
Impact of Internet of Things (IoT) on Connectivity and Security Challenges
Explore the impact of Internet of Things (IoT) on connectivity and security challenges. Learn about IoT applications in health monitoring, smart homes, businesses, and the various security challenges that IoT devices pose. Understand the significance of IoT in today's connectivity vision.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
INTERNET OF THINGS (IOT) INTERNET OF THINGS (IOT) 27/05/2025
INTERNET OF THINGS (IOT) INTERNET OF THINGS (IOT) THE INTERNET OF THINGS (IOT): is a new topic in today s connectivity vision. This vision has many privacy, security, technical, social, and legal challenges. Internet first brought global connectivity. The Internet today provides a medium for all types of personal and business communications, whether they be: VoIP Real-time voice communications between people. IM chat Instant messenger for real-time chat messaging. Audio conferencing Real-time audio conference calling among multiple people. Video conferencing Real-time video conference calling among multiple people. Collaboration Real-time document sharing and editing with audio and video conference calling among multiple remote people.
INTERNET OF THINGS (IOT) INTERNET OF THINGS (IOT)
IoT Applications That Impact Our Lives IoT Applications That Impact Our Lives The IoT s Impact on Humans Health monitoring and updating :Sensors can monitor human vital statistics and securely send data analytics to a bedside application or mobile application. Home security and smart home control systems: homeowners can have near real-time access to home security systems, access to home surveillance video camera feeds, and full control over air-conditioning settings to maximize energy efficiency. Near real-time tracking and monitoring of family members via global positioning systems (GPS). Online banking, bill paying, and financial transactions
IoT Applications That Impact Our Lives IoT Applications That Impact Our Lives The IoT s Impact on Businesses Retail stores: Stores, banks, restaurants, and manufacturers must have a World Wide Web presence direct to their customers. Remote Businesses that require monitoring of things such as electric meters, water usage. sensors for utility/environmental/infrastructure monitoring: City and public service traffic-monitoring applications: Smart cities can monitor and report on real-time traffic conditions and redirect traffic flow during rush-hour conditions with near real-time updates to mobile applications accessible to smart cars.
Security () Security () The following summarizes the security challenges of IoT devices: IoT devices such as sensors or consumer items (Internet-connected TV) are deployed in large quantities. Depending on the criticality of the application, an outage could impact many endpoints if attacked. IoT devices that are not updated or maintained properly may permit vulnerabilities to become entry points into your network or organization. IoT devices typically do not provide the user or owner with any inside visibility or knowledge of how the device works and connects to the Internet. Vendors or service providers that have remote access to an IoT device may be able to pull information or data from your IoT device without your permission. IoT devices typically are not physically secure and can be located anywhere in public areas or outside your house. Security is lacking for Wi-Fi-connected IoT devices on public or open Wi-Fi networks.
Privacy Privacy The following privacy challenges must be addressed by manufacturers and defined in the right- of-use and end user software licensing agreement: Privacy policy statement: An actual legal definition of the user s privacy rights as documented in the manufacturer s privacy policy statement. This privacy policy statement must accompany any online form where privacy data is input by an individual. Definition of data, metadata, or analytical data use and rights: This is an actual definition that defines what data, metadata, or analytical data are and what they may be used for, and if permission is required by the user for use of those data. Ability for a user to provide consent to a manufacturer s or application service provider s privacy policy statement: Users must be able to read the statement online and accept or decline the privacy policy s terms and conditions.