SlideShare ist ein Scribd-Unternehmen logo
1 von 25
The Internet of Things (IoT)
CONTENT
 What is IoT
 Where is IoT
 History of IoT
 Why IoT matters
 How IoT works
 Fundamental components of IoT
 IoT applications
 Opportunity and Challenges
 Advantages and Disadvantges of IoT
 Attacking IoT
 Recommendations
“What is IoT?”
 If you just Google “what is IoT?”, many of the
answers are unnecessarily technical. Case in point:
 “The Internet of Things (IoT) is a system of
interrelated computing devices, mechanical
and digital machines, objects, animals or
people that are provided with unique identifiers
and the ability to transfer data over a network
without requiring human-to-human or human-
to-computer interaction.”
Various Names, One Concept
 M2M (Machine to Machine)
 “Internet of Everything” (Cisco Systems)
 “World Size Web” (Bruce Schneier)
 “Skynet” (Terminator movie)
Where is IoT?
History of IOT
 1970- The actual idea of connected devices was proposed
 1990- John Romkey created a toaster which could be turned
on/off over the Internet
 1995- Siemens introduced the first cellular module built for M2M
 1999- The term "Internet of Things" was used by Kevin Ashton
during his work at P&G which became widely accepted
 2004 - The term was mentioned in famous publications like the
Guardian, Boston Globe, and Scientific American
 2005-UN's International Telecommunications Union (ITU)
published its first report on this topic.
 2008- The Internet of Things was born
 2011- Gartner, the market research company, include "The
Internet of Things" technology in their research
Why IoT Matters
 When something is connected to the internet, that means that it
can send information or receive information, or both. This ability to
send and/or receive information makes things smart, and smart is
good.
 Let’s use smartphones (smartphones) again as an example. Right
now you can listen to just about any song in the world, but it’s not
because your phone actually has every song in the world stored
on it. It’s because every song in the world is stored somewhere
else, but your phone can send information (asking for that song)
and then receive information (streaming that song on your phone).
 To be smart, a thing doesn’t need to have super storage or a
supercomputer inside of it. All a thing has to do is connect to super
storage or to a supercomputer. Being connected is awesome.
 In the Internet of Things, all the things that are being connected to
the internet can be put into three categories:
 Things that collect information and then send it.
 Things that receive information and then act on it.
Why be concerned about IoT?
 It’s just another computer, right?
◦ All of the same issues we have with
access control, vulnerability
management, patching, monitoring,
etc.
◦ Imagine your network with 1,000,000
more devices
◦ Any compromised device is a foothold
on the network
How IOT works?
The entire IOT process starts with the devices themselves like
smartphones, smartwatches, electronic appliances like TV, Washing
Machine which helps you to communicate with the IOT platform.
Fundamental components of an IoT
system
 Here, are four fundamental components of an IoT system:
 1) Sensors/Devices:
 Sensors or devices are a key component that helps you to collect
live data from the surrounding environment. All this data may have
various levels of complexities. It could be a simple temperature
monitoring sensor, or it may be in the form of the video feed.
 A device may have various types of sensors which performs multiple
tasks apart from sensing. Example, A mobile phone is a device
which has multiple sensors like GPS, camera but your smartphone
is not able to sense these things.
 2) Connectivity:
 All the collected data is sent to a cloud infrastructure. The sensors
should be connected to the cloud using various mediums of
communications. These communication mediums include mobile or
satellite networks, Bluetooth, WI-FI, WAN, etc.
 3) Data Processing:
 Once that data is collected, and it gets to the cloud, the software performs
processing on the gathered data. This process can be just checking the
temperature, reading on devices like AC or heaters. However, it can
sometimes also be very complex like identifying objects, using computer
vision on video.
 4)User Interface:
 The information needs to be available to the end-user in some way which
can be achieved by triggering alarms on their phones or sending them
notification through email or text message. The user sometimes might need
an interface which actively checks their IOT system. For example, the user
has a camera installed in his home. He wants to access video recording and
all the feeds with the help of a web server.
 However, it's not always one-way communication. Depending on the IoT
application and complexity of the system, the user may also be able to
perform an action which may create cascading effects.
IoT Applications
Application type Description
Smart Thermostats Helps you to save resource on heating bills by
knowing your usage patterns.
Connected Cars IOT helps automobile companies handle billing,
parking, insurance, and other related stuff
automatically.
Activity Trackers Helps you to capture heart rate pattern, calorie
expenditure, activity levels, and skin temperature
on your wrist.
Smart Outlets Remotely turn any device on or off. It also allows
you to track a device's energy level and get
custom notifications directly into your
smartphone.
Parking Sensors IOT technology helps users to identify the real-
time availability of parking spaces on their phone.
Connect Health The concept of a connected health care system
facilitates real-time health monitoring and patient
care. It helps in improved medical decision-
making based on patient data.
Smart City Smart city offers all types of use cases which
include traffic management to water distribution,
IoT solutions are widely used in numerous companies across industries. Some most common
IoT applications are given below:
Smart home Smart home encapsulates the connectivity
inside your homes. It includes smoke
detectors, home appliances, light bulbs,
windows, door locks, etc.
Smart supply chain Helps you in real time tracking of goods
while they are on the road, or getting
suppliers to exchange inventory information.
Does IoT add additional risk?
 Are highly portable devices captured during
vulnerability scans?
 Where is your network perimeter?
 Are consumer devices being used in areas – like
health care – where reliability is critical?
 Do users install device management software on
other computers? Is that another attack vector?
Opportunity
& Challenges
OF IOT
Challenges of IoT
 At present IoT is faced with many
challenges, such as:
 Insufficient testing and updating
 Concern regarding data security and
privacy
 Software complexity
 Data volumes and interpretation
 Integration with AI and automation
 Devices require a constant power supply
which is difficult
 Interaction and short-range
OPPORTUNITIES
 Recent initiatives such as “Open Interconnect Consortium”, “The AllSeen
Alliance” and the proposal from IBM (Adept) for the use of modified Bitcoin
block chains in IoT.
 A blockchain is a distributed public database that maintains a continuously-
growing list of data transactions, protected against tampering and revision.
 It grows linearly and chronologically as new completed blocks are added to it
(see Baris Yeldiren’s article on “Blockchains – the next big thing”).
Blockchains hold promises in helping to resolve most of the above problems
and in alleviating integration challenges.
 Bitcoin blockchains take a lot of computing power to generate. IBM proposes
to increase speed and scalability by partially replacing the “proof of work”
part of the block by a “proof of stake”, which require far less computations.
Advantages of IoT
 Key benefits of IoT technology are as follows:
 Technical Optimization:
 IoT technology helps a lot in improving technologies and making them
better. Example, with IoT, a manufacturer is able to collect data from various
car sensors. The manufacturer analyzes them to improve its design and
make them more efficient.
 Improved Data Collection:
 Traditional data collection has its limitations and its design for passive use.
IoT facilitates immediate action on data.
 Reduced Waste:
 IoT offers real-time information leading to effective decision making &
management of resources.
 Improved Customer Engagement:
 IoT allows you to improve customer experience by detecting problems and
improving the process.
Disadvantages IOT
 Security: IoT technology creates an ecosystem of connected devices. However,
during this process, the system may offer little authentication control despite
sufficient security measures.
 Privacy: The use of IOT, exposes a substantial amount of personal data, in
extreme detail, without the user's active participation. This creates lots of privacy
issues.
 Flexibility: There is a huge concern regarding the flexibility of an IoT system. It is
mainly regarding integrating with another system as there are many diverse
systems involved in the process.
 Complexity: The design of the IOT system is also quite complicated. Moreover,
it's deployment and maintenance also not very easy.
 Compliance: IOT has its own set of rules and regulations. However, because of
its complexity, the task of compliance is quite challenging.
Attacking IoT
 Difficult to update firmware and OS
 Lack of vendor support for repairing
vulnerabilities
 Vulnerable web interfaces (SQL
injection, XSS)
 Coding errors (buffer overflow)
 Clear text protocols and unnecessary
open ports
 Default, weak, and hardcoded
credentials
 DoS / DDoS
 Physical theft and tampering
Recommendations
 Plan for IoT growth:
◦ Additional types of logging, log storage: Can you find the needle in the
haystack?
◦ Increased network traffic: will your firewall / IDS / IPS be compatible and keep
up?
◦ Increased demand for IP addresses both IPv4 and IPv6
◦ Increased network complexity – should these devices be isolated or
segmented?
◦ Strengthen partnerships with researchers, vendors, and procurement
department
The internet of things (io t)

Weitere ähnliche Inhalte

Was ist angesagt?

Internet of Things (Iot)
Internet of Things (Iot)Internet of Things (Iot)
Internet of Things (Iot)Nasir Mahmood
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of ThingsRohan M
 
What is the Internet of Things? How does it Work?
What is the Internet of Things? How does it Work?What is the Internet of Things? How does it Work?
What is the Internet of Things? How does it Work?AbhijitVerma9
 
01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-thingsJohn Soldatos
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsDodi Saputra
 
Internet of things (IOT) Presentation-PPT
Internet of things (IOT) Presentation-PPTInternet of things (IOT) Presentation-PPT
Internet of things (IOT) Presentation-PPTCharan Vimala
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...ijcsit
 
IEEE Internet of Things (IoT) Initiative in Ukraine #iotconfua
IEEE Internet of Things (IoT) Initiative in Ukraine #iotconfuaIEEE Internet of Things (IoT) Initiative in Ukraine #iotconfua
IEEE Internet of Things (IoT) Initiative in Ukraine #iotconfuaAndy Shutka
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsBHAVANA KONERU
 
Internet of things
Internet of thingsInternet of things
Internet of thingsRamiro Cid
 
Summer Internship report on IOT RTTC Trivandrum
Summer Internship report on IOT  RTTC TrivandrumSummer Internship report on IOT  RTTC Trivandrum
Summer Internship report on IOT RTTC TrivandrumFathimaCec
 
Internet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginnersInternet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginnersFIITJEE PU College
 
IRJET - Smart Classroom Automation based on IoT
IRJET -  	  Smart Classroom Automation based on IoTIRJET -  	  Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoTIRJET Journal
 
Introduction of Internet of Things(IoT) By Thakur Pawan & Pathania Susheela
Introduction of Internet of Things(IoT) By Thakur Pawan & Pathania SusheelaIntroduction of Internet of Things(IoT) By Thakur Pawan & Pathania Susheela
Introduction of Internet of Things(IoT) By Thakur Pawan & Pathania SusheelaGovt. P.G. College Dharamshala
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of ThingsIRJET Journal
 

Was ist angesagt? (18)

Internet of Things (Iot)
Internet of Things (Iot)Internet of Things (Iot)
Internet of Things (Iot)
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
 
What is the Internet of Things? How does it Work?
What is the Internet of Things? How does it Work?What is the Internet of Things? How does it Work?
What is the Internet of Things? How does it Work?
 
Designing the Internet of Things
Designing the Internet of ThingsDesigning the Internet of Things
Designing the Internet of Things
 
01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of things (IOT) Presentation-PPT
Internet of things (IOT) Presentation-PPTInternet of things (IOT) Presentation-PPT
Internet of things (IOT) Presentation-PPT
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
 
IEEE Internet of Things (IoT) Initiative in Ukraine #iotconfua
IEEE Internet of Things (IoT) Initiative in Ukraine #iotconfuaIEEE Internet of Things (IoT) Initiative in Ukraine #iotconfua
IEEE Internet of Things (IoT) Initiative in Ukraine #iotconfua
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Summer Internship report on IOT RTTC Trivandrum
Summer Internship report on IOT  RTTC TrivandrumSummer Internship report on IOT  RTTC Trivandrum
Summer Internship report on IOT RTTC Trivandrum
 
Internet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginnersInternet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginners
 
IRJET - Smart Classroom Automation based on IoT
IRJET -  	  Smart Classroom Automation based on IoTIRJET -  	  Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoT
 
Introduction of Internet of Things(IoT) By Thakur Pawan & Pathania Susheela
Introduction of Internet of Things(IoT) By Thakur Pawan & Pathania SusheelaIntroduction of Internet of Things(IoT) By Thakur Pawan & Pathania Susheela
Introduction of Internet of Things(IoT) By Thakur Pawan & Pathania Susheela
 
Iot Report
Iot ReportIot Report
Iot Report
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of Things
 

Ähnlich wie The internet of things (io t)

IOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxIOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxrupasharma39
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)GOPAL BASAK
 
Emerging chap asasasasasawwqwqwwqwewewr4.pptx
Emerging chap asasasasasawwqwqwwqwewewr4.pptxEmerging chap asasasasasawwqwqwwqwewewr4.pptx
Emerging chap asasasasasawwqwqwwqwewewr4.pptxmeharikiros2
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
Chapter 4about internet of things IoT.pptx
Chapter 4about internet of things IoT.pptxChapter 4about internet of things IoT.pptx
Chapter 4about internet of things IoT.pptxTekle12
 
Ch 4.pptx
Ch 4.pptxCh 4.pptx
Ch 4.pptxKume3
 
Emergig-Technology-ch-4.ppt
Emergig-Technology-ch-4.pptEmergig-Technology-ch-4.ppt
Emergig-Technology-ch-4.pptLammiiGurmeessaa
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxugushe
 
chaptertaaaaaaaaaaaaaaadddddddd2222 4.ppt
chaptertaaaaaaaaaaaaaaadddddddd2222 4.pptchaptertaaaaaaaaaaaaaaadddddddd2222 4.ppt
chaptertaaaaaaaaaaaaaaadddddddd2222 4.ppttadudemise
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)Biniam Behailu
 
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxThe-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxHadHic
 
iot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdfiot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdfRamithaDevi
 
IOT_UNIT-1_Presentation which is basic presentation level
IOT_UNIT-1_Presentation which is basic presentation levelIOT_UNIT-1_Presentation which is basic presentation level
IOT_UNIT-1_Presentation which is basic presentation levelGovadaDhana
 

Ähnlich wie The internet of things (io t) (20)

1. IoT.pptx
1. IoT.pptx1. IoT.pptx
1. IoT.pptx
 
IOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxIOT LADEN GHISING.pptx
IOT LADEN GHISING.pptx
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Emerging chap asasasasasawwqwqwwqwewewr4.pptx
Emerging chap asasasasasawwqwqwwqwewewr4.pptxEmerging chap asasasasasawwqwqwwqwewewr4.pptx
Emerging chap asasasasasawwqwqwwqwewewr4.pptx
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Chapter 4about internet of things IoT.pptx
Chapter 4about internet of things IoT.pptxChapter 4about internet of things IoT.pptx
Chapter 4about internet of things IoT.pptx
 
Iotppt
IotpptIotppt
Iotppt
 
Ch 4.pptx
Ch 4.pptxCh 4.pptx
Ch 4.pptx
 
IOT VIVA QUESTION.pdf
IOT VIVA QUESTION.pdfIOT VIVA QUESTION.pdf
IOT VIVA QUESTION.pdf
 
internet of things
internet of thingsinternet of things
internet of things
 
Emergig-Technology-ch-4.ppt
Emergig-Technology-ch-4.pptEmergig-Technology-ch-4.ppt
Emergig-Technology-ch-4.ppt
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptx
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
chaptertaaaaaaaaaaaaaaadddddddd2222 4.ppt
chaptertaaaaaaaaaaaaaaadddddddd2222 4.pptchaptertaaaaaaaaaaaaaaadddddddd2222 4.ppt
chaptertaaaaaaaaaaaaaaadddddddd2222 4.ppt
 
U - 4 Emerging.pptx
U - 4 Emerging.pptxU - 4 Emerging.pptx
U - 4 Emerging.pptx
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)
 
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxThe-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
 
iot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdfiot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdf
 
Unit 1 iot.pptx
Unit 1 iot.pptxUnit 1 iot.pptx
Unit 1 iot.pptx
 
IOT_UNIT-1_Presentation which is basic presentation level
IOT_UNIT-1_Presentation which is basic presentation levelIOT_UNIT-1_Presentation which is basic presentation level
IOT_UNIT-1_Presentation which is basic presentation level
 

Kürzlich hochgeladen

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Kürzlich hochgeladen (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

The internet of things (io t)

  • 1. The Internet of Things (IoT)
  • 2. CONTENT  What is IoT  Where is IoT  History of IoT  Why IoT matters  How IoT works  Fundamental components of IoT  IoT applications  Opportunity and Challenges  Advantages and Disadvantges of IoT  Attacking IoT  Recommendations
  • 3. “What is IoT?”  If you just Google “what is IoT?”, many of the answers are unnecessarily technical. Case in point:  “The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human- to-computer interaction.”
  • 4.
  • 5. Various Names, One Concept  M2M (Machine to Machine)  “Internet of Everything” (Cisco Systems)  “World Size Web” (Bruce Schneier)  “Skynet” (Terminator movie)
  • 7. History of IOT  1970- The actual idea of connected devices was proposed  1990- John Romkey created a toaster which could be turned on/off over the Internet  1995- Siemens introduced the first cellular module built for M2M  1999- The term "Internet of Things" was used by Kevin Ashton during his work at P&G which became widely accepted  2004 - The term was mentioned in famous publications like the Guardian, Boston Globe, and Scientific American  2005-UN's International Telecommunications Union (ITU) published its first report on this topic.  2008- The Internet of Things was born  2011- Gartner, the market research company, include "The Internet of Things" technology in their research
  • 8. Why IoT Matters  When something is connected to the internet, that means that it can send information or receive information, or both. This ability to send and/or receive information makes things smart, and smart is good.  Let’s use smartphones (smartphones) again as an example. Right now you can listen to just about any song in the world, but it’s not because your phone actually has every song in the world stored on it. It’s because every song in the world is stored somewhere else, but your phone can send information (asking for that song) and then receive information (streaming that song on your phone).  To be smart, a thing doesn’t need to have super storage or a supercomputer inside of it. All a thing has to do is connect to super storage or to a supercomputer. Being connected is awesome.  In the Internet of Things, all the things that are being connected to the internet can be put into three categories:  Things that collect information and then send it.  Things that receive information and then act on it.
  • 9. Why be concerned about IoT?  It’s just another computer, right? ◦ All of the same issues we have with access control, vulnerability management, patching, monitoring, etc. ◦ Imagine your network with 1,000,000 more devices ◦ Any compromised device is a foothold on the network
  • 10. How IOT works? The entire IOT process starts with the devices themselves like smartphones, smartwatches, electronic appliances like TV, Washing Machine which helps you to communicate with the IOT platform.
  • 11. Fundamental components of an IoT system  Here, are four fundamental components of an IoT system:  1) Sensors/Devices:  Sensors or devices are a key component that helps you to collect live data from the surrounding environment. All this data may have various levels of complexities. It could be a simple temperature monitoring sensor, or it may be in the form of the video feed.  A device may have various types of sensors which performs multiple tasks apart from sensing. Example, A mobile phone is a device which has multiple sensors like GPS, camera but your smartphone is not able to sense these things.  2) Connectivity:  All the collected data is sent to a cloud infrastructure. The sensors should be connected to the cloud using various mediums of communications. These communication mediums include mobile or satellite networks, Bluetooth, WI-FI, WAN, etc.
  • 12.  3) Data Processing:  Once that data is collected, and it gets to the cloud, the software performs processing on the gathered data. This process can be just checking the temperature, reading on devices like AC or heaters. However, it can sometimes also be very complex like identifying objects, using computer vision on video.  4)User Interface:  The information needs to be available to the end-user in some way which can be achieved by triggering alarms on their phones or sending them notification through email or text message. The user sometimes might need an interface which actively checks their IOT system. For example, the user has a camera installed in his home. He wants to access video recording and all the feeds with the help of a web server.  However, it's not always one-way communication. Depending on the IoT application and complexity of the system, the user may also be able to perform an action which may create cascading effects.
  • 13.
  • 15. Application type Description Smart Thermostats Helps you to save resource on heating bills by knowing your usage patterns. Connected Cars IOT helps automobile companies handle billing, parking, insurance, and other related stuff automatically. Activity Trackers Helps you to capture heart rate pattern, calorie expenditure, activity levels, and skin temperature on your wrist. Smart Outlets Remotely turn any device on or off. It also allows you to track a device's energy level and get custom notifications directly into your smartphone. Parking Sensors IOT technology helps users to identify the real- time availability of parking spaces on their phone. Connect Health The concept of a connected health care system facilitates real-time health monitoring and patient care. It helps in improved medical decision- making based on patient data. Smart City Smart city offers all types of use cases which include traffic management to water distribution, IoT solutions are widely used in numerous companies across industries. Some most common IoT applications are given below:
  • 16. Smart home Smart home encapsulates the connectivity inside your homes. It includes smoke detectors, home appliances, light bulbs, windows, door locks, etc. Smart supply chain Helps you in real time tracking of goods while they are on the road, or getting suppliers to exchange inventory information.
  • 17. Does IoT add additional risk?  Are highly portable devices captured during vulnerability scans?  Where is your network perimeter?  Are consumer devices being used in areas – like health care – where reliability is critical?  Do users install device management software on other computers? Is that another attack vector?
  • 19. Challenges of IoT  At present IoT is faced with many challenges, such as:  Insufficient testing and updating  Concern regarding data security and privacy  Software complexity  Data volumes and interpretation  Integration with AI and automation  Devices require a constant power supply which is difficult  Interaction and short-range
  • 20. OPPORTUNITIES  Recent initiatives such as “Open Interconnect Consortium”, “The AllSeen Alliance” and the proposal from IBM (Adept) for the use of modified Bitcoin block chains in IoT.  A blockchain is a distributed public database that maintains a continuously- growing list of data transactions, protected against tampering and revision.  It grows linearly and chronologically as new completed blocks are added to it (see Baris Yeldiren’s article on “Blockchains – the next big thing”). Blockchains hold promises in helping to resolve most of the above problems and in alleviating integration challenges.  Bitcoin blockchains take a lot of computing power to generate. IBM proposes to increase speed and scalability by partially replacing the “proof of work” part of the block by a “proof of stake”, which require far less computations.
  • 21. Advantages of IoT  Key benefits of IoT technology are as follows:  Technical Optimization:  IoT technology helps a lot in improving technologies and making them better. Example, with IoT, a manufacturer is able to collect data from various car sensors. The manufacturer analyzes them to improve its design and make them more efficient.  Improved Data Collection:  Traditional data collection has its limitations and its design for passive use. IoT facilitates immediate action on data.  Reduced Waste:  IoT offers real-time information leading to effective decision making & management of resources.  Improved Customer Engagement:  IoT allows you to improve customer experience by detecting problems and improving the process.
  • 22. Disadvantages IOT  Security: IoT technology creates an ecosystem of connected devices. However, during this process, the system may offer little authentication control despite sufficient security measures.  Privacy: The use of IOT, exposes a substantial amount of personal data, in extreme detail, without the user's active participation. This creates lots of privacy issues.  Flexibility: There is a huge concern regarding the flexibility of an IoT system. It is mainly regarding integrating with another system as there are many diverse systems involved in the process.  Complexity: The design of the IOT system is also quite complicated. Moreover, it's deployment and maintenance also not very easy.  Compliance: IOT has its own set of rules and regulations. However, because of its complexity, the task of compliance is quite challenging.
  • 23. Attacking IoT  Difficult to update firmware and OS  Lack of vendor support for repairing vulnerabilities  Vulnerable web interfaces (SQL injection, XSS)  Coding errors (buffer overflow)  Clear text protocols and unnecessary open ports  Default, weak, and hardcoded credentials  DoS / DDoS  Physical theft and tampering
  • 24. Recommendations  Plan for IoT growth: ◦ Additional types of logging, log storage: Can you find the needle in the haystack? ◦ Increased network traffic: will your firewall / IDS / IPS be compatible and keep up? ◦ Increased demand for IP addresses both IPv4 and IPv6 ◦ Increased network complexity – should these devices be isolated or segmented? ◦ Strengthen partnerships with researchers, vendors, and procurement department