title and content - niksun · 5 •with advances in miniaturization and nanotechnology, smaller and...

23
109 207 246 Dark 1 255 255 255 Light 1 131 56 155 Dark 2 0 99 190 Light 2 85 165 28 Accent 1 214 73 42 Accent 2 185 175 164 Accent 3 151 75 7 Accent 4 193 187 0 Accent 5 255 221 62 Accent 6 255 255 255 Hyperlink 236 137 29 Followed Hyperlink 127 175 221 Tata Blue 50% 203 215 238 Tata Blue 25% 179 149 197 Purple 50 % 212 195 223 Purple 25 % 255 242 171 Yellow 50 % 255 249 213 Yellow 25 % 229 205 186 Brown 50 % 248 241 235 Brown 25 % 180 213 154 Green 50 % 214 231 200 Green 25 % 241 240 202 Light Green 50% 251 251 241 Light Green 25% Title and Content

Upload: others

Post on 19-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

109207246

Dark 1

255255255

Light 1

13156155

Dark 2

099190

Light 2

8516528

Accent 1

2147342

Accent 2

185175164

Accent 3

151757

Accent 4

1931870

Accent 5

25522162

Accent 6

255255255

Hyperlink

23613729

Followed Hyperlink

127175221

Tata Blue 50%

203215238

Tata Blue 25%

179149197

Purple 50 %

212195223

Purple 25 %

255242171

Yellow 50 %

255249213

Yellow 25 %

229205186

Brown 50 %

248241235

Brown 25 %

180213154

Green 50 %

214231200

Green 25 %

241240202

Light Green 50%

251251241

Light Green 25%

Title and Content

2

Ever Smaller, Faster, Cheaper, Inter & Intra Connected

Devices and Things

Increasing Complexity of Resultant Ecosystems will

increase Security & Privacy concerns

Tremendous new business opportunities will emerge as a

consequence in this new frontier

3

Smart TransportationSmart Kitchen Smart Home

Automation

Smart OfficeSmart Dining

Smart Navigation

Smart

ShoppingSmart

SocializingSmart Infotainment

4

UCLA creates ARPANET, the beginning of Internet

1969

1982

e-Commerce appearance (ATM & telephone banking)

1990

Official public face of Internet

1994

e-Commerce online appearance

1995

Official launch of AMAZON.COM

Official launch of

YAHOO.COM

Official launch of EBAY.COM,

MSN.COM

1998

ICQ launching

Official launch of

GOOGLE.COM

2000

Dot-Com companies

collapse

WIKIPEDIA.ORGlaunching

2001

OVERTURE.COM official launching

2002 2005

LIVE.COM official launching

YouTube launching

2006

Twitter launching

2007 2008 2009 2010

Online TV Shows

iPhone & Mobile Web

Internet Election in US

ICANN policy changes

1st

Webmail

2004

Concept of Web 2.0 & Social Media; Facebook launched

PAYPAL.COM official launching

US passes the Cybersecurity Enhancement Act

1971

Email was born

1991

1st WWW page; 1st

Webcam

334 users on the network

255,000 users on the network

300 million users on the network

640 million users on the network

1.1 billion users on the network

1.7 billion users on the network

“social” or “experience” webcommunicate, connect, and share

information

Phase-I Phase-II Phase-III Phase-IV

Concept of IOT

5

• With advances in miniaturization and nanotechnology, smaller and smaller things will have the ability to interact and connect, at alower cost

• Eventually - particles as small as dust might be tagged and networked

• Lack of integration between virtual & real world – causes many business problems

• RFID and related technologies finally close this gap

Advances in Miniaturization RFID technology - pivotal enablers of IoT

Source: ITU “Ubiquitous Network Societies and their impact on the telecommunication industry

6

• The number of devices could range from a minimum of six billion to a maximum of 44 billion by 2020.• Household items will make up over 70% of all connected devices• By 2020, North America will have the most devices per person, with the highest estimates predicting

as many as 23.2 devices per person in the region.• The Middle East and Africa are expected to have the fewest devices, where estimates are as low as 0.2

per person

Forecast of Internet Usage

• The concept of Internet of Things can be regarded as an extension of the existing interaction betweenhumans and applications through the new dimension of “Things” communication and integration.

• The vision of Future Internet based on standard communication protocols considers the merging ofcomputer networks, Internet of Media (IoM), Internet of Services (IoS), and Internet of Things (IoT)into a common global IT platform of seamless networks and networked “things”.

Future Internet

IoT IoM IoS IoE

IoT – Internet of Things IoM – Internet of Media

IoS – Internet of Services IoE – Internet of

EnterprisesSource: CASAGRAS

Society

8

The Changing Web – From 1.0 to 3.0 The Internet of Things Was “Born” Between 2008 and 2009

The evolution from Internet of People to Internet of Things IoT Can Be Viewed as a Network of Networks

Source: Gary Hayes, 2006

9

• A new dimension in the world of information and communication technologies (ICTs): from anytime, any place connectivity foranyone, we will now have connectivity for anything, ideally using Any path/network and Any service.

• Dynamic network of billions or trillions of wireless identifiable “things” communicating with one another and integrating thedevelopments from concepts like Pervasive Computing, Ubiquitous Computing and Ambient Intelligence

• Fusion of the digital world and the physical world through - pervasive networks, miniaturization of devices, mobile communication,and new models for business processes

IoT – Adding a New Dimension

Source: CASAGRAS

ANYTIME

ANYWHERE

ANYBODY

10

Audio web surfing

The end of .com domination

Input revisited

Mobile networking

Web surf on any device

Text-to-Speech reads; Rather than reading and clicking, theaudience can tell the browser where they want to go withspoken commands

Integrating the Internet into every possible device

Multi-touch computing; Touch screen technology; SimpleGesture implementation

For years, Internet has been about serving the singular user.Multiple-user experiences seem like the next logical step

In the very near future new extensions will be popping moreoften; Domain Service giants will start selling "ExtensionSubscriptions"

- 11 -

Challenges

of IoT

Security & PrivacyTechnological

Standardization

Managing & fostering rapid

innovation

• Technological standardization in most areas - nanotechnology and robotics, is still in its infancy, or remainsfragmented

• Managing and fostering rapid innovation is a challenge for governments and industry alike

• The most important challenges are the protection of data and privacy

• Concerns over privacy and data protection are widespread, particularly as sensors and smart tags can track users’movements, habits and ongoing preferences

• Protecting privacy must not be limited to technical solutions, but encompass regulatory, market-based and socio-ethical considerations

Security & Privacy Needs Facets of Privacy Protection in IoT

Resilience to attacks

Data authentication

Access control

Data Integrity

Encryption, Signatures by tags/objects

Client privacy

Internet of Things – New security and privacy challenges – by Rolf H. Weber

• Categorization and analysis is a first step towards understanding the Internet of Things

• The categorization of IoT helps to detail on the security and privacy sensitivity in the respectivefields

• Have to identify how sensitive are they to security & privacy properties

• Enables to develop an integrated security & privacy approach for the Internet of Things

Categorization & Technologies that Make Up IoT Sensitivity to Security & Privacy

Security and Privacy Challenges in the Internet of Things by Christoph P. Mayer -KiVS Workshop on Global Sensor Networks

14

Source: The Internet Society survey,2011

The following chart shows the % contribution of threats coming from major sources as analyzed by the Internet Society

15Towards a Future Internet – Delphi Report

SaaS Will Move from a Complement to a Competitor of Other Security Platforms

Identity Will Be Core to Cloud Security

Security Will Become Predictive

Virtualization Security Will Seep Out of the Datacenter and into Other Facets of the Enterprise

Data and Application Security Will Become Embedded Everywhere

Crime Corporations, Rogue Government Agencies Will Buy Security, System & N/W Mgmnt Products

Consumers & Enterprises Will Continue to Grow Spending on Endpoint Security at Surprising Rates

Vulnerabilities will become more common

Attackers will take the path of least resistance - Humans

Attackers will try to defraud people and organizations through Social Media

Managed Services Will Get Cloudy

Mobile Security Will Move Beyond Security

SMBs Will See More Targeted Attacks Against Data and Resources

Will See Improved Social Engineering Attacks

Source: IDC Top 10 Predictions Worldwide Security Products and Services

17

Possible Business Models around Internet of Things( Gartner)

Forecast on Business around Security and Privacy

18

Many consumer packaged goods, such assoda cans and boxed goods, already have2D barcodes that lead to promotionalcontent

Smart Advertising

Food product companies, such as Hormel, use 2D barcodes to present recipes

Information Collation

Amazon's mobile apps can recognize physical media items, like DVDs, using

image recognition. The item can then be purchased from Amazon.

Image Processing & Recognition

•Sell TVs on a pay-as-you-go basis.•Pay per hour of runtime of lawn tractor

Variety of Pay-per options

•Connected car systems could delivermessages to renew car registrations•Dynamic advertising, recipes or gamescould be added to cereal boxes with e-paper

Content Delivery

Consumers could get a free coffee machine based on minimum consumption of

branded "coffee cartridges" (for example, Illy coffee)

Consumption based biz models

Consumer electronics can be remotely "tuned" to room conditions.

Remote maintenance, monitoring and optimization

Gartner: CIO Advisory: Which 'Internet of Things' Business Models Are Right for Your Customers?

A consumer could get discounts on groceries for buying/ordering them from

an advertised supermarket in a connected refrigerator which is ad supported

Connected Appliances, Ad-supported biz models

Medicine bottles can monitor the rate of consumption of medicines and

automatically prompt/remind your doctor or pharmacy to contact you to schedule the next delivery (and propose an order

amount).

Replenishment model

19IDC Worldwide and U.S. Security Services 2011–2015 Forecast

IDC Worldwide Network Security 2010–2014 Forecast IDC Worldwide Network Security 2010–2014 Forecast

0

500

1,000

1,500

2,000

2,500

3,000

3,500

4,000

4,500

5,000

2008 2009 2010 2011 2012 2013

Other

Security and vulnerabilitymanagement

Identity and accessmanagement

Network security

Endpoint security

Web security

Messaging security

Worldwide Security SaaS Forecast by Market, 2008-

2013 ($M)

IDC Security Services Market Analysis Perspective for 2010

20

• According to Forrester Survey, security spending is centered on network security and data security - newcybersecurity threats (Stuxnet, Aurora, etc.); changing IT architectures (virtualization in the data center, openenterprise initiatives, consumerization, and employee mobility); regulations, etc.

• Significant trends in security spending strategies - Rising adoption of managed security services (MSS) andsoftware-as-a-service- (SaaS) based security solutions

• Fueled by the increasing focus of browser-based attacks and greater user mobility, SaaS-based web security isprimed to enter the mainstream.

• Vulnerability scanning, DDoS protection, identity management services, log management, and endpoint securityare all growing

Forrester Forrester

21

Vast Business Opportunities with increased proliferation of

interconnected devices and things

New business models and services that exploit this inter

and intra connectedness will emerge & begin to dominate

Resultant complexity will necessitate new methodologies

for maintaining and increasing security in these worlds

Success will go to those who are able to plan, participate

in and foster the growth of these new ecosystems

22