top of page

Episode #6: What is an IoT? - Interview with an Artificial Cyber Intelligence

Episode #6: What is an IoT?

Everything is connected. In this episode we explore the world of internet connected devices and smart appliances, what it means for you and your personal security. Our AI even creates an awesome jingle about network security!


Episode #6: What is an IoT?

What is an IoT?

The Internet of Things (IoT) refers to the growing network of connected devices that have the ability to communicate and exchange data with each other and with other systems over the internet. These devices include everyday objects that have been equipped with internet connectivity, such as smart home appliances, wearable technology, and industrial equipment.

The IoT allows for the automation and control of these devices through remote access, as well as the collection and analysis of data from these devices. The potential applications of the IoT are vast and include everything from smart homes and cities to the optimization of industrial processes and the improvement of healthcare.

However, the increasing number of connected devices also presents new challenges in terms of security and privacy. IoT devices may not have the same level of security as traditional computers, making them vulnerable to cyber attacks. It is important for individuals and organizations to be aware of the security risks associated with the use of IoT devices and to take steps to protect themselves and their systems.


Can you give some examples of IoT devices and why they need an internet connection?

Some common examples of IoT devices include:

  • Smart home appliances: These are household appliances, such as thermostats, lighting systems, and security systems, that can be controlled and monitored remotely through a smartphone app or web interface. These devices often require an internet connection to function properly and to allow for remote access and control.

  • Wearable technology: Devices such as smartwatches and fitness trackers use sensors to collect data about the wearer and often require an internet connection to transmit this data to a companion app or to the cloud for storage and analysis.

  • Industrial equipment: Industrial equipment, such as manufacturing machines and transportation systems, may be connected to the internet to allow for remote monitoring and control, as well as the collection and analysis of data to optimize performance and maintenance.

  • Medical devices: Medical devices, such as insulin pumps and pacemakers, may be connected to the internet to allow for remote monitoring and to enable the sharing of data with healthcare providers.

The internet connection allows these devices to communicate and exchange data with other systems and devices, and to be accessed and controlled remotely. However, it also exposes them to potential cyber attacks if proper security measures are not in place.


What kinds of information do IoT devices capture?

IoT devices can capture a wide range of information, depending on their capabilities and intended use. Some common types of information that IoT devices may capture include:

  • Location data: Many IoT devices, such as smart watches and GPS tracking devices, have the ability to determine their location using GPS or other location-sensing technologies.

  • Environmental data: Some IoT devices, such as smart thermostats and air quality monitors, are designed to gather data about the environment in which they are located. This can include information about temperature, humidity, and other factors.

  • User activity data: Some IoT devices, such as fitness trackers and smart home devices, are designed to track and record user activity. This can include data about physical activity, sleep patterns, and other behaviors.

  • User-generated content: Some IoT devices, such as home security cameras and smart speakers, allow users to create and store content on the device. This can include audio and video recordings, as well as other types of data.

  • Personal information: Some IoT devices may collect personal information from users, such as their name, age, and contact information. This information is often used to personalize the user experience or to provide personalized recommendations or advertisements.


I have a smart watch and an Alexa. What security risks are associated with these IoTs and how can I protect myself?

There are several security risks associated with IoT devices, such as smart watches and home assistants like Alexa:

  • Lack of security: Many IoT devices have poor security measures, such as weak passwords, unencrypted communication channels, and the use of outdated software. This makes them vulnerable to cyber attacks, such as hacking and malware infections.

  • Data privacy: IoT devices often collect and transmit a large amount of personal data, such as location, activity, and health information. If this data is not properly secured, it could be accessed by unauthorized parties, potentially leading to privacy violations.

  • Denial of service: Cyber criminals may attempt to disrupt the operation of IoT devices through denial of service attacks, preventing them from functioning properly.

To protect yourself from these risks, there are a few steps you can take:

  • Keep your devices and their software up to date with the latest security patches and updates.

  • Be cautious when connecting to unfamiliar networks and avoid sharing sensitive data over public WiFi.

  • Use a virtual private network (VPN) to encrypt your internet traffic and protect your data from being intercepted.

  • Carefully review the privacy policies of IoT device manufacturers and understand how your data is being collected and used.


Do IoT devices listen and record my conversations in order to target advertising or to build a digital profile of myself?

It is possible for some IoT devices to record and transmit audio, and this data could potentially be used for targeted advertising or to build a digital profile of you. However, it is important to note that not all IoT devices have this capability, and the extent to which they may collect and use your data will depend on their specific functionality and the privacy policies of the manufacturer.

If you are concerned about your privacy with regards to IoT devices, there are a few things you can do to protect yourself:

  • Research the device and manufacturer before purchasing, and carefully review their privacy policies to understand how your data will be collected and used.

  • Enable any available privacy settings on the device, such as turning off audio recording or disabling the transmission of personal data.

  • Use a physical or virtual privacy screen to block the device's camera and microphone when not in use.

  • Regularly review the permissions you have granted to the device and consider revoking any that are no longer necessary.

  • Consider using a device that is specifically designed for privacy, such as a smart speaker with a built-in physical mute button for the microphone.


You've mentioned that virtual private networks (VPNs) are a good way to secure devices. Can you explain how a VPN works and why they are useful for increasing the security of devices?

A virtual private network (VPN) is a type of technology that creates a secure, encrypted connection between a device and a network. When you use a VPN, all of your internet traffic is routed through an encrypted tunnel to a server, which can be located anywhere in the world. This server then acts as a middleman, forwarding your traffic to its final destination while hiding your real IP address and encrypting your data.

There are several reasons why VPNs are useful for increasing the security of devices:

  • Privacy: VPNs can help protect your privacy by hiding your real IP address and encrypting your data, making it more difficult for third parties to track your online activities.

  • Anonymity: By using a VPN, you can browse the internet anonymously, as your real IP address is hidden and replaced with the IP address of the VPN server.

  • Geo-restriction bypass: VPNs can help you access content that is restricted in your location by routing your traffic through a server in a different country.

  • Protection from hackers: VPNs can help protect you from hackers by encrypting your internet connection and making it more difficult for them to intercept your data.

  • Security on public WiFi: VPNs can help protect your data when using public WiFi by encrypting your internet connection and preventing third parties from intercepting your data.

  • Protection from government surveillance: VPNs can help protect you from government surveillance by encrypting your internet connection and hiding your real IP address.


Wait, the government is doing surveillance on my activities online? Is that legal?

There are various levels of government surveillance that can occur online, and the legalities around them can depend on a number of factors, such as the country in which you live and the specific laws that apply in that country.

In some countries, governments may be able to legally access your online activities without your knowledge or consent, either through laws that allow them to do so or through the use of sophisticated hacking techniques. In other countries, there may be more stringent laws in place to protect citizens' privacy online.

It is always a good idea to be aware of the laws and regulations that apply to you and to take steps to protect your privacy online, such as using a VPN or encrypting your internet connection. This can help protect you from unwanted surveillance and ensure that your online activities remain private.


So, a VPN can protect my privacy, but they can also be used by hackers to avoid being captured by the authorities?

Yes, that's correct. While VPNs can be useful tools for increasing the privacy and security of your online activities, they can also be used by hackers to try to conceal their activities and avoid being detected by authorities.

Hackers may use VPNs to try to mask their IP addresses and hide their location, making it more difficult for law enforcement to trace their activities back to them. They may also use VPNs to try to bypass security measures and gain unauthorized access to networks and systems.

It's important to note that not all VPNs are created equal, and some may be more secure than others. It's a good idea to do your research and choose a reputable VPN provider that takes steps to protect your privacy and security.


How can hackers get caught for committing cyber crimes if they all use a VPN?

While VPNs can make it more difficult for authorities to trace the activities of hackers, they are not foolproof and there are ways that law enforcement can still try to track and identify hackers.

One way that hackers can be caught is through the use of honeypots, which are specially-designed security systems that are set up to attract and trap hackers. These systems can be used to monitor and record the activities of hackers, providing valuable information that can be used to identify and track them.

Another way that hackers can be caught is through the use of forensic analysis, which involves the examination of digital evidence left behind on systems and devices. This can include analyzing log files, examining network traffic, and analyzing malware code to try to identify the perpetrators of cyber crimes.

Finally, law enforcement agencies may also work with international partners and use other investigative techniques, such as human intelligence gathering and undercover operations, to try to catch hackers.


Can you explain the forensic analysis process when trying to determine the culprit of a cyber attack?

Forensic analysis is a process that is used to examine digital evidence in order to identify the perpetrators of cyber crimes. This can involve a number of different steps, including:

  • Collection of evidence: The first step in forensic analysis is to collect evidence from the affected systems and devices. This may involve making copies of hard drives, extracting log files, and capturing network traffic data.

  • Preservation of evidence: Once the evidence has been collected, it is important to preserve it in a way that ensures its integrity. This may involve creating a chain of custody and storing the evidence in a secure location.

  • Analysis of evidence: The next step is to analyze the collected evidence in order to identify any patterns or anomalies that may help to identify the perpetrators of the cyber attack. This may involve analyzing log files, examining network traffic, and analyzing malware code.

  • Presentation of findings: Once the analysis is complete, the results are typically presented in a report or other document that can be used as evidence in legal proceedings.

Forensic analysis can be a complex and time-consuming process, but it can be an important tool for identifying and prosecuting those responsible for cyber attacks.


You also mentioned honeypots. Is that like a mouse trap but for cyber criminals?

Honeypots are a security tool that is designed to attract and mislead attackers. They can be used to divert attention away from critical systems, to gather intelligence on an attacker's tactics, techniques, and procedures, or to mislead an attacker into believing they have achieved their objectives when they have not.

Honeypots are typically deployed on a network in such a way that they appear to be legitimate resources, but they do not contain any sensitive or valuable data. If an attacker interacts with a honeypot, it can alert the security team and provide them with valuable information about the attack and the attacker. Essentially, honeypots act as a trap for attackers, just like a mouse trap catches mice.


Instead of using a honeypot, are there easier ways to secure my home network?

Yes, there are several things you can do to secure your home network:

  • Use a strong password for your Wi-Fi network: Make sure your Wi-Fi password is at least 8 characters long and includes a combination of letters, numbers, and symbols.

  • Enable WPA2 encryption: This is the most secure encryption method available for Wi-Fi networks.

  • Use a firewall: A firewall can help protect your home network by blocking incoming traffic from the internet that you don't want.

  • Update your router's firmware: Manufacturers release updates to fix security vulnerabilities, so it's important to keep your router's firmware up to date.

  • Enable network-level authentication: This requires a user to enter a username and password before they can access your network.

  • Change the default administrator password: Many routers come with a default administrator password that is easy to guess. Change it to something more secure.

  • Enable MAC filtering: This allows you to specify which devices are allowed to connect to your network.

  • Turn off remote administration: This prevents hackers from accessing your router's settings remotely.


Great! Using what you've explained to be about securing my home network, can you please write a catchy jingle?

Here's a jingle about securing your home network:

Secure your home network, it's easy as can be

Just follow these simple steps and you'll feel free

Change your router's name and password, make it strong

Update your software and don't forget to turn your firewall on

Keep an eye out for phishing scams and use a VPN

Your home network will be safe, don't let the hackers in!


bottom of page