IOTY Protocol, for worldwide IoT devices
  • πŸ•ΆοΈOverview
  • πŸ’‘Introduction
    • πŸ§˜β€β™‚οΈOur vision: make accessible IoT
    • πŸš€IoT: a growth market
    • πŸ€–Problem: interoperability
    • βš™οΈHow blockchain works
      • πŸ—³οΈTrust through blockchain
      • πŸ“”Automate actions with smart contracts
    • πŸŒ€Our solution to these challenges
  • πŸ˜Άβ€πŸŒ«οΈComplex ecosystem
    • 🌐Too much diversity of technologies
    • 🚧Each network as its own standard
    • 🎊Lack of interoperability
    • β›ˆοΈCascade of isolated systems
    • 🦸Business challenges
  • πŸ›‘οΈSafety and traceability
    • πŸ’’Insecure networks
    • πŸ–²οΈIoT data difficult to track
    • *️Cyber risks
    • πŸͺŸTrust needed
  • πŸͺ…CONNECTIFY' system
    • πŸ—οΈSeamless integration into CONNECTIFY
    • β˜€οΈCONNECTIFY: a problem resolver
    • πŸͺͺOur industrialization platform
    • πŸ’»Simple interface
  • πŸ’«IOTY Protocol
    • ✨Decentralized platform
    • ✍️Message signature
    • 🫧Encrypted storage
  • πŸ”…IOTY Network
    • πŸ“±App IOTY
    • πŸ“²SDK
    • β›³Wifi Geoloc
  • πŸ’ŽUse cases
    • πŸ’ Industry 4.0
    • 🧬Healthcare
    • 🏠Smart home
    • πŸ›΅Mobility
    • πŸ™οΈSmart cities
  • 🌽Grant Program
  • πŸ’²Tokenomics $IOTY
    • β›²Token Metrics
    • πŸ¦‹Overview of the $IOTY
    • πŸ–οΈMinting Mechanism
    • ❇️Use of Proceeds
    • 🐳Utilities
  • 🎯Roadmap and go to market
    • 🧩Milestones
    • πŸ‘¨β€πŸ’ΌTechnological and partnerships
    • πŸ’ΈFund-raising
    • πŸ›’long-term roadmap
    • πŸ‘₯KPI objectives
  • 🏁To conclude
  • 🏒Compagny
    • πŸ‘¨β€πŸ‘©β€πŸ‘§β€πŸ‘¦Team
    • πŸŽͺMedia kit
    • βš–οΈDisclaimer
    • πŸ’₯Risks
Powered by GitBook
On this page
  1. Safety and traceability

Cyber risks

The absence or weakness of security in the IoT exposes users and companies to high risks of cyberattacks and confidential data leaks.

The proliferation of connected objects provides hackers with new targets for accessing corporate or personal networks. Large-scale IoT hacking is also a major threat. In 2016, the Mirai botnet infected hundreds of thousands of insecure connected objects to carry out massive DDoS attacks. This type of DDoS attack can bring critical infrastructures to their knees. The personal and strategic data collected en masse by the IoT is also highly coveted. Their interception can have devastating effects in terms of privacy or competitive position.

Without adequate IoT security, cyber-risks will grow exponentially with the multiplication of connected objects. Confidentiality and protection against cybercrime are key issues.

PreviousIoT data difficult to trackNextTrust needed

Last updated 1 year ago

πŸ›‘οΈ
*️