internet of things - the dream and the nightmare

29
IoT: the dream and the nightmare… Kate Carruthers #eIoT2015

Upload: kate-carruthers

Post on 07-Jan-2017

1.563 views

Category:

Technology


0 download

TRANSCRIPT

IoT: the dream and the nightmare…

Kate Carruthers #eIoT2015

Slides are online:

http://www.slideshare.net/carruthk

Oct-2015 © 2015 Kate Carruthers 2

Oct-2015 © 2015 Kate Carruthers 3

IoT is part of the

digital

transformation of

business, the

economy, and

society

Oct-2015 © 2015 Kate Carruthers 4

Industrial revolution

Digital revolution

IoT revolution

Industrial internet. Rise of networked industry. Convergence of industrial, digital, analytics, & connectivity.

Distributed information and communication networks. Rise of networked economy powered by apps.

Harnessing machines to drive economies of scale. Shift away from agriculture based economies.

Oct-2015 © 2015 Kate Carruthers 7

Source: http://blog.csiro.au/a-much-smarter-watch-how-our-flexible-batteries-and-electrified-fabrics-can-improve-wearables/

Oct-2015 © 2015 Kate Carruthers 8

“The real role of wearables

that no one talks about is all

these smart things around

you have no idea what’s

happening with you…” - Hosain Rahman, CEO Jawbone

Source: 'Ingestibles' could become the new wearables faster than you think, Alicia Marie Tan, Mashable, Oct 2015, http://mashable.com/2015/10/14/jawbone-ingestibles/#RqDiEDnH3Sql

Oct-2015 © 2015 Kate Carruthers 9

“I always use the example of,

no matter how smart my

thermostat is, it has no idea if

I’m hot or cold.” - Hosain Rahman, CEO Jawbone

Source: 'Ingestibles' could become the new wearables faster than you think, Alicia Marie Tan, Mashable, Oct 2015, http://mashable.com/2015/10/14/jawbone-ingestibles/#RqDiEDnH3Sql

Oct-2015 © 2015 Kate Carruthers 10

Robyn Lewis founder and CEO

VisitVineyards.com

Thin film write-protected

NFC that enables post sale

communication between

seller & customer about the

product

Oct-2015 © 2015 Kate Carruthers 13 Source: Industrial Internet: Pushing the Boundaries of Minds and Machines, Evans, Peter and Annunziata, Marco, GE, 2012, p. 10

Oct-2015 © 2015 Kate Carruthers 14

Source: A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems, Jay Lee, Behrad Bagheri, Hung-An Kao, 2015, http://www.sciencedirect.com/science/article/pii/S221384631400025X

Cisco says US$14 trillion IoE value

• asset utilization (reduced costs) of $2.5 trillion

• employee productivity (greater labor efficiencies) of $2.5 trillion

• supply chain and logistics (eliminating waste) of $2.7 trillion

• customer experience (addition of more customers) of $3.7 trillion

• innovation (reducing time to market) of $3.0 trillion

Oct-2015 © 2015 Kate Carruthers 15

Source: CISCO White paper: Embracing the Internet of Everything for your Share of $14 trillion, 2013

Source: http://readwrite.com/2014/04/30/connected-home-hackers-stop-yelling-at-babies-foscam#feed=/tag/internet-of-things&awesm=~oEe6yipkTkz40o

Oct-2015 © 2015 Kate Carruthers 17

Last August, a hacker infiltrated a wireless camera owned by the Gilbert family, living in Houston, Texas. The stranger took control of the unit and used it to scream obscenities at a two-year-old toddler. Fortunately, the hearing-impaired child didn’t have her cochlear implant turned on at the time, otherwise she would have heard the stranger yelling, “Wake up Allyson, you little slut!”

Oct-2015 © 2015 Kate Carruthers 18

Oct-2015 © 2015 Kate Carruthers 19

Bloomberg, Data Breaches in the US, at 4 Sep 2014

Oct-2015 © 2015 Kate Carruthers 20

• 3rd party HVAC

firm attack

vector

• Security

software

disabled

• PCI DSS didn’t

save them

Oct-2015 © 2015 Kate Carruthers 21

Bloomberg, Oct 2014

JP Morgan

• Sarbanes-Oxley Act (SOX)

• Payment Card Industry Data Security Standard (PCI DSS)

• Gramm-Leach-Bliley Act (GLB) Act

• Electronic Fund Transfer Act, Regulation E (EFTA)

• Free and Secure Trade Program (FAST)

• Fair and Accurate Credit Transaction Act (FACTA), including Red Flags Rule

• Federal Rules of Civil Procedure (FRCP)

Oct-2015 © 2015 Kate Carruthers 22

Oct-2015 © 2015 Kate Carruthers 23

“How do consumers know

that the products and

services are protected”

David Kleidermacher, Blackberry CSO

Source: IoT security forcing business model changes, panel says, Oct 2015 http://www.scmagazine.com/iot-security-forcing-business-model-changes-panel-says/article/448668/

Oct-2015 © 2015 Kate Carruthers 24

Miller Newton, CEO of PKWare:

“there's not a lot of

authentication on the IoT.

It is easy to impersonate”

Source: IoT security forcing business model changes, panel says, Oct 2015 http://www.scmagazine.com/iot-security-forcing-business-model-changes-panel-says/article/448668/

Oct-2015 © 2015 Kate Carruthers 26

“Business models will have

to change. We used to build

them [products], ship them and

forget about them until we had

to service them,”

“We've moved to a new world

where we have to ship and

remember.” Source: John Ellis, Ellis & Associates, IoT security forcing business model changes, panel says, Oct 2015 http://www.scmagazine.com/iot-security-forcing-business-model-changes-panel-says/article/448668/

Oct-2015 © 2015 Kate Carruthers 27

“Targeted Intrusions By

Nation-State Actors Pose A

Major Cyber Threat Going

Into 2015”

Source: Targeted Intrusions By Nation-State Actors Pose A Major Cyber Threat Going Into 2015, Amanda Vicinanzo, 02/12/2015, Homeland Security Today, http://www.hstoday.us/single-article/targeted-intrusions-by-nation-state-actors-pose-a-major-cyber-threat-going-into-2015/1f96ee7a4b2867f1b1511387660bb4b8.html

Oct-2015 © 2015 Kate Carruthers 28

Security

Privacy

Geopolitics

Oct-2015 © 2015 Kate Carruthers 29

Thank you

Kate Carruthers UNSW Australia [email protected] @kcarruthers http://www.slideshare.net/carruthk