security in a connected society
TRANSCRIPT
![Page 1: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/1.jpg)
Business Security in a Connected Society aka Internet of Things (IoT), Networked Society
![Page 2: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/2.jpg)
EducationAA – Tiffin UniversityBA – Ohio Northern UniversityMA – Bowling Green State UniversityMA – George Washington University
ExperiencePrincipal Founder, President & Chairman - CentraCommCEO - Aardvark Inc.
Lynn R. Child
![Page 3: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/3.jpg)
SecurityinaConnectedSociety
![Page 4: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/4.jpg)
Evolution of Society’s Use of Technology
![Page 5: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/5.jpg)
SmarterDevices=ConnectedSociety
![Page 6: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/6.jpg)
Technology is making our homes safer
![Page 7: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/7.jpg)
Technology is making work smarter
![Page 8: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/8.jpg)
Technology is changing society
![Page 9: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/9.jpg)
Technology is connecting the world
![Page 10: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/10.jpg)
Connectivity will overhaul businesses
![Page 11: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/11.jpg)
Data will power business decisions: The emerging world of Big Data Analytics is revolutionizing business decision-making
![Page 12: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/12.jpg)
Rank Country Devicesonline Relative size
1 SouthKorea 37.9
2 Denmark 32.7
3 Switzerland 29.0
4 UnitedStates 24.9
5 Netherlands 24.7
6 Germany 22.4
7 Sweden 21.9
8 Spain 19.9
9 France 17.6
10 Portugal 16.2
11 Belgium 15.6
12 UnitedKingdom 13.0
13 Canada 11.6
14 Italy 10.2
15 Brazil 9.2
16 Japan 8.2
17 Australia 7.9
18 Mexico 6.8
19 Poland 6.3
20 China 6.2
21 Colombia 6.1
22 Russia 4.9
23 Turkey 2.3
24 India 0.6
Connected Society:
*Organisation_for_Economic_Co-operation_and_Development
Over75BillionConnected
Devicesby2020!
List of countries by IoT devices online per 100 inhabitants as published by the OECD* in 2015.
![Page 13: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/13.jpg)
![Page 14: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/14.jpg)
HackersDisruptBusiness
![Page 15: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/15.jpg)
1963MIT coins the term “Hackers” related to people who were typing up the phone lines.
1983The movie War Games is released and depicts a young hacker nearly starting WWIII by accessing a military supercomputer.
![Page 16: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/16.jpg)
1995The web takes off and famous hacker Kevin Mitnick steals 20,000 credit card numbers leading to a fear of e-commerce. Later caught by the FBI by utilizing a “White Hacker”.
2006Julian Assange becomes the new face of hacking.
![Page 17: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/17.jpg)
2011CIA, PBS, Gmail, the U.S. Senate all are hacked. Anonymous rises up as a underground hacktivist community. Year was coined “The Year of the Hack.”
2014A record 1 billion records were compromised. Becomes the new “Year of the Breach.”
![Page 18: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/18.jpg)
RiskstoHome,Business,&Careers
![Page 19: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/19.jpg)
Security hacks could expose our homes
![Page 20: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/20.jpg)
Security hacks could disrupt our businesses
![Page 21: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/21.jpg)
Security hacks could end you & your students careers
![Page 22: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/22.jpg)
WhatCanBusinessDeans&FacultyDo?
![Page 23: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/23.jpg)
Be Aware of the Most Prevalent Tactics to “Hack” Information
Spearfishing:Ane-mailspoofingfraudattemptthattargetsaspecificorganization,seekingunauthorizedaccesstoconfidentialdata. …conductedbyperpetratorsoutforfinancialgain,tradesecretsormilitaryinformation.ExampleofSocialEngineering.
![Page 24: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/24.jpg)
Be Aware of Other Prevalent Forms of Hacks: MalwareMalicioussoftwarethatinterfereswithnormalcomputerfunctionsorsendspersonaldataabouttheusertounauthorizedpartiesovertheInternetorgainsaccesstoprivatecomputersystems.Includesviruses,worms,Trojanhorses,etc.Somecommonandprevalentmalwareincludes:
•SpyWare – secretlygathersinformationaboutapersonororganization.Cantakepartialorfullcontrolofcomputerwithoutknowledgeofuser.•AdWare – automaticallyrendersadvertisementsinordertogeneraterevenueforitsauthor.Pop-upsareanexample.•RamsonWare – restrictsaccesstoyourcomputersystemanddemandsaransombepaidtothecreatorofthemalwareinorderfortherestrictiontoberemoved.Formsinclude:encryptedfiles,locksystem/displaymessagetopay…
![Page 25: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/25.jpg)
.
![Page 26: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/26.jpg)
6 Online Security Tips for Your Students & You
üThinkBeforeYouClicküGotoAuthorizedMarketplaceforDownloadsüUpdate/PatchSoftwareUponyourDevicesüPracticePasswordManagementüCreateSeparateEmailAccountsüConsiderEnd-UserSecurityTrainingüIfItFeelsWrong,ItProbablyIs!
![Page 27: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/27.jpg)
A Challenge to Deans, Faculty, and StaffPrepare your Business Students for the Reality of a Connected Society: - Read and Research Continuously - Utilize Case Studies- Practice Simulations- Seek Out Industry Speakers- Attend Relevant Events and Webinars- Be Willing to Watch, Learn, & Listen from
Your Students!
![Page 28: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/28.jpg)
![Page 29: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/29.jpg)
• Student&FacultyPresentations• DefiningtheInternetofThings• TheCONfidence ofThings• IoT andBusiness• ManufacturingandConnectedDevices• Automotive,Security&Trust• ThePowerofDataAnalytics• StudentCompany&Internship
Interaction• InteractiveQ&AThroughouttheDay
2015IAForum Agenda
![Page 30: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/30.jpg)
RegisterTodaywww.IAForum.net
$35ChamberMembers|$45Non-ChamberMembers|$10Students
BreakfastandLunchProvidedWednesdayOctober28th 8:45am– 5:00pm
Winebrenner Auditorium,Winebrenner SeminaryTheUniversityofFindlayCampus
950NorthMainStreet,Findlay,OH45840
![Page 31: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/31.jpg)
Presentation References & Other Resourcesü ConnectedSociety/InternetofThings:
https://en.wikipedia.org/wiki/Internet_of_Thingsü TheHorizonReport-2015HigherEducation(EmergingTechnologies):
http://www.ictliteracy.info/rf.pdf/Horizon-report-2015.pdfü Over75BillionDevicesConnectedby2020:
http://www.businessinsider.com/75-billion-devices-will-be-connected-to-the-internet-by-2020-2013-10
ü World’sBiggestDataBreaches:http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks//
ü JeepCarGetsHacked:http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway
ü Spearfishing:http://searchsecurity.techtarget.com/definition/spear-phishingü MalWare:http://whatis.techtarget.com/glossary/Malware
![Page 32: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/32.jpg)
Presentation References & Other Resources
ü GrrCon SecuritySummit&HackerConference:http://grrcon.comü IAForum.net:http://IAForum.netü WhytheInternetofThingsisBigBusiness:
http://harvardmagazine.com/2015/07/why-the-internet-of-things-is-big-business
ü NISTCybersecurityFramework: http://www.nist.gov/cyberframework/ü OnlineTrustAlliance:https://otalliance.org/initiatives/internet-thingsü End-UserSecurityTraining: http://www.KnowBe4.comü SocietalImpactofaConnectedLifeOvertheNext5Years:
http://www.gsma.com/connectedliving/wp-content/uploads/2013/02/GSMA-Connected-Life-PwC_Feb-2013.pdf
ü TopITTrendsin2015:http://www.entrepreneur.com.ph/technology/top-it-trends-for-businesses-in-2015-and-how-to-prepare-for-those?ref=tag
![Page 33: Security In A Connected Society](https://reader031.vdocuments.us/reader031/viewer/2022030315/5883ef671a28ab34428b5e11/html5/thumbnails/33.jpg)
ThankyoufortheHonor&PrivilegeofSharingInformationRegarding
“BusinessSecurityinaConnectedSociety.”
LynnR.Child,President&Chairman,CentraCommwww.CentraComm.netDirect:419-421-1284|[email protected]
Findthispresentationat:http://www.slideshare.net/CentraComm/security-in-a-connected-society