SlideShare a Scribd company logo
1 of 7
Name: DAMMALAPATI NAGASWATHI
E-mail: d_nagaswathi@yahoo.in
Twitter Id: d_nagaswathi@yahoo.in
University: SR ENGINEERING COLLEGE
Year/Semester: 3rd/2nd
Branch: CSE
INTRODUCTION
Internet Operators can choose any of The Internet of Things refers
to the ever-growing network of physical objects that feature an IP
address for internet connectivity, and the communication that occurs
between these objects and other Internet-enabled devices and systems.
The Internet of Things extends internet connectivity beyond
traditional devices like desktop and laptop computers, smartphones
and tablets to a diverse range of devices and everyday things that
utilize embedded technology to communicate and interact with the
external environment, all via the Internet.
Internet services that are available and free to access for any of public
sector
Examples of objects that can fall into the scope of Internet of Things
include connected security systems, thermostats, cars, electronic
appliances, lights in household and commercial environments, alarm
clocks, speaker systems, vending machines and more.
As far as the reach of the Internet of Things, there are more than 12
billion devices that can currently connect to the Internet, and
researchers at IDC estimate that by 2020 there will be 26 times more
connected things than people.
Taking place all over the world as we seek to understand how this will
impact our lives. We are also trying to understand what the many
opportunities and challenges are going to be as more and more devices
start to join the Internet of things . For now the best thing that we can
do is educate ourselves about what the Internet of things is and the
potential impacts that can be seen on how we work and live.
The latest trend that I spot in this topic is
security(Information security ).
Trends
security is the big impact in present days . where we have
to issue of privacy and data sharing .
The protection of information and its critical elements,
including the systems and hardware that use, store, and
transmit that information . The value of information comes
from the characteristics it possesses. Availability , Accuracy ,
Authenticity , Confidentiality , Integrity ,Utility ,
Possession .To fully understand the importance of
information security, you need to know the elements of an
information system . An Information System is much more
than computer hardware; it is the entire set of software,
hardware, data, people, and procedures necessary to use
information as a resource in the organization
The features that I expected to implement is for the security
purpose and its can be implemented very easy the next five years
we can see that the hacking of the information will be decreased by
the aspect I implemented like access-key , fingerprint on the
system screen . As per the concept of getting secured in many ways
base upon the information on various criteria in business , health
etc. Security administrators can greatly reduce the levels of risk
caused by end users, and create more acceptable and supportable
security profiles.
Interest Areas
As per the topic which , I selected is security (Information security in
mails and messages) because many of the people in the world are faced
with problem of no security for their data and files. As ,their are securied
a lot but are hacked by others to over come this kind issue . As ,we now
that each and every website is aware of phonenumber ,email-id to secure
but in another aspect i thought of having a access-key for the people who
are accessing the social websites and files from any of the sites . Access-
key is nothing but a Code give to the person who had register the phone-
number in any of the webistes is automatically give a code and
fingerprint . So , that persons can on access the files and the data will be
secure without hacked
Ex: code like 10 digits if it is yahoo y000000001,based on the websites
Thank you

More Related Content

What's hot

Cyber Security
Cyber SecurityCyber Security
Cyber SecurityIllumeo
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by RudyUdieh Moody
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )TechnoHacks_Infosystem
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Dr. Michael Agbaje
 
Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterVeriato
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Securitymtvvvv
 
Traditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer CrimeTraditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer CrimeDhrumil Panchal
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-statusRama Reddy
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinEslam Hussein
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.muhammad-Sulaiman
 
DigitalCitizenshipPresentation
DigitalCitizenshipPresentationDigitalCitizenshipPresentation
DigitalCitizenshipPresentationICCNS
 

What's hot (19)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by Rudy
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
 
Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office Perimeter
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
Traditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer CrimeTraditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer Crime
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam hussein
 
Beekman5 std ppt_11
Beekman5 std ppt_11Beekman5 std ppt_11
Beekman5 std ppt_11
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
DigitalCitizenshipPresentation
DigitalCitizenshipPresentationDigitalCitizenshipPresentation
DigitalCitizenshipPresentation
 

Viewers also liked

3. GP 10 Minute Diversity Guide
3. GP 10 Minute Diversity Guide3. GP 10 Minute Diversity Guide
3. GP 10 Minute Diversity GuideBrisilda Sokoli
 
A3 nicholas crofts_cidoc_practioners-specialists
A3 nicholas crofts_cidoc_practioners-specialistsA3 nicholas crofts_cidoc_practioners-specialists
A3 nicholas crofts_cidoc_practioners-specialistsevaminerva
 
LABRARY Finland - exploring new role of public library
LABRARY Finland - exploring new role of public libraryLABRARY Finland - exploring new role of public library
LABRARY Finland - exploring new role of public libraryLari Aho
 
New jersey 2010 Voter Guide
New jersey 2010 Voter GuideNew jersey 2010 Voter Guide
New jersey 2010 Voter GuideDemocracia
 
統一地方選挙とは何なのか
統一地方選挙とは何なのか統一地方選挙とは何なのか
統一地方選挙とは何なのかHiroki Sawa
 
Assignment 3 - Tritec Engine Development
Assignment 3 - Tritec Engine DevelopmentAssignment 3 - Tritec Engine Development
Assignment 3 - Tritec Engine Developmentteam56026
 
Why bihar needs special category status
Why bihar needs special category statusWhy bihar needs special category status
Why bihar needs special category statusrisingbihar
 
Dr. Mobley Speaker Info
Dr. Mobley Speaker InfoDr. Mobley Speaker Info
Dr. Mobley Speaker InfoMobleyD
 
Bloque academico mauricio freile
Bloque academico mauricio freileBloque academico mauricio freile
Bloque academico mauricio freilemafrega
 
Crime thriller, md, jd, jh hg
Crime thriller, md, jd, jh hgCrime thriller, md, jd, jh hg
Crime thriller, md, jd, jh hghayleigh282
 
HLEG thematic workshop on "Intra-generational and Inter-generational Sustaina...
HLEG thematic workshop on "Intra-generational and Inter-generational Sustaina...HLEG thematic workshop on "Intra-generational and Inter-generational Sustaina...
HLEG thematic workshop on "Intra-generational and Inter-generational Sustaina...StatsCommunications
 
North West Leicestershire District 20 May VCS Forum Draft Agenda
North West Leicestershire District 20 May VCS Forum Draft Agenda North West Leicestershire District 20 May VCS Forum Draft Agenda
North West Leicestershire District 20 May VCS Forum Draft Agenda Voluntary Action LeicesterShire
 
Global education in portugal
Global education in portugalGlobal education in portugal
Global education in portugalDr Lendy Spires
 

Viewers also liked (20)

3. GP 10 Minute Diversity Guide
3. GP 10 Minute Diversity Guide3. GP 10 Minute Diversity Guide
3. GP 10 Minute Diversity Guide
 
A3 nicholas crofts_cidoc_practioners-specialists
A3 nicholas crofts_cidoc_practioners-specialistsA3 nicholas crofts_cidoc_practioners-specialists
A3 nicholas crofts_cidoc_practioners-specialists
 
Pieza 1
Pieza 1Pieza 1
Pieza 1
 
VES CROWDFUNDING PRESS RELEASE #1
VES CROWDFUNDING PRESS RELEASE #1 VES CROWDFUNDING PRESS RELEASE #1
VES CROWDFUNDING PRESS RELEASE #1
 
Melton VCS Forum Draft Agenda
Melton VCS Forum Draft AgendaMelton VCS Forum Draft Agenda
Melton VCS Forum Draft Agenda
 
Ver a traves
Ver a travesVer a traves
Ver a traves
 
Tenencia responsable de mascotas
Tenencia responsable de mascotasTenencia responsable de mascotas
Tenencia responsable de mascotas
 
인공지능
인공지능인공지능
인공지능
 
LABRARY Finland - exploring new role of public library
LABRARY Finland - exploring new role of public libraryLABRARY Finland - exploring new role of public library
LABRARY Finland - exploring new role of public library
 
New jersey 2010 Voter Guide
New jersey 2010 Voter GuideNew jersey 2010 Voter Guide
New jersey 2010 Voter Guide
 
Formato condicional
Formato condicionalFormato condicional
Formato condicional
 
統一地方選挙とは何なのか
統一地方選挙とは何なのか統一地方選挙とは何なのか
統一地方選挙とは何なのか
 
Assignment 3 - Tritec Engine Development
Assignment 3 - Tritec Engine DevelopmentAssignment 3 - Tritec Engine Development
Assignment 3 - Tritec Engine Development
 
Why bihar needs special category status
Why bihar needs special category statusWhy bihar needs special category status
Why bihar needs special category status
 
Dr. Mobley Speaker Info
Dr. Mobley Speaker InfoDr. Mobley Speaker Info
Dr. Mobley Speaker Info
 
Bloque academico mauricio freile
Bloque academico mauricio freileBloque academico mauricio freile
Bloque academico mauricio freile
 
Crime thriller, md, jd, jh hg
Crime thriller, md, jd, jh hgCrime thriller, md, jd, jh hg
Crime thriller, md, jd, jh hg
 
HLEG thematic workshop on "Intra-generational and Inter-generational Sustaina...
HLEG thematic workshop on "Intra-generational and Inter-generational Sustaina...HLEG thematic workshop on "Intra-generational and Inter-generational Sustaina...
HLEG thematic workshop on "Intra-generational and Inter-generational Sustaina...
 
North West Leicestershire District 20 May VCS Forum Draft Agenda
North West Leicestershire District 20 May VCS Forum Draft Agenda North West Leicestershire District 20 May VCS Forum Draft Agenda
North West Leicestershire District 20 May VCS Forum Draft Agenda
 
Global education in portugal
Global education in portugalGlobal education in portugal
Global education in portugal
 

Similar to IoT

Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxtodd521
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadaysPECB
 
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSecurity and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSysfore Technologies
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
 
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docxTHE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docxoreo10
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
Security Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfSecurity Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfJPLoft Solutions
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.vitor94
 

Similar to IoT (18)

Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSecurity and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
Recent trends in cloud computing articles
Recent trends in cloud computing articlesRecent trends in cloud computing articles
Recent trends in cloud computing articles
 
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docxTHE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Security Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfSecurity Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdf
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
 
IoT
IoTIoT
IoT
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
EmergingTrend.pdf
EmergingTrend.pdfEmergingTrend.pdf
EmergingTrend.pdf
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.
 
Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
 

More from Mphasis

Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Automation
AutomationAutomation
AutomationMphasis
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation SystemMphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Mphasis kushagra
Mphasis kushagraMphasis kushagra
Mphasis kushagraMphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Automation
AutomationAutomation
AutomationMphasis
 

More from Mphasis (20)

SMAC
SMACSMAC
SMAC
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Automation
AutomationAutomation
Automation
 
IoT
IoTIoT
IoT
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
 
IoT
IoTIoT
IoT
 
SMAC
SMACSMAC
SMAC
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Mphasis kushagra
Mphasis kushagraMphasis kushagra
Mphasis kushagra
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
SMAC
SMACSMAC
SMAC
 
Io t 22
Io t 22Io t 22
Io t 22
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
SMAC
SMACSMAC
SMAC
 
IoT
IoTIoT
IoT
 
Automation
AutomationAutomation
Automation
 

Recently uploaded

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

IoT

  • 1. Name: DAMMALAPATI NAGASWATHI E-mail: d_nagaswathi@yahoo.in Twitter Id: d_nagaswathi@yahoo.in University: SR ENGINEERING COLLEGE Year/Semester: 3rd/2nd Branch: CSE
  • 2. INTRODUCTION Internet Operators can choose any of The Internet of Things refers to the ever-growing network of physical objects that feature an IP address for internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices and systems. The Internet of Things extends internet connectivity beyond traditional devices like desktop and laptop computers, smartphones and tablets to a diverse range of devices and everyday things that utilize embedded technology to communicate and interact with the external environment, all via the Internet. Internet services that are available and free to access for any of public sector
  • 3. Examples of objects that can fall into the scope of Internet of Things include connected security systems, thermostats, cars, electronic appliances, lights in household and commercial environments, alarm clocks, speaker systems, vending machines and more. As far as the reach of the Internet of Things, there are more than 12 billion devices that can currently connect to the Internet, and researchers at IDC estimate that by 2020 there will be 26 times more connected things than people. Taking place all over the world as we seek to understand how this will impact our lives. We are also trying to understand what the many opportunities and challenges are going to be as more and more devices start to join the Internet of things . For now the best thing that we can do is educate ourselves about what the Internet of things is and the potential impacts that can be seen on how we work and live.
  • 4. The latest trend that I spot in this topic is security(Information security ). Trends security is the big impact in present days . where we have to issue of privacy and data sharing . The protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information . The value of information comes from the characteristics it possesses. Availability , Accuracy , Authenticity , Confidentiality , Integrity ,Utility , Possession .To fully understand the importance of information security, you need to know the elements of an information system . An Information System is much more than computer hardware; it is the entire set of software, hardware, data, people, and procedures necessary to use information as a resource in the organization
  • 5. The features that I expected to implement is for the security purpose and its can be implemented very easy the next five years we can see that the hacking of the information will be decreased by the aspect I implemented like access-key , fingerprint on the system screen . As per the concept of getting secured in many ways base upon the information on various criteria in business , health etc. Security administrators can greatly reduce the levels of risk caused by end users, and create more acceptable and supportable security profiles.
  • 6. Interest Areas As per the topic which , I selected is security (Information security in mails and messages) because many of the people in the world are faced with problem of no security for their data and files. As ,their are securied a lot but are hacked by others to over come this kind issue . As ,we now that each and every website is aware of phonenumber ,email-id to secure but in another aspect i thought of having a access-key for the people who are accessing the social websites and files from any of the sites . Access- key is nothing but a Code give to the person who had register the phone- number in any of the webistes is automatically give a code and fingerprint . So , that persons can on access the files and the data will be secure without hacked Ex: code like 10 digits if it is yahoo y000000001,based on the websites