Join Tom Tobiassen for an in-depth discussion in this video What you should know, part of Cybersecurity Awareness: The Internet of Things (IoT).
- [Instructor] So the first part of this is to look at the current cyber environment. What is it like? As we look at the integration of the physical world and the virtual world, there are some things out there that are baseline facts that we should look at. Daily life depends on the Internet. How many of you use mobile banking? How many have healthcare providers that use the Internet to send prescriptions? Trade, education, industry, all of that depends on the Internet.
E-government is another big part of the Internet. Mobile computing is a reality. How many devices do most of us have? I would say the average, especially if we're gathering like this, would be four or five that they use in their daily interactions with the Internet. Mobile devices are used in the workplace. Mobile devices are used not only for the personal world but in the business world. And that becomes something that is very important.
When you look at the world population of over seven billion people, five billion of those people will soon be connected to the Internet. Not only is that going to change the security of the Internet, but also the way these connected people interact with their own societies, with each other, and with other societies. The number of Internet devices out there right now already exceeds the human population. And then when you get to the Internet of Things, when that becomes more of a reality, we are going to have 50 billion connected devices, maybe even more, by the year 2020.
And then you have such things as artificial intelligence, augmented reality, virtual reality, neuromorphic computing, computing which is designed to mirror the nerve impulses that travel through the human body. So if computing can do that, what does it mean for computer interaction in our daily lives? And for those of us out there trying to protect our society from those that want to harm us, the one big fact that we need to consider is that cyber protections, as they exist today, are completely inadequate.
Firewalls are constantly being breached, even the next generation of firewalls have issues. We have over reliance, in my view, on passwords. But there is no real movement to other authentication technology adopted on a mass scale. Other methods out there you probably already know of is biometric authentication. There are others like key cards, various chips, but there's an over reliance on passwords because it's easy to use and that's what we know.
We also have weak authentication technologies in general, such as the iPhone6. Cisco routers had problems in the past. There is the lack of encryption out there that was taken advantage of by the Heartbleed virus, and that was a vulnerability that used encryption. The concept of the Internet of Things started not long ago by just putting radio frequency identification tags, RFID, on things. That provided the ability to track devices.
Tracking later evolved into putting small computers into everything and giving those computers the ability to control the remote devices. With the advent of the wireless Internet, it was quickly determined that many devices could be connected to the wireless Internet and not only be controlled, but these devices could dialogue with other computers on the Internet and provide information while receiving data that could be used to perform tasks. These smart devices could in real time adapt from the information learned from the other devices in their environment.
With all of these devices being connected to the Internet and some running old software developed before there was this vast array of interconnectivity, the problem of hackers has become critical. With all these Internet-connected devices now in our homes and businesses, the number of ways that hackers can get into our personal information leaves us vulnerable to all types of digital attacks thus the dawn of cyber security.
So with the Internet of Things, these are exciting times that will change the way we interact with the things around us, with other people, and the rest of the world. We're going to dive into the Internet of Things and talk about some hacking, some of the devices, the Dark Net, and how we can protect ourselves on the Internet.
Note: This course was recorded and produced by Mentor Source, Inc. We're pleased to host this training in our library.