Presentation by Group8
Presentation by Group8
(IOT)
Presentation by Group8
MEMBERS
• CENTINO
• SEÑASE
• TAPA
• OREO
WHAT IS THE INTERNET OF
THINGS (IOT)?
The term Internet of Things was coined by Kevin Ashton when he was
working for Procter & Gamble (P&G) in 1999. As a part of his work in
supply chain optimization, Ashton gave a presentation with the goal of
attracting P&G’s senior management’s attention to a new technology called
Radio-Frequency Identification or RFID. His presentation was entitled
“Internet of Things”.
IOT TECHNOLOGIES
When you first heard the term Internet of Things, one of the first questions
that entered your mind was probably “What things?”
It is important to note that the word thing has a special meaning in IoT. In the
context of IoT, a thing is any physical object that can connect to the Internet.
However, IoT does not end with giving physical objects an online presence.
On the contrary, it is just the beginning. A “smart object” needs to have a
function or a purpose.
“SMART” THINGS
SENSORS ACTUATORS
CONNECTIVITY CLOUD
PROTOCOLS COMPUTING
SENSORS
In order to interact with the physical world, first, a smart object needs to
gather information about its environment. For this purpose, a smart object
needs to have sensors. As the name implies, a sensor is a component that
detects a specific physical input. The following are common types of sensors
with their definitions and examples:
EXAMPLES SENSOR:
TEMPERATURE SENSOR
detects the temperature of an object or an environment.
PROXIMITY SENSOR
detects motion
EXAMPLES SENSOR:
OPTICAL SENSOR
converts light energy into digital signals
PRESSURE SENSOR
converts physical power into electronic signals
EXAMPLES SENSOR:
HUMIDITY SENSOR
measures the amount of water vapour in the atmosphere
ACCELEROMETER
measures acceleration
GYROSCOPE
uses Earth’s gravity to detect the position or orientation of an object
ACTUATORS
Connectivity protocols are sets of rules and standards that govern how
devices communicate and exchange data with each other over a network,
facilitating seamless interaction and data transfer within the Internet of
Things (IoT) and other networked environments.
EXAMPLES:
WIFI
Widely used in home automation, smart devices, and industrial IoT
deployments.
BLUETOOTH
Used in applications such as wireless audio streaming, data synchronization
between devices, and beacon technology for location-based services.
EXAMPLES:
ZIGBEE
Commonly used in home automation, smart lighting, and industrial control
systems.
Z-WAVE
Enables automatic identification and tracking of items in various applications
such as supply chain management, inventory tracking, and access control.
IMPACT OF IOT ON DAILY LIFE:
Internet of Things abundant around us. These devices are making our lives
easier and safer, and they also help us make the best use of our resources.
So, IoT devices can save your life during emergencies. They can also help
you maintain health. For instance, wearable devices can keep track of how
many steps you walked today. It can then calculate the calories you burn and
give you a goal.
DIFFERENT FACTORS OF
EVERYDAY LIFE:
3.Retail:
Google Maps and similar applications are the best examples of IoT in traffic
management. Here, your smartphones work like sensors. They exchange
information about the roads between themselves. As a result, all the vehicles
can sync with each other and reduce traffic jams.
DIFFERENT FACTORS OF
EVERYDAY LIFE:
5.Agriculture
The Internet of Things can significantly increase farming success. Farmers
can get a lot of helpful information through IoT devices. For instance, IoT
sensors can tell them about the moisture and acidity levels in the soil. It can
precisely explain agricultural lands’ chemical characteristics and nutrient
levels.
As a result, farmers can now make better-informed decisions than in the past.
Plus, data-driven insights from the IoT systems can further help with farming
commitments. These systems can also tell you the best time for sowing the
crops. Advanced devices can alarm the farmer about plant diseases
beforehand.
BENEFITS OF IOT
IoT devices can pose a risk to their owners and others. An insecure IoT
device can be used to gain a foothold on an organization’s network and
enable an attacker to move laterally behind their defenses. IoT devices can
also be conscripted into botnets to perform
distributed denial-of-service (DDoS) attack, credential stuffing, and other
automated attacks. IoT security can help to secure IoT devices and reduce
the cybersecurity risks that they pose.
EXAMPLES OF CHALLENGES:
WEAK AUTHENTICATION
IoT devices are notorious for their use of weak and default passwords. Several large
botnets, such as Mirai, infected many devices simply by logging in using default and
hardcoded passwords.
DATA ENCRYPTION
IoT devices commonly collect large amounts of sensitive data, but they don’t
always protect it properly. For example, IoT devices frequently fail to
encrypt data stored on devices or traveling over the network.
EXAMPLES OF CHALLENGES:
VULNERABLE SOFTWARE
IoT device creators do not always follow development security best practices, including
the use of reputable and updated libraries. These issues are exacerbated by the fact that
IoT devices are often difficult to patch, leaving vulnerabilities exposed for exploitation.
INSECURE PROTOCOLS
IoT devices often use insecure network interfaces and protocols. For
example, some IoT devices allow connections via Telnet, which exposes
credentials and other data in plaintext on the network.
EXAMPLES OF CHALLENGES:
LACK OF STANDARDIZATION
One of the main contributors to weak IoT security is the lack of security standards and
requirements. For IoT devices, most security standards are optional recommendations, if
they exist at all.
SECURITY CHALLENGES IN IOT
The Internet of Things (IoT) envisages the world where all our electronic
devices can communicate with one another. Just as the internet connects
people, the IoT will connect our smart gadgets together. However, as with
any fledgling technology, there are teething problems that can’t be ignored as
connected devices become more integrated into businesses and our everyday
lives. The following five IoT hacks demonstrate the current vulnerabilities in
IoT.
FIVE IOT HACK
MIRAI BOTNET
Mirai malware that it used to infect connected devices. Once it successfully infected a
vulnerable IoT gadget, it automatically searched the internet for other vulnerable devices.
Whenever it found one, the malware used the default name and password to login into the
device, install itself, and repeat the process.
HACKABLE CARDIAC DEVICES
These pacemakers relayed information about the patient’s conditions to their physicians,
which made monitoring of each patient much easier. Once attackers gained access to
pacemaker’s transmitter, they were able to alter its functioning, deplete the battery, and
even administer potentially fatal shocks.
FIVE IOT HACK
JEEP HACK
The Jeep Hack involved exploiting vulnerabilities in Fiat Chrysler's Uconnect
infotainment system, allowing attackers to remotely take control of critical vehicle
functions, including steering, brakes, and transmission, posing significant safety risks to
drivers and passengers.
CONCLUSION