15.0 IoT Basics EH

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

9 hours 47 minutes
Video Transcription
Hi. Welcome back to the course. And the last module. We finished up our discussion on I. D s firewalls and honey pots
in module 15. We're gonna talk about the Internet of things or I ot
So what is I ot What's basically a network of physical devices? Could be things like vehicles, home appliances, you know, your thermostat airplanes, etcetera, representative of the things that might be able to be. So, you know, you got light bulbs, you got thermostats, even bicycles
has some kind of tracking your Fitbit or you're different exercise equipment stuff
from, of course, your smartphone, even things like alarm clocks. So basically, anything that you use in life there that can collect in exchange data in some capacity.
So the anti architecture, basically, this four stages, right? So we've got stage one, which is our sensors. So that's an actuator. So that's basically we're collecting all that information, right? So are smaller smartphones collecting information are, you know, camera system in the house. To keep things safe that's collecting information or thermostats collecting information, a refrigerator, et cetera, et cetera.
On that stage two, we move into the aggregation of all that data So it's all coming into one
particular spot,
or or, you know, a small amount of spots and is being aggregated
and then states tree. Let's see EJ i t. So that's where it's kind of running the analytics and pre processing it. To be able to publish it into the cloud on that stage four, of course, is a cloud. That's where we can actually manage the analytics from our, you know, say smartphone, etcetera, etcetera. We can manage things. We can archive data,
and that's basically what Stage four is.
So I ot architecture. Here's another slide on it. So this is more of the aspect of you got your smartphone. You got an app to look at something. So let's say, for example, you're using it. Have to monitor your temperature in your house. You want to turn the A C on or off, turn the heat on her off. So that way, when you come home, you're not freezing hurt or too hot. So
basically, those that information's coming from the device so it's coming to the temple is taking the temperature,
pressure, humidity, et cetera, and then is bringing it through that gateway
and then it's gonna put it up in the cloud, you know, through wireless communication, putting up in the cloud and then down to your mobile app on your phone. So then you can look and see. And you could say, You know what? I wanted a little a little cooler. When I get home, I'm gonna turn down the temperature
so I ot applications three primary thing out there. At least popularity wise nowadays is like smart home thing. So you know, your thermostat, your refrigerator, your lights, smart door locks, camera systems, etcetera, etcetera. And then the wearables is the next thing. So all your fitness related stuff. So you know, like you're you're smart Watches like apple watch
different activity trackers. So I mentioned a Fitbit,
even smart glasses on. And then the smart city, right? We're trying to get smarter on her parking where we could just, you know, scan our phone or simply gotten pay instead of having to carry around a bag of change. And then you just all the way through it, you know, so smart creates of the smart media ring stuff, even in the industrial stuff, remote asset control, so I could turn on this pump remotely
connected cars,
and that's probably the next biggest one along with connected health. That's actually one that's growing, at least where I live at right now. That's that's, Ah, growing market as well.
So several different protocols were in use, and actually a lot of them if you just think in the context of pretty much any type of wireless communication type of protocol that's gonna be involved in this well, so we've got infrastructure, you know, things like deputy 4 to 6 R P l six lo pan.
We've got identification. So you are a C E p C,
and you codes communications, transports of best things like a WiFi and Bluetooth that were used to discovery. So Indian s data protocols like Coop
Web socket and device management like ohm ADM
Semantic So Jason L. D. And Web thing model and that multilayer frameworks like we've home Kit and I Oh, tickety And regarding that little mean there if you have never watched, if you don't know where that's from, it's a movie called Office Space that came out a thinking was 1996 great classic new movie. If you work in, I t at all.
If you haven't watched that, you definitely need to go watch it and check it out.
So, Hyoty communication models. Basically, it's your common sense stuff, right? So you know our device to device. So our lights, which is communicating with our smartphone or something like that device to cloud. So basically that you know, lights which is sending it up into the cloud we're collecting in aggregating that data, the device and gateway Generally that's gonna be some type of, ah, go to
it's going to go between device. So, for example, if we had, like a you know, a device like our thermostat with the temperature sensor.
But we also have, like, a cover in monoxide or smoke detector than both of those could relay information into this gateway and then that gets sent up into the cloud to be for monitoring and so we can change information.
And then we have back in data sharing so that specially just trying to make sense of all the data.
So there's several challenges with the i. O. T. We've got security connective ity, compatibility of longevity, so different providers, air creating things out there. There's really not too many standards out there as of right now. So that's another challenge and getting everybody to get on board with certain things and then intelligence analysis and actions. And we just got to figure out What is that data mean?
So security. That's gonna be the security of devices, right? So wonder what things are hackable pretty much anything, right? I mean, everything's hackable, but the common things you might see out in the media or you've seen in different news stories, things like baby monitors, medical infusion pumps like effusion points were there for giving drug and infusions, pacemakers and defibrillators
very critical in different layers. Because those
if you could turn that off, it's not gonna fire when someone's, you know, an atrial fibrillation or something like that. Obviously, this is not a course in cardiology, but you can google that type of stuff.
Thermostats, etcetera. So basically anything that has ah, essentially a wireless signal we can we can hack it
conductivity, so basically the right. Right now everybody's pretty much on the client server architectural type of thing, but that's one of the challenges of io ti. You know it's not so bad with you know, tens of 1000 devices. But when we get up in the billions, you know, that's gonna take a lot of data a lot of band with, you know? So we've got to try to figure out
what we can do with that problem. You know? Are we gonna
decentralized things? Is that one solution? So how's that gonna work?
Compatibility and longevity. So again, that relates back to that lack of standard protocols right now. So, you know my smartphone today Is that gonna work with a smartphone, you know, 10 years from now? Or that we're the app that I like from, you know, 10 years from now. So we got to keep that in mind as well again, standards, you know, like, what do we do with some structure data?
And then you know what kind of technical skills are needed? And those do those get outdated
as to the technology changes,
intelligent and analysis and then also intelligent action. So, you know, basically,
are there flaws in the data modules that are causing us to get an accurate data analysis? You know, our legacy systems, you know, are you have the ability to manage this unstructured data or even the real time data. And then, of course, the slow adoption of newer technologies.
So in this video, we just went over some of the basic concepts of io ti and things related to let communication models and challenges.
And the next video, we're gonna talk a little more about different. I ot vulnerabilities, and we're gonna touch on the US top 10.
Up Next
Penetration Testing and Ethical Hacking

If the idea of hacking as a career excites you, you will benefit greatly from completing this training here on Cybrary. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Those interested in earning their Certified Ethical Hacker (CEH) will want to start by taking this course

Instructed By