There are several benefits of IoT connected devices, and many opportunities for new applications are growing. On the other hand, these benefits of the IoT come with some significant challenges. IoT sensor network increases its threats and vulnerability to malicious attacks.
This workshop introduces the fundamentals of an Internet of Things (IoT) and how one can implement to protect the Cybersecurity and Privacy. The course covers infrastructure related architecture, technologies and principles behind IoT to cater to the Cyber-attack. The workshop will also discuss different stages of security implementation, Identify the possible threats and vulnerabilities. Attendees will learn how to compute the potential impact of threat appearance with their IoT applications. Monitoring risk analysis and various level of threats and vulnerabilities will also be discussed.
What you will learn:
- Given IoT domain related to, sensors, Hardware, Operating systems and Web IoT protocols.
- Learn building blocks and schematic of IoT such as Sensors, MCU’s and Cloud components.
- Learn various cloud IoT platforms available such as AWS IoT, IBM Bluemix and Microsoft Azure and security model available
- Step-by-step process for analyzing Cybersecurity and Privacy
- Hardware and Software tools available to audit security risk within an IoT environment
- Encrypted Computing and Secure Computation
- Definition and determination of active and passive Cybersecurity
- Data analytics for cybersecurity:
- Predictive Cybersecurity
- Event Analysis
- Event Attribution and Cyber-Forensics
- Firmware wetting
- Intelligence and Cybersecurity and privacy regulation.
- Quantitative and Qualitative methods of security risk analysis
- Understanding the threats and vulnerabilities of IoT devices
- Estimations of the impact and determining risk for IoT systems.
At the end of this course, attendees will demonstrate the ability to:
- Understand what IoT technologies are used for today and what is required in specific scenarios.
- Understand the types of technologies that are available and in use today and can be utilized to implement IoT solutions.
- Demonstrate the understanding of Cybersecurity architecture.
- Understanding of the Security and Privacy Engineering Cybersecurity Settings.
- Understanding of the Intersection of IoT, Social Media, and other Pervasive computing platforms.
- Enterprise Security.
- Privacy and Trust of IoT.
- Malware Analysis.
- Event Recovery.
- Security as a Service (SaaS).
- Privacy as a Service (PaaS).
This course introduces the design principles of the Internet of Things (IoT) and their device along with infrastructure-related architectures, technologies and protocol frameworks that are aimed at enabling the formation of highly distributed and ubiquitous networks.
Attendees will also learn the basic principles of cybersecurity and privacy, assessing various security level of threats and vulnerabilities occurred within the IoT devices, networking connection, and cloud technologies.
The learning model includes sensors, hardware platform, and cloud. The workshop describes the block diagram, schematic and implementation lab. The course outlines the usage of Cloud platforms such as AWS IoT, IBM Bluemix, and Microsoft Azure.
This workshop aims to showcase new and emerging strategies and technologies for forecasting, to mitigate, countering, and attributing cyber-events that threaten security and privacy within the realm of IoT.
Cybersecurity is the body of technologies, processes, and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cybersecurity and physical security.
IoT – Cybersecurity includes:
- Application security
- Information security
- Network security
- Disaster recovery
- Operational security
Who Should Attend:
The “Cybersecurity and Privacy for IoT” workshop is designed to help Engineers, City officials, Universities, Cybersecurity & Privacy project researchers, and personnel with Cryptography background working at the level of Faculty/Teaching staff – Engineers/Researchers – T & D Employees/staff.
The workshop also helps the people who are studying Cyber Security (CS), Internet of Things (IoT), Cyber Laws/Forensics and CS/IoT Lab setup.
This course is primarily aimed for learners who are interested in transitioning toward a more managerial role in Cybersecurity and are therefore in understanding the interplay between business strategy and the IT infrastructure.
The workshops also help for startups, medium and large companies to learn the current trend, technologies and implementation strategy for Cybersecurity.