The internet of things connects billions of devices to the internet and involves the use of billions of data points, all of which need to be secured

Due to its expanded attack surface, IOT Security and IOT privacy are cited as major concerns. In 2016, one of the most notorious recent IoT attacks was Mirai, a botnet that infiltrated domain name server provider Dyn and took down many websites for an extended period of time in one of the biggest distributed denial-of-service (DDoS) attacks ever seen. Attackers gained access to the network by exploiting poorly secured IoT devices. Because IoT devices are closely connected, all a hacker has to do is exploit one vulnerability to manipulate all the data, rendering it unusable. Manufacturers that dont update thier devices regularly - or at all -- leave them vulnerable to cybercriminals. Additionally, connected devices often ask users to input their personal information, including names, ages, addresses, phone numbers and even social media accounts -- information thats invaluable to hackers. Hackers arent the only threat of the internet of things; privacy is another major concern for IoT users. For instance, companies that make and distribute consumer IoT devices could use those devices to obtain and sell users personal data. Beyond leaking personal data, IOT poses a risk to critical infrastructure, including electricity, transportation and inancial services. Kevin Ashton, co-founder of the Auto-ID Center at the Massachusetts Institute of Technology (MIT), first mentioned the internet of things in a presentation he made to Procter &Gamble (P&G) in 1999. Wanting to bring radio frequency ID (RFID) to the attention of P&Gs senior management, Ashton called his presentation "Internet of Things" to incorporate the cool new trend of 1999: the internet. MIT professor Neil Gershenfelds book, When Things Start to Think, also appeared in 1999. It didnt use the exact term but provided a clear vision of where IoT was headed. IoT has evolved from the convergence of wireless technologies, microelectromechanical systems (MEMSes), microservics and the internet. The convergence has helped tear down the silos between operational technology (OT) and information technology (IT), enabling unstructured machine-generated data to be analyzed for insights to drive improvements. Although Ashtons was the first mention of the internet of things, the idea of connected devices has been around since the 1970s, under the monikers embedded internet and pervasive computing. The first internet appliance, for example, was a Coke machine at Carnegie Mellon University in the early 1980s. Using the web, programmers could check the status of the machine and determine whether there would be a cold drink awaiting them, should they decide to make the trip to the machine. IoT evolved from M2M communication, i.e., machines connecting to each other via a network without human interaction. M2M refers to connecting a device to the cloud, managing it and collecting data. Taking M2M to the next level, IoT is a sensor network of billions of smart devices that connect people, systems and other applications to collect and share data. As its foundation, M2M offers the connectivity that enables IoT. The internet of things is also a natural extension of supervisory control and data acquisition (SCADA), a category of software application programs for process control, the gathering of data in real time from remote locations to control equipment and conditions. SCADA systems include hardware and software components. The hardware gathers and feeds data into a computer that has SCADA software installed, where it is then processed and presented in a timely manner. The evolution of SCADA is such that late-generation SCADA systems developed into first-generation IoT systems. The concept of the IoT ecosystem, however, didnt really come into its own until the middle of 2010 when, in part, the government of China said it would make IoT a strategic priority in its five-year plan.WHAT IS THE HISTORY OF IOT?