SlideShare a Scribd company logo
1 of 21
Download to read offline
How Does IoT Work?
Get Data—Securely—to the Right Place, at the
Right Time, in the Right Format
“
”
CHALLENGES
SENSING A COMPLEX
ENVIRONMENTS
Immediately detecting the drop off in network
of IoT device and ones it comes back online
#1
Immediately detecting the drop off in network
of IoT device and ones it comes back online#1
#2 Ability to detect and monitor IoT
devices and fix any problems
SENSING A COMPLEX
ENVIRONMENTS
Connectivity
Variety of wired and wireless connectivity
standards are required to enable different
application needs
#1
Thousand of IoT devices signaling and sending
data between one another takes a toll on power
and we cannot afford to use 100% consumption of
these small and expensive embedded CPU Of IoT
devices
#1
Power consumption
- Should have minimal battery drain and low power
consumption
Power consumption
#1
Thousand of IoT devices signaling and sending
data between one another takes a toll on power
and we cannot afford to use 100% consumption of
these small and expensive embedded CPU Of IoT
devices
Security
Authorization: IoT device or server has proper
authorization to send or receive that stream
of data
#1
Open ports: An IoT device is dangerously
vulnerable when it’s sitting and listening to an
open port out to the Internet
#1
#2
Authorization: IoT device or server has proper
authorization to send or receive that stream
of data
Security
Encryption: You need end to end encryption
between devices and servers.
#1
#2
#3
Open ports: An IoT device is dangerously vulnerable
when it’s sitting and listening to an open port out to the
Internet
Authorization: IoT device or server has proper authorization to
send or receive that stream of data
Security
IoT complexities
IoT application development needs to be easy
for all developers, not just to experts#1
Demand a whole new level of systems and
capabilities that can harness the ecosystem
and unlock value for organizations
#1
#2
IoT application development needs to be easy for all
developers, not just to experts
IoT complexities
Cloud is important
A virtual infrastructure for utility computing
integrating applications, monitoring devices,
storage devices, analytics tools, visualization
platforms, and client delivery
#1
A virtual infrastructure for utility computing
integrating applications, monitoring devices, storage
devices, analytics tools, visualization platforms,
and client delivery
Systems in the cloud will be used to transform
data to insight and drive productive,
cost-effective actions from these insights
#1
#2
Cloud is important
EXPONENTIAL GROWTH OF SMART
DEVICES AND SENSORS
Source: cognizant
Keep following us
for More
We are ChromeInfo Technologies, a Mobile App Development, Web
Development and Software Testing company with development center
in India.
ABOUT Us
Mobile Application Development
Android Application Development
iPhone Application Development
iPad Application Development
Web Development
Software Testing
OUR OFFERING
For more follow us
THANK YOU
Our Most viewed slide

More Related Content

What's hot

Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
Bryan Len
 

What's hot (20)

Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystem
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of Things
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay Kumar
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot device
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
Internet of Things(IoT)
Internet of Things(IoT)Internet of Things(IoT)
Internet of Things(IoT)
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 

Similar to TOP 6 Security Challenges of Internet of Things

Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
Somasundaram Jambunathan
 

Similar to TOP 6 Security Challenges of Internet of Things (20)

Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
pptt.pptx
pptt.pptxpptt.pptx
pptt.pptx
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Security Issues in Internet of Things
Security Issues in Internet of ThingsSecurity Issues in Internet of Things
Security Issues in Internet of Things
 
Internet of Things, OWASP & WAF
Internet of Things, OWASP & WAF Internet of Things, OWASP & WAF
Internet of Things, OWASP & WAF
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
IoT Presentation.pptx
IoT Presentation.pptxIoT Presentation.pptx
IoT Presentation.pptx
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital Footprint
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?
 
IoT-Device-Security.pptx
IoT-Device-Security.pptxIoT-Device-Security.pptx
IoT-Device-Security.pptx
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
IoT security
IoT securityIoT security
IoT security
 
IOT.pptx
IOT.pptxIOT.pptx
IOT.pptx
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 

More from ChromeInfo Technologies

More from ChromeInfo Technologies (20)

The Ultimate Guide To Mvp Development Company Cost | Chromeinfotech
The Ultimate Guide To Mvp Development Company Cost | ChromeinfotechThe Ultimate Guide To Mvp Development Company Cost | Chromeinfotech
The Ultimate Guide To Mvp Development Company Cost | Chromeinfotech
 
Top 5 Ways to do Mobile App Market Research
Top 5 Ways to do Mobile App Market ResearchTop 5 Ways to do Mobile App Market Research
Top 5 Ways to do Mobile App Market Research
 
Follow the 9 Essential Steps to Create a Hit Mobile App
Follow the 9 Essential Steps to Create a Hit Mobile AppFollow the 9 Essential Steps to Create a Hit Mobile App
Follow the 9 Essential Steps to Create a Hit Mobile App
 
2018 App Segments for IoT to Invest
2018 App Segments for IoT to Invest2018 App Segments for IoT to Invest
2018 App Segments for IoT to Invest
 
COST REQUIRED TO DEVELOP AN APP
COST REQUIRED TO DEVELOP AN APPCOST REQUIRED TO DEVELOP AN APP
COST REQUIRED TO DEVELOP AN APP
 
iOS 11 is Here
iOS 11 is HereiOS 11 is Here
iOS 11 is Here
 
SEO for Mobile Apps
SEO for Mobile AppsSEO for Mobile Apps
SEO for Mobile Apps
 
Native Apps vs. Web Apps – What Is the Better Choice?
Native Apps vs. Web Apps – What Is the Better Choice?Native Apps vs. Web Apps – What Is the Better Choice?
Native Apps vs. Web Apps – What Is the Better Choice?
 
Chat and messaging apps
Chat and messaging appsChat and messaging apps
Chat and messaging apps
 
So, How Do You Make Agile Successful?
So, How Do You Make Agile Successful? So, How Do You Make Agile Successful?
So, How Do You Make Agile Successful?
 
How Can Businesses Benefit from Web 2.0?
How Can Businesses Benefit from Web 2.0? How Can Businesses Benefit from Web 2.0?
How Can Businesses Benefit from Web 2.0?
 
Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in Healthcare
 
Web Application Development Tools for Creating Perfect User Experience
Web Application Development Tools for Creating Perfect User ExperienceWeb Application Development Tools for Creating Perfect User Experience
Web Application Development Tools for Creating Perfect User Experience
 
Take Your Mobile App Marketing to Its “Next Level”
Take Your Mobile App Marketing to Its “Next Level”Take Your Mobile App Marketing to Its “Next Level”
Take Your Mobile App Marketing to Its “Next Level”
 
For Business Success, Choose Cross Platform App Development
For Business Success, Choose Cross Platform App DevelopmentFor Business Success, Choose Cross Platform App Development
For Business Success, Choose Cross Platform App Development
 
The Business Benefits of Apple Powered Swift App Development
The Business Benefits of Apple Powered Swift App DevelopmentThe Business Benefits of Apple Powered Swift App Development
The Business Benefits of Apple Powered Swift App Development
 
Facts About The Future Of Enterprise Mobile Apps You Need To Know
Facts About The Future Of Enterprise Mobile Apps You Need To KnowFacts About The Future Of Enterprise Mobile Apps You Need To Know
Facts About The Future Of Enterprise Mobile Apps You Need To Know
 
Native Application Development Company
Native Application Development CompanyNative Application Development Company
Native Application Development Company
 
Google I/O 2016: What to expect from Android N to virtual reality?
Google I/O 2016: What to expect from Android N to virtual reality?Google I/O 2016: What to expect from Android N to virtual reality?
Google I/O 2016: What to expect from Android N to virtual reality?
 
ChromeInfotech - Corporate Profile
ChromeInfotech - Corporate ProfileChromeInfotech - Corporate Profile
ChromeInfotech - Corporate Profile
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

TOP 6 Security Challenges of Internet of Things

  • 1.
  • 2. How Does IoT Work? Get Data—Securely—to the Right Place, at the Right Time, in the Right Format “ ”
  • 4. SENSING A COMPLEX ENVIRONMENTS Immediately detecting the drop off in network of IoT device and ones it comes back online #1
  • 5. Immediately detecting the drop off in network of IoT device and ones it comes back online#1 #2 Ability to detect and monitor IoT devices and fix any problems SENSING A COMPLEX ENVIRONMENTS
  • 6. Connectivity Variety of wired and wireless connectivity standards are required to enable different application needs #1
  • 7. Thousand of IoT devices signaling and sending data between one another takes a toll on power and we cannot afford to use 100% consumption of these small and expensive embedded CPU Of IoT devices #1 Power consumption
  • 8. - Should have minimal battery drain and low power consumption Power consumption #1 Thousand of IoT devices signaling and sending data between one another takes a toll on power and we cannot afford to use 100% consumption of these small and expensive embedded CPU Of IoT devices
  • 9. Security Authorization: IoT device or server has proper authorization to send or receive that stream of data #1
  • 10. Open ports: An IoT device is dangerously vulnerable when it’s sitting and listening to an open port out to the Internet #1 #2 Authorization: IoT device or server has proper authorization to send or receive that stream of data Security
  • 11. Encryption: You need end to end encryption between devices and servers. #1 #2 #3 Open ports: An IoT device is dangerously vulnerable when it’s sitting and listening to an open port out to the Internet Authorization: IoT device or server has proper authorization to send or receive that stream of data Security
  • 12. IoT complexities IoT application development needs to be easy for all developers, not just to experts#1
  • 13. Demand a whole new level of systems and capabilities that can harness the ecosystem and unlock value for organizations #1 #2 IoT application development needs to be easy for all developers, not just to experts IoT complexities
  • 14. Cloud is important A virtual infrastructure for utility computing integrating applications, monitoring devices, storage devices, analytics tools, visualization platforms, and client delivery #1
  • 15. A virtual infrastructure for utility computing integrating applications, monitoring devices, storage devices, analytics tools, visualization platforms, and client delivery Systems in the cloud will be used to transform data to insight and drive productive, cost-effective actions from these insights #1 #2 Cloud is important
  • 16. EXPONENTIAL GROWTH OF SMART DEVICES AND SENSORS Source: cognizant
  • 18. We are ChromeInfo Technologies, a Mobile App Development, Web Development and Software Testing company with development center in India. ABOUT Us Mobile Application Development Android Application Development iPhone Application Development iPad Application Development Web Development Software Testing OUR OFFERING