Thursday, September 22, 2016
Wednesday, September 21, 2016
Internet of Things -Who could spoil the fun?
Category
|
Characteristic
|
Hackers
|
Observant, studious; Unauthorized,
illegal access to computers and data; seeking to'penetrate' the system; may have a psychological urge to so do.
|
White hackers
|
Self claimants to relatively harmless: they state they are normally operation improvement biased; they try to examine operational mistakes.
|
Crackers
|
Serious offenders, can cause serious damage to the IoT system. Enters with the intentional purpose of obtaining unauthenticated access to someone else’s information and data.
|
Vandals
|
Could access systems to deletes
files, reformat hard disks at will; cause serious breach through pilferage; loss of inventoried information data; data may be irretrievable.
|
Jokers
|
Relatively minor players; not so harmful; (a probable group of possible braggarts; those who wanna prove they can).
|
Breakers
|
Very serious offenders - Professionals who can comprehend, make and unmake programs; thieves of data; spies for profits; proxy fighters; invaders backed by real war-mongers
|
Phreakers
|
(Common
among less developed countries; some segments of expatriates in the Gulf): they break into telephone systems - use phone networks to evade payment of big telephone bills; obtain access codes; steal telephone ,
information; may use phone cards and access numbers in an illicit manner with purpose
to transfer telephone conversation charges to other people. (See also collectors below)
|
Carders
|
Paying oneself with others’ cards
|
Cyber crows
|
The financial criminals -breakers into computer systems of financial and banking accounts. Obtain
numbers of ATM, credit cards and some other valuable information; may sell obtained
information to other people; could at from multiple locations in a concerted manner
|
Collectors (codes kids)
|
Interceptors of various passwords, codes and numbers of private phone
companies that have access to global networks.
|
Computer pirates
|
Breakers of the highest order; specialized in illegal cracking of protection systems of licensed
software and then sell it at prices that are significantly lower than prices
of the manufacturers.
|
References:-
1. Researching the Psychology of Hackers
December 2, 2015 By Martin McKeay
accessed on 21st September 2016
2. Cyberpsychologist Mary
Aiken thinks we need to understand cybercriminal motivations, while mentoring
young people with tech and hacking skills
accessed on 21st September 2016
3. Who
hacks? Who cracks?
Date: May 10 2004. source: computer crime research center: Victor Sabadash
http://www.crime-research.org/news/10.05.2004/246/
http://www.crime-research.org/news/10.05.2004/246/
Accessed on 21 september
2016.
Tuesday, September 20, 2016
The Internet of Family- Mamma is still the chief...
Will the IoT help my family efficiency frontier to a higher
level? Electricity / other utilities would sense human beings around and usage so
that energy / utility efficiency follow- through auto-switch on and switch-off. Savings
ensue.
![]() |
Source of Image: Wikipedia |
My children experience a world of foggy clouds and gain easier mathematical insights through usage of analytics. They practically optimize time by preferring the data based evidence. They know to reason and research. They are
quieter: search operations keep them busy. Parents do not need to know all the
answers. Robotics assists in knowledge support systems. My child is weak in
numerics and is ably supported by the system through throwing up problems that
make it fun to learn. Learning is updated and engaged in- on a continuous
basis. Learning is as per child convenience. No complaints of a strain.
Machines help monitor children activity. Any deviation from
mutually accepted norms would be accepted to be reported. Mamma is the sensor board
chief. System should predict and prevent catastrophic children waywardness as
wearable report friends, visits or group movements. Family privacy issues need to be sorted
out, without the machines at the dinner table...
IoT
thus are means for finding out what really is going on. Machines would now accurately pinpoint the root cause of children experiencing
study problems. IoT would help youngsters avoid unnecessary study shutdowns
owing to tedium. Machines assume counsellor roles and give advice anonymously. Most
absorptive times (beneficial for child) and intellectual outages are documented. Time
slots for peak learning are documented so that students register better.
Asset management improves dramatically. I can travel safer- sensors
guard my home. Unknown characters likely to intrude in to my domain are
reported to me in my car.
Cars seek stacking of drinks to eatables to fuel and oil. Cars detect driver moods and road side obstacles - 360 degrees. Cars speak to each other and to garage gates. Tyre replacement is announced through a process of applying analytics which feeds on number of times and the severity of applying brakes. Sensors detect fissures in the railway tracks. Travel route timings to airport are on demand.
Cars seek stacking of drinks to eatables to fuel and oil. Cars detect driver moods and road side obstacles - 360 degrees. Cars speak to each other and to garage gates. Tyre replacement is announced through a process of applying analytics which feeds on number of times and the severity of applying brakes. Sensors detect fissures in the railway tracks. Travel route timings to airport are on demand.
If one has health issues like blood pressure or diabetes gadgets
advise of variations which could be detrimental to the person’s functional abilities.
I am advised on corrective action. If my sleeping posture is detrimental to my
spine my bed informs me on lurking fears and probable hazards.
My
pill box monitor informs me of a forgotten tablet. My wallet informs me of dwindling resources
and might elect to nudge me towards an ATM.
In
kitchen, given the fed data, it could ask you to add in more salt or spice
depending on the observed data of consumer preferences.
Based
on predictive abilities, my machines would tell me what would make my family
happier. All I want is my family happy.
Monday, September 19, 2016
Sunday, September 18, 2016
Recommended Readings on Internet of Schools
The Trends and Challenges Shaping Technology Adoption In Schools
https://ww2.kqed.org/mindshift/2016/09/16/the-trends-and-challenges-shaping-technology-adoption-in-schools/
The Connections Between Computer Use and Learning Outcomes in Students
Saturday, September 17, 2016
Readings on sensors, smart cars and smart homes...
6 Affordable Vehicles with Collision Warning Systems
The Game Has Been Escalated': Pentagon Eyes Space Sensors for Missile Defense Read more: https://sputniknews.com/military/20160902/1044871551/pentagon-space-sensors.html
8 vehicles earn top rating for collision warning
Even the bad guys will stare
The Game Has Been Escalated': Pentagon Eyes Space Sensors for Missile Defense Read more: https://sputniknews.com/military/20160902/1044871551/pentagon-space-sensors.html
8 vehicles earn top rating for collision warning
Even the bad guys will stare
Of Smart Cars under IoT

Car Think!
Under the
Internet of Things, cars could think and react and prompt. They could be paired to
an owner’s smartphone, home, lighting, heating and control systems. They would be
connected to various house appliances. All settings could be adjusted
from behind the wheel.
Linkages to smartphones enables a duplication of the car dashboard so as to allow remote monitoring of things such as fuel and oil levels. Smartphones and smart cars would sync with home ecosystem and mobile devices.
Linkages to smartphones enables a duplication of the car dashboard so as to allow remote monitoring of things such as fuel and oil levels. Smartphones and smart cars would sync with home ecosystem and mobile devices.
The car’s geo-location software would work in tandem with the home cameras and innumerable other sensors, so that the owner and his assets are well connected and the owner well
informed of the position.
Car owners could have reassuring car-to-home connectivity. (Car as a home away from home?) Owners would wire-less control connected devices at home from a remote point. Linked smoke detectors could convey any smoke alarm to the car. A minor mishap like a garden pipe leak at home would be conveyed to the owner even as he is in the car. May be, if connected, the plumber would have an order to execute.
Car owners could have reassuring car-to-home connectivity. (Car as a home away from home?) Owners would wire-less control connected devices at home from a remote point. Linked smoke detectors could convey any smoke alarm to the car. A minor mishap like a garden pipe leak at home would be conveyed to the owner even as he is in the car. May be, if connected, the plumber would have an order to execute.
Cars would communicate with parking lots in its search for parking spaces.
Apps are already available to reserve parking slots against due payment. Problems
of finding cars in huge sized parking lots are facilitated on the smart phone. Town restraints on parking could be detected and the owner informed of risks. (Parking prohibited in Troy on Wednesdays, for example)
Alerts on status of car machines would be available. Any problem in the car could
be detected; if there is need to fill in fuel, air oil etc. the car would notify. Efficiency levels and maintenance costs are minimized owing to early
warning suggestions. The smart car would have diagnostic systems which analyse generated data points to predict latent vehicle issues before they really result in a problem.
Security features that keep the car connected in an emergency. eCall-equipped chip by 2018 that will automatically contact the nearest emergency centre in case of a collision. Plain breakdown could be reported real-time to breakdown services.
Cars could capture conversations and respond (e.g: How far is the ATM?)
Cars could capture conversations and respond (e.g: How far is the ATM?)
Sensors would also monitor driver behaviour and warn them of sleepy
eyes or over limit alcohol intake. Thus IoT enters the arena of behaviourial oversight for safety's sake. Family / Chauffeur trackers that would send reports if the driver has
violated agreed upon boundaries
Sensors of the Smart type would advise on:
- Road topography and conditions
- Fuel Stations and rest rooms
- Proximate vehicle distance
- Obstacles in rear, sides and front
- Blind spot manoeuvring
- Air pressures
- Vehicle engine and engineering
- Seatbelts
- Weather ahead
- All electronic controls
- All crucial elements like gears, brakes etc
- Traffic management
- Food to suit tastes!
We may need drivers no more!!!
Some References
Thursday, September 15, 2016
Securing the Internet of Things from terrorism
Terrorists use the internet on a 4 R frame - to
relate to, recruit, retain, and refer
their clandestine network. They use the net to build bonds and networks, and to
maintain dangerous relationships. Given a common mission (to disrupt if not
destroy the State), they meet and tie together in virtual space platform.
How do the terrorists use the
internet?
- Selling a radical ideology - the web as a medium to propagate.
- Eavesdrop to enable recruiting followers with an extreme bend of mind.
- Virtually communicate in forms which are accessible to password restricted followers but inaccessible to authorities.
- Deepening relationships through instilling fear within and without and creating the obsession of goal achievement.
- Building protected cyber-forums.
- Instilling hatred for the system.
- Provoking the mind of the potential recruit (may be through a photo, a story, a harping on a series of stories. call to action).
- Exaltation of terrorism to obsessive levels in the psyche of the potential terrorist.
- ‘Fundamentalizing’ thought from a level of acceptance of the neighbour to a level of abhorrence.
- Arranging stealth finance. Payment systems are used: funds are moved through electronic wire transfers, credit card or alternate payment facilities.
- Using avenues like crowd funding, e-commerce to solicit funds for the illegal activities.
Criminal activity in finance would include
- identity theft,
- access to account database,
- credit card theft,
- wire fraud,
- stock fraud,
- intellectual property crimes,
- auction fraud,
- e-gold online payment accounts
- using commodity markets
Case 1: Younis Tsouli (2005) built websites and ran web forums for terrorists. He was a distributor of video
material for terrorists. He hijacked web sites; ran password-protected forums
with large number of members which were used for military instructions. Laundered
money was used to fund the registration of nearly 180 websites as also to equip
terrorists across several countries. Approximately 1,400 credit cards generated
approximately £1.6 million of crime driven money.
Case 2: Tariq Al-Daour (2006) had 37,000 credit card details on his
computer drives. These were obtained through phishing attacks or purchased in
on-line forums where stolen information circulates. Gullible people
were led to believe that they were verifying their accounts were unwittingly
helping the group fund their terrorist activities.
As terrorists connect through cyberspace, IoT raises security issues as never before. Given that the devices are all inter-connected, theft at any one
point could have a contagion effect with the criminal having recourse to a huge set of data. Ranging
from electronic key to mobiles to identity theft, there are multiple avenues but also immense potential for harm. IoT would enable availability of movements and preferences of consumers,Criminal hackers could track these through a host of inter-connected
devices. The security threat implicit in multiple connected devices has to be
instilled in the consumer mind-set. In
the absence of any IoT regulator, self regulatory standards by independent vendor
are essential.
References:-
http://techonomy.com/2016/08/27253/
(Excerpts from a forthcoming book by the author)
Operational Risks of IoT - Cyber-attacks
A cyber-attack is a deliberate, planned criminal
use of computer networks to launch an attack against the intended victim, entity,
organization or country. The machine led virtual attacks aim to disrupt or at least weaken the optimal functioning of
target entities. This disruption would result in a slowing of or 'freeze state' in regard to the computer infrastructure.
The modus operandi could be hacking, social media interventions, computer viruses, malware, ransomware, phlooding
(“Phlooding” refers to the aiming at freezing the central organizational servers
through intended, deliberate overloading of the servers, which consequentially
slows systems or stalls the systems) etc. Inevitably, there is a service delay or denial to customers.
Cyberattacks
will instil fear of a different variety. The withdrawal of balances through ATM
in remote places (as recently happened in India) is sufficient to cause panic
in general public. Imagine then, a
series of crippling attacks as was seen in Israel in January 2012, involving
the targeting of multiple representational Israeli websites.
Case 1 : In
January 2012, hackers stuck at financial muscle of Tel Aviv - the Stock
Exchange, and the First International Bank. There was a DOS attack. – denial of
service. The disclosure of the credit card and account details of thousands of
Israeli nationals - Banking Supervision Department of Bank of Israel said
15000 accounts were broken into - unnerved
public at large. The
e-attacker, OxOmar and sometime earlier, the Gaza Hackers Team which had usurped Israeli
fire services website, had indicated the operational risks in using internet.
The
cyber-attackers are obsessed with religious, political or social objectives. They will continue to orchestrate run on the systems without any fear of the future. Any country can be attacked any time, anywhere.
As IoT evolves and seeks to put in place an elaborate pattern of connected
systems, contagion risk is very high. We need to erect moats to safeguard the fort of Internet of Things.
References:
http://edition.cnn.com/2012/11/19/tech/web/cyber-attack-israel-anonymous/
http://www.bbc.com/news/world-16577184
http://www.timesofisrael.com/israelis-in--hack-case-to-be-extradited-to-us/
(Excerpts from a forthcoming book by the author)
Wednesday, September 14, 2016
The Internet of Insecurity- Fear as the Key.
![]() |
Watch Your Wearable |
- As IoT knits together automobiles, electricity, air-conditioners, dishwashers, refrigerators, alarm systems etc., their security features could be broken into by a determined impostor or a group of criminal 'infiltrators'.
- Hackers could access networks through pilfered user authorisations. Stealing identification, tracking down locations of a community of individuals etc. would be possible.
- Hackers could intercept / read/ analyse signals emanating from the newly networked devices, Hardware could be easily penetrated and web connected machines stand exposed.
- Political strategy to accentuate the division of sects has technological repercussions. The fragmented groups may have opened a new war zones with web warfare. As they become fragmented, it becomes difficult to track.
Evolving threats identified by establishment agencies all around are:
- Individual criminals;
- Extremist Groups like the Islamic State using online hacking as a weapon ;
- Clandestine, detached groups using them;
- Online hacking - breakdown threats to www;
- Using social media to eavesdrop/ influence;
- Money laundering using internet fund transfer;
- Financing of disruptive terrorist activities using systems;
- Potentially ne'er-do-well states using them in frustration ;
- Power seeker nations seeking to destroy competitor's systems T
These 'infiltrators' could indulge in:
- spying,
- deliberate placement of disinformation,
- theft of identity and data,
- open and subtle propaganda of their belief systems
- stealth attacks on data in singular or multiple patterns.
Together, these negative approaches have immense destruction capabilities. The future of online security lies in the ability to proactively stall potential criminals through offensive and defensive mechanisms. With authorities in the US suggesting that Russia and China may have more sophisticated cyber programmes, an on line warfare seems to be in the offing to substitute the cold war era.
These 'infiltrators' could easily listen into or tap the millions of signals which would follow the internet
of things.
The Age of Insecurity is here.
Excerpts from a forthcoming book by the author
Friday, September 9, 2016
Top Online Learning Places...
Check these to read: might be interesting...
50 Top Online Learning Sites
Addendum....
10 Highly Effective Study Habits By John M. Grohol, Psy.D.
- "Avoid catastrophic thinking. Instead of thinking, “I’m a mess, I’ll never have enough time to study for this exam,” look at it like, “I may be a little late to study as much as I’d like, but since I’m doing it now, I’ll get most of it done.”"
Micro-learning— Miniaturizing delivery - Some Short Reads..
Blended learning goes better with micro-learning. Learning under this category of delivery is short and in 'retain-able' doses. The philosophy is 'Brevity is the soul of wit'. Learn little, learn long. Short, 'absorb-able', bit sized learning. One hour sessions are obsolete. The input may run for just about 3-5 minutes - just in time capsule -designed to meet a specific learning outcome.
'The sources are accessible via various devices ranging from mobile phones to tablets to laptop computers. The delivery is in formats like ranging from videos,
blogs, games, quizzes, simulations, to podcasts.
Microlearning is focused nugget learning.
References:
Microteaching, an efficient technique for learning effective teaching Ambili Remesh
The Microlearning Trend: Accommodating Cultural and Cognitive Shifts
Wednesday, September 7, 2016
Subscribe to:
Posts (Atom)