Jump to content
WEC2019 Call for Abstracts Read more... ×

Search the Community

Showing results for tags 'security'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • IoT Community Forum
    • IoT Engineering
    • IoT Industry News
    • Community Agenda

Product Groups

  • 10 Things you should know about the IoT

Categories

  • Knowledge Notes
  • Case Studies
  • Announcements

Categories

  • Technology Vendors
  • Consultants
  • Research Organisations
    • Universities
    • Government Agencies

Blogs

  • IoT intellectual property strategy
  • Hook, line and blog
  • Productivity-focused IoT and M2M
  • IoT Thoughts and the Dawn of new Era
  • Making IoT Connectivity Great
  • Microsoft Cloud Workshop: IoT on the Edge
  • Waleed Ahmed

Calendars

  • EA’s IoT Community Activities
  • Other IoT Events
  • Organising Committee Meetings

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Found 12 results

  1. Casino hacked via a thermometer in a lobby aquarium – what a nice story. Sad, there is no technical details in the article. http://www.businessinsider.de/hackers-stole-a-casinos-database-through-a-thermometer-in-the-lobby-fish-tank-2018-4?r=UK&IR=T
  2. Nadine Cranenburgh

    Incarceration with IoT

    Introduction Replacing prisons with high tech systems capable of detaining prisoners in their own homes and the use of artificial intelligence to predict and prevent imminent offenses may sound the stuff of science fiction, but rapid advances in technology surrounding IoT makes such a vision a possibility worth discussing. A system that effectively turns prisoners into internet nodes using IoT wearables with the ability to deliver electric shocks would have significant social impact. These ramifications need to be taken into account along with engineering design and legal considerations. This application of IoT falls at the intersection of engineering, technology and law, and as such, needs an interdisciplinary approach. The case for technological incarceration Big data, IoT, and AI can be useful in reforming and improving certain aspects of the legal system. One candidate is the prison system, which has remained largely unchanged for hundreds of years. In Australia and many other Western countries, the rate of incarceration is increasing as governments respond to voter pressure to be tough on crime. This comes at a high social and financial cost. In the US, the cost of running prisons is tens of billions of dollars per year. In Australia the annual cost is in the billions. It would actually be cheaper (although not practical) to assign an individual police officer to each prisoner. For prisoners, incarceration causes effects following release including diminished life expectancy, prolonged unemployment and reduced income. This leads to further costs to the public purse. In addition, a disproportionate number of underprivileged and minority groups are imprisoned, including Indigenous Australians and African Americans. One of the main arguments for incarceration is to deter people from committing crimes. Research has shown that a more effective deterrent than fear of prison is the belief by a potential criminal that their crime is likely to be detected, and that prisoners with a harsh sentence reoffend at a marginally higher rate than those dealt with leniently. Protection of the community through incarceration of violent criminals is also limited to the length of sentences. How could technological incarceration work? Technological incarceration has the potential to punish criminals and keep the community safe while reducing the financial and social costs of traditional incarceration. One proposal is to implement a variant of home detention which uses electronic bracelets or anklets along with an IoT system to achieve: real-time tracking of offenders’ locations constant surveillance of offenders’ actions immediate immobilisation of offenders who are committing a crime or escaping Challenges One challenge of technological incarceration is that GPS tracking with wearables is not an adequate substitute for prison because it cannot prevent offenders from harming others in their location or if they escape. To solve this issues, the wearables need to be able to report to a central location in real-time. For constant surveillance, and prevention of harm to the public, the cost of corrections officers viewing CCTV for every offender is too expensive. Therefore a computer-monitoring solution needs to be found. The final challenge is how to immobilise offenders who are reoffending or escaping. This could be achieved by incorporating a device such as a taser into the offender’s anklet, which could be remotely activated if incapacitation was required. Technological incarceration could be perceived as “soft” by the community, and education might be needed to convince the public that deprivation of liberty is a harsh punishment in itself. Conversely, some may see it as too harsh, due to complete loss of privacy and the risks of tasering. It could be argued that these concerns are not as great as the current ramifications of traditional incarceration. Technological incarceration would also place a burden on families, be vulnerable to technological failure, and present privacy concerns to family members and engineers and technicians involved in maintenance of the incarceration equipment. An important question is the number of technology triggered taser-related deaths, or failures of tasers leading to public danger that society is willing to tolerate, similar to the issues of driverless vehicle-caused fatalities and casualties. This needs to be put in context with current issues including deaths and violent attacks in prisons, and crimes committed by offenders on bail. Another question is whether technological incarceration would be made available to every offender, or only those who are not violent or dangerous. As the offenders would be imprisoned in their own homes, provisions would also have to be made for accommodation for homeless offenders. Technology The electronic anklet is existing technology. There are two forms: one uses RF tracking capability and the other GPS. The GPS version has the capability to accurately track offenders to within around 10 centimeters. They are fitted with an alarm for tampering, and cost around a sixth to a tenth of traditional imprisonment. In existing devices, fibre optic technology is used to provide tamper-proofing: a beam is interrupted when offenders try to remove their device. However, this technology is only used currently for offenders on parole or with a non-custodial sentence. To solve the more complex problem of monitoring and incapacitating offenders in real time if they are posing a danger to others, proponents of technological incarceration have proposed the use of sensor vests in conjunction with computer-based monitoring with technologies such as machine vision. Rather than installing fixed sensors (infrared temperature sensors (IRT), audio sensors and cameras) in offenders’ homes, these sensors could be installed in modified police vests. This has already been trialled with cameras in vests to provide police accountability. Machine vision has the potential to detect suspicious movements such as fast hand and leg movement, or picking up implements.There is also a lot of promise in using sensors and machine vision interpretation with convolutional neural networks (ConvNets or CNNs) which have proven effective in image recognition and classification in driverless cars and robot vision. One issue is the transmission of sensor data (particularly high definition video) in real time for analysis. This could be resolved by analysing the data locally on the vest, and transmitting interpretations, however, it is yet to be determined if available interpretation technology is small enough to be mobile. Another area for further investigation is how integrated audio, visual and other sensor data can be used to gain a picture of the offender's activities than high definition video alone. Biosensors (which are used in the monitoring of athlete’s condition) could also be used to monitor offenders’ emotional state. Stable communications are also necessary for the transmission of real time data and triggering of tasers. This would require a reliable 4G, or preferably signal in the offender’s home. If the data connection is lost, police officers would need to be called in. This is another argument for only using technological incarceration for lower risk offenders. Low battery charge levels on the tasering device would also trigger a police visit. Facial recognition technology also has the potential to allow monitoring of the gradual reintegration of offenders into society after their sentence has been served. Progress Technological incarceration using IoT systems is feasible, but its implementation is limited by social and legal concerns and challenges. Once these challenges and concerns have been addressed, it might be possible to trial technological incarceration on less dangerous offenders (elderly, female and white collar) in controlled conditions. If society does go down the path of technological incarceration, it is unlikely that people would be completely removed from offender management. In the case of a suspicious movement, an alarm could alert corrections officers and provide them with a visual feed to make a decision on the appropriate response. Once the technology has been proven, it might be possible to hand over more control of the response to the AI system, in a similar way that we are now allowing driverless cars to make judgement calls on the road. The manufacturing and supply of devices that could be used in technological incarceration is primarily based in the US at the moment, but there is potential for it to expand to Australia and other nations if society accepts its implementation. Sources: The content on this page was primarily derived from the following: Webinar titled “The Internet of Incarceration” by Professor Dan Hunter, Dean, Swinburne Law School
  3. Tim Kannegieter

    Security approaches

    View the recording: This webinar has passed. Members of Engineers Australia can view the recording free on MyPortal. Simply logon and navigate to Technologies > Security. Others can purchase the recording on EABooks. Title: Picking locks with a blowtorch – IT Security in age of the IOT Presenter: Michael O'Flaherty, Security Consultant, UXC Saltbush Description: Applying an IT Security approach to the Internet of Things (IOT) is akin to picking a lock with a blowtorch. The approach is not fit for purpose and will ultimately end in frustration, burnt hands and very little of the lock’s function remaining. The foundation for good IoT security is recognising the gaps between traditional ICT security and the IoT, and knowing why the approach is different. IT Security is getting pretty good at applying security frameworks and methodologies to corporate IT functions. Unfortunately, the same cannot be said for IT Security's approach to the adoption of the IoT. An IT security manager's head will generally spin when confronted with the IoT and its inability to fit nicely within the mold of traditional IT security. In this talk, security consultant Michael O'Flaherty will explain the fundamental gaps between IT and IoT Security approaches and show you three ways to provide the layers of security that more appropriately accommodate the unique service offering that is the IoT. What you will learn: The difference between corporate and IOT security Three ways to provide layers of security About the presenter: Michael has spent over 20 years casting a sceptical eye over 'good solutions' with the perspective of making them better in Australia and overseas. As a IT Security Consultant he spends most of his time giving risk advice surrounding the myriad contemporary technology being deployed at client sites (some of it is taken). When: 12 midday AEST (Sydney) on 25 October 2016. The presentation will last 30 minutes followed by question time. Where: The presentation is by webinar. After registering you will be sent details of how to logon. Cost: This presentation is free to members of Engineers Australia (EA), the Australian Computer Society (ACS), the Institution of Engineering and Technology (IET) and IEEE. Just provide your membership number during registration for the event. The cost for non-members is $30. How to register: Please register on the Engineers Australia event system. Note, to register you need to have a free EA ID which you can get on the first screen of the registration page. Take note of your ID number for future events.
  4. Ramon Fernandes

    Zigbee vulnerabilities

    This post documents a recent paper detailing the security holes in the Zigbee Light Link protocol and uses a hack against Philips Hue light bulbs. It aims to show how the security problems in the Hue bulbs plus the Zigbee Light Link vulnerabilities could lead to bricking bulbs or even jamming Wi-Fi networks on the 2.4 GHz band. https://blog.acolyer.org/2017/06/22/iot-goes-nuclear-creating-a-zigbee-chain-reaction/
  5. Arthur Baoustanos

    Customer Identity Summit Live 2017

    until
    Learn the latest developments on Privacy & Consent, Customer Experience and the IoT. Hear the HSBC Case Study: Customer Identity Management – Democratised and Commoditised Watch the Alexa Demo featuring biometrics thought leaders Daon Interact with the panelists as they discuss the Evolving Role of Privacy in Digital Transformation Network with other business leaders and digital identity experts across this fast moving industry These global summit series bring together visionary analysts, executives, technical experts, thought leaders and other identity professionals to share their digital transformation knowledge and experience. Details and Registration here.
  6. Tim Kannegieter

    Shodan

    Shodan a search engine specifically designed for the Internet of things. It allows the user to find specific types of things connected to the internet using a variety of filters. This is enabled by storing the meta-data that the IoT devices broadcast. Shodan allows user to determine all parts of your network that are accessible from the internet, categorise the things into types, show what devices are broadcasting using particular SCADA protocols (such as Modbus, S7, DNP2, Fox, BACnet, Ethernet/IP, GE-SRTP, HART and PCWorx) and show where they are being used geographically. Website: https://www.shodan.io/
  7. Tim Kannegieter

    Spiral Systems

    "Spiral Systems conceive, design, build, test and introduce into service systems that meet customer needs, comply with safety and security regulations and are highly maintainable." Website: http://www.spiralsystems.com.au/
  8. Matthew Sheedy

    IoT Secuirty

    Hi all, With recent attention in the media, along with the innate obligation as engineers to develop and deliver safe and secure products, cybersecurity in the IoT is a massive topic. Not only is it wide it is deep too with the landscape constantly changing as hackers adapt and find new exploits. I really enjoy the couple of webinars on the topic so far, which can be found in past webinar recordings here: Introduction to IOT Security and Further security approaches Therefore, I thought it best to share the following article from the IEEE I read this morning on the topic. Wanted: Smart Public Policy for Internet of Things Security
  9. Tim Kannegieter

    Strategic principles for securing IOT

    The U.S. Department of Homeland Security’s have recently released a report called Strategic Principles for Securing the Internet of Things (IoT). This includes reference to the Industrial Internet Consortium's own security framework.
  10. until
    Connected/Smart transport systems encompass a broad range of vehicle and embedded transport systems to manage complexity, optimise performance, and ensure safety of vehicles, passengers and users of the transport system. In practical terms this means autonomous vehicles, roadside sensors and an interconnected system encompassing transit systems, ticketing and rail. Cybersecurity issues in this connected transport system pose a threat to the safety and efficient running are amongst the major concerns of Government and policy bodies. IoTSec Australia is hosting the third of its IoT Cyber Forum series with the intent to raise awareness and promote secure practices in the IoT ecosystem. Come and hear industry experts on connected transport and autonomous vehicles discuss the current and future state of connected transport systems. A security panel will then hold an interactive session answering questions on security for vehicles, embedded systems and control system backend. Date: 2nd December 2016 Time: 8.00am arrival for an 8.30am - 10.30am session Venue: BDO, Level 10/12 Creek Street, Brisbane RSVP: info@iotsec.net.au Speakers: Miranda Blogg: Director (Connected and Automated Vehicles), Department of Transport and Main Roads Dr Andry Rakotonirainy: Deputy Director, Centre for Accident Research & Road Safety, Queensland University of Technology Jamie Smith: Connected Transport Lead, Telstra Security expert panel: TBA Regards, IoTSec Australia www.iotsec.net.au
  11. There a numerous media reports circulating about a denial of service attack, launched from up to 1 million IOT devices, that was so large it apparently overwhelmed the security company charged with defending the site. Use a search engine with keywords Akamai and denial of service and you will find the details. Note, we cant provide direct links as this breaches copyright. Akamai has nothing on its website, so the media reports at this stage are allegations only.
  12. Steve

    Security for IoT

    Could we add the topic of security to our list of potential Webinar subjects please. IoT devices are often remotely located, sending back data of potential importance to the end user. There may be concerns that this data could be either lost or intercepted. Or that someone might attempt to hack into an IoT device. E.g. a device that monitors a car parking space might be ready to raise the alarm that you have been parked too long. Who wouldn't want an App to override this? What is recommended good practice to ensure secure and robust communications. At the event last Thursday (8th September) at Chatswood on "IoT Deployment in Australia" one of the questions was on security. Unfortunately, not the speakers area of expertise. Best regards Steve Lewis
×