SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Ethical Issues – Smart Tech in
IoT
Introduction
• Internet of things
• IoT architecture
• Privacy and Security
Tank, B., Upadhyay, H. & Patel, H. 2016, 'A Survey on IoT Privacy Issues and Mitigation Techniques', paper presented to the Proceedings of the Second International Conference on
Information and Communication Technology for Competitive Strategies, Udaipur, India.
Lucero, S. 2016, IoT platforms: enabling the Internet of Things, IHS, ihs.com.
Stakeholders
• Interests
• Power/interests grid
• Risks
https://www.stakeholdermap.com/images/stakeholder-analysis.gif
Resolutions
• Security Measures
• Perception layer
• Access control – secure tags
• Key management – forward/backward secrecy
• Network layer
• Authentication
• Application layer
• Technical – protection of privacy
• Non-Technical – increase user awareness
Internet of Things
Ethical Issues
Ethical Issues
• What is Ethics?
• IEEE ethic code
• IoT Ethical Issues
Personal message recording leak – Teddy bear
• Ethical Issues:
• Internet connected Teddy bear leak 2 million recordings of parents and their
children
• 800, 000 records of personal information were exposed (emails, password)
Chester, R. 2017, 'Millions of recorded messages between parents and children targeted in teddy bear toy hack'.
Personal message recording leak – Teddy bear
• Ethical Issues:
• Database design flaw
• Irresponsible vendor
• Records were sold
Chester, R. 2017, 'Millions of recorded messages between parents and children targeted in teddy bear toy hack'.
A Case study - FitBit
https://support.endomondo.com/hc/en-us/articles/202228488-Fitbit
A Case study - FitBit
• Ethical Issues:
• Shared their customers’ fitness
information with their business
partners
• Advertisement emails, phone calls,
and ad notices on the phone were
interrupting the customers
Considerations dealing with Ethical issues
• Government regulations of IoT
• When making decisions, follow the ethics code
• Always think about the customers’ benefit
• Improve IoT security
• Customer awareness
Internet of Things
In Businesses
Examples of IoTs used in businesses
1.3 million robots in factories that are at risk of being hacked by 2018 (CNet)
https://www.cnet.com/au/news/factory-robots-industry-machines-can-be-easily-hacked/
Incidents
• In 2014 a German Steel Mill was hacked, some of the furnaces
blasted. Hackers obtained access by infecting emails with malicious
scripts sent to the employees’ inbox.
• A uranium enrichment facility in Iran was infected by a virus called
StuxNet leading a failure to some of the equipment in the facility.
http://www.bbc.com/news/technology-30575104
http://www.abc.net.au/triplej/programs/hack/the-worlds-first-digital-weapon-stuxnet/7926298
Internet of Things
Legal issues
Legal issues is?
• Intellectual property
• Cybercrime
• Liability of providers
• Data protection and privacy
• Telecom
Case Study: Trane
• Connected thermostat vulnerabilities detected by Cisco’s Talos group
allowed foothold into network
• It tooks 12 months to find fixes for 2 vulnerabilities
• 21 months to publish fix for 1 vulnerability
• The device owners may not aware of fixes or have the skill to install
updates
http://blog.talosintel.com/2016/02/trane-iot.html
Solution
• Policies, procedures and standards
• Awareness training
• Risk management and weakness management
• Forensics
• Additional types of logging, log storage
• Increased demand for IP addresses both IPv4 and IPv6 and Increased network complexity
• Strengthen partnerships with researchers, vendors, and procurement department
http://krebsonsecurity.com/2016/02/iot-reality-smart-devices-dumb-defaults/
http://www.gsma.com/connectedliving/gsma-iot-security-guidelines-complete-document-set/

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of Things(IoT)
Internet of Things(IoT)Internet of Things(IoT)
Internet of Things(IoT)
 
IOT and Application Performance Monitoring
IOT and Application Performance MonitoringIOT and Application Performance Monitoring
IOT and Application Performance Monitoring
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT) Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
IoT13: Xively showcase
IoT13: Xively showcaseIoT13: Xively showcase
IoT13: Xively showcase
 
Iot and ethics
Iot and ethicsIot and ethics
Iot and ethics
 
10 min IoT ppt
10 min IoT ppt10 min IoT ppt
10 min IoT ppt
 
Iot how it works
Iot   how it worksIot   how it works
Iot how it works
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approachThe Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
 
The Role of Internet-of-Things (IoT) in Healthcare
The Role of Internet-of-Things (IoT) in HealthcareThe Role of Internet-of-Things (IoT) in Healthcare
The Role of Internet-of-Things (IoT) in Healthcare
 
IoT in healthcare
IoT in healthcareIoT in healthcare
IoT in healthcare
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
The Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the OpportunitiesThe Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the Opportunities
 
Iot - Internet of Things
Iot - Internet of ThingsIot - Internet of Things
Iot - Internet of Things
 
Internet of Things(IoT) Applications | IoT Tutorial for Beginners | IoT Train...
Internet of Things(IoT) Applications | IoT Tutorial for Beginners | IoT Train...Internet of Things(IoT) Applications | IoT Tutorial for Beginners | IoT Train...
Internet of Things(IoT) Applications | IoT Tutorial for Beginners | IoT Train...
 

Ähnlich wie Ethical issues in internet of things

L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
talhajann43
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
Potato
 

Ähnlich wie Ethical issues in internet of things (20)

A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
CHA_001_IOT.pptx
CHA_001_IOT.pptxCHA_001_IOT.pptx
CHA_001_IOT.pptx
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
Kijiji 160616
Kijiji 160616Kijiji 160616
Kijiji 160616
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
 
IoT.ppt
IoT.pptIoT.ppt
IoT.ppt
 
iot-talk.pptx
iot-talk.pptxiot-talk.pptx
iot-talk.pptx
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
Iot internet-of-things-ppt
Iot internet-of-things-pptIot internet-of-things-ppt
Iot internet-of-things-ppt
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 

Mehr von Mohammad Emrul Hassan Emon

Mehr von Mohammad Emrul Hassan Emon (20)

Offer Letter_EC (20201116-163318543) - Mohammad Emrul Hassan Emon Signed.pdf
Offer Letter_EC (20201116-163318543) - Mohammad Emrul Hassan Emon Signed.pdfOffer Letter_EC (20201116-163318543) - Mohammad Emrul Hassan Emon Signed.pdf
Offer Letter_EC (20201116-163318543) - Mohammad Emrul Hassan Emon Signed.pdf
 
pay 26.pdf
pay 26.pdfpay 26.pdf
pay 26.pdf
 
Last_Payslip_(8-10-2021).PDF
Last_Payslip_(8-10-2021).PDFLast_Payslip_(8-10-2021).PDF
Last_Payslip_(8-10-2021).PDF
 
Fundemental of interaction designs
Fundemental of interaction designsFundemental of interaction designs
Fundemental of interaction designs
 
Enterprise software testing
Enterprise software testingEnterprise software testing
Enterprise software testing
 
Enterprise Software Architecture Project
Enterprise Software Architecture ProjectEnterprise Software Architecture Project
Enterprise Software Architecture Project
 
Industry Project Pitch presentation
Industry Project Pitch presentationIndustry Project Pitch presentation
Industry Project Pitch presentation
 
Industry project developling full it software solutions and project management
Industry project developling full it software solutions and project managementIndustry project developling full it software solutions and project management
Industry project developling full it software solutions and project management
 
Developing Movie Recommendation System
Developing Movie Recommendation SystemDeveloping Movie Recommendation System
Developing Movie Recommendation System
 
Inspection of Software Requirements Specifications (srs)
Inspection of Software Requirements Specifications (srs)Inspection of Software Requirements Specifications (srs)
Inspection of Software Requirements Specifications (srs)
 
Software requirement specification(SRS)
Software requirement specification(SRS)Software requirement specification(SRS)
Software requirement specification(SRS)
 
Group Project Quality and Operation Management
Group Project Quality and Operation ManagementGroup Project Quality and Operation Management
Group Project Quality and Operation Management
 
Emon,Mohammad Emrul Hassan-MBA degree certificate
Emon,Mohammad Emrul Hassan-MBA degree certificateEmon,Mohammad Emrul Hassan-MBA degree certificate
Emon,Mohammad Emrul Hassan-MBA degree certificate
 
Emon,Mohammad Emrul Hassan-MIT Testamur
Emon,Mohammad Emrul Hassan-MIT TestamurEmon,Mohammad Emrul Hassan-MIT Testamur
Emon,Mohammad Emrul Hassan-MIT Testamur
 
Technology innovative products and services solution reports
Technology innovative products and services solution reportsTechnology innovative products and services solution reports
Technology innovative products and services solution reports
 
software system design
software system designsoftware system design
software system design
 
Customer engagement on mobile application research
Customer engagement on mobile application researchCustomer engagement on mobile application research
Customer engagement on mobile application research
 
Technology Research on customer enagement
Technology Research on customer enagementTechnology Research on customer enagement
Technology Research on customer enagement
 
Ethical issues in Internet of things
Ethical issues in Internet of thingsEthical issues in Internet of things
Ethical issues in Internet of things
 
Technology innovation project
Technology innovation projectTechnology innovation project
Technology innovation project
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

Ethical issues in internet of things

  • 1. Ethical Issues – Smart Tech in IoT
  • 2. Introduction • Internet of things • IoT architecture • Privacy and Security Tank, B., Upadhyay, H. & Patel, H. 2016, 'A Survey on IoT Privacy Issues and Mitigation Techniques', paper presented to the Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, Udaipur, India. Lucero, S. 2016, IoT platforms: enabling the Internet of Things, IHS, ihs.com.
  • 3. Stakeholders • Interests • Power/interests grid • Risks https://www.stakeholdermap.com/images/stakeholder-analysis.gif
  • 4. Resolutions • Security Measures • Perception layer • Access control – secure tags • Key management – forward/backward secrecy • Network layer • Authentication • Application layer • Technical – protection of privacy • Non-Technical – increase user awareness
  • 6. Ethical Issues • What is Ethics? • IEEE ethic code • IoT Ethical Issues
  • 7. Personal message recording leak – Teddy bear • Ethical Issues: • Internet connected Teddy bear leak 2 million recordings of parents and their children • 800, 000 records of personal information were exposed (emails, password) Chester, R. 2017, 'Millions of recorded messages between parents and children targeted in teddy bear toy hack'.
  • 8. Personal message recording leak – Teddy bear • Ethical Issues: • Database design flaw • Irresponsible vendor • Records were sold Chester, R. 2017, 'Millions of recorded messages between parents and children targeted in teddy bear toy hack'.
  • 9. A Case study - FitBit https://support.endomondo.com/hc/en-us/articles/202228488-Fitbit
  • 10. A Case study - FitBit • Ethical Issues: • Shared their customers’ fitness information with their business partners • Advertisement emails, phone calls, and ad notices on the phone were interrupting the customers
  • 11. Considerations dealing with Ethical issues • Government regulations of IoT • When making decisions, follow the ethics code • Always think about the customers’ benefit • Improve IoT security • Customer awareness
  • 12. Internet of Things In Businesses
  • 13. Examples of IoTs used in businesses 1.3 million robots in factories that are at risk of being hacked by 2018 (CNet) https://www.cnet.com/au/news/factory-robots-industry-machines-can-be-easily-hacked/
  • 14. Incidents • In 2014 a German Steel Mill was hacked, some of the furnaces blasted. Hackers obtained access by infecting emails with malicious scripts sent to the employees’ inbox. • A uranium enrichment facility in Iran was infected by a virus called StuxNet leading a failure to some of the equipment in the facility. http://www.bbc.com/news/technology-30575104 http://www.abc.net.au/triplej/programs/hack/the-worlds-first-digital-weapon-stuxnet/7926298
  • 16. Legal issues is? • Intellectual property • Cybercrime • Liability of providers • Data protection and privacy • Telecom
  • 17. Case Study: Trane • Connected thermostat vulnerabilities detected by Cisco’s Talos group allowed foothold into network • It tooks 12 months to find fixes for 2 vulnerabilities • 21 months to publish fix for 1 vulnerability • The device owners may not aware of fixes or have the skill to install updates http://blog.talosintel.com/2016/02/trane-iot.html
  • 18. Solution • Policies, procedures and standards • Awareness training • Risk management and weakness management • Forensics • Additional types of logging, log storage • Increased demand for IP addresses both IPv4 and IPv6 and Increased network complexity • Strengthen partnerships with researchers, vendors, and procurement department http://krebsonsecurity.com/2016/02/iot-reality-smart-devices-dumb-defaults/ http://www.gsma.com/connectedliving/gsma-iot-security-guidelines-complete-document-set/