Monday, October 7, 2019

Cyber Security Internet of things (IOT)

Internet of things is a emerging field due to technology upgradation through artificial intelligence.
  • IOT is the interconnection of devices globally through Internet connection.
  • Due to IOT advancements in technology, cyber security plays a major role for merits to secure.
  • For example for IOT, we can say RFID to track devices. And day to day use of small control through remote devices.
  • IOT homes are starting point, so education is only important for Internet of things. Currently due to IOT light bulbs, Camera, thermostat are currently connecting to Internet.

Camera connected to Internet:
  • Whenever camera is connected using intercept key, hacker can see the key. So secure your wireless network
  • Web camera can be hacked based on Virus send as an attachment. 
  • Advanced robots technology is important for security bounty hunters.

Smart Medicine Bottle:
  • Tracks number of pills in the bottle.
  • Reports changes in quantity. 
  • Remember data and time of pills taken.
  • HIPPA-health insurance portability accountability act.
  • Activate remote wiping of applications, whenever your device lost we can do that.
  • Drones are Internet connected, currently there are 5 lakhs of drones sold this year.

The Cyber security Techniques:
  • Cryptography
  • Intrusion detection
  • Multifactor authentication

Cryptography:
Cryptography is a mathematics to change data which is unreadable, only recipient have the key.

Multifactor Authentication - MFA:
MFA is a input two different forms of data to access data on Internet.

Biometric Identification:
  • Finger Print
  • Voice Recognition
  • Face recognition
IDS:Intrusion Detection System:
IDS is used to detect the external threat. People try to access data from external in that may be a chance of external threat.

Internal intrusion:
  • Internal intrusion is someone within a company or somebody trying to sabotage company data.
  • Peoples careless with software while installing allowing access to third party are route for the attack.
  • Use strong password so password cannot be compromised by dictionary attack.
  • We can predict easily 50 billion devices connecting to Internet in the next 5 years.
  • Protecting privacy will continue to challenge IOT at lightning speed.

Hill Station view:


3 comments:

Manikandan said...

Thanks for you comment john and what are the err you spotted

Anonymous said...

Very useful information you have given here on cyber Security and IOT.It is useful to students who are doing Cyber Security Course.Thanks a lot.

felisha green said...


If you ever want to change or up your university grades contact cybergolden hacker he'll get it done and show a proof of work done before payment. He's efficient, reliable and affordable. He can also perform all sorts of hacks including text, whatsapp, password decrypt,hack any mobile phone, Escape Bancruptcy, Delete Criminal Records and the rest

Email: cybergoldenhacker at gmail dot com

Explore Me

Networking- Cisco IOS XR

Cisco IOS XR found in service providers routers like 12000 series cisco IOS XR. Cisco IOS XR originally designed for 64 bit operations....