Your Name:

Madhu Manivannan

 

Grade Level:

Grade 8

 

School or Organization Name:

University of Toronto Schools

 

Co-Presenter Name(s):

n/a

 

Area of the World from Which You Will Present:

Toronto, Ontario, Canada

 

Language in Which You Will Present:

English

 

Target Audience(s):

All

 

Short Session Description (one line):

Iota Piscium - the app to safer household devices

 

Full Session Description (as long as you would like):

Iota Piscium is capable of detecting IoT (Internet of Things) devices and identify possible security risks and give a solution to overcome or fix the vulnerabilities. Iota Piscium is focused more towards building and providing a robust secured environment targeting today’s IoT (Internet of Things) devices (particularly home based) and their security.

The IoT  market is growing exponentially, and by 2020 the number of IoT devices are projected to be more than 212 billion devices. But the security of these devices is always ignored, or the user is negligent about their privacy. This is a serious growing concern and is mostly left unnoticed leaving behind a vacuum which can grow at large and possibly leave a sinkhole impact to the users. So, this app is to bring this awareness and a secured solution to end consumers who have petite knowledge about security on these IoT devices.

This concept is different to others in this field which still yet to flourish. Iota Piscium lets the consumers be more aware of the IoTHD (Internet of Things Household Device) they use on a daily basis.  Existing methods are trivial to many end users. An IoT microwave is still a microwave, but any device, how small may it seem, can bring a downfall in home security. With Iota Piscium, this app brings more attention to the links between your invaluable data and your IoT devices. Iota Piscium focuses on providing a safe, secure and robust environment through bringing consciousness in solving a complex everyday problem lying ahead of our future course in the internet.

Causes of Problems:

● Unauthorized Access: This measure ensures that only those with authorization gain access to the IoTHD. An example is the credentials you must enter when logging into your IoTHD
● Malicious Use: This measure manifests itself in a many ways. The most common are that high-value network resources are locked away from public access. An example is your company's computer room.
● Faults: This measure is concerned with detecting and preventing potential issues when and before they occur. An example is the temperature sensors in the equipment and devices that supply information on the operational state.
● Tampering: This measure monitors when devices are accessed, or when cases are opened to determine when something might have happened that shouldn't. An example is when credentials used for access to the resource.
● Destruction: This measure is similar to malicious use, and works primarily in a preventative capacity. An example is the company's computer room, as mentioned above.
● Disclosure: This measure focuses on keeping the particulars of the network secret so that exploits cannot be quickly developed. An example is keeping the specifications under lock and key so that only those that need to know the particulars have access to them. 
 

Precautions to take:

●Defense in Depth: This focuses on increasing the number, types, and locations of security. For example, don't only have security at login. Add security elements that check credentials at many points, like access to resources.
● Compartmentalization: This focuses on breaking up resources into self-contained pieces, and having access determine by piece by piece basis. For example, if a user has access to a particular printer, don't automatically assume they have access to them all.
● The Principle of Least Privilege: This dictates that any particular user should only be given access to the IoTHD resources they need to perform their duties. For example, if a user is part of engineering, don't give them access to accounting resources.
● The Weakest Link: This says that your network security is only as strong as the weakest part and that you need to design the safety of the weakest part. For example, if too many people have access to the IoTHD, then efforts must be made to increase security in this area or reduce the number of user access with proper access management. 

Some experience in the IoT or Security field will be needed in order to fully comprehend the topic.

Websites / URLs Associated with Your Session:

n/a

Tags: 2017Entrepreneurship, 2017Research, 2017STEMProjects

Views: 97

Reply to This

Replies to This Discussion

Dear Madhu,

All the very best to you. We are fairly new to Internet of Things.

Your efforts to educate people on new technology, its drawbacks and benefits is commendable.

Congrats.

All the very best.

Abhijith

Hello 

I'm writing on behalf of the co-coordinators of the 2017 Student STEM + Entrepreneurship Conference.

Your proposal for the 2017 Student STEM + Entrepreneurship Conference has been accepted. Please make sure to claim your timeslot and become familiar with the platform Blackboard Collaborate where the conference will be hosted before you present. A previously sent email contains further information about the necessary steps to take. It can be found in your email inbox under the name STEM & Entrepreneurship.  

 

Thank you for your cooperation.

Best,

Eunice Daudu and Gaby Palines

Co-coordinators of the 2017 Student STEM + Entrepreneurship Conference

Madhu

Please make sure you schedule your session ASAP!

Eric Walters

Faculty Moderator, 2017 Student STEM + Entrepreneurship Conferenc

Hello 

I'm writing on behalf of the co-coordinators of the 2017 Student STEM + Entrepreneurship Conference.

Your proposal for the 2017 Student STEM + Entrepreneurship Conference has been accepted. You have not yet claimed a time slot.Please make sure to claim your timeslot and become familiar with the platform Blackboard Collaborate where the conference will be hosted before you present. A previously sent email contains further information about the necessary steps to take. It can be found in your email inbox under the name STEM & Entrepreneurship.   If there is anything we can do to help you chose a time slot, please let me know. 

Best,

Eunice Daudu and Gaby Palines

Co-coordinators of the 2017 Student STEM + Entrepreneurship Conference

May we plant a tree in your honor?

Attachments:

RSS

STEM + Entrepreneurship

#stuconf2017

The Learning Revolution

© 2024   Created by Steve Hargadon.   Powered by

Badges  |  Report an Issue  |  Terms of Service