Soon many billions of heretofore disconnected devices will be outfitted with Internet access and equipped with software. These appliances will be able to accept control from authorized parties and to emit information that can be used for management and analysis. The introduction of these devices poses a wide range of questions that must ultimately be answered—

How do I configure large numbers of new devices into my network?
How do I avoid configuring someone else’s devices accidentally into my network and vice versa?
How does a device know it is talking to an authorized agent?
How can I grant temporary access to devices to guests, law enforcement, fire departments, third parties?
How do I revoke access to third parties?
How can I keep transactions involving these devices private?
How do I allow guest’s devices to become part of my network temporarily?
How does the Internet of Things affect my daily life? My business? My social relationships? My health? My privacy? My security?
What new businesses might arise as a consequence of a proliferation of Internet-enabled devices?
What if there are bugs in these devices? How can updates be performed securely? By only authorized parties?

In his distinguished Cyber Security NYU Engineering/Sloan Foundation Lecture, Internet pioneer Vinton G. Cerf does not claim to answer all of these questions, but says it’s important to ask them and to seek answers.