Time
5 hours 49 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Transcription

00:01
Welcome, everybody. Uh, this is the I t security episode number 13 I t uses today on NFL Handra gonna and I'll begin instructor for day session.
00:14
The learning objectivity of this session is to understand and be able to identify Some comes at induced cases of the A t. Nowadays.
00:26
I did. The applications are boundless and limitless. Networks are being extended to be calls temperature sensors, lightbulbs, washing machine speeds, makers, refrigerator. You know, overall information services are on the networks to allow allow
00:46
this control of the sources
00:48
are also growing. Um, we can stand, you know,
00:52
There he is talking about this already deployed architect er off I a t that we have today.
01:00
But you know, the following on. Just a few examples off. How were, you know, leveraging the tea today?
01:07
Uh, we'll start with energy and smart rich, uh, you know, the
01:14
we used to have, you know, back in the days off utility company and sending workers to actually measure
01:23
How much energy did you consume or how much three gas meter changed in the mouth is no passengers by some harms today. Um, Al humps off tomorrow, I believe,
01:38
will be connected homes with no was Mark appliances, and it's Margaret's
01:44
to communicate Electra electrical demand and load information with the utility companies. Command Command. This, combined with the abilities ability
01:55
to ridge down into the homes blinds is such as, you know,
02:00
demand response technology or clients or technology aims to make our energy energy generation on distribution systems much more efficient, resealing on more supportive for environmental concerns.
02:17
Uh, then we can move on Thio be a cultural transportation's. This is not quite new, but, you know,
02:24
consider, uh,
02:27
ah connected card that is constantly using on onboard sensors that can you no measure in real time and make calculations to identify potential safety issues. That is right for you are the machine itself. You know, sensors inside the car will be able to see.
02:46
You know,
02:47
in addition, we are, you know, facing the vehicle to vehicle connection communication.
02:55
Uh, these willow Paris to, you know, exchange messages and signals to two through the vehicle. Um, and you know, it will like saying data to alert
03:12
the other week letters that there's off, you know, back. Sure, there's something
03:16
dangerous in the road ahead. So the beagle cool anticipate to anything your situation. Maybe there's another vehicle, uh, right after a curve. And if it wasn't for the alert,
03:31
maybe the vehicle crush. You know this.
03:37
This is where I nt comes into play
03:39
on when you moved moved to manufacturing. You know, the manufacturing wall has proven that substantial amount of the industrial industrial I t use cases
03:52
robotic systems, assembly lines, manufacturing plant science operation off. The systems are driven by sensors and machines which are connected over no Internet are even the Internet itself.
04:08
You know, distributed automation and control requires
04:13
these devices to communicate with management and Mauritania monitoring applications. Improving efficiency of the system has been, you know, principal driver goal off manufacturer off rioting in the manufacturer industry
04:30
on. Then we have warbles, which is basically, you know, uh, tomorrow watchers and everything you can actually work even clothes and other days, Um,
04:42
you know, in their tea there to world oracles including, you know, again,
04:47
smartwatches or any type of you know,
04:53
we really can use to measure ah, function in your body, for example.
05:00
And they work in sensors that might detect acceleration, for example, to Evolet on athlete's statistics. are overall shape,
05:10
uh, heart rate temperature, JIA localization and many others.
05:15
New advancements will perform levels into more sophisticated structures and enhancement to come live in items, you know, maybe in the future, which will be talking about in a minute. Um, you will be able to just something your body,
05:35
uh, with deny a T. For example, Maybe you're
05:39
you have a new injury in your in your knee or in your any other muscle. So on I t that is implanting to yourself might be able to just that on the fly. And you don't have any any any need to go to a doctor after the injury has passed.
05:57
And after off first and finally the medical devices,
06:00
uh, you know,
06:02
anything that can be controlled with radio frightened frequency or micro electrical mechanism systems? The peacemakers medical devices, I believe, are taking a great advantage off piety. But the problem is that
06:18
you have to cover that not only the security part of I o t, but also the safety part. And you know, because if you don't cover to safe the part that someone can,
06:32
Huh?
06:33
I actually heard you like, for example,
06:38
breach or exploit or hack your peacemaker that implies are really, really high risk for us, a human being. So I believe we can grab up all this and say that these five main industries are taking the most bandage off. GM are leveraging, Um,
06:58
all the things that could be done with i A t.
07:01
Then work it and, you know, stand alone 90 to improve business, to improve measures to improve your held itself. So anything that can be can be improved. I believe this this, um,
07:16
industries are taking the most battles off them.
07:21
What those beach he means in the beauty world. Will Indians vehicle to vehicle and it's being created to alert other vehicles far behind that there's, ah danger in the road ahead of the road.
07:39
Uh, this is Margaret and where the advantages of using it all it's Margaret is something that will somehow some houses are already using it, you know? Uh, home appliances. 3%. Just one every off. Never complaining. Or Margaret.
07:57
Maybe stuff can actually tell the refrigerator
08:01
that something's wrong or something, or something is needed at the revision. Refrigerator can. Sure. Some some information. You're fun to tell you to remember you that you need to buy milk or something like that. You know the distribution, monitoring and conference systems off this energy system, which is called again Smart grade
08:20
involved coyote in many capacities. For example, some homes come with the newly installed
08:26
smart a meter to allow two way communication between your home's electrical half and the utility provider.
08:37
What's the greatest concern off I A. T uses today? Well, safety and, um,
08:43
security results a concern, but we die. It is specifically safety and privacy under two main concerns.
08:52
In today's brief lecture, we discussed a few sample of how we're leveraging. I am thine nowadays and weather advantages Can we take
09:01
away? And what challenges do we have in the i t nowadays?
09:07
Uh, well, this book I recommended you read it. I security for Thomas thinks a great book, and it contains a lot of information.
09:18
Looking forward in next video, we will cover the IA ti uses in industry and business specifically
09:24
Well, I come to jury things video and talk to you soon

Up Next

IoT Security

This IoT Security training is designed to help IT professionals strengthen their knowledge about the Internet of Things (IoT) and the security platforms related to it. You’ll also be able to identify the security, privacy and safety concerns related to the implementation of an IoT infrastructure.

Instructed By

Instructor Profile Image
Alejandro Guinea
CERT Regional Director
Instructor