Internet of Things Mi Gyeong Gwak CSC 540 – Individual Research 29 April 2014.

Slides:



Advertisements
Similar presentations
Hart District Acceptable Use Policy Acceptable Use Policy.
Advertisements

I Choose Privacy! Intellectual Freedom: Addressing the Privacy Issue in the Academic Library.
A Brief History of Information Privacy IC211. Colonial America Eavesdropping “listen[ing] under walls or windows, or the eaves of a house, to hearken.
SEARCH AND SEIZURE A REASONABLE TEST Created by the Ohio State Bar Foundation.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Teaching American History: Moot Courts and Constitutional Concepts.
Breaking Trust On The Internet
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Computer Encryption Cheryl Dong Naima Ritter Hayden Bottoms Jennifer Kozin Brittany James.
THEFT BURGLARY THEFT VIOLENT CRIME THEFT CAR THEFT THEFT BURGLARY THEFT.
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
Law enforcement officers conduct searches every day in an effort to find evidence that can be seized and used in court to prosecute people who have violated.
RFID: The Reward is Worth the Risk With Government Intervention By Alex Johnson.
Privacy & Personal Information -- Why do we care or do we?
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
The Fourth Amendment to the U.S. Constitution. The U.S. Constitution The Constitution was created on September 17 in It was ratified on June 21,
4th Amendment.
CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Class 11 Internet Privacy Law Government Surveillance.
BUSINESS B1 Information Security.
Deep Packet Inspection Matthew Carson. What is Deep Packet Inspection? A form of packet filtering which examines the data portion of an internet packet.
Computer Legislation The need for computer laws Go to Contents.
2.6 Protecting Individual Citizens 1 st & 4 th Amendments In Depth Government & Citizenship Timpanogos High School.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
By: Justin Cruz Engl Ms. Deezy. Government?  Government is supposed to protect us but who protects us from the government?  How much control should.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
DO NOW – Friday, December 6 What do you think “unreasonable” means? A man is seen walking into an apartment with a grey duffel bag. He is then seen coming.
Search and Seizure. I) Search and Seizure A) The 4 th amendment outlines the rules governing search and seizure.
The Bill of Rights The First Fundamental Changes of the Constitution.
THE 4 TH AMENDMENT The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
CPS 82, Fall Privacy before … l Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic.
The Fourth Amendment and the Home By Laura Zajac.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
The Fourth Amendment, Technology, and a Right to Privacy
Cybercrime What is it, what does it cost, & how is it regulated?
RIGHT TO PRIVACY A presentation by: Stacy Leatherberry Kristyn Bryson Mandy Timms Lisa Wheeler Jacob Sabins.
Computer crimes.
CALL TO ORDER  Have you or someone you’ve known ever been searched by the police, legally or illegally?  What do you know about the rules that police.
4 th Amendment  “The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures, shall.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
By, Kris Coles Eva Ortega Christina Torres. Veronia School District v. Acton First court case to go to Supreme Court, were the school district demand.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Group 3 Against the Proposed Amendments to Fed.R.Civ.Proc., Fed.R.Crim.Proc. & Fed.R.Evid.
Fourth Amendment And Probable Cause. By the end of this presentation you should be able to understand; ◦Fourth Amendment of the U.S. Constitution ◦How.
SOURCE:2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING AUTHER: MINGLIU LIU, DESHI LI, HAILI MAO SPEAKER: JIAN-MING HONG.
Understanding the Constitution
Privacy and the Law.
Limiting the Right of Search
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
Grab a book off the shelf and look it up. (Article V)
Forensics Week 7.
Chapter 14 Searches and Seizures
The Fourth Amendment and the Home
Understanding Law: Mr Thompson, APT Academy
Fourth Amendment.
CHAPTER 1 1/15/2019 BHS Law Related Education Program Criminal Justice
Bill of Rights Do Now: Paraphrase the Fourth Amendment to the Constitution. Rewrite it into your own words without leaving out any information. You can.
The Surveillance State
IA455 Chris Danieli and Zachary gibson
Warm Up – February 11 Grab the handouts from the front table
Search & Seizure in Schools:
How does this Constitutional amendment protect Americans?
Arrest.
Judicial Restraint vs. Judicial Activism
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
Presentation transcript:

Internet of Things Mi Gyeong Gwak CSC 540 – Individual Research 29 April 2014

Internet of Things (IoT) 0 It is a technology that applies within a geographically circumscribed environment, where diverse objects communicate with one another through the Internet.

Defining Features of IoT 0 ubiquity 0 miniaturization 0 ambiguity 0 identification 0 connectivity 0 mediation and autonomous agency 0 embedded intelligence 0 seamless transfer 0 distributed control 0 big data 0 unpredictability

Digital Universe Four major migrations from analog to digital 1. computer 2. phones 3. Cameras 4. machines postmastersqc.com

Intel’s Estimation 0 15 billion objects by billion objects by Each person having about 26 smart objects by Total global worth of IoT technology = $6.2 trillion 0 Infographic: 0 nt-systems/iot/internet-of-things-infographic.html nt-systems/iot/internet-of-things-infographic.html 0

Technology - Communication 0 Radio-frequency identification (RFID) 0 Near field communication (NFC) 0 Bluetooth 0 WiFi it.emcelettronica.com

Technology - Identification 0 Internet Protocol version 6 (IPv6) 0 Internet Protocol version 4 (IPv4) 0 Transmission Control Protocol (TCP) 0 User Datagram Protocol (UDP)

Hardware, Software, and Cloud Service 0 Gainspan 0 Wiznet 0 Nordic Semiconductor 0 TI 0 Arduino 0 Raspberry Pi 0 BeagleBone Black 0 RIOT OS 0 Thingsquare Mist 0 ThingWorx 0 Evrythng 0 Sense

Applications 0 Mimo monitor 0 BeClose system 0 dweet.io ions_ranking/ ions_ranking/

Ethical Issues 0 Privacy 0 Malicious usage 0 Cybercrime 0 Discrimination

Examples 0 “It might be some effort to get this kind of scenario, but if breaking into one server means you get to ransack 100, 1,000, 10,000 people’s homes, that’s definitely worth it, and that’s where the real danger lies.“ - Rachel Metz from MIT Review 0 Hackers used 100,000 everyday consumer gadgets that were connected to the internet to send more than 750,000 malicious spam phishing s to enterprises and individuals throughout the world. (Occured between December 23, 2013 and January 6)

Laws and Regulations 0 The Fourth Amendment to the United States “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized"

“Shine the Light” law by California constitution “… outlines specific rules regarding how and when a business must disclose use of a customer's personal information and imposes civil damages for violation of the law” en.wikipedia.org

The Computer Fraud and Abuse Act (CFAA) 0 accessing a computer without authorization and subsequently transmitting classified government information. [Subsection 1030(a)(1)]; 0 theft of financial information [Subsection 1030(a)(2)]; 0 accessing a "protected computer," which the courts have recently interpreted as being any computer connected to the internet, even if the intruder obtains no data [Subsection 1030(a)(3)]; 0 transmitting code that causes damage to a computer system [Subsection 1030(a)(5)]; 0 trafficking in computer passwords for the purpose of affecting interstate commerce or a government computer [Subsection 1030(a)(6)];

The Electronic Communication Privacy Act (ECPA) 0 “for the increasing amount of communications and data transferred and stored on computer systems… under the law, unauthorized access to computer messages, whether in transit or in storage, is a federal crime”

Conclusion 0 Our imagination becomes reality. 0 We are future computer scientists. 0 Building a better smart world through the IoT depends on us, on our action. tonden.wordpress.com

References and-its-applications and-its-applications 0 systems/iot/internet-of-things-infographic.html systems/iot/internet-of-things-infographic.html ifference.html ifference.html 0 interface-for-the-internet-of-things/ interface-for-the-internet-of-things/

References ng/ ng/ /Cyber-criminals-hack-REFRIGERATOR-send- malicious- s-worlds-household-attack.html /Cyber-criminals-hack-REFRIGERATOR-send- malicious- s-worlds-household-attack.html 0 things/ethics things/ethics 0 D/Statistics/Documents/facts/ICTFactsFigures2013-e.pdf security-challenge / D/Statistics/Documents/facts/ICTFactsFigures2013-e.pdf security-challenge / 0 me/crimelaws.html me/crimelaws.html