Security Solutions for
Hyperconnectivity in
the Internet of Things
Maurice Dawson Jr., Ph.D., D.CS., SMIEEE, CSSLP, CGEIT, CCISO
Director of IIT Center for Cyber Security and Forensics Education
Assistant Professor of Information Technology and Management
Fulbright Scholar 2017-2018, 2014, Senior IEEE Member
Illinois Institute of Technology | School of Applied Technology
Discussion
The Internet of Things describes a world in which smart technologies enable objects with a network to
communicate with each other and interface with humans effortlessly. This connected world of
convenience and technology does not come without its drawbacks, as interconnectivity implies
hackability. This talk will discuss technical, human, societal, and policy issues concerning
hyperconnectivity and IoT. Additionally, this talk will offer insights from cutting-edge research about the
strategies and techniques that can be implemented to protect against cyber-attacks.
Understanding the Challenge and
Symptoms
Internet of
Things
The internet of things, or IoT, is a system of
interrelated computing devices, mechanical
and digital machines, objects, animals or
people that are provided with unique
identifiers (UIDs) and the ability to transfer
data over a network without requiring human-
to-human or human-to-computer interaction.
Security Solutions for Hyperconnectivity in the Internet of Things
Bluetooth
Enabled
Common
Devices on
Home Network
Embracing
BYOD Culture
Lack of standardization for device policy
once brought into organization’s network.
Internet of
Everything
Researchers at Cisco Systems estimate that
over 99 percent of physical devices
are still unconnected and that there is a
market of $14.4 trillion. This white paper
urges business leaders to transform their
organizations based on key learnings to
be competitive for the future. (Evans, 2012).
Process
There is no standard process for
assessing IoT devices.
Applications
Beyond
Vulnerable
Garnter group reported over 70%
of vulnerabilities found at the
application layer.
Security Solutions for Hyperconnectivity in the Internet of Things
Over 13,000
Openings
Cybersecurity talent gaps exist across
the country. Closing these gaps requires
detailed knowledge of the cybersecurity
workforce in your region.
NSA/DHS
NATIONAL CAE
IN CYBER
DEFENSE
DESIGNATED
INSTITUTIONS
Research
Available
Issues with translating academic to
practitioner.
Questions?
Security Solutions for Hyperconnectivity in the Internet of Things

More Related Content

PPTX
Trishant kweera (iot)
PDF
IoT
PPTX
Internet of things: A beginners' guide
PPTX
Internet of Things
PPTX
Different applications and security concerns in Iot by Jatin Akad
PDF
Top cited Network Security Articles- Part 1
PDF
Understanding Architecture of Internet of Things
PPTX
Internet of things
Trishant kweera (iot)
IoT
Internet of things: A beginners' guide
Internet of Things
Different applications and security concerns in Iot by Jatin Akad
Top cited Network Security Articles- Part 1
Understanding Architecture of Internet of Things
Internet of things

What's hot (18)

PPTX
Internet Of Things
PPT
Alloy Cybersecurity
PPTX
IOT and Characteristics of IOT
PDF
October 2020 - Top Read Articles in Network Security & Its Applications
PPTX
Internet of Things
PDF
Most Downloaded article for an year in academia - International Journal of Ne...
PDF
March 2021: Top 10 Read Articles in Network Security and Its Applications
PDF
January 2021 - Top 10 Read Articles in Network Security & Its Applications
PPT
Engin cloud com2010-v2
PPTX
PhD Admission Pitching
PPTX
Internet of Things
PDF
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
PDF
Overview of Ethical Issues in Digital Watermarking
PPTX
Technology
PDF
TAROT2013 Testing School - Antonia Bertolino presentation
PPTX
Ubiquitous computing presentation 2
PPTX
Ambient intelligence
PDF
The Internet of Things
Internet Of Things
Alloy Cybersecurity
IOT and Characteristics of IOT
October 2020 - Top Read Articles in Network Security & Its Applications
Internet of Things
Most Downloaded article for an year in academia - International Journal of Ne...
March 2021: Top 10 Read Articles in Network Security and Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
Engin cloud com2010-v2
PhD Admission Pitching
Internet of Things
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
Overview of Ethical Issues in Digital Watermarking
Technology
TAROT2013 Testing School - Antonia Bertolino presentation
Ubiquitous computing presentation 2
Ambient intelligence
The Internet of Things
Ad

Similar to Security Solutions for Hyperconnectivity in the Internet of Things (20)

PPTX
Unit & Ubiquitous IoT for securing cyberentities
PPTX
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
DOCX
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
PDF
Applications of artificial intelligence techniques to combating cyber crimes ...
PDF
76 s201918
PDF
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
PDF
Atos wp-cyberrisks
PDF
The Internet of Things. . While IoT has the potential to enhance our lives by...
PDF
May 2021: Top 10 Read Articles in Network Security and Its Applications
PDF
June 2021 - Top 10 Read Articles in Network Security and Its Applications
PDF
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
PDF
The Intersection of Artificial Intelligence and Cybersecurity: Safeguarding D...
PDF
September 2021: Top 10 Read Articles in Network Security and Its Applications
PPTX
cyber security challenges in a hyperconnected world .pptx
PDF
Exploring Secure Computing for the Internet of Things, Internet of Everything...
PDF
Securing the internet of things frontier: a deep learning ensemble for cyber-...
PPSX
The Internet of Things (IoT)
PDF
Most cited articles in academia - International journal of network security &...
PPTX
iot ppt.pptx
PDF
Malware threat analysis techniques and approaches for IoT applications: a review
Unit & Ubiquitous IoT for securing cyberentities
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
Applications of artificial intelligence techniques to combating cyber crimes ...
76 s201918
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Atos wp-cyberrisks
The Internet of Things. . While IoT has the potential to enhance our lives by...
May 2021: Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
The Intersection of Artificial Intelligence and Cybersecurity: Safeguarding D...
September 2021: Top 10 Read Articles in Network Security and Its Applications
cyber security challenges in a hyperconnected world .pptx
Exploring Secure Computing for the Internet of Things, Internet of Everything...
Securing the internet of things frontier: a deep learning ensemble for cyber-...
The Internet of Things (IoT)
Most cited articles in academia - International journal of network security &...
iot ppt.pptx
Malware threat analysis techniques and approaches for IoT applications: a review
Ad

More from Maurice Dawson (20)

PPT
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
PPTX
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
PDF
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
PDF
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
PPTX
CTRL, Search, Exploit, and Destroy
PDF
MWAIS Fall 2017 Newsletter
PDF
MWAIS Fall 2018 Newsletter
PDF
Information Technology Use in West African Agriculture – challenges and oppor...
PDF
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
PDF
Schedule for the 13th Annual Conference of the Midwest AIS
PDF
UMSL IS | Farmer 2 Farmer Program
PDF
Midwest Association for Information Systems - MWAIS2018
PDF
MWAIS 2018 - 13th Annual Conference
PDF
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
PDF
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
PDF
Hacking, Privacy and Security in a Hyperconnected Society
PDF
University of Missouri - Saint Louis Cyber Security
PDF
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
PDF
Security Solutions for Hyperconnectivity and the Internet of Things
PDF
Microblogging in higher education: Digital Natives, knowledge creation, socia...
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
CTRL, Search, Exploit, and Destroy
MWAIS Fall 2017 Newsletter
MWAIS Fall 2018 Newsletter
Information Technology Use in West African Agriculture – challenges and oppor...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
Schedule for the 13th Annual Conference of the Midwest AIS
UMSL IS | Farmer 2 Farmer Program
Midwest Association for Information Systems - MWAIS2018
MWAIS 2018 - 13th Annual Conference
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Hacking, Privacy and Security in a Hyperconnected Society
University of Missouri - Saint Louis Cyber Security
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
Security Solutions for Hyperconnectivity and the Internet of Things
Microblogging in higher education: Digital Natives, knowledge creation, socia...

Recently uploaded (20)

PPTX
Water-Energy-Food (WEF) Nexus interventions, policy, and action in the MENA r...
PPTX
The DFARS - Part 251 - Use of Government Sources By Contractors
PPTX
Part I CSO Conference and AVP Overview.pptx
PPTX
SUKANYA SAMRIDDHI YOJANA RESEARCH REPORT AIMS OBJECTIVES ITS PROVISION AND IM...
PDF
CXPA Finland Webinar - Modern Components of Service Quality - Alec Dalton - ...
PPTX
Chapter 1: Philippines constitution laws
PDF
The GDP double bind- Anders Wijkman Honorary President Club of Rome
PDF
Dean, Jodi: Concept Paper - Multi Family Lot
PPTX
CHS rollout Presentation by Abraham Lebeza.pptx
PPTX
Robotics_Presentation.pptxdhdrhdrrhdrhdrhdrrh
PPTX
cpgram enivaran cpgram enivaran cpgram enivaran
PPTX
Reactivity of metals with oxygen, rusting.pptx
PPTX
Presentation on CGIAR’s Policy Innovation Program _18.08.2025 FE.pptx
PDF
AAAAAAAAAAAAAAAAAaaaaaaaAAAAAAAt - ĐV.pdf
PPTX
ANALYSIS OF THE PROCLAMATION OF THE PHILIPPHINE INDEPENDENCE.pptx
PDF
CXPA Finland Webinar: Rated 5 Stars - Delivering Service That Customers Truly...
PDF
Item # 8 - 218 Primrose Place variance req.
PPT
Republic Act 9729 Climate Change Adaptation
PPTX
Parliamentary procedure in meeting that can be use
PPTX
3.-Canvassing-Procedures49for election.pptx
Water-Energy-Food (WEF) Nexus interventions, policy, and action in the MENA r...
The DFARS - Part 251 - Use of Government Sources By Contractors
Part I CSO Conference and AVP Overview.pptx
SUKANYA SAMRIDDHI YOJANA RESEARCH REPORT AIMS OBJECTIVES ITS PROVISION AND IM...
CXPA Finland Webinar - Modern Components of Service Quality - Alec Dalton - ...
Chapter 1: Philippines constitution laws
The GDP double bind- Anders Wijkman Honorary President Club of Rome
Dean, Jodi: Concept Paper - Multi Family Lot
CHS rollout Presentation by Abraham Lebeza.pptx
Robotics_Presentation.pptxdhdrhdrrhdrhdrhdrrh
cpgram enivaran cpgram enivaran cpgram enivaran
Reactivity of metals with oxygen, rusting.pptx
Presentation on CGIAR’s Policy Innovation Program _18.08.2025 FE.pptx
AAAAAAAAAAAAAAAAAaaaaaaaAAAAAAAt - ĐV.pdf
ANALYSIS OF THE PROCLAMATION OF THE PHILIPPHINE INDEPENDENCE.pptx
CXPA Finland Webinar: Rated 5 Stars - Delivering Service That Customers Truly...
Item # 8 - 218 Primrose Place variance req.
Republic Act 9729 Climate Change Adaptation
Parliamentary procedure in meeting that can be use
3.-Canvassing-Procedures49for election.pptx

Security Solutions for Hyperconnectivity in the Internet of Things