Time
5 hours 49 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Transcription

00:01
Hello, everybody. Welcome to the island Security episode number 12
00:05
I t. Security functional areas.
00:09
Uh, my name's on HMS Dragon Air and I'll be instructor for today's session.
00:15
Well, the learning archetypes for this module is to understand and be able to identify the four basic I achieve functional areas.
00:24
Well, first, we'll start with monitoring this. You know, this area basically is focusing remote sensing. I'm reporting the operation conditions, You know, you such performance and other external environmental factors. You know, in some things, in this concept, devices
00:44
such as, you know that you're smart watches that now it monitors your health
00:51
and some some security system. Like like security locks,
00:55
uh, alarms. You know, monitoring might be at device primary purpose, for example, some smart watches. Now they have
01:04
some sensors that Cayman surgery your heart.
01:08
Uh, and they can ever warn you about some
01:14
that that something's wrong. Wrong with your with your help
01:18
or even, even even call, you know, automatically thio, anomie, lands or abductor,
01:25
Uh, and also you they can save a historical data. Like when you go to the doctor, you can create, you know, ah, file. So you can share it. Share it with your doctor and they can see how's your health for the last 30 days and they can provide a bird a better diagnosis for you.
01:45
The second one's control, you know, enables enable cer tain device functions to be managed or customized remotely. For example, a vehicle can be started remotely or home. Thermostat can be adjusted from across the room. Uh, needless to say,
02:02
this has to include strong authentication because at the end, remember, we're dealing Nolly with security, but also with safety. We have seen many cases where cars are being hijacked
02:17
from, you know, and the normal normal and control operation is changed. Some cars you can actually drop driving from distance. Rendering your
02:35
the driver useless
02:38
for this example is at the end, that hacker is controlling the car on a distance even over that the cellular network or five G 40 networks. So yeah, control has a huge
02:53
ah
02:54
advantage when it comes to I a t, but you just have you just need to be sure that you're including the right controls, meaning ah thio hardening
03:06
security and safety.
03:08
Then we go to optimization, which is basically monitoring and controlling capabilities, you know, which enabled your device to tune performance and efficiency, Baines. Based on historical and real time operating data, uh, you know,
03:25
maintain ins. Problem diagnosis. This is useful when it comes Thio industry, for example. When you're monitoring your trucks when you're monitoring how much vessel ing they consume,
03:44
uh, how many miles per gallon
03:47
they're consuming? What's the bear out? What's the best route for for For for all your or your vehicles? You know, optimization.
03:58
That's the key of it.
03:59
And information devices can operate a talents Lee on about timber Meltem I environmental on operational factors with the minimal human interaction.
04:12
You know, basically, you're smart cars right now. You can drive them and you can put, you know, Chris control. And then
04:19
right now, for example, some cars they drive
04:23
all right themselves. You just can't lie down. I don't want to say in the brands, but you know, the one I'm talking about,
04:30
you can just lie down and your your your trip and the current will do everything for you.
04:35
Now remember, we have a discussion about this. I see security. It's not, you know, focus on Leon authentication strong cryptographic controls, um are strong, you know,
04:50
a security itself, its focus on safety safety, which can cost way more harm than on security. Because with security okay, that they still your data. This they, you know, make they take down your service is
05:08
and you know, that's that's not good. I know that. But, you know, losing human lives,
05:13
that's way worse. So when when we're talking about coyote security, you know, and safety have to be at the same level and you have to treat them, tripped him like that. You have to focus both and security and safety. And in these four basic functional areas
05:32
security, safety
05:34
are you cannot
05:36
Hey, stop looking at them.
05:39
Whenever you know you're thinking of monitoring, controlling optimization and information
05:45
all of them. You have to think in safety and security as well.
05:51
Okay. Provide an example from monitoring scenario on the security safety concern about it.
05:59
Uh, for example, when turning scenario, you're ah, Smartwatch can monitor your heart rate and you know it can It can actually, um, call an ambulance in case something's wrong. He can't so that if you're falling down
06:15
so this'll really good a batch is off I A t and the security safety concern you know they are Hackers can steal data.
06:24
Ah,
06:25
and you know what? Since we're talking about health, that might be a huge privacy concern. But what will happen if the hacker changes the way your your your your watch reports on your heart rate? You might end up going to the doctor and they make it
06:45
end up giving you the wrong medicine. And that's
06:47
wait worse, right?
06:50
Brighton Example of a control, a scenario and security safety concern. Well, as we said before control in this area,
07:00
you know, we're talking about device functions to be managed, a customized, remotely
07:04
be calls. For example, if something hijacks your vehicle, which, by the way, there has been examples off them on real life examples. Cars are being hijacked are being hacked
07:18
on, and they don't work like they were supposed to work anymore. Imagine, you're going and highway and then outside and your your car starts to accelerate
07:30
on and you end up crushing that. That's really, really scary
07:35
and how get up how camps and optimization helped a boy safety problems.
07:42
Well, since you're monitoring and controlling you know devices from a remote location, You know, both historical and real time. Uh, you know, you can just maintain its dates. For example, if you see something wrong with your device and you might call
08:01
someone say, Hey, you know what? You have to come to the factory because we need to.
08:05
I changed some part or, you know, just provide novel maintaining students buys, you know that can, um one You want us early than you know.
08:18
Not after that that the incident happened. So, yeah, that battered Smith optimization capability can help us to avoid any saythe insecurity as well. Problems
08:31
Well, in today's reflector would discuss the four basic coyote functional areas.
08:39
Uh, Security for Dummies by Laurence Miller. I know the timing's dummy work and it and said, You know, it ain't sound good, but believe me, this is a really good book. It includes so much more information. Uh, you'll be able to see, you know, I A t functional areas, but
08:58
you will be able to see another concepts that are covered
09:01
both in this course, and not so I have to recommend you to to read his book,
09:09
looking forward the next media will cover the e t uses today.
09:13
Well, that's it for today. I home your video and I talk to you soon.

Up Next

IoT Security

This IoT Security training is designed to help IT professionals strengthen their knowledge about the Internet of Things (IoT) and the security platforms related to it. You’ll also be able to identify the security, privacy and safety concerns related to the implementation of an IoT infrastructure.

Instructed By

Instructor Profile Image
Alejandro Guinea
CERT Regional Director
Instructor