Document Details

WellEstablishedHexagon

Uploaded by WellEstablishedHexagon

Tags

internet of things iot security information technology technology

Summary

These lecture notes provide an overview of the Internet of Things (IoT). They cover the evolution of IoT, its impacts on human and business activities, e-commerce trends, and mobility issues. The document touches upon various aspects, including security and privacy challenges in the context of IoT.

Full Transcript

Information Technology Security Lecture 2 The Internet of Things Is Changing How We Live Learning Objective(s) Explain information systems security and its effect on people and businesses. Key Concepts The evolution of the Internet of Things (IoT) from the late 1990s t...

Information Technology Security Lecture 2 The Internet of Things Is Changing How We Live Learning Objective(s) Explain information systems security and its effect on people and businesses. Key Concepts The evolution of the Internet of Things (IoT) from the late 1990s to present The impact that the Internet and IoT have on human and business life How bricks-and-mortar businesses transform into e- business models with e-commerce and an IoT strategy How IP mobility is driving IoT to include both personal and business environments New challenges created by IoT The Internet of Things Is Changing How We Live Social Media Mediums Facebook® VoIP Twitter® IM chat LinkedIn® Audio conference Pinterest® Video conference Snapchat® Collaboration Instagram® Digital Media Drivers for Internet of Things (IoT) IP-based networking Connectivity Smaller and faster computing Cloud computing Data analytics Evolution of IoT Internet service providers (ISPs) Radio frequency identification (RFID) Application service providers (ASPs) Software as a Service (SaaS) How the Internet and TCP/IP Transform Our Lives IoT’s Impact on Human and Business Life The Internet has changed our day-to-day lives Personally Socially Professionally Use the Internet to: Check weather, news, and social media sites at home Check business emails at work Store-and-Forward vs. Real-Time Communications Real-time Occurs instantaneously Store-and- Acceptable delay in forward transmitting communication IoT’s Impact on Humans Health monitoring and updating Home security and smart home control systems Online family member calendars Near real-time tracking and monitoring via GPS Online banking, bill paying, and financial transactions Online e-commerce purchases IoT’s Impact on Business Retail stores Virtual workplace Remote sensors Traffic-monitoring applications B2C service delivery model “Anything as a Service” IoT applications Evolution from Bricks and Mortar to E-Commerce E-commerce Sale of goods and services on the Internet Business-to-consumer (B2C) Customers purchase goods and services directly from their website Business-to-business (B2B) Businesses conduct sales with other businesses Payment Card Industry Data Security Standard (PCI DSS) Protects private customer data Evolution from Bricks and Mortar to E-Commerce (cont.) Internet business challenges: Growing the business through the Internet Changing an existing conventional business into an e-business Building secure and highly available websites and e-commerce portals Building a web-enabled customer-service strategy Finding new customers with Internet marketing E-business Strategy Elements E-commerce solution Internet marketing strategy E-customer service-delivery strategy Payment and credit card transaction processing Why Businesses Must Have an Internet and IoT Marketing Strategy Must remain competitive Bricks-and-mortar business model out of date in global market Customers require continuous access to information, products, and services IP Mobility Personal communication devices and mobile phones are powerful Cell phones are used to extend mobility Mobile phones, smartphones, and PDAs match the power and flexibility of small computers Tablets, smartphones, and netbooks fill need for lightweight portable devices Mobile Users and Bring Your Own Device (BYOD) Employees and contractors use their own personal devices to connect to network at office Issues with Mobile Computing Network Usability Security Mobile Applications Limited web browsers can’t run some traditional applications Bad interface design causes application failure on mobile devices Many users from multiple domains found uses for mobile applications Medical applications were a good fit for mobile applications Mobile Applications (cont.) 4G networks provide true IP communications Mobile IP enables users to: Move between LAN segments and stay connected without interruption Maintain a connection to the network as long as the mobile device stays within network coverage IP Mobile Communications Mobile Node (MN) Home Agent (HA) Foreign Agent (FA) Care of Address (COA) Correspondent Node (CN) IP Mobile Communications (cont.) IP Mobile Communications (cont.) 1. Mobile node (MN) connects to foreign agent (FA). 2. FA assigns care of address (COA) to MN. 3. FA sends COA to home agent (HA). 4. Correspondent node (CN) sends message to MN. a. CN’s message for MN goes first to HA. b. HA forwards message to COA. c. FA forwards message to MN. New Challenges Created by the IoT Security Privacy Interoperability Legal and E-commerce regulatory and economic compliance dev issues Security Challenges of IT Devices Deployed in large quantities (such as sensors or consumer items) Ubiquitous and can have wide reach into the user or household population Not maintained or updated devices allow vulnerabilities Upgrades can be difficult to distribute and deploy No owner visibility of how the device connects to the Internet Not physically secure Capture readings and measurements in the open Privacy Challenges Privacy policy statement Definition of data, metadata, or analytical data use and rights Ability for a user to provide consent to a manufacturer’s or application service provider’s privacy policy statement Determine the domain of privacy Interoperability and Standards Internet Engineering Task Force (IETF) ensures interoperability and standards can be pursued for IoT solutions Interoperability has significant financial impacts if not properly addressed Goal is to bring the cost of IoT devices and supporting applications down so they are affordable Interoperability and Standards Challenges Some manufacturers want to design and deploy proprietary IoT devices and solutions Cost factors to implement functional, operational, technical, and security capabilities into IoT devices and applications Time-to-market risk Technology outdated risk A void in interoperability and standards for IoT devices can create an environment of bad IoT devices Legal and Regulatory Issues Proper handling and protection of sensitive data Privacy data subject to privacy laws of state you live in as well as state that the IoT hosting company resides in IoT vendor or solutions provider required to adhere to security control requirements and data protection laws Legal and Regulatory IoT Questions Who is collecting data? Who is collecting behavior patterns? Are they selling this data? Do they have the right to sell it? Is there liability associated with the data? E-Commerce and Infrastructure Foundational Economic resources investments Development Issues Technical and Policy and industry regulatory development definitions Summary The evolution of the Internet of Things (IoT) from the late 1990s to present The impact that the Internet and IoT have on human and business life How bricks-and-mortar businesses transform into e-business models with e-commerce and an IoT strategy How IP mobility is driving IoT to include both personal and business environments New challenges created by IoT

Use Quizgecko on...
Browser
Browser