5 hours 49 minutes
Hello, everybody. And welcome to the I A T Security episode Number four Thing I t's Industry and business. My name is Alejandro Gonna and I'll be your instructor for today's session.
Learning Operatives is to understand and be able to identify some concepts on just cases for I A T business and industry.
Ah, well, enterprise I t cells moving forward with the deployment off I NT system that served, you know, various business purposes.
Some industries have mature their concepts of I A t more than the offers. For example, in energy are, you know, in the energy industry, they were allowed advance infrastructures, you know, with smart meters and wireless communication
to enhance the energy and monitoring capabilities off the utility itself.
Uh, you know, retail, on the other hand, is trying to, you know, figure it out. How to leverage the new sensors and they in data, you know, retail establishments
given But the various technology layers and physical components that comm prop, you know, comprised the ia ti eco system. It's good to consider on enterprise. I want implementation as a system to system.
Uh, why's that? Because, for example, company days in both for example, e Commerce and Health I ity will help them to sell more while also now in their claims, fitness programs and health overall.
For example, let's say that this is a single company things Cos. Chief information officer. My bills tasked with managing foots off, you know, cars and shipping vehicles drawing system that support inspection of critical infrastructure, for example, the data center,
you know, in certain and sensors embedded in the trucks to provide feet but gas consumption.
So all of this always are different systems that are connected to each other.
And you know this. This complexity into this challenge is to keep in there to secure on ensuring that no one instance after that he cannot be used as a pivoting point Joe talk to attack. Other systems in the business are in the enterprise,
Security architects will need to be clearly great colleague, you know, involved in every area of the planning process off, you know, so we can establish security requirements because if we try to patch at the end of the life cycle,
these are this is way too expensive and you know,
CEOs, mind not, you know, end up rolling out products that doesn't have any IOC products. Doesn't have any security on top of them.
Eso lets you know, just right here. Ah, little example of what we just talked about. For example, we could have here
Let's say this is a watch. You can say this is a watch
on. We have a lot of other watches over here.
All of them. We have fun over here,
which is, you know, communicating Thio Radio frequency.
Um, you know, all of them go to a get away. You can say this is a get quake.
and then we, on the other hand, we also have the fleet of vehicles.
I can say this is a vehicle. Well, because it is a vehicle.
Ah, and we have, you know, three of them and
they are all connected again. Also, that sitter's of cloud provider over here.
And they're all connected. Thio,
um, And down here we have some environmental monitoring
devices or sensors
there are connected with. Remember the section where we talk about particles? The Kuwait Protocol, which was better suited for devices that didn't consume, didn't have enough a performance, you know, didn't have a big
chip or a big ah, memory, for example. So Kuwait
can be really coming handy when we talk about this, um, sensors to communicate
Um, then we can also have some other energy monitoring here sensors
on. And this time we'll be using a different protocol, which is because we needed we need thio. Make sure that we're providing a quality of service so that I am
Q t t political. We come in handy in this case, and this is also connected to the same,
on at the end of all this. This is the cloud, of course. But over here,
let's say this is a server.
We have a server over here.
Uh, which is, you know, getting all of this information from all this points
and is being You know, I used, uh too. Maybe
at third party integration right here. Maybe there's another business.
There's another enterprise or dish another. You know,
someone here is also
waiting for bad information because that they can actually give you a now a more information about what you're doing. But you're not doing our maybe celled, you another thing
and the school also go to reporting me, but maybe data analytics, our business intelligence over here, uh, which you know,
I have all this monitoring and you can see the graphics here. Maybe a pie. A graphic charts?
I don't know.
all this. Um
good. Back go. It could, you know, go back to you. Over here
are I could back Thio the server over here or the server King made decisions here to adjust us sensors over here.
So, as you can see, the point here is that there's assistant system connections here. You know its privileges costs on one principle feature of piety is that anything can be connected to everything and everything to anything. You know, Governor says that ality, you know, generate massive amounts
off input data from sources that are globally distributed.
Uh, this means that transfer it dancer into date up, for example. This could be these right here could be in Central America,
which is where I'm located, by the way.
this could be in Europe.
This could be in UK. This could be in China.
This could be on a U. S.
So all these sources are coming from different locations. So, uh, you know,
using centralized applications to reduce costs on Greece Security is incompatible with the i t. Nowadays, when it's Jason's will have to would be forced to aggregate data in multiple distributed many data centers or use
instead of using a centralized approach. Use a decentralized approach. So,
uh, this is this is yet another that we need to feel out from from from, you know, normal security to Ryan. See security.
So you know the problem again. How can you How can we guarantee security, safety and privacy when data is moving from one point to another really fast? And we have several sources to protect
what those systems system means in there to world with? Well, uh, one system, which is measuring health, could be communicating with another system. There is measuring that's consumption,
that system to system communication. Can we continue using centralized systems? Us. I NT grows?
Uh, no. We cannot do continue to that. The cost implications off this will be huge. Not to mention is the safety and security implications.
What's the greatest concern with using centralized systems in I A T infrastructure? Well, how to protect the data coming from different data sources and how to protect it. You know, if one day comes from Central America and the other data is located in China.
On today's brief lecture, we discussed a few examples use cases and concerns off I 80 uses in business and industry.
Uh, you can look the gardener, which contains a really, really cool our article off this, uh, you know, I A t in industry and business
Looking forward in the next video, we'll cover their tea future. And what challenges can we expect?
Well, I hope you're you're the video and talk to you soon.
IoT Security Skill Assessment
Understanding IoT helps to shed light on all the different devices that we use that ...