In this presentation, Nagaswathi introduces IoT and associated trends. Nagaswathi wants to tackle security problems faced by users of IoT devices through an access key based approach.
Axa Assurance Maroc - Insurer Innovation Award 2024
IoT
1. Name: DAMMALAPATI NAGASWATHI
E-mail: d_nagaswathi@yahoo.in
Twitter Id: d_nagaswathi@yahoo.in
University: SR ENGINEERING COLLEGE
Year/Semester: 3rd/2nd
Branch: CSE
2. INTRODUCTION
Internet Operators can choose any of The Internet of Things refers
to the ever-growing network of physical objects that feature an IP
address for internet connectivity, and the communication that occurs
between these objects and other Internet-enabled devices and systems.
The Internet of Things extends internet connectivity beyond
traditional devices like desktop and laptop computers, smartphones
and tablets to a diverse range of devices and everyday things that
utilize embedded technology to communicate and interact with the
external environment, all via the Internet.
Internet services that are available and free to access for any of public
sector
3. Examples of objects that can fall into the scope of Internet of Things
include connected security systems, thermostats, cars, electronic
appliances, lights in household and commercial environments, alarm
clocks, speaker systems, vending machines and more.
As far as the reach of the Internet of Things, there are more than 12
billion devices that can currently connect to the Internet, and
researchers at IDC estimate that by 2020 there will be 26 times more
connected things than people.
Taking place all over the world as we seek to understand how this will
impact our lives. We are also trying to understand what the many
opportunities and challenges are going to be as more and more devices
start to join the Internet of things . For now the best thing that we can
do is educate ourselves about what the Internet of things is and the
potential impacts that can be seen on how we work and live.
4. The latest trend that I spot in this topic is
security(Information security ).
Trends
security is the big impact in present days . where we have
to issue of privacy and data sharing .
The protection of information and its critical elements,
including the systems and hardware that use, store, and
transmit that information . The value of information comes
from the characteristics it possesses. Availability , Accuracy ,
Authenticity , Confidentiality , Integrity ,Utility ,
Possession .To fully understand the importance of
information security, you need to know the elements of an
information system . An Information System is much more
than computer hardware; it is the entire set of software,
hardware, data, people, and procedures necessary to use
information as a resource in the organization
5. The features that I expected to implement is for the security
purpose and its can be implemented very easy the next five years
we can see that the hacking of the information will be decreased by
the aspect I implemented like access-key , fingerprint on the
system screen . As per the concept of getting secured in many ways
base upon the information on various criteria in business , health
etc. Security administrators can greatly reduce the levels of risk
caused by end users, and create more acceptable and supportable
security profiles.
6. Interest Areas
As per the topic which , I selected is security (Information security in
mails and messages) because many of the people in the world are faced
with problem of no security for their data and files. As ,their are securied
a lot but are hacked by others to over come this kind issue . As ,we now
that each and every website is aware of phonenumber ,email-id to secure
but in another aspect i thought of having a access-key for the people who
are accessing the social websites and files from any of the sites . Access-
key is nothing but a Code give to the person who had register the phone-
number in any of the webistes is automatically give a code and
fingerprint . So , that persons can on access the files and the data will be
secure without hacked
Ex: code like 10 digits if it is yahoo y000000001,based on the websites