IoT: Privacy and Security
Kevin G. Chege
ISOC
Chapters Workshop
Addis Ababa, 2019
Privacy, Security and IoT
• Privacy is about retaining the ability to disclose data consensually, and
with expectations about the context and scope of sharing.
• With online privacy, we wish to ensure that our personal data is not
disclosed to third parties without our knowledge or consent
• As with any online service, IoT Privacy and IoT Security are linked and
complement each other:
• Entering your password via a un-secured IoT device risks eaves-droppers from
stealing your identity
• If your mobile phone lacks a password and is stolen, your personal data like
call logs, messages, photos etc can be accessed
There are two ways to view IoT Security
•Outward Security
• Focus on potential harms that
compromised devices and systems
can inflict on the Internet and other
users
•Inward Security
• Focus on potential harms to the
health, safety, and privacy of
device users and their property
stemming from compromised IoT
devices and systems
3
Outward Security: Impact of Cyber Security issues
4
Inward Security: What risks do insecure IoT
devices bring to Privacy and Security?
• Using insecure IoT Devices increases the risks of personal data being
exposed/stolen and privacy compromised:
• A smart camera using default username and password combination
can be used to spy on you or be compromised to send junk information
to the Internet
• A wearable smart device that sends health information over un-
encrypted channels can expose personal data
• A smart home device like a television that lacks sufficient updates can
be vulnerable to new attacks and be used to share private data
• Smart vehicles running insecure software can be accessed remotely
and compromised to disable certain functions of the car
6
Economics favor weak IoT security
• Strong security can be expensive to design and implement, and it
lengthens the time it takes to get a product to market.
• The commercial value of user data also means that there is an incentive
to hoard as much data for as long as possible
• There is currently a shortage of credible ways for suppliers to signal their
level of security to consumers (e.g., certifications and trustmarks).
• The cost and impact of poor security tend to fall on the consumer and
other Internet users, rather than on the producers of IoT systems
How can IoT Security be improved?
• Collaborative approach: sharing of information by users, vendors,
manufacturers on security breaches and best practices
• Strong policy controls for example:
• Requiring encryption in devices: IoT devices should use encryption in order to
make it very difficult for a 3rd
party to eavesdrop on communications
• Frameworks on device features and capabilities
• User Education for example:
• Train users on preferring stronger passwords on IoT Devices
• Consumer Demand for devices to have certain eg using two factor
authentication: a password (something you know) and a token (something
you have).
• Train users to identify insecure devices and avoid them
8
How do we improve things?
• Research and Innovation
• Open Standards
• Certifications and Trustmarks
• Policy and Regulation
• Frameworks and Best Practices
Visit us at
www.internetsociety.org
Follow us
@internetsociety
Galerie Jean-Malbuisson 15,
CH-1204 Geneva,
Switzerland.
+41 22 807 1444
1775 Wiehle Avenue,
Suite 201, Reston, VA
20190-5108 USA.
+1 703 439 2120
Thank you.
chege@isoc.org

More Related Content

PPTX
Chapter-5.pptx
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PPTX
Assign 1_8812814ctm.pptx
PPTX
Ravi i ot-security
PDF
How To Evaluate the Strengths and Weaknesses of Security and Privacy in IoT D...
PDF
IoT Security.pdf
PPTX
IoT, Data Analytics and Big Data Security.pptx
PPTX
Not IN Cybersecurity Connectivity,Cloud Platforms,Security.pptx
Chapter-5.pptx
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Assign 1_8812814ctm.pptx
Ravi i ot-security
How To Evaluate the Strengths and Weaknesses of Security and Privacy in IoT D...
IoT Security.pdf
IoT, Data Analytics and Big Data Security.pptx
Not IN Cybersecurity Connectivity,Cloud Platforms,Security.pptx

Similar to Kevin-IoTSecurity_ISOC PPT on Internet of Things (20)

PDF
Presentation 10 (1).pdf
PPTX
Cybersecurity
PDF
Fundamentals of IoT Security
PDF
sample assignment
PDF
Presentation about IoT in media and communication.pdf
PDF
assignment help experts
PDF
IoT Security and Privacy Concerns: Safeguarding Your Connected Devices
PPTX
CYBER SECURITY.pptx
PPTX
Security Testing for IoT Systems
PPTX
Introduction Of Cyber Security in 2024.pptx
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
PPTX
1713435528251_1709734122381_1708585866621_1708585864158_2.Information Systems...
PDF
Strengthening IoT Security Against Cyber Threats.pdf
PDF
Navigating IoT Challenges_ Ensuring Security and Privacy in a Connected World
PPTX
A Wake-Up Call for IoT
PDF
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
PDF
Cyber Security Intelligence
PPTX
Cyber Security PPT.pptx
PDF
IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...
Presentation 10 (1).pdf
Cybersecurity
Fundamentals of IoT Security
sample assignment
Presentation about IoT in media and communication.pdf
assignment help experts
IoT Security and Privacy Concerns: Safeguarding Your Connected Devices
CYBER SECURITY.pptx
Security Testing for IoT Systems
Introduction Of Cyber Security in 2024.pptx
IoT Security, Threats and Challenges By V.P.Prabhakaran
1713435528251_1709734122381_1708585866621_1708585864158_2.Information Systems...
Strengthening IoT Security Against Cyber Threats.pdf
Navigating IoT Challenges_ Ensuring Security and Privacy in a Connected World
A Wake-Up Call for IoT
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Cyber Security Intelligence
Cyber Security PPT.pptx
IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...
Ad

Recently uploaded (20)

PPTX
Fundamentals of Mechanical Engineering.pptx
PPTX
CyberSecurity Mobile and Wireless Devices
PPTX
Information Storage and Retrieval Techniques Unit III
PDF
Abrasive, erosive and cavitation wear.pdf
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PDF
Visual Aids for Exploratory Data Analysis.pdf
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PDF
Design Guidelines and solutions for Plastics parts
PPTX
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PPTX
communication and presentation skills 01
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PDF
August -2025_Top10 Read_Articles_ijait.pdf
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
Fundamentals of Mechanical Engineering.pptx
CyberSecurity Mobile and Wireless Devices
Information Storage and Retrieval Techniques Unit III
Abrasive, erosive and cavitation wear.pdf
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
Visual Aids for Exploratory Data Analysis.pdf
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Design Guidelines and solutions for Plastics parts
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
III.4.1.2_The_Space_Environment.p pdffdf
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Fundamentals of safety and accident prevention -final (1).pptx
communication and presentation skills 01
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
August -2025_Top10 Read_Articles_ijait.pdf
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
Ad

Kevin-IoTSecurity_ISOC PPT on Internet of Things

  • 1. IoT: Privacy and Security Kevin G. Chege ISOC Chapters Workshop Addis Ababa, 2019
  • 2. Privacy, Security and IoT • Privacy is about retaining the ability to disclose data consensually, and with expectations about the context and scope of sharing. • With online privacy, we wish to ensure that our personal data is not disclosed to third parties without our knowledge or consent • As with any online service, IoT Privacy and IoT Security are linked and complement each other: • Entering your password via a un-secured IoT device risks eaves-droppers from stealing your identity • If your mobile phone lacks a password and is stolen, your personal data like call logs, messages, photos etc can be accessed
  • 3. There are two ways to view IoT Security •Outward Security • Focus on potential harms that compromised devices and systems can inflict on the Internet and other users •Inward Security • Focus on potential harms to the health, safety, and privacy of device users and their property stemming from compromised IoT devices and systems 3
  • 4. Outward Security: Impact of Cyber Security issues 4
  • 5. Inward Security: What risks do insecure IoT devices bring to Privacy and Security? • Using insecure IoT Devices increases the risks of personal data being exposed/stolen and privacy compromised: • A smart camera using default username and password combination can be used to spy on you or be compromised to send junk information to the Internet • A wearable smart device that sends health information over un- encrypted channels can expose personal data • A smart home device like a television that lacks sufficient updates can be vulnerable to new attacks and be used to share private data • Smart vehicles running insecure software can be accessed remotely and compromised to disable certain functions of the car
  • 6. 6 Economics favor weak IoT security • Strong security can be expensive to design and implement, and it lengthens the time it takes to get a product to market. • The commercial value of user data also means that there is an incentive to hoard as much data for as long as possible • There is currently a shortage of credible ways for suppliers to signal their level of security to consumers (e.g., certifications and trustmarks). • The cost and impact of poor security tend to fall on the consumer and other Internet users, rather than on the producers of IoT systems
  • 7. How can IoT Security be improved? • Collaborative approach: sharing of information by users, vendors, manufacturers on security breaches and best practices • Strong policy controls for example: • Requiring encryption in devices: IoT devices should use encryption in order to make it very difficult for a 3rd party to eavesdrop on communications • Frameworks on device features and capabilities • User Education for example: • Train users on preferring stronger passwords on IoT Devices • Consumer Demand for devices to have certain eg using two factor authentication: a password (something you know) and a token (something you have). • Train users to identify insecure devices and avoid them
  • 8. 8 How do we improve things? • Research and Innovation • Open Standards • Certifications and Trustmarks • Policy and Regulation • Frameworks and Best Practices
  • 9. Visit us at www.internetsociety.org Follow us @internetsociety Galerie Jean-Malbuisson 15, CH-1204 Geneva, Switzerland. +41 22 807 1444 1775 Wiehle Avenue, Suite 201, Reston, VA 20190-5108 USA. +1 703 439 2120 Thank you. chege@isoc.org

Editor's Notes

  • #3: Example of outward risk: A home appliance may continue to function well as far as the direct user is concerned, and s/he may be unaware that it is part of a botnet participating in a DDoS attack Toaster example: - Someone may use it against you, and remotely decide to burn your hands our even your house (inward security related issue) Your toaster works ok but is being used for a major DDOS attack (outward) At ISOC,  our focus is on the impact that IoT security and privacy has on the Internet and other users.
  • #8: (new technologies, better user interfaces, better development tools)