0% found this document useful (0 votes)
16 views30 pages

Module 2 FISS 1

The document discusses the evolution and impact of the Internet of Things (IoT) on personal and business life, highlighting how it has transformed traditional business models into e-commerce. It outlines key challenges related to security, privacy, interoperability, and legal compliance that arise from the integration of IoT technologies. Additionally, it emphasizes the necessity for businesses to adopt an Internet and IoT marketing strategy to remain competitive in the modern market.

Uploaded by

tangerine relevo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views30 pages

Module 2 FISS 1

The document discusses the evolution and impact of the Internet of Things (IoT) on personal and business life, highlighting how it has transformed traditional business models into e-commerce. It outlines key challenges related to security, privacy, interoperability, and legal compliance that arise from the integration of IoT technologies. Additionally, it emphasizes the necessity for businesses to adopt an Internet and IoT marketing strategy to remain competitive in the modern market.

Uploaded by

tangerine relevo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com
www.jblearning.com All rights reserved.
All rights reserved.

Fundamentals of Information
Systems Security

Lesson 2

Emerging Technologies
are Changing How We Live
Page 1
Fundamentals of Information Systems Security
Learning Objective(s)
▪ Explain information systems security and
its effect on people and businesses.

Page
2

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
Key Concepts
▪ The evolution of the Internet of Things (IoT) from
the late 1990s to present
▪ The impact that the Internet and IoT have on
human and business life
▪ How bricks-and-mortar businesses transform into e-
business models with e-commerce and an IoT
strategy
▪ How IP mobility is driving IoT to include both
personal and business environments
▪ New challenges created by IoT
Page 3

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
The Internet of Things Is Changing
How We Live

Social Media Mediums

Facebook® VoIP
Twitter® IM chat
LinkedIn® Audio conference
Pinterest® Video conference
Google+® Collaboration
Instagram® Digital Media
Page 4

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
Drivers for Internet of Things
(IoT)

IP-based networking

Connectivity

Smaller and faster computing

Cloud computing

Data analytics

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 5
All rights reserved.
Evolution of IoT
▪ Internet service providers (ISPs)
▪ Radio frequency identification (RFID)
▪ Application service providers (ASPs)
▪ Software as a Service (SaaS)

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 6
All rights reserved.
How the Internet and TCP/IP
Transform Our Lives
• The transition to a Transmission
Control Protocol/Internet
Protocol (TCP/IP) world changed
our way of life.

• People, families, businesses,


educators, and government all
communicate differently than
they did before.

• Nearly everyone has easy


access to the Internet.

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 7
All rights reserved.
IoT’s Impact on Human and
Business Life
▪ The Internet has changed our day-to-day
lives
• Personally
• Socially
• Professionally

▪ Use the Internet to:


• Check weather, news, and social media sites at
home
• Check business emails at work
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Fundamentals of Information Systems Security www.jblearning.com Page 8
All rights reserved.
Store-and-Forward vs. Real-Time
Communications

Real-time • Occurs instantaneously

Store-and- • Acceptable delay in


forward transmitting communication

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 9
All rights reserved.
IoT’s Impact on Humans
Health monitoring and updating

Home security and smart home control systems

Online family member calendars

Near real-time tracking and monitoring via GPS

Online banking, bill paying, and financial transactions

Online e-commerce purchases

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 10
All rights reserved.
IoT’s Impact on Business
Retail stores
Virtual workplace

Remote sensors

Traffic-monitoring applications B2C

service delivery model

“Anything as a Service” IoT applications

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 11
All rights reserved.
Evolution from Bricks and Mortar to
E-Commerce
▪ E-commerce
• Sale of goods and services on the Internet
▪ Business-to-consumer (B2C)
• Customers purchase goods and services directly from their
website
▪ Business-to-business (B2B)
• Businesses conduct sales with other businesses
▪ Payment Card Industry Data Security Standard (PCI
DSS)
• Protects private customer data

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 12
All rights reserved.
Evolution from Bricks and Mortar to
E-Commerce (cont.)
▪ Internet business challenges:
• Growing the business through the Internet
• Changing an existing conventional business into
an e-business
• Building secure and highly available websites and
e-commerce portals
• Building a web-enabled customer-service strategy
• Finding new customers with Internet marketing

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 13
All rights reserved.
E-business Strategy Elements

▪ E-commerce solution
▪ Internet marketing strategy
▪ E-customer service-delivery strategy
▪ Payment and credit card transaction
processing

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 14
All rights reserved.
Why Businesses Must Have an
Internet and IoT Marketing Strategy
▪ Must remain competitive
▪ Bricks-and-mortar business model out of
date in global market
▪ Customers require continuous access to
information, products, and services

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 15
All rights reserved.
IP Mobility

▪ Personal communication devices and mobile


phones are powerful
▪ Cell phones are used to extend mobility
▪ Mobile phones, smartphones, and PDAs
match the power and flexibility of small
computers
▪ Tablets, smartphones, and netbooks fill need
for lightweight portable devices

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 16
All rights reserved.
Mobile Users and Bring Your
Own Device (BYOD)
▪ Employees and contractors use their own personal
devices to connect to network at office

Issues with Mobile Computing

• Network
• Usability
• Security

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 17
All rights reserved.
Mobile Applications

▪ Limited web browsers can’t run some


traditional applications
▪ Bad interface design causes application
failure on mobile devices
▪ Many users from multiple domains found
uses for mobile applications
▪ Medical applications were a good fit for
mobile applications

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 18
All rights reserved.
Mobile Applications (cont.)

▪ 4G & 5G networks provide true IP


communications.
▪ Mobile IP enables users to:
• Move between LAN segments and stay
connected without interruption.
• Maintain a connection to the network as long
as the mobile device stays within network
coverage.

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 19
All rights reserved.
New Challenges Created by the IoT

Security Privacy Interoperability

Legal and E-commerce


regulatory and economic
compliance dev issues

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 20
All rights reserved.
New Challenges Created by the IoT
Legal and E-commerce
Security Privacy Interoperability regulatory and economic
compliance dev issues

❑ Security: How do you keep the bad guys out if you enable the IoT for
your personal and professional life?

❑ Privacy: How do you protect your family’s identity and privacy data
from theft or unauthorized access that can lead to identity theft?

❑ Interoperability and standards: How well do IoT manufacturers and


ASP developers ensure that devices communicate securely?

❑ Legal and regulatory compliance

❑ E-commerce and economic development issues

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 21
All rights reserved.
Security Challenges of IT Devices
▪ Deployed in large quantities (such as sensors or
consumer items)
▪ Not maintained or updated devices allow
vulnerabilities
▪ Upgrades can be difficult to distribute and deploy
▪ No owner visibility of how the device connects to the
Internet
▪ Not physically secure
▪ Capture readings and measurements in the open

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 22
All rights reserved.
Privacy Challenges

▪ Privacy policy statement.


▪ Definition of data, metadata, or analytical data
use and rights.
▪ Ability for a user to provide consent to a
manufacturer’s or application service
provider’s privacy policy statement.
▪ Determine the domain of privacy.

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 23
All rights reserved.
Interoperability and Standards

▪ Internet Engineering Task Force (IETF)


ensures interoperability and standards can
be pursued for IoT solutions.
▪ Interoperability has significant financial
impacts if not properly addressed.
▪ Goal is to bring the cost of IoT devices and
supporting applications down so they are
affordable.

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 24
All rights reserved.
Interoperability and Standards
Challenges
▪ Some manufacturers want to design and deploy
proprietary IoT devices and solutions.
▪ Cost factors to implement functional, operational,
technical, and security capabilities into IoT
devices and applications.
▪ Time-to-market risk.
▪ Technology outdated risk
▪ A void in interoperability and standards for IoT
devices can create an environment of bad IoT
devices
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Fundamentals of Information Systems Security www.jblearning.com Page 25
All rights reserved.
Legal and Regulatory Issues

▪ Proper handling and protection of sensitive


data
▪ Privacy data subject to privacy laws of state
you live in as well as state that the IoT
hosting company resides in
▪ IoT vendor or solutions provider required to
adhere to security control requirements and
data protection laws

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 26
All rights reserved.
Legal and Regulatory IoT Questions

Who is collecting data?

Who is collecting behavior patterns?

Are they selling this data?

Do they have the right to sell it?

Is there liability associated with the data?

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 27
All rights reserved.
E-Commerce
and
Infrastructure Foundational
Economic resources investments
Development
Issues
Technical and Policy and
industry regulatory
development definitions

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 28
All rights reserved.
Summary
▪ The evolution of the Internet of Things (IoT)
from the late 1990s to present
▪ The impact that the Internet and IoT have on
human and business life
▪ How bricks-and-mortar businesses transform
into e-business models with e-commerce and
an IoT strategy
▪ How IP mobility is driving IoT to include both
personal and business environments
▪ New challenges created by IoT

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 29
All rights reserved.
Activity 2
Research for one emerging technology and provide the following
•Definition and how it works
•Current applications
•Benefits and challenges
•Impact on different industries (education, healthcare, business, transportation, etc.)
•Future trends
Submit through the Assignment post. It will be presented next meeting.

You might also like