Time
5 hours 49 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Transcription

00:01
Hello, everybody. Welcome to the Coyote Security Episode number six.
00:05
Um, well, we discussed and I t one of one of the basics.
00:10
My name is on the 100. You now and I'll be your instructor for today's session.
00:15
The learning opportunities for decision is to understand basic concepts off the Internet of things.
00:23
Well, the devices ultimo known as things in this context, um,
00:30
are not new concepts at all.
00:32
It is the result of the technological evolution we have been seen
00:37
in the past few decades. It's not just about connecting things anymore. It also conference analyzing this data produced by these things. Analysis of the data leads to new inside Tom and also helps ability, pardons, breaking situations for scraping, prescribing solutions
00:56
and, you know,
00:58
instructing are denied things to take decisions to utmost themselves. So what are what about privacy, you say? Well,
01:07
that should be one of the main priorities of the creators of the devices. In the improves, a sessions will be discussed,
01:15
the difference or you know how to close the gap between security and safety.
01:23
And you know how safety adds a lot of more complicated things to the I to security problem burst of the cyber security program. Um, you know, privacy being one of them.
01:34
Because when you have your computer, you may have pictures. Beginning, have you know,
01:40
you know, information that you may consider sensitive.
01:44
But what about you know, something that is young being trapped for your help?
01:49
Something that is struck in your heartbeat, For example, something for struck in your now your health percent. That's more sensitive information for me,
02:01
you know. So, uh, if you're concerned about privacy, should your sister use the device? Well, it depends on the number of connected things it's projected to grow.
02:14
I am not a annual compound rate of 23% between substance for thing. And today TW 20
02:23
steps in flame
02:24
written almost 50 billion devices connected in the Internet by the enough trying. It's waiting.
02:30
So more than 80%
02:34
will be spending in business to business application on the gaiety devices. So basically, you will be able to, you know, do some of your daily stuff
02:45
from your beauty device. For example, paying your bills going to a doctor are you know, the doctor. You can send information about your health from your smile which, or any other variety device you may use on yourself. You know, order, uh,
03:01
your country, for example, our order milk from your refrigerator. You know, other than 10 stuff he will get to us. That's that's for sure. We cannot resist to use science to devices. That's the point.
03:15
So is, instead of resistant. To use the device, we shall instead understand how to create a safe a security bus for people to use,
03:24
Uh, before we go. But before we get all techy and you know it starts cussing technologies and stuff,
03:31
let's start with the basics off I ity. Aah! Think in the context of the Internet defense, it's an entry on entity and story or a physical object that has a unique event. Fun on embedded system on the ability to transfer data over another word
03:49
comprehend, You know,
03:51
a comprehensive
03:53
I didn't see existent consists of many different parts, such as electron, its circuit
03:59
ah, sensing an acting capability, embedded systems at computing that were particles, communication networks, Clark computed big data management and analytics and business roots. We basically have four main concepts on a T.
04:17
The devices that contain sensors, actuators, machines
04:21
that means the business model. The year you'll use, you know, maybe again. Business, business, customer business, customer customer. The business use that you will use and how you will monetize that business model and the connectivity. And, you know, the night before, the particles will discuss particles more in death
04:42
in the next section
04:43
on security percent. Of course, the safety swill and the platform, you know, storage, analytic specialization, integration, those air before main
04:55
concepts off variety infrastructure.
05:01
Should we stop using devices also know as things under its privacy concerns? No, the answer is no. For me, for example.
05:10
Uh, at some point it will get to us, that's for sure. I mean, at some point will be pain
05:16
all our daily stuff when within I ity devise. For example, whenever you go to your dear doctor that they will request a pdf created by your iron device Or do you monitor advice because you they went to check your temperature, your heartbeats.
05:35
Um, you know, all that's all the help you can measure with a smartwatch for Tampa.
05:42
So no, you cannot resist to do that and said, we we better understand how to great safe and secure for our it's on devices for customers.
05:53
What is the thing in the context off I A. T? Well, that's advice. Something that you can actually touch
06:00
are not the things that that the thing in this context is, um,
06:06
on entry or physical object that has indicated far, you know, I'm a better system and the ability to transfer data over the network basically watch, for example,
06:16
mentioned two different parts off a 90 eco system.
06:20
Well, uh, the device in the business model, for example, those are all things that you can mention
06:29
in today's brief lecture. We discussed the basic concept off IA Thia reviewed some concerns of privacy when Houston 80 devices and we discussed the main concepts off 90 eco system.
06:43
You can use the 81 1 this is a page, actually. A primer of Internet of things
06:51
and the agenda another page by pitch targets.
06:58
Looking forward in an Expedia we will cover. I have this communication proud of holes.
07:03
Well, I hope you enjoyed this video and talk to you soon

Up Next

IoT Security

This IoT Security training is designed to help IT professionals strengthen their knowledge about the Internet of Things (IoT) and the security platforms related to it. You’ll also be able to identify the security, privacy and safety concerns related to the implementation of an IoT infrastructure.

Instructed By

Instructor Profile Image
Alejandro Guinea
CERT Regional Director
Instructor