Internet of everything
Internet of everything

This free course is available to start right now. Review the full course description and key learning outcomes and create an account and enrol if you want a free statement of participation.

Free course

Internet of everything

4.3 Security and the IoE

Security has become the primary concern for all interconnected computer systems. The IoE is not immune to attack and a good system should be designed with security in mind. In this section you will cover security architecture and policies, what may be a beneficial security strategy, the pervasive nature of security, security devices, wireless security, the risk of personal data with the IoE and system redundancy and how this assures security.

The increased number of connected devices and the amount of data they generate increases the demand for security of that data.

Watch the video of John Stewart, Senior Vice President, Chief Security Officer at Cisco Systems, discussing how to secure billions of devices in the IoE.

Download this video clip.Video player: ioe_1_video_4_3_1_1_security_included.mp4
Skip transcript


Hi. My name's John Stewart. I'm chief security officer here at Cisco. It is amazing to live in a time where there are more IP-addressable devices connected on the face of the earth than there are people. And it's really daunting to think about the fact that in the span of less than 10 years there are potentially going to be 50 billion IP-addressable systems on the internet.
Things like cameras, things like identity-card readers, things like people, things like cars, things like-- yes, believe it or not-- houses that tweet or trees that are tweeting or diapers that have their own iPhone app in order to make sure you can detect if your young kid has actually got to be changed. This innovation is happening all around us right now.
Part of what we're beginning to realise here at Cisco is that, as this transforms our world, companies like Samsung, General Electric, certainly ourselves, we have to build security into it and build it sort of in a different way. All the security capabilities that PCs were able to run can't be run on phones. Even the security features on phones can't always be run on the next-generation tablets. If you can run it on a tablet you might not be able to run it on a small sensor that's detecting air quality. So the entire concept of security is changing around our eyes.
Here's what we're aiming to do. We think there's a huge opportunity for both networks, service providers, and security in a quote-unquote "cloud configuration" to protect the devices that are being brought online. This should, all going smoothly-- and this is the test-- enable a house to be better protected, enable a car to be better protected, enable us to be able to crowdsource and protect one another's systems, because we're actually cooperating electronically. And it should, in the end analysis, enable the 50 billion IP-addressable systems that are coming online.
Here's the thing. They're going to come online anyway. So the designing of security now, which is to basically think about the problem today and enable it inside of the network-- and you give me another place it could be enabled, and I'm willing to listen. I don't know of one, and I've been in this industry for about 25 years. I think it's the only place it's going to get done. It's not only because I'm at Cisco, it's because I've actually defended networks for this long.
And the network of the future is the one that's going to need a network with security built in. That's one of our goals. Proof's in the pudding. You end up telling us how we're doing. Thanks.
End transcript
Copy this transcript to the clipboard
Print this transcript
Interactive feature not available in single page view (see it in standard view).

Hacking attacks are a daily occurrence, and it seems no organisation is immune. Given how easy it is to steal and misuse information in today’s connected world, it is only natural to be concerned about this problem as people, process, data, and things all become connected in the IoE. In the video, DARPA and Car Hacking [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)] , Dr. Kathleen Fisher of the Defense Advanced Research Projects Agency (DARPA) describes how a hacker could control the operation of a motor vehicle remotely.


Take your learning further

Making the decision to study can be a big step, which is why you'll want a trusted University. The Open University has 50 years’ experience delivering flexible learning and 170,000 students are studying with us right now. Take a look at all Open University courses.

If you are new to university level study, find out more about the types of qualifications we offer, including our entry level Access courses and Certificates.

Not ready for University study then browse over 900 free courses on OpenLearn and sign up to our newsletter to hear about new free courses as they are released.

Every year, thousands of students decide to study with The Open University. With over 120 qualifications, we’ve got the right course for you.

Request an Open University prospectus