top 6 security challenges of internet of things
TRANSCRIPT
How Does IoT Work?
Get Data—Securely—to the Right Place, at the Right Time, in the Right Format
“”
CHALLENGES
SENSING A COMPLEX
ENVIRONMENTS
Immediately detecting the drop off in network
of IoT device and ones it comes back online #1
Immediately detecting the drop off in network
of IoT device and ones it comes back online #1
#2 Ability to detect and monitor IoT
devices and fix any problems
SENSING A COMPLEX
ENVIRONMENTS
Connectivity
Variety of wired and wireless connectivity
standards are required to enable different
application needs
#1
Thousand of IoT devices signaling and sending
data between one another takes a toll on power
and we cannot afford to use 100% consumption of
these small and expensive embedded CPU Of IoT
devices
#1
Power consumption
- Should have minimal battery drain and low power
consumption
Power consumption
#1Thousand of IoT devices signaling and sending
data between one another takes a toll on power
and we cannot afford to use 100% consumption of
these small and expensive embedded CPU Of IoT
devices
Security
Authorization: IoT device or server has proper
authorization to send or receive that stream
of data
#1
Open ports: An IoT device is dangerously
vulnerable when it’s sitting and listening to an
open port out to the Internet
#1
#2
Authorization: IoT device or server has proper
authorization to send or receive that stream
of data
Security
Encryption: You need end to end encryption
between devices and servers.
#1
#2
#3
Open ports: An IoT device is dangerously vulnerable
when it’s sitting and listening to an open port out to the
Internet
Authorization: IoT device or server has proper authorization to
send or receive that stream of data
Security
IoT complexities
IoT application development needs to be easy
for all developers, not just to experts#1
Demand a whole new level of systems and
capabilities that can harness the ecosystem
and unlock value for organizations
#1
#2
IoT application development needs to be easy for all
developers, not just to experts
IoT complexities
Cloud is important
A virtual infrastructure for utility computing
integrating applications, monitoring devices,
storage devices, analytics tools, visualization
platforms, and client delivery
#1
A virtual infrastructure for utility computing
integrating applications, monitoring devices, storage
devices, analytics tools, visualization platforms,
and client delivery
Systems in the cloud will be used to transform
data to insight and drive productive,
cost-effective actions from these insights
#1
#2
Cloud is important
EXPONENTIAL GROWTH OF SMART
DEVICES AND SENSORS
Source: cognizant
Keep following us
for More
We are ChromeInfo Technologies, a Mobile App Development, Web
Development and Software Testing company with development center
in India.
ABOUT Us
Mobile Application Development
Android Application Development
iPhone Application Development
iPad Application Development
Web Development
Software Testing
OUR OFFERING
For more follow us
THANK YOU
Our Most viewed slide