Wednesday, September 21, 2016

Internet of Things -Who could spoil the fun?


Category
Characteristic
Hackers
Observant, studious; Unauthorized, illegal access to computers and data; seeking to'penetrate' the system; may have a psychological urge to so do. 
White hackers
Self claimants to relatively harmless: they state they are normally operation improvement biased; they try to examine operational mistakes.
Crackers
Serious offenders, can cause serious damage to the IoT system.  Enters with the intentional purpose of obtaining unauthenticated access to someone else’s information and data.
Vandals
Could access systems to deletes files, reformat hard disks at will; cause serious breach through pilferage; loss of inventoried information data; data may be irretrievable. 
Jokers
Relatively minor players; not so harmful; (a probable group of possible braggarts; those who wanna prove they can).
Breakers
Very serious offenders - Professionals who can comprehend, make and unmake programs; thieves of data; spies for profits; proxy fighters; invaders backed by real war-mongers
Phreakers
(Common among less developed countries; some segments of expatriates in the Gulf): they break into telephone systems - use phone networks to evade payment of  big telephone bills; obtain access codes; steal telephone , information; may use phone cards and access numbers in an illicit manner with purpose to transfer telephone conversation charges to other people. (See also collectors below) 
Carders
Paying oneself with others’ cards
Cyber crows
The financial criminals -breakers into computer systems of financial and banking accounts. Obtain numbers of ATM, credit cards and some other valuable information; may sell obtained information to other people; could at from multiple locations in a concerted manner
Collectors (codes kids)
Interceptors of various passwords, codes and numbers of private phone companies that have access to global networks.

Computer pirates
Breakers of the highest order; specialized in illegal cracking of protection systems of licensed software and then sell it at prices that are significantly lower than prices of the manufacturers. 



References:-
1.  Researching the Psychology of Hackers
December 2, 2015  By Martin McKeay
accessed on 21st  September 2016
2. Cyberpsychologist Mary Aiken thinks we need to understand cybercriminal motivations, while mentoring young people with tech and hacking skills
accessed on 21st September 2016
3. Who hacks? Who cracks?
Accessed on 21 september 2016.

Tuesday, September 20, 2016

A Vacation de-stressed by an app.

The Internet of Family- Mamma is still the chief...

Will the IoT help my family efficiency frontier to a higher level? Electricity / other utilities would sense human beings around and usage so that energy / utility efficiency follow-  through auto-switch on and switch-off. Savings ensue.

 
Move your family efficiency curve to right thru IoT 


Source of Image: Wikipedia
As internet connects sensors through a labyrinthine web and as my egg tray (so also my entire grocery list) is linked to Walmart or Carrefour or BigBazaar, there would be economies of scale. There is the economic order quantity (eoq) possible for my grocer who shares gains with me. My family garners scale efficiency and obtains additional revenue savings streams. Grocer’s lists are drawn up by machines. Machines fill up trolleys at the super market to each member’s needs.

My children experience a world of foggy clouds and gain easier mathematical insights through usage of analytics. They practically optimize time by preferring the data based evidence. They know to reason and research. They are quieter: search operations keep them busy. Parents do not need to know all the answers. Robotics assists in knowledge support systems. My child is weak in numerics and is ably supported by the system through throwing up problems that make it fun to learn. Learning is updated and engaged in- on a continuous basis. Learning is as per child convenience. No complaints of a strain. 

Machines help monitor children activity. Any deviation from mutually accepted norms would be accepted to be reported. Mamma is the sensor board chief. System should predict and prevent catastrophic children waywardness as wearable report friends, visits or group movements. Family privacy issues need to be sorted out, without the machines at the dinner table...
IoT thus are means for finding out what really is going on. Machines would now accurately pinpoint the root cause of children experiencing study problems. IoT would help youngsters avoid unnecessary study shutdowns owing to tedium. Machines assume counsellor roles and give advice anonymously. Most absorptive times (beneficial for child)  and intellectual outages are documented.   Time slots for peak learning are documented so that students register better.

Asset management improves dramatically. I can travel safer- sensors guard my home. Unknown characters likely to intrude in to my domain are reported to me in my car. 

Cars seek stacking of drinks to eatables to fuel and oil.  Cars detect driver moods and road side obstacles - 360 degrees. Cars speak to each other and to garage gates. Tyre replacement is announced through a process of applying analytics which feeds on number of times and the severity of applying brakes.  Sensors detect fissures in the railway tracks. Travel route timings to airport are on demand.
If one has health issues like blood pressure or diabetes gadgets advise of variations which could be detrimental to the person’s functional abilities. I am advised on corrective action. If my sleeping posture is detrimental to my spine my bed informs me on lurking fears and probable hazards.
My pill box monitor informs me of a forgotten tablet.  My wallet informs me of dwindling resources and might elect to nudge me towards an ATM. 
In kitchen, given the fed data, it could ask you to add in more salt or spice depending on the observed data of consumer preferences.
Based on predictive abilities, my machines would tell me what would make my family happier.  All I want is my family happy. 


Sunday, September 18, 2016

Recommended Readings on Internet of Schools


The Trends and Challenges Shaping Technology Adoption In Schools


https://ww2.kqed.org/mindshift/2016/09/16/the-trends-and-challenges-shaping-technology-adoption-in-schools/



The Connections Between Computer Use and Learning Outcomes in Students

Saturday, September 17, 2016

Readings on sensors, smart cars and smart homes...

Of Smart Cars under IoT

What could Google have in common with Lexus, Toyota, SEAT, BMW and Audi ?
Car Think!



Under the Internet of Things, cars could think and react and prompt. They could be paired to an owner’s smartphone, home, lighting, heating and control systems. They would be connected to various house appliances. All settings could be adjusted from behind the wheel.

Linkages to smartphones enables a duplication of the car dashboard so as to allow remote monitoring of things such as fuel and oil levels. Smartphones and smart cars would sync with home ecosystem and mobile devices.

The car’s geo-location software would work in tandem with the home cameras and innumerable other sensors, so that the owner and his assets are well connected and the owner well informed of the position.

Car owners could have reassuring car-to-home connectivity. (Car as a home away from home?) Owners would wire-less control connected devices at home from a remote point. Linked smoke detectors could convey any  smoke alarm to the car. A minor mishap like a garden pipe leak at home would be conveyed to the owner even as he is in the car. May be, if connected, the plumber would have an order to execute. 

Cars would communicate with parking lots in its search for parking spaces. Apps are already available to reserve parking slots against due payment. Problems of finding cars in huge sized parking lots are facilitated on the smart phone. Town restraints on parking could be detected and the owner informed of risks. (Parking prohibited in Troy on Wednesdays, for example) 

Alerts on status of car machines would be available. Any problem in the car could be detected; if there is need to fill in fuel, air oil etc. the car would notify. Efficiency levels and maintenance costs are minimized owing to early warning suggestions.The smart car would have diagnostic systems which analyse generated data points to predict latent vehicle issues before they really result in a problem.

Security features that keep the car connected in an emergency. eCall-equipped chip by 2018 that will automatically contact the nearest emergency centre in case of a collision. Plain breakdown could be reported real-time to breakdown services.

Cars could capture conversations and respond (e.g: How far is the ATM?) 

Sensors would also monitor driver behaviour and warn them of sleepy eyes or over limit alcohol intake. Thus IoT enters the arena of behaviourial oversight for safety's sake. Family / Chauffeur trackers that would send reports if the driver has violated agreed upon boundaries

Sensors of the Smart type would advise on: 
  • Road topography and conditions
  • Fuel Stations and rest rooms
  • Proximate vehicle distance
  • Obstacles in rear, sides and front
  • Blind spot manoeuvring
  • Air pressures
  • Vehicle engine and engineering
  • Seatbelts
  • Weather ahead
  • All electronic controls
  • All crucial elements like gears, brakes etc
  • Traffic management
  • Food to suit tastes!
We may need drivers no more!!!

Some References



Extract from a forthcoming book by the author. 

Thursday, September 15, 2016

Securing the Internet of Things from terrorism

Terrorists use the internet on a 4 R frame - to relate to, recruit, retain, and refer their clandestine network. They use the net to build bonds and networks, and to maintain dangerous relationships. Given a common mission (to disrupt if not destroy the State), they meet and tie together in virtual space platform.  

How do the terrorists use the internet?
  • Selling a radical ideology - the web as a medium to propagate.
  • Eavesdrop to  enable recruiting followers with an extreme bend of mind.
  • Virtually communicate in forms which are accessible to password restricted followers but inaccessible to authorities.
  • Deepening relationships through instilling fear within and without and creating the obsession of goal achievement.
  • Building protected cyber-forums.
  • Instilling hatred for the system.
  • Provoking the mind of the potential recruit (may be through a photo, a story, a harping on a series of stories.  call to action).
  • Exaltation of terrorism to obsessive levels in the psyche of the potential terrorist.
  • ‘Fundamentalizing’ thought from a level of acceptance of the neighbour to a level of abhorrence. 
  • Arranging stealth finance. Payment systems are used: funds are moved through electronic wire transfers, credit card or alternate payment facilities.
  • Using avenues like crowd funding, e-commerce to solicit funds for the illegal activities.  

  
Criminal activity in finance would include
  • identity theft,
  • access to account database,
  • credit card theft,
  • wire fraud,
  • stock fraud,
  • intellectual property crimes,
  • auction fraud, 
  • e-gold online payment accounts  
  • using commodity markets


Case 1: Younis Tsouli  (2005) built websites and ran web forums for terrorists. He was a distributor of video material for terrorists. He hijacked web sites; ran password-protected forums with large number of members which were used for military instructions. Laundered money was used to fund the registration of nearly 180 websites as also to equip terrorists across several countries. Approximately 1,400 credit cards generated approximately £1.6 million of crime driven money.

Case 2: Tariq Al-Daour (2006)  had 37,000 credit card details on his computer drives. These were obtained through phishing attacks or purchased in on-line forums where stolen information circulates. Gullible people were led to believe that they were verifying their accounts were unwittingly helping the group fund their terrorist activities.

As terrorists connect through cyberspace, IoT raises security issues as never before. Given that the devices are all inter-connected, theft at any one point could have a contagion effect with the criminal having recourse to a huge set of data. Ranging from electronic key to mobiles to identity theft, there are multiple avenues but also immense potential for harm. IoT would enable availability of movements and preferences of consumers,Criminal hackers could track these through a host of inter-connected devices. The security threat implicit in multiple connected devices has to be instilled in the consumer mind-set. In the absence of any IoT regulator, self regulatory standards by independent vendor are essential.

References:-
http://techonomy.com/2016/08/27253/

(Excerpts from a forthcoming book by the author) 

Operational Risks of IoT - Cyber-attacks

A cyber-attack is a deliberate, planned criminal use of computer networks to launch an attack against the intended victim, entity, organization or country.  The machine led virtual attacks aim to disrupt or at least weaken the optimal functioning of target entities. This disruption would result in a slowing of or 'freeze state' in regard to  the computer infrastructure. 

The modus operandi could be hacking, social media interventions, computer viruses, malware, ransomware, phlooding (“Phlooding” refers to the aiming at freezing the central organizational servers through intended, deliberate overloading of the servers, which consequentially slows systems or stalls the systems) etc. Inevitably, there is a  service delay or denial to customers.   

Cyberattacks will instil fear of a different variety. The withdrawal of balances through ATM in remote places (as recently happened in India) is sufficient to cause panic in general public. Imagine then,  a series of crippling attacks as was seen in Israel in January 2012, involving the targeting of multiple representational Israeli websites.

Case 1 : In January 2012, hackers stuck at financial muscle of Tel Aviv - the Stock Exchange, and the First International Bank. There was a DOS attack. – denial of service. The disclosure of the credit card and account details of thousands of Israeli nationals - Banking Supervision Department of Bank of Israel said 15000 accounts were broken  into - unnerved public at large. The e-attacker, OxOmar and sometime earlier, the Gaza Hackers Team which had usurped Israeli fire services website,  had indicated the operational risks in using internet.

Case 2 - One of the big US  banks went public in 2014 that it systems had been susceptible. Data of seventy six million household customers and seven million businesses, had been reportedly run over. Their names, email addresses and telephone numbers were in the hands of intruders.

The cyber-attackers are obsessed with religious, political or social objectives. They will continue to orchestrate run on the systems without any fear of the future. Any country can be attacked any time,  anywhere.   

As IoT evolves and seeks to put in place an elaborate pattern of connected systems, contagion risk is very high. We need to erect moats to safeguard the fort of Internet of Things.

References:
http://edition.cnn.com/2012/11/19/tech/web/cyber-attack-israel-anonymous/
http://www.bbc.com/news/world-16577184 
http://www.timesofisrael.com/israelis-in--hack-case-to-be-extradited-to-us/

(Excerpts from a forthcoming book by the author) 

Further Readings: Internet of Things

Wednesday, September 14, 2016

The Internet of Insecurity- Fear as the Key.

Watch Your Wearable 
In the world of internet of things, (IoT) inter-connected smart household devices would have / abet surveillance capabilities. This could intrude privacy. These inter-connected devices are  vulnerable to hacking. 

  • As IoT knits together automobiles, electricity, air-conditioners, dishwashers, refrigerators, alarm systems etc., their security features could be broken into by a determined impostor or a group of criminal 'infiltrators'.
  • Hackers could access networks through pilfered user authorisations. Stealing identification, tracking down locations of a community of individuals etc. would be possible.
  • Hackers could intercept / read/ analyse signals emanating from the newly networked devices, Hardware could be easily penetrated and web connected machines stand exposed.   
  • Political strategy to accentuate the division of sects  has technological repercussions. The  fragmented groups  may have opened a new war zones with web warfare. As they become fragmented, it becomes difficult to track. 

Evolving threats identified by establishment agencies all around are:

  1. Individual criminals;
  2. Extremist Groups like the Islamic State using online hacking as a weapon ;
  3. Clandestine, detached groups using them;
  4. Online hacking - breakdown threats to www; 
  5. Using social media to eavesdrop/ influence; 
  6. Money laundering using internet fund transfer;
  7. Financing of disruptive terrorist activities using systems;
  8. Potentially ne'er-do-well states using them in frustration ;
  9. Power seeker nations seeking to destroy competitor's systems T

These 'infiltrators' could indulge in:
  • spying, 
  • deliberate placement of disinformation, 
  • theft of identity and data, 
  • open and subtle propaganda of their belief systems 
  • stealth attacks on data in singular or multiple patterns.  

Together, these negative approaches have immense destruction capabilities. The future of online security lies in the ability to proactively stall potential criminals through offensive and defensive mechanisms.  With authorities in the US suggesting that Russia and China may have more sophisticated cyber programmes, an on line warfare seems to be in the offing to substitute the cold war era.  

These 'infiltrators' could easily listen into or tap the millions of signals which would follow the internet of things. 

The Age of Insecurity is here.

Excerpts from a forthcoming book by the author

Friday, September 9, 2016

Top Online Learning Places...


Check these to read: might be interesting...

50 Top Online Learning Sites



Addendum....
10 Highly Effective Study Habits By John M. Grohol, Psy.D.

  • "Avoid catastrophic thinking. Instead of thinking, “I’m a mess, I’ll never have enough time to study for this exam,” look at it like, “I may be a little late to study as much as I’d like, but since I’m doing it now, I’ll get most of it done.”"
 

Micro-learning— Miniaturizing delivery - Some Short Reads..

Blended learning goes better with micro-learning. Learning  under this category of delivery is short and in 'retain-able' doses. The philosophy is 'Brevity is the soul of wit'. Learn little, learn long. Short, 'absorb-able', bit sized learning.  One hour sessions are obsolete. The input may run for just about   3-5 minutes - just in time capsule -designed to meet a specific learning outcome.


'The sources  are accessible via various devices ranging from mobile phones to tablets to laptop computers. The delivery is in formats like ranging from videos, blogs, games, quizzes, simulations, to podcasts.