Day1 Ccet

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 20

Internet of Things

(IoT) & Mobile


Security
Indian Cyber Crime Coordination Center,
Ministry of Home Affairs

Date : 05-02-2024
Session Outline

1. Understanding Internet of
Things
2. Usefulness of IoT
3. IoT Cyber Security Issues
4. Safe Use of Internet of Things
• Mobile Security
• Network and Device Security
• Data Security
A real Problem….

Travel Time 2 Hours : Switch ON and OFF the Motor


Solution - IoT

Internet

Mobile App to control Motor Internet (Mobile Data)


connected Motor
IP Cameras : Convenient, Economic
IoT : Affordable and widely used
(Demo)
Home
Medical

einfochips.com
1. Things (Devices)

How does IoT Work ?


• Camera
• Temperature Sensor
• Electrical Equipment
• Cars

2. Connectivity
• Wi-Fi
• LAN / Broadband
• Bluetooth
• NFC etc.

3. Server
• Software to read and
process data / signals

4. Mobile App /
Software
• Control / Operate IoT
Devices.
Raspberry Pi – A Mini Computer.

Make students familiar with IoT


Essential Skillsets

1. Python Programming
2. Linux Fundamentals
3. Networking
4. Basic Hardware
IoT – Cyber Security Issues

Malware / Virus Data Leak Insecure Software Cyber Attack


Communication Vulnerabilities
Why do you
need security ?
Source : NYTIMES
1. Mobile Security

• Large number of IoT devices controlled from


Phone.
• If your phone is controlled by someone else, it
is a Risk

• Be judicious with Mobile Apps.


• Use Antivirus Software on Phone.
• Buy only trusted IoT platforms / Devices
2. Network & Device
Security

Use Strong Wi-Fi Change default Regularly update


Password. passwords your firmware
3. Data
Security
• Backup your data
• Do not share any confidential
data unless absolutely
necessary.
• Lock your device access with
strong password.
Be a Cyber Volunteer

 Register on National Cybercrime Reporting Portal (www.cybercrime.gov.in)


 create ‘Login Id’.
 Mention name of State/UT of your residence and mobile number
 Enter OTP received on your mobile on ‘Login Id’ page and ‘submit’.
 Registration Step 1” on page “USER VOLUNTEER PROFILE DETAILS”
 Upload resume, ID Proof*, Address Proof* and Passport size photograph.
 Select Type of Volunteer ship:-
- Cyber Awareness Promoter
- Cyber Expert
- Cyber Volunteer for unlawful content flagger

18
@cyberdosti4c
Cyber Dost – Follow on social media
@cyberdost
Internet of Things (IoT) Smart Home (Video – 4)

20

You might also like