Time
5 hours 49 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Transcription

00:01
Hello, everybody, and welcome to the 50 Security episode number 15
00:05
I A T feature. My name is 700 now, and I'll be gym instructor for today's session.
00:12
Learning additives is to understand what challenges and trends king respect from I t
00:18
on the near future.
00:22
Well, today's I A T innovations continue to push. You know, new technologists. I identify NW, establishing new relationships between objects, systems and people. We can think of new capabilities to solve problems at a big scale.
00:39
For example, cognitive systems In day a tool
00:43
is showing a grove today, and we'll continue doing that upper to come in years.
00:48
But what about new brand new research is aiming to increase sales on data gathering
00:54
while we'll need to be securing the future well over a decade ago, just to give you an idea, Duke's university researchers demonstrated cognitive control off a robotic arm by translated neural neural control singles
01:12
from electrodes embedded in a monkey's brain,
01:15
basically the brain that the monkey could control robotic arm with his tux.
01:22
The research is, you know, compare.
01:26
You know you got the signals from from from the back from the brain and you know translated that to a murderer. Actuators inputs.
01:36
These inputs allow the monkey, you know. True, the initial training on majestic to control a robotic arm used on Lee Bischel fit back to adjust its Omar driving tots.
01:49
So this is called a brain computer. Interfaces are brain machine interfaces.
01:57
BC I or being my
02:00
on you know, it continues to advance. Nowadays, the technology promises are featuring which you know the Nero Science. Allow individuals to regain physical functions by wearing a controlling or controlling a robotic system merely by thought.
02:17
Research has also demonstrated that brain to brain functioning, allowing, you know, comet, this devoted province album networks.
02:29
This type of cognitive research implies a future in which some types off smart devices will be smart on Lee because there's a human control of them, You know across the network
02:43
are the human. You know the human brain is made of hyper war by providing
02:49
sensors feeds from sensors located 1000 kilometers away,
02:53
meaning that you could I know what's happening in Paris and be able to actually see it because there's a there's a there's a sensor in your brain that is receiving a signal from another sensor located at the other aside the world.
03:10
So now imagine what type of coyote security and safety controls
03:15
will be needed in such cognitive systems, where the things that you need to secure our human brains or physical systems, which implies a human, a part of the human body,
03:30
how
03:30
can you authenticate a human rate to advice or the other way around? How can you authenticate advice to a human brain? What integrity and confident shall any losses? Me? And in this scenario,
03:46
what will happen to your brain if that buzz you're trying to authenticate, too,
03:52
is a rock or is corrupt on the other one the other way around whether it will happen if a hacker tries to authenticate your brain, you know the safety and security implication off. These are huge. And we have to be prepared to that.
04:09
Uh, you know what will happen if I signal this is proved our corrupt, our money related in in any kind of what will happen to your brain to your heart? Are you familiar with the ransom word? Attacks? Well, what will happen if someone in credit
04:28
your brain and it's and it's claiming a ransom
04:30
uh, so you can actually continue using your brain? Uh, so yeah, this sons like a side? Fine. But it's actually there and it will come. We just need to be prepared.
04:45
What does B c I or being mine means in the i t world? What it means brain computer interfaces or brain machine interfaces
04:55
mentioned some concerns we should have as I a t continues to grow. Well, uh,
05:01
eventually the thing will become something that we actually are, for example, authentication between your brain and another sensor across the world. How can you authenticate that? How can you guarantee integrity and a bio availability
05:20
in such scenario?
05:24
Can you think of a security safety control we used today that will become obsolete in the future? Off I ity will several security controls, for example,
05:35
something monstering our servers or trying thio
05:43
be able to identify the health off server by actually Ping in that that server that is will be obsolete in tenor in terms off. What?
05:54
How can we use that to measure or brain, or why do we need to use that?
06:00
Uh, you know, it will not will not be able to use that and also access controls as we know it today. You cannot put your brain into a curb Rhys database. So yeah,
06:13
there's a lot of control that will become obsolete. A CZ We continue to grow in the I t. Will.
06:19
In today's brief lecture, we discussed a few examples use cases and concerns about the future.
06:29
Uh, this book again comes into play here. A practical Internet of Things Security by Brian Russell. I highly recommend you to Britain's book. I should contain several other topics,
06:43
and you will find very useful for your tea career
06:49
looking for work. In the next year, we will cover the main building abilities off I achieve.
06:55
Well, that's it for today. Votes. Thank you for watching Hope you're the video and talk to you soon.

Up Next

IoT Security

The IoT Security training course is designed to help IT professionals strengthen their knowledge about the Internet of Things (IoT) and the security platforms related to it. You’ll also be able to identify the security, privacy and safety concerns related to the implementation of an IoT infrastructure.

Instructed By

Instructor Profile Image
Alejandro Guinea
CERT Regional Director
Instructor