2016 AFCEA TechNet Asia-Pacific Conference & Expo

Continuing Education Course 4: "The Evolution of the Internet of Things (IoT)" (Room Nautilus Suite)

16 Nov 16
2:00 PM - 3:30 PM

Tracks: Continuing Education

Approved for 1 CompTIA CEU:  A+ and Network+; 1 GIAC CPE

The 90 minute presentation will focus on the evolution, revolution and convolution of the Internet of Things (IoT) with embedded devices. Humans have always tried to make their lives easier for themselves through inventions and technology. Modern computer components have allowed the average user to surround themselves with more technology that few understand. Users have given up many of their privacy rights and security controls by employing easy to use technology that supposedly makes their life easier.

 

This talk will cover some of the major privacy laws as mentioned in the CISSP certification, along with recent technology advancements that influence those laws. These technology advancements will look at both commercialization, federal requirements (per the CEH certification and DoD FISMA) and user comprehension of how these advancements work (per NIST SP 800-12). The main source for technology advancements will be Internet of Things devices such as the Raspberry Pi, Beagle Bone Board, embedded computers such as the Texas Instruments Sensor Tag, environmental control computers (SCADA), Arduino microcontrollers and other microcomputer products.

 

Portions of the presentation will cover the functionality of smartphones including Harris Corporation’s Stingray line of cellular intercept products. Wireless communication (per CCNA 640-722) will be discussed as an overview of how most of the IoT devices provide utility as well as security vulnerabilities. The Open Source Security Testing Methodology Manual (OSSTMM) is used to show the relationship between technology trends and what the security community is failing to notice in IoT and all communication related devices.

 

The remainder of the presentation will cover the different types of microcomputers, their capabilities, their value as an asset and threat to an organization, and the expected future of micro devices.  We will discuss real examples of how these devices are used and can be used within an organization’s security realm.