1 / 118

Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran

Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran Lecture at Ryerson Univ - 2014

globalstf
Download Presentation

Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet of Things (IoT)Cloud Security Dr. Anton Ravindran Lecture at Ryerson Univ - 2014

  2. 1993 Web browser

  3. 5000 Exabytes

  4. 90%

  5. IoT Can Be Viewed as a Network of Networks Source: Cisco IBSG

  6. Things?

  7. People - things People - people Things - things

  8. The Internet of Things (IoT) is the network of physical objects accessed through the Internet, as defined by technology analysts and visionaries These objects contain embedded technology to interact with internal states or the external environment. They are basically uniquely identifiable objects and their virtual representations in an Internet-like structure. What is IoT?

  9. Structure of IoT

  10. Technology Roadmap: The Internet of Things

  11. how?

  12. What will we do with it?

  13. Connect with things?

  14. Monitor things?

  15. Search for things

  16. Manage things

  17. Control things

  18. Each person to be surrounded by 3,000 to 5,000 connected everyday things? 2035?

  19. Weapon of mass disruption?

  20. IoT raises important questions and introduces new challenges for the security of systems and processes and the privacy of individuals. Some IoT applications are tightly linked to sensitive infrastructures and strategic services such as the distribution of water and electricity and the surveillance of assets. Other applications handle sensitive information about people, such as their location and movements, or their health and purchasing preferences. Confidence in and acceptance of IoT will depend on the protection it provides to people’s privacy and the levels of security it guarantees to systems and processes. Privacy & Security

  21. Internal Policies, State Legal and regulatory issues are extremely important when building IoT systems that have security implications. To verify that a service provider has strong policies and practices that address legal and regulatory issues, each customer must have its legal and regulatory experts inspect the provider’s policies and practices to ensure their adequacy. The issues to be considered in this regard include data security and export, compliance, auditing, data retention and destruction, and legal discovery. In the areas of data retention and deletion, trusted storage and trusted platform module access techniques can play a key role in limiting access to sensitive and critical data. Policies & Legislations

  22. It will change our lives

  23. DIKW Source : Chaim Zins Theory of DIKW

  24. One cannot be analytical without data and you cant really be good at analytics without good data. Data

  25. If Data Quality is not good, then no matter what cutting Analytical landscape and state of art technology you have it would be “GARBAGE IN GARBAGE OUT”. So before the data analytics is done you should find a place where all the data are cleansed, harmonized and are of good data quality. It sounds very simple, but it’s the most difficult thing and most organization spend lot of money and resource to get this correct. Data

  26. How can I act on this insight? What is the best that could happen? What will happen? Why did it happen? What happened (hindsight)? Scenario modeling & root cause analysis Enterprise Performance Optimization Predictive modeling Descriptive modeling Reports & OLAP Data Cleansing & Classification ROI Raw data Insight Vs. Hindsight Data Information Knowledge Intelligence

  27. Source: BI Intelligence

  28. Technologies

  29. There are undoubtedly risks associated with the use of Cloud-based services, just as there are risks associated other delivery models. Source: Capgemini

  30. History of Cloud

  31. Five Key Cloud Attributes • Shared / pooled resources • Broad network access • On-demand self-service • Scalable and elastic • Metered by use

  32. A survey commissioned by Microsoft on ‘Cloud computing among business leaders and the general population’ states that: • 58% of the general population and 86% of senior business leaders are excited about the potential of cloud computing. • But, more than 90% of these same people are concerned about the security, access and privacy of their own data in the cloud. Why Security? Source: Microsoft

  33. Source: IBM

  34. What is Cloud Security? Cloud Security • Agility • Self-service • Scale • Automation • Gate-keeper • Standards • Control • Centralized Cloud Security is security principles applied to protect data, applications and infrastructure associated within the Cloud Computing technology.

  35. Market Analysis What market size are we talking about Market Size: 2012 : US $425.4 Million 2013 : US $629.6 Million 2014 : US $963.4 Million

  36. Global Cloud Security Market Growth Analysis 2012-2014 (US$ million)

  37. Global Cloud Security Market by End-User Segmentation

  38. Why is Cloud Security Important • Increasing Usage of Cloud Services in Non-traditional Sectors • Growing Adoption of Cloud Services in Government Departments • Rise in Cloud Service-specific Attacks • Growing Usage of Cloud Services for Critical Data Storage • Rise in Employee Mobility

  39. Most security problems stem from: • Loss of control • Lack of trust • Multi-tenancy • These problems exist mainly in 3rd party management models • Self-managed clouds still have security issues, but not related to above Cloud Computing Problems

More Related