The Internet of Things(IoT) BY CODEY DISNEY. Objectives  What Is the IOT?  How are corporations at risk? What are the security risks and what can happen.

Slides:



Advertisements
Similar presentations
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Advertisements

Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
OC RIMS Cyber Safety & Security Incident Response.
Zenith Visa Web Acquiring A quick over view. Web Acquiring Allows merchants to receive payments for goods and services through the Internet Allows customers.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
SOA Security Chapter 12 SOA for Dummies. Outline User Authentication/ authorization Authenticating Software and Data Auditing and the Enterprise Service.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
1 Pertemuan 9 Network Security and E-Commerce Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Payment Card Industry (PCI) Data Security Standard
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
New Data Regulation Law 201 CMR TJX Video.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Finance and Governance Workshop Data Protection and Information Management 10 June 2014.
Internet Security for Small & Medium Business Week 6
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Security considerations for mobile devices in GoRTT
Security and Privacy in Smart Communities By: Dr. Tan Hanh, Dr. Hoang Xuan Dau Posts and Telecommunications Institute of Technology (PTIT), Hanoi, Vietnam.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
The Internet of Things and Consumer Protection
Security Awareness at Board Level Dr. Claudia Natanson CISO Diageo TERENA Networking Conference May 2007 Lyngby, Denmark “Myth or Reality”
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Computer Security By Duncan Hall.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
THE NEED FOR NETWORK SECURITY Hunar & Nawzad & Kovan & Abdulla & Aram.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Security and resilience for Smart Hospitals Key findings
Performing Risk Analysis and Testing: Outsource or In-house
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Case Study - Target.
E&O Risk Management: Meeting the Challenge of Change
Team 1 – Incident Response
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.
Forensics Week 11.
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Internet of Things Vulnerabilities
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Security Essentials for Small Businesses
Cybersecurity compliance for attorneys
Anatomy of a Common Cyber Attack
Presentation transcript:

The Internet of Things(IoT) BY CODEY DISNEY

Objectives  What Is the IOT?  How are corporations at risk? What are the security risks and what can happen  Target  How it was resolved  Prevention- Mitigation  What the future holds  Conclusion  Sources

What is the IoT?  The Internet of things consists of an object or device that, within certain parameters, is included within the whole of the internet. Allowing for connectivity at any given point via IP addresses or URI(URL and URN).  Key components that make up the “things” part of IoT  Sensors  Processors  Connectivity

Security Risks associated with the IoT  Possible vulnerabilities  Unsecure  Susceptibility to data theft  Malfunctions  Outages

Repercussions faced in corporate and business settings  Worst case scenario  Breach of cliental data  Implementation of Malware and Virus  Loss of customer trust  Negative media attention  Profit loss

Target Breach  Incident happened between ending of 2013 and beginning of 2014  70 million client numbers taken  40 million credit and debit information stolen

Target Breach continued  Hacker found security vulnerabilities in Hvac system  The Hvac in one of the stores was unsecured.  Hacker was able to gain credentials from a third party company.  With credentials the Hacker implemented malware on Target’s POS system.  Data was then offloaded to place all over World throughout the use of FTP

How case was resolved  Implementation of new:  Rules  Logging  Used applications to whitelist POS systems.  Update and reset passwords across the board.  Limiting vender access to servers.  Appointed new CISO

Ways To mitigate  Determine what devices are connected to the network  Ensure all devices are secured before implementation  Monitor the devices connected to the network  Have regular network scans  Defense in Depth  Employee awareness training

Future of IoT Pros  Introduces new products  Time efficiency  Cost effectiveness  Self-awareness through health  Cons  New Security risks  Breach of Privacy  Over-reliance

Conclusion The Internet of Things is a rapidly expanding entity interconnecting people and technology in a way that is exhilarating but also brings new challenges for not only those dealing with internet security but the general public as well. Only time will show whether or not the IoT will be a valuable asset or if it will be a societal blight.

Sources  on-us-companies-in-2014 [1] on-us-companies-in-2014 [1  security-and-technology-enhanc security-and-technology-enhanc  things/disadvantages things/disadvantages  security-breaches/ security-breaches/  internet-things/ internet-things/

Questions?