| secureIoT
Hello!
I am Mel Savich
I am the Cybersecurity Lead.
You can find me at:
@melaleucaaa
Hello!
I am Erica Sietsema
I am the Director of Research and
Development.
You can find me at:
secureIoT@umich.edu
Hello!
I am Kiley Judge
I am the User Interface Designer.
You can find me at:
kajudge@umich.edu
Security is hard; it's nearly impossible to
know what devices are connected to
your home network.. and extremely
difficult to decide what to do if someone
is on your network.
Who is our customer?
Becca Davis
Becca is a 22 year-old Political Science
student at Indiana University.
In her free time, she games a lot online. But
recently she’s noticed that her internet
experience has been lagging.
After calling her ISP and doing some
Googling, she found out that there was more
internet activity on her network than
expected for a 3-person apartment.
This led Becca to believe that there were
people connected to her internet without her
or her roommate’s knowledge.
Becca lives in a small college apartment
with multiple other roommates. Her wifi
password is constantly being shared
and she currently has no way of
knowing what is connected to her
network.
Persona: Think/See/Feel/Do
secureIoT
Think
Becca thinks that her wifi is too slow and wants
to know why.
See
She sees that her roommate gives out the
apartment’s wifi password constantly.
Feel
She feels that there should be a way to control
who is on her network.
Do Becca is forced to game in other locations.
Use Case
As a student who shares wifi
with my roommates,
I want to monitor my network
so that my internet does not lag.
OUR PROCESS IS EASY
➜ we believe that users of our
application aren’t knowledgeable in
security, but would like to be
➜ we hope to learn whether users
would use secureIoT often in their
everyday lives
➜ this information would be valuable
to security usability research
Hypothesis
Thanks!
Any questions?
You can find us at:
secureIoT@umich.edu

More Related Content

PDF
secureIoT Presentation #2
PPTX
CST 20363 Session 6 Cyberspace
PPTX
Online Ethics and Etiquette
DOCX
Ethical Dilemma/Issues is Cyberworld
PPTX
Ethical Dilemmas/Issues in CyberWorld
PPT
Internet Ethics
PPTX
Digital citizenship presentation
PPTX
Internet security, ethics, & etiquette
secureIoT Presentation #2
CST 20363 Session 6 Cyberspace
Online Ethics and Etiquette
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemmas/Issues in CyberWorld
Internet Ethics
Digital citizenship presentation
Internet security, ethics, & etiquette

What's hot (20)

PPTX
Internet ethics
PPT
Computer Ethics
PDF
Responsible Digital Citizenship
PPTX
Internet / Cyber Security
PPTX
Computer Ethics
PPTX
Computer Lab Management and Ethics in Using Computer
PPT
Netiquette and safety
PDF
Cyber Ethics
PPTX
Legal Issues in Applied Technology
PPTX
Ethics in computing
PPTX
Safe and ethical use of technology in the classroom power point final
ODP
Erasmus+ group 2
PPTX
Computer ethics
PPT
Computer ethics
DOCX
Internet ethics and rules
PPTX
Computer ethics
PPTX
Internet Ethics
PDF
Social Media Marketing 04 08 10
PPTX
Digital citizenship.pptx
Internet ethics
Computer Ethics
Responsible Digital Citizenship
Internet / Cyber Security
Computer Ethics
Computer Lab Management and Ethics in Using Computer
Netiquette and safety
Cyber Ethics
Legal Issues in Applied Technology
Ethics in computing
Safe and ethical use of technology in the classroom power point final
Erasmus+ group 2
Computer ethics
Computer ethics
Internet ethics and rules
Computer ethics
Internet Ethics
Social Media Marketing 04 08 10
Digital citizenship.pptx
Ad

Viewers also liked (20)

PDF
AdPerks preso #2
PDF
Adperk free food_mvp1
PDF
AdPerks-Presentation1
PDF
Free food preso#2_round3
PDF
Eecs441 persona mvp1_ar_kickers
PDF
Eecs441 persona mvp_2
PDF
secureIoT Presentation #1
PDF
Perso#3
PDF
Eecs441 presentation1 ar_kickers
PDF
My stox persona presentation v2
PDF
OnTopic Presentation 3
PDF
Mvp1 preso
PDF
Stockr presentation 1
PDF
Persona preso v2
PPTX
Persona preso v3
PDF
Presentation 3 - MVP 1 ExpireX
PDF
Presentation 1 wednesday 9 27
PPTX
Yining Zhou - Company Preso - Xiaomi
PDF
Company Presentation: athenahealth
PDF
Nintendo company-pres-brihow
AdPerks preso #2
Adperk free food_mvp1
AdPerks-Presentation1
Free food preso#2_round3
Eecs441 persona mvp1_ar_kickers
Eecs441 persona mvp_2
secureIoT Presentation #1
Perso#3
Eecs441 presentation1 ar_kickers
My stox persona presentation v2
OnTopic Presentation 3
Mvp1 preso
Stockr presentation 1
Persona preso v2
Persona preso v3
Presentation 3 - MVP 1 ExpireX
Presentation 1 wednesday 9 27
Yining Zhou - Company Preso - Xiaomi
Company Presentation: athenahealth
Nintendo company-pres-brihow
Ad

Similar to secureIoT Presentation #2 redo (20)

PDF
This Time, It’s Personal: Why Security and the IoT Is Different
PDF
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
PDF
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
PDF
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
PPTX
A Quick Guide On What Is IoT Security_.pptx
PPTX
IoT Security Briefing FBI 07 23-2017 final
PDF
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
PPTX
Sec285 final presentation_joshua_brown
PDF
IoT Hardware Teardown, Security Testing & Control Design
PPTX
Top Security Solutions for Hyperconnectivity and IoT: A Comprehensive Guide
PPTX
Spirent: The Internet of Things: The Expanded Security Perimeter
PDF
IoT Security and Privacy Concerns: Safeguarding Your Connected Devices
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
PPTX
Assign 1_8812814ctm.pptx
PDF
Protecting your home and office in the era of IoT
DOCX
Security and Privacy considerations in Internet of Things
PDF
iotsecurity-171108154118.pdf
PDF
IRJET- Securing IP Surveillance Cameras using Adaptive Security Appliance...
DOCX
Addressing security and privacy in io t ecosystem v0.4
This Time, It’s Personal: Why Security and the IoT Is Different
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
A Quick Guide On What Is IoT Security_.pptx
IoT Security Briefing FBI 07 23-2017 final
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
Sec285 final presentation_joshua_brown
IoT Hardware Teardown, Security Testing & Control Design
Top Security Solutions for Hyperconnectivity and IoT: A Comprehensive Guide
Spirent: The Internet of Things: The Expanded Security Perimeter
IoT Security and Privacy Concerns: Safeguarding Your Connected Devices
IoT Security, Threats and Challenges By V.P.Prabhakaran
Assign 1_8812814ctm.pptx
Protecting your home and office in the era of IoT
Security and Privacy considerations in Internet of Things
iotsecurity-171108154118.pdf
IRJET- Securing IP Surveillance Cameras using Adaptive Security Appliance...
Addressing security and privacy in io t ecosystem v0.4

More from Mel Savich (6)

PDF
Duo Security
PDF
Phish Fryer Presentation #5
PDF
Sandia National Laboratories
PDF
Phish Fryer Presentation #4
PDF
Phish Fryer Presentation #3
PDF
Let's Get Political Presentation #1
Duo Security
Phish Fryer Presentation #5
Sandia National Laboratories
Phish Fryer Presentation #4
Phish Fryer Presentation #3
Let's Get Political Presentation #1

Recently uploaded (20)

PDF
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK
PDF
Java Basics-Introduction and program control
PDF
First part_B-Image Processing - 1 of 2).pdf
PPTX
Building constraction Conveyance of water.pptx
PDF
Unit1 - AIML Chapter 1 concept and ethics
PPTX
ai_satellite_crop_management_20250815030350.pptx
PDF
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
PPTX
Feature types and data preprocessing steps
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PPTX
Principal presentation for NAAC (1).pptx
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PDF
Abrasive, erosive and cavitation wear.pdf
PPTX
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PPTX
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
PDF
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PDF
Design Guidelines and solutions for Plastics parts
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK
Java Basics-Introduction and program control
First part_B-Image Processing - 1 of 2).pdf
Building constraction Conveyance of water.pptx
Unit1 - AIML Chapter 1 concept and ethics
ai_satellite_crop_management_20250815030350.pptx
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
Feature types and data preprocessing steps
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
Principal presentation for NAAC (1).pptx
distributed database system" (DDBS) is often used to refer to both the distri...
Abrasive, erosive and cavitation wear.pdf
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
Exploratory_Data_Analysis_Fundamentals.pdf
Design Guidelines and solutions for Plastics parts
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...

secureIoT Presentation #2 redo

  • 2. Hello! I am Mel Savich I am the Cybersecurity Lead. You can find me at: @melaleucaaa
  • 3. Hello! I am Erica Sietsema I am the Director of Research and Development. You can find me at: secureIoT@umich.edu
  • 4. Hello! I am Kiley Judge I am the User Interface Designer. You can find me at: kajudge@umich.edu
  • 5. Security is hard; it's nearly impossible to know what devices are connected to your home network.. and extremely difficult to decide what to do if someone is on your network.
  • 6. Who is our customer?
  • 7. Becca Davis Becca is a 22 year-old Political Science student at Indiana University. In her free time, she games a lot online. But recently she’s noticed that her internet experience has been lagging. After calling her ISP and doing some Googling, she found out that there was more internet activity on her network than expected for a 3-person apartment. This led Becca to believe that there were people connected to her internet without her or her roommate’s knowledge.
  • 8. Becca lives in a small college apartment with multiple other roommates. Her wifi password is constantly being shared and she currently has no way of knowing what is connected to her network.
  • 9. Persona: Think/See/Feel/Do secureIoT Think Becca thinks that her wifi is too slow and wants to know why. See She sees that her roommate gives out the apartment’s wifi password constantly. Feel She feels that there should be a way to control who is on her network. Do Becca is forced to game in other locations.
  • 10. Use Case As a student who shares wifi with my roommates, I want to monitor my network so that my internet does not lag.
  • 12. ➜ we believe that users of our application aren’t knowledgeable in security, but would like to be ➜ we hope to learn whether users would use secureIoT often in their everyday lives ➜ this information would be valuable to security usability research Hypothesis
  • 13. Thanks! Any questions? You can find us at: secureIoT@umich.edu