8 - Slide - Securing IoT
8 - Slide - Securing IoT
Content
• Introduction
• Design for protection
• Privacy and ethics
• Security
Introduction
• Securing IoT
https://
courses.edx.org/courses/course-v1:CurtinX+IOT1x+2T2018/jump_to/bl
ock-v1:CurtinX+IOT1x+2T2018+type@vertical+block@2d1cf5960ba04a
a99e6fa50474e7c208
Note
• The internet of things will provide further ways for hackers to attack
businesses and lives.
• Data about you is being sent everywhere, all the time.
• Security certainly needs to be carefully worked out and added to the
design of a system across every path; devices, the network, programs,
and data.
Securing IoT
• Hackable devices
https://
courses.edx.org/courses/course-v1:CurtinX+IOT1x+2T2018/jump_to/bl
ock-v1:CurtinX+IOT1x+2T2018+type@vertical+block@7c77277f01a94c
59899244c3a5104a8d
Securing IoT
For each scenario, a risk has been identified. You need to decide:
• How high the level of impact will be if the risk comes about?
• How likely is it that the risk will occur?
• What security measures should be taken to reduce the risk?