Unit4 A

Download as pdf or txt
Download as pdf or txt
You are on page 1of 21

CSE88D

Security and Governance


UNIT 4-Part I
Introduction

Internet is possibly the victim of its success as


far as security is concerned
Security

• In an objective sense, security measures the absence of


threats to acquired values.

• In a subjective sense, security measures the absence of


fear that such values will be attacked.

• Security is a system property. Security is much more


than a set of functions and mechanisms.
Privacy

• Object Privacy: eavesdropping, tracking, stealing data.

• Location Privacy: tracking, monitoring, revealing data.

• On one hand, entity who carries device-enabled does not


want to be tracked by the terminal, which could preserve its
privacy.
• On the other hand, one requires tracing device-enabled
criminals or suspicious objects in a controlled way, which
could save money, national assets and human lives.
Security and Privacy challenges

• Authentication, Integrity, Confidentiality based on


application requirement.
– Universal authentication
– Identity management
– Authorized access of data
– Availability of data (a big challenge in near future!)

• Lightweight security protocol for constrained


environments.
• Privacy preserving service.
• Trust and ownership issues.
Who are you?

I’m Bob

Prover Verifier

Authentication, integrity
IoT scenarios/applications

• Home appliances
• Transport
• E-Governance
• Social networking
• Banking
• Enterprise systems
• Telecommunication
• Education
• Agriculture
• Defense
• …
• Privacy-preserved data --> avoiding link or tracing.

• Authentication-preserved data --> avoiding


impersonation.

• Integrity-preserved data --> avoiding data alteration.

• Confidentiality-preserved data --> avoiding


unauthorized access to data
Overview of governance
• Processes and policies are the actionable part of any
governance model.

• They are the activities that are followed, applied, and


enforced to govern and manage all IoT initiatives.

• Shows the key components of an IoT governance and


management model.
Key components of an IoT Governance model
• In addition to managing IoT solution development, the IoT
governance model defines principles, processes, and
standards in these areas:

• Device Portfolio Management, which deals with life cycle


funding of devices, sharing of devices, incentives and funding,
IT processes, and the corresponding changes necessary to
sustain a specific IoT target state.
• Device and platform vendor management helps with
identifying and managing the right vendors that are required
for the IoT solution.

• It also focuses on establishing a partnership strategy to


develop the end-to-end IoT solution because no one team or
vendor can deliver the full IoT solution.

• Vendor management for IoT is very important for several


reasons:
• Complexity of IoT solutions. Many different technologies and
hardware/software components are involved in any IoT
project.

• Domain-specific expertise. In addition to technical


capabilities, an IoT solution requires domain-specific analysis
expertise to create business value for the client.

• The combination of technical and industry domain skills


requires partnership with right team and vendors to make
sure that they are engaged at the right time and right level.
• Operational Management, which addresses device lifecycle
management, device monitoring, capacity and performance,
security, change management and device registry.

• This area addresses the various tools and changes to the


infrastructure that are required to operate and manage the
environment for IoT.
Four Reasons on how Data Governance is important for
IoT

• 1. Saves Money
• Governance saves money– and can also create income.
• Having a firm grasp on how you characterize central metrics, and
marketing avoidances, segments, and determined properties like
client lifetime value, can assist you to upgrade your advertising
efforts. Enhanced campaigns will produce more income.

• Solid governance models diminish information duplication – and


decrease duplicate information administration endeavors. With better
quality data, organizations likewise diminish the probability of
mistakes.

• Lesser mistakes and more noteworthy understanding equivalents to


better data effectiveness – which additionally cuts down the costs.
• 2. Saves from Risk
• An absence of powerful governance is a security threat for
two reasons: regulatory compliance issues and outside
security dangers related to filthy and unstructured
information.

• Bad data and badly organized information represents a


security hazard for the basic reason in case that you have
unstructured information jamming up your database.

• Good governance devices and practices make it simpler to


screen what is going on over your database. Additionally, good
data governance will make it less demanding to perceive what
regions might be in danger.
• 3. Gives Clarity
• Anything under 100% faith in analytics data prompts cerebral
pains and guess works.

• More prominent clarity implies more trust in data-driven


choices. Because of having more confidence, you can develop
the speed with which you can settle on information related
choices and decisions.

• Information security rules guarantee every one of your


activities supports significant protection strategies
• 4. Guarantee Data consistency, Repeatability, and Reliability
• Dealing with your information implies characterizing
predictable metrics over the company. It helps to recognizes
what unique visitors or conversion rates are.

• Without reported measures around metrics, choices might be


made around false theories.

• Good governance likewise ensures information respectability


for future changes. Such changes may incorporate advancing
business challenges, rising technologies, and new data
patterns.
DATA in a Minute on INTERNET
IBM SAYS…
• One solution isn’t surprising: If you want to improve your IoT
governance to reduce risk, you have to define what your IoT
governance is. And you don’t have to look too far for an example.
Experts at IBM suggest using your IT governance strategy as a
blueprint, stating:

• IoT governance is an extension to IT governance, where IoT


governance is specifically focused on the lifecycle of IoT devices,
data managed by the IoT solution, and IoT applications in an
organization's IT landscape.

• IoT governance defines the changes to IT governance to ensure the


concepts and principles for its distributed architecture are managed
appropriately and are able to deliver on the stated business goals.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy