IOTcoban Chuong4
IOTcoban Chuong4
Secured
IOT CƠ BẢN
502068
Ghi chú về bản quyền
• Toàn bộ nội dung bài giảng là của CISCO,
sinh viên có quyền tải về, lưu trữ, in ấn,
tham khảo cho mục đích học tập. Sinh viên
không được phát hành lại hay thay đổi nội
dung slide nếu chưa có sự đồng ý của chủ
sở hữu.
• Phần ghi chú ở cuối slide (nếu có) là do các
thầy cô ghi chú lại trong quá trình giảng dạy.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Chapter 5: Everything
Needs to be Secured
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
5.1 Security in the Digitized
World
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Why is Security so Important?
Types of Data
The quantity, volume, variety, and immediacy of generated data has changed.
Personally identifiable information (PII) or sensitive personal information (SPI) is data relating to a
living individual that can be used on its own or with other information to identify, contact, or locate a
specific individual.
Informational data can also contain sensitive information concerning corporate secrets, new product
patents, or national security.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Why is Security so Important?
Lab – Types of Data
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Why is Security so Important?
Who Wants our Data?
The Good Guys
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Why is Security so Important?
Data in the Wrong Hands
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Why is Security so Important?
Lab – Internet Fingerprint
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Why is Security so Important?
Security Best Practices
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Protecting the Corporate World
Physical Security
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Protecting the Corporate World
Challenges of Securing IoT Devices
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Protecting the Corporate World
Safe Wi-Fi Usage
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Protecting the Corporate World
Protecting Devices
Keep the Firewall On
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Protecting the Corporate World
Packet Tracer – Secure a Wireless Router
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Securing Personal Data and Devices
Smart Homes
Smart sensors in our homes increase the
potential for security issues.
The sensors could provide a way for
hackers to get into our home network and
gain access to any PCs and data that are
connected to it.
Before purchasing home security systems,
it is very important to research the
developer and the security and encryption
protocols that are in place for its products.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Securing Personal Data and Devices
Public Hotspots
Safety rules to follow when using a public or
unsecure Wi-Fi hotspot:
• Do not access or send any sensitive personal
information
• Verify that your computer is configured with
file and media sharing, and that it requires
user authentication with encryption.
• Use encrypted virtual private network (VPN)
tunnels and services.
Bluetooth can be exploited by hackers to
eavesdrop on some devices, establish
remote access controls, distribute malware,
and drain batteries.
• Turn off when not in use.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Securing Personal Data and Devices
Setting up a VPN on Smartphones
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Securing Personal Data and Devices
Lab - Discover Your Own Risky Online Behavior
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
5.2 Chapter Summary
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Chapter Summary
Summary
The quantity, volume, variety, and immediacy of generated data has changed.
Personally identifiable information (PII) or sensitive personal information (SPI) is data relating to a
living individual that can be used on its own or with other information to identify, contact, or locate a
specific individual.
Informational data can also contain sensitive information concerning corporate secrets, new
product patents, or national security.
White hat hackers test security to help protect data.
Black hat hackers, want access to collected data for many nefarious reasons.
Outside perimeter security - on-premise security officers, fences, gates, continuous video surveillance,
and security breach alarms.
Inside perimeter security - continuous video surveillance, electronic motion detectors, security traps, and
biometric access and exit sensors.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Chapter Summary
Summary (Cont.)
• Increasing Number of Devices - The number of interconnected sensors and smart devices is growing
exponentially, increasing the opportunity for attacks.
• Non-Traditional Location of Devices - Some connected IoT devices are able to interact with the physical world.
• Lack of Upgradeability - IoT sensor-enabled devices may be located in remote and/or inaccessible locations
where human intervention or configuration is almost impossible.
Know the steps to protect your company’s wireless network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Chapter Summary
Summary (Cont.)
Smart sensors in our homes increase the potential for security issues.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32