the identity of IoT machines and devices to protect data and control access. 2. Access Control - It is a security technique that regulates who or what can view or use resources in a computing environment
  • 9. Key elements of iot security 3. Data Security - to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. 4. Non Repudiation - is the assurance that someone cannot deny something.It means that the data receiver cannot deny that he or she have not received the data yet.
  • 10. Key elements of iot security 5. Data availability - means that information is accessible to authorized users. It provides an assurance that your system and data can be accessed by authenticated users whenever they're needed.
  • 11. Problems of iot security 1. Hijacking Of IoT Devices - IoT devices that have weak security measures can become a target of attackers and attackers performs many attacks to hijack them. 2. Insufficient Testing And Lack Of Updates - One of the security issues with IoT devices is that companies producing them are often too careless when it comes to proper testing and providing timely software updates.
  • 12. Problems of iot security 3. Botnet Attacks - a hacker creates an army of bots by infecting them with malware and directs them to send thousands of requests per second to bring down the target. 4. Lack Of User Awareness - IoT is new technology, so the users are not so much aware about the threats of the IoT security.
  • 13. Problems of iot security 5. Issue of default passwords – many devices are comes with the default passwords, which will be easily guessed by the bruteforce attacks. 6. Remote vehicles access – hijack of your car is also one of the threat possessed by the IoT. A skilled hacker might hijack by getting the access of your smart car through the remote access.
  • 14. Solutions of iot security 1. Change passwords often and make them strong - Changing passwords, on a regular basis, on internets accounts, computers and mobile devices is a norm nowadays. 2. Don’t connect insecure networks - It is unsafe to connect your devices to insecure networks because attackers might steal your data, passwords and sensitive information.
  • 15. Solutions of iot security 3. Update firmware timely – updates installs security patches on your devices and stops hackers or attackers to gain access of the system. 4. Don’t rely on cloud technology – Cloud technology is very convenient for sure, but it is also a quite vulnerable emerging technology prone to attacks.
  • 16. Solutions of iot security 5. Strong physical security – Providing physical security means, to keep the IoT devices and objects at safe place so that no one can breach sensitive information and informational data. 6. Use Private Networks – always connect to private networks only and create unique passwords for that connection.
  • 17. Attacks in iot security 1. Botnet Attack - A botnet is a network that combines various systems together to remotely take control over a victim’s system and distribute malware. 2. Denial of service Attack(DOS) - A denial-of-service (DoS) attack deliberately tries to cause a capacity overload in the target system by sending multiple requests.
  • 18. Attacks in iot security 3. Man-in-the-Middle Attack - In a Man-in-the-Middle (MiTM) attack, a hacker breaches the communication channel between two individual systems in an attempt to intercept messages among them. 4. Social engineering Attack -Hackers use social engineering to manipulate people into giving up their sensitive information such as passwords and bank details.
  • 19. Attacks in iot security 5. Ransomware - In this attack, a hacker uses malware to encrypt data that may be required for business operations. 6. Advanced persistent threat - is a targeted cyber attack, where an intruder gains illegal access to a network and stays undetected.
  • 20. Career in iot security The Internet of Things offers a range of career opportunities in embedded systems cybersecurity, software development, and more. Some of the top IoT industries include healthcare, manufacturing, utilities, transportation, agriculture, and consumer products. Jobs are expected to increase in the coming years across industries, though growth may be slower in some sectors than others.