Internet of things security, privacy and governance

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

Internet of things security, privacy and governance.

Scene 2 (8s)

The term IoT, or Internet of Things, refers to the collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as between the devices themselves . The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers ( UIDs ) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction ..

Scene 3 (31s)

Vulnerabilities of iot. The lack of security of web, cloud, and mobile interfaces and of all network services. Data confidentiality. Gaps in encryption and authentication/authorization. Insecure firmware and insufficient security configuration options..

Scene 4 (45s)

Iot Security. IOT Security is the act of securing Internet of Things devices and the objects and everything which is connected through internet from attackers. It is very important to secure Iot devices from the attackers or hackers. Hardware, software and connectivity will all need to be secure for IOT objects to work effectively. Without security, any connected object or device can be hacked easily. Once hackers gain control, they can perform any activity and steal the users digital data.

Scene 5 (1m 8s)

Key elements of iot security. Authentication Data security Non repudiation Access control Data availability.

Scene 6 (1m 16s)

Iot privacy. A simple definition is that privacy may be considered as the authorized, fair , and legitimate processing of personal information. Authorized processing of personal information only happens where the person or organization is authenticated, and the processing is authorized in that the person acting has appropriate privilege for that processing. Processing personal information includes, but is not limited to: collection, storage, use, sharing, organization, display, recording, alignment, combination, disclosure by transmission, copying, consultation, erasure, destruction, alteration of personally identifiable information and any data related to it ..

Scene 7 (1m 44s)

Privacy requirements. The data stewards, data architects, data administrators, and data modelers should review and use the following privacy requirements throughout the system development life cycle. The following provides some privacy requirements to be considered: Purpose Notice Choice/consent Security Minimization.

Scene 8 (1m 59s)

Iot governance. IoT governance is the set of policies and procedures meant to address these areas of concern and generally address at least three areas related to IoT: Technical architecture Data management Information security Technical architecture Technical architecture is the area that is likely most familiar to most tech leaders, and you should use your existing technical architecture standards as the basis for your IoT architecture..

Scene 9 (2m 18s)

Data Management: Data management will be the most conceptually challenging element of your IoT governance policy to get right since there are technical, legal, and ethical elements to what data is captured, how and where it’s stored, and how the data is used and retained. Information Security: Information security should also be relatively familiar to tech leaders, with the additional elements of the volume of information gathered from IoT sensors and the potential for personally identifiable information (PII) that may be collected from employees either as a stated objective or unwittingly..

Scene 10 (2m 44s)

Thank you.