SlideShare a Scribd company logo
1 of 18
Internet of
Things
Security
09.11.2019
Cigdem Sengul
About me
Senior Researcher at New
Ventures at Nominet, the registry
for UK domain names
Specialise in computer networks
and currently on IoT access control,
and personal data protection.
3
Internet of Things (IoT) promises a smarter future
Things Networks Data, Applications
Flood
monitoring
connect to , generate enabling new
4
IoT needs to improve its
reputation
4
Not easy to use
Not secure
Not private
or interoperable
5
Need to secure end-to-end
Things Networks Data, Applications
Flood
monitoring
connect to , generate enabling new
Things vary in
their capabilities
Various
communication
patterns and network
architectures
Multiple protocols
(proprietary or
standards)
Security
requirements are
diverse
Security Makes IoT a Market for Lemons?
Information Asymmetry Consumers have no
ability to differentiate between the safe and
dangerous devices.
Leads to a spiral effect of quality of goods in
a market degrading leaving only "lemons"
behind.
Negative Externalities mean the cost of a
poor product is suffered by a third party.
May lead to market failure necessitating
regulation.
6
Source: https://www.iotsecurityfoundation.org/market-for-lemons/
UK Code of Practice for Consumer IoT
SecurityVoluntary code of practice
In June 2019, DCMS ran a
consultation on mandatory
requirements to ensure
baseline IoT security
IoT security label
NOMINET IOT PRIVACY
7
Source: DCMS
1. No default universal passwords
All IoT device passwords shall be
unique and not resettable to any
universal factory default value.
NOMINET IOT PRIVACY
8
Example of bad:
Mirai botnet launched a brute force attack,
trying commonly used administrative
passwords on IoT devices like surveillance
cameras, and DVR players.
Took over 600K devices = Unprecedented
DDoS power
Source: Cisco. Data from a honeypot, showing devices
are distributed all around the world.
https://umbrella.cisco.com/blog/2017/01/05/future-
assaulting-internet-mirai/
2. Implement a
vulnerability
disclosure
policy
9
All companies shall provide a public
point of contact as part of a
vulnerability disclosure policy.
Disclosed vulnerabilities should be
acted on a timely manner.
9
Example of bad:
The web exploit in question is called DNS
rebinding, an attack first disclosed at the
RSA Conference in 2008.
The severity of this vulnerability, and the
continued negligence by the Radio Thermostat
Company of America who’ve had years to fix it,
are perfect examples of why we need security
regulation for IoT devices.
https://medium.com/@brannondorsey/attacking-private-networks-from-the-internet-with-dns-
rebinding-ea7098a2d325
3. Keep software
updated
Software components should be
securely updateable.
Constrained devices that cannot
physically be updated, should be
isolatable and replaceable.
https://www.iottechnews.com/news/2017/apr/07/amnesia-yet-another-iot-
botnet-targets-global-dvrs/
Example of bad:
Amnesia targeted digital video recorders
(DVRs) by exploiting an unpatched remote
code execution vulnerability disclosed a
year before the attacks.
4. Securely store
credentials &
sensitive data
11
Any credentials shall be stored
securely within services and on
devices. Hard-coded credentials in
device software are not acceptable.
Example of bad:
WeMo devices put the signing key in the
firmware; so the attacker can sign firmware
updates…
Source: https://arstechnica.com/information-technology/2014/02/password-leak-in-wemo-
devices-makes-home-appliances-susceptible-to-hijacks/
6. Minimise
exposed attack
surfaces
13
All devices and services should operate
on the ‘on the principle of least privilege’;
unused ports should be closed; code
should be minimized. Software runs with
appropriate privileges.
Example of bad:
2 billion logs containing everything from user
passwords to account reset codes and even a
"smart" camera recorded conversation on the
Orvibo platform, exposed to the Internet
through misconfigured Elasticsearch API
without any password protection.
Souurce:
https://www.forbes.com/sites/daveywinder/2019/07/02/confirmed-2-
billion-records-exposed-in-massive-smart-home-device-breach
8. Ensure that personal data is
protected
15
Where devices and/or services
process personal data, they shall do so
according to regulation e.g., GDPR
Example of bad:
The data breach caused e-mails,
passwords and 2 million voice messages
recorded on toys be breached, and at
some point held in ransom.
Source: https://www.bbc.co.uk/news/technology-39115001
10. Monitor system telemetry data
17
If telemetry data is collected from IoT
devises and services, such as usage
and measurement data, it should be
monitored for security anomalies.
Example of bad:
The attackers used the IoT thermometer,
which was connected to the casino’s
network, to gain a foothold in the network.
Once inside, they pulled data across the
network, out the thermostat and up to the
cloud. 10 GB off to a device in Finland
before the threat was detected and
stopped.
https://digit.fyi/iot-thermometer-fish-tank-hack/
11. Make it easy for consumers to
delete personal data
18
Consumers should be given clear
instructions on how to delete their
personal data.
Bad example:
Old car is still in the management app,
never expires
Used home automation hub comes with
old owner’s devices, and don’t go away
with factory reset Source: https://securityintelligence.com/an-iot-love-story-always-apart-never-disconnected/
12. Make
installation and
maintenance of
devices easy
19
Installation and maintenance should
employ minimal steps and follow
security best practice on usability.
Example of bad:
Resetting to factory settings should not
require a sequence of precise steps
Usability affects security
https://www.youtube.com/watch?v=1BB6wj
6RyKo
Guidelines
improve
security
hygiene
Basic security hygiene can take us a long
way.
Integrity of the system is at the heart of it all
User education can put pressure on
manufacturers
Thank you

More Related Content

What's hot

Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centersBrencil Kaimba
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxMohanPandey31
 
Insight into SOAR
Insight into SOARInsight into SOAR
Insight into SOARDNIF
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsMark Arena
 
OT Security - h-c0n 2020
OT Security - h-c0n 2020OT Security - h-c0n 2020
OT Security - h-c0n 2020Jose Palanco
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
ATT&CKing with Threat Intelligence
ATT&CKing with Threat IntelligenceATT&CKing with Threat Intelligence
ATT&CKing with Threat IntelligenceChristopher Korban
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceDhruv Majumdar
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK frameworkBhushan Gurav
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesSlideTeam
 
Purple Team Exercises - GRIMMCon
Purple Team Exercises - GRIMMConPurple Team Exercises - GRIMMCon
Purple Team Exercises - GRIMMConJorge Orchilles
 
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Sounil Yu
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 

What's hot (20)

Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
Insight into SOAR
Insight into SOARInsight into SOAR
Insight into SOAR
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
 
OT Security - h-c0n 2020
OT Security - h-c0n 2020OT Security - h-c0n 2020
OT Security - h-c0n 2020
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
ATT&CKing with Threat Intelligence
ATT&CKing with Threat IntelligenceATT&CKing with Threat Intelligence
ATT&CKing with Threat Intelligence
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Cipher trace
Cipher traceCipher trace
Cipher trace
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat Intelligence
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK framework
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation Slides
 
Purple Team Exercises - GRIMMCon
Purple Team Exercises - GRIMMConPurple Team Exercises - GRIMMCon
Purple Team Exercises - GRIMMCon
 
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 

Similar to IoT security presented in Ada's List Conference

The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...44CON
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxmariuse18nolet
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxvoversbyobersby
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDr. Raghavendra GS
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docxjeffevans62972
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docxodiliagilby
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of ThingsCognizant
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxvrickens
 
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET Journal
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...IJCSIS Research Publications
 
Trends and transients_2019_cigdem_sengul
Trends and transients_2019_cigdem_sengulTrends and transients_2019_cigdem_sengul
Trends and transients_2019_cigdem_sengulCigdem Sengul
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT Worldsyrinxtech
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts#essaywriting
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 

Similar to IoT security presented in Ada's List Conference (20)

The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of things
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
Trends and transients_2019_cigdem_sengul
Trends and transients_2019_cigdem_sengulTrends and transients_2019_cigdem_sengul
Trends and transients_2019_cigdem_sengul
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT World
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 

Recently uploaded

Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...SUHANI PANDEY
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceEscorts Call Girls
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...nilamkumrai
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...roncy bisnoi
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...SUHANI PANDEY
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 

Recently uploaded (20)

Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 

IoT security presented in Ada's List Conference

  • 2. About me Senior Researcher at New Ventures at Nominet, the registry for UK domain names Specialise in computer networks and currently on IoT access control, and personal data protection.
  • 3. 3 Internet of Things (IoT) promises a smarter future Things Networks Data, Applications Flood monitoring connect to , generate enabling new
  • 4. 4 IoT needs to improve its reputation 4 Not easy to use Not secure Not private or interoperable
  • 5. 5 Need to secure end-to-end Things Networks Data, Applications Flood monitoring connect to , generate enabling new Things vary in their capabilities Various communication patterns and network architectures Multiple protocols (proprietary or standards) Security requirements are diverse
  • 6. Security Makes IoT a Market for Lemons? Information Asymmetry Consumers have no ability to differentiate between the safe and dangerous devices. Leads to a spiral effect of quality of goods in a market degrading leaving only "lemons" behind. Negative Externalities mean the cost of a poor product is suffered by a third party. May lead to market failure necessitating regulation. 6 Source: https://www.iotsecurityfoundation.org/market-for-lemons/
  • 7. UK Code of Practice for Consumer IoT SecurityVoluntary code of practice In June 2019, DCMS ran a consultation on mandatory requirements to ensure baseline IoT security IoT security label NOMINET IOT PRIVACY 7 Source: DCMS
  • 8. 1. No default universal passwords All IoT device passwords shall be unique and not resettable to any universal factory default value. NOMINET IOT PRIVACY 8 Example of bad: Mirai botnet launched a brute force attack, trying commonly used administrative passwords on IoT devices like surveillance cameras, and DVR players. Took over 600K devices = Unprecedented DDoS power Source: Cisco. Data from a honeypot, showing devices are distributed all around the world. https://umbrella.cisco.com/blog/2017/01/05/future- assaulting-internet-mirai/
  • 9. 2. Implement a vulnerability disclosure policy 9 All companies shall provide a public point of contact as part of a vulnerability disclosure policy. Disclosed vulnerabilities should be acted on a timely manner. 9 Example of bad: The web exploit in question is called DNS rebinding, an attack first disclosed at the RSA Conference in 2008. The severity of this vulnerability, and the continued negligence by the Radio Thermostat Company of America who’ve had years to fix it, are perfect examples of why we need security regulation for IoT devices. https://medium.com/@brannondorsey/attacking-private-networks-from-the-internet-with-dns- rebinding-ea7098a2d325
  • 10. 3. Keep software updated Software components should be securely updateable. Constrained devices that cannot physically be updated, should be isolatable and replaceable. https://www.iottechnews.com/news/2017/apr/07/amnesia-yet-another-iot- botnet-targets-global-dvrs/ Example of bad: Amnesia targeted digital video recorders (DVRs) by exploiting an unpatched remote code execution vulnerability disclosed a year before the attacks.
  • 11. 4. Securely store credentials & sensitive data 11 Any credentials shall be stored securely within services and on devices. Hard-coded credentials in device software are not acceptable. Example of bad: WeMo devices put the signing key in the firmware; so the attacker can sign firmware updates… Source: https://arstechnica.com/information-technology/2014/02/password-leak-in-wemo- devices-makes-home-appliances-susceptible-to-hijacks/
  • 12. 6. Minimise exposed attack surfaces 13 All devices and services should operate on the ‘on the principle of least privilege’; unused ports should be closed; code should be minimized. Software runs with appropriate privileges. Example of bad: 2 billion logs containing everything from user passwords to account reset codes and even a "smart" camera recorded conversation on the Orvibo platform, exposed to the Internet through misconfigured Elasticsearch API without any password protection. Souurce: https://www.forbes.com/sites/daveywinder/2019/07/02/confirmed-2- billion-records-exposed-in-massive-smart-home-device-breach
  • 13. 8. Ensure that personal data is protected 15 Where devices and/or services process personal data, they shall do so according to regulation e.g., GDPR Example of bad: The data breach caused e-mails, passwords and 2 million voice messages recorded on toys be breached, and at some point held in ransom. Source: https://www.bbc.co.uk/news/technology-39115001
  • 14. 10. Monitor system telemetry data 17 If telemetry data is collected from IoT devises and services, such as usage and measurement data, it should be monitored for security anomalies. Example of bad: The attackers used the IoT thermometer, which was connected to the casino’s network, to gain a foothold in the network. Once inside, they pulled data across the network, out the thermostat and up to the cloud. 10 GB off to a device in Finland before the threat was detected and stopped. https://digit.fyi/iot-thermometer-fish-tank-hack/
  • 15. 11. Make it easy for consumers to delete personal data 18 Consumers should be given clear instructions on how to delete their personal data. Bad example: Old car is still in the management app, never expires Used home automation hub comes with old owner’s devices, and don’t go away with factory reset Source: https://securityintelligence.com/an-iot-love-story-always-apart-never-disconnected/
  • 16. 12. Make installation and maintenance of devices easy 19 Installation and maintenance should employ minimal steps and follow security best practice on usability. Example of bad: Resetting to factory settings should not require a sequence of precise steps Usability affects security https://www.youtube.com/watch?v=1BB6wj 6RyKo
  • 17. Guidelines improve security hygiene Basic security hygiene can take us a long way. Integrity of the system is at the heart of it all User education can put pressure on manufacturers

Editor's Notes

  1. We are part of the Internet DNS infrastructure, and develop cyber-security solutions for UK government and enterprises
  2. Nothing really interconnects Devices may turn into bricks if companies discontinue service Security threats are a reality: IoT-enabled DDoS attacks, IoT ransomware attacks Creep factor may affect adoption
  3. is a well-known[1] 1970 paper by economist George Akerlof  which examines how the quality of goods traded in a market can degrade in the presence of information asymmetry between buyers and sellers, leaving only "lemons" behind. In American slang, a lemon is a car that is found to be defective only after it has been bought. Consumers have no ability to differentiate between the safe and dangerous devices. When there is Information Asymmetry, consumers differentiate by price, which may drive out good quality products out of the market. Negative Externalities mean bad effects of the market are felt by third parties, in other words the cost of a poor product is suffered by a third party. Such market failure may necessitate regulation!
  4. The UK's Department for Digital, Culture, Media and Sport ("DCMS") has released a voluntary code of practice to help Internet of Things companies to achieve a "secure by design" approach, including to comply with applicable data protection laws, such as the GDPR, from the earliest stages of the design process. In February 2019, ETSI, the European Standards Organisation, launched the first globally-applicable industry standard on internet-connected consumer devices. ETSI Technical Specification 103 645 brings together what is widely considered good practice in consumer IoT security. The ETSI standard builds on the Code of Practice, but has been designed to work for European and wider global needs.
  5. Mirai bots scan the IPv4 address space for devices that run telnet or SSH, and attempt to log in using a hardcoded dictionary of IoT credentials. Once successful, the bot sends the victim IP address and associated credentials to a report server, which asynchronously triggers a loader to infect the device. Infected hosts scan for additional victims and accept DDoS commands from a command and control (C2) server. Telnet connection using 10 username and password pairs selected randomly from a pre-configured list of 62 credentials.
  6. thousands of potentially exploitable vulnerabilities that would have gone unfixed had they not been reported. A VDP is the digital equivalent of “if you see something, say something.” It’s intended to give ethical hackers (also known as “researchers” or “finders”), or anyone who stumbles across something amiss—clear guidelines for reporting potentially unknown or harmful security vulnerabilities to the proper person or team responsible. Think of this real-life analogy: you walk past a neighbor’s house and see their back door was left wide open. What would you do? You’d probably knock on their door, holler to see if they were home, or maybe even call them. But for technology, it’s not that simple. You might not know how to contact them, where to find a phone number or email address. Furthermore, you wouldn’t know if your email or voicemail ever made it to the correct person, or anyone at all. Or, after looking for and not finding an appropriate contact channel, most of us would probably just give up. The result, nearly every time, is that nothing happens...except that the vulnerability remains and the organization is unaware. 2018 IoT Security Foundation Study: 90.3% Companies without a disclosure policy.
  7. The situation is worse for the computers embedded in IoT devices. In a lot of systems—both low-cost and expensive—users have to manually download and install relevant patches. Often the patching process is tedious and complicated, and beyond the skill of the average user. Sometimes, ISPs have the ability to remotely patch things like routers and modems, but this is also rare. Even worse, many embedded devices don’t have any way to be patched. Right now, the only way for you to update the firmware in your hackable DVR is to throw it away and buy a new one. In 2015, Chrysler recalled 1.4 million vehicles to patch a security vulnerability. The only way to patch them was for Chrysler to mail every car owner a USB drive to plug into a port on the vehicle’s dashboard. In 2017, Abbott Labs told 465,000 pacemaker patients that they had to go to an authorized clinic for a critical security update. At least the patients didn’t have to have their chests opened up. https://medium.com/@brannondorsey/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325
  8. thousands of potentially exploitable vulnerabilities that would have gone unfixed had they not been reported. A VDP is the digital equivalent of “if you see something, say something.” It’s intended to give ethical hackers (also known as “researchers” or “finders”), or anyone who stumbles across something amiss—clear guidelines for reporting potentially unknown or harmful security vulnerabilities to the proper person or team responsible. Think of this real-life analogy: you walk past a neighbor’s house and see their back door was left wide open. What would you do? You’d probably knock on their door, holler to see if they were home, or maybe even call them. But for technology, it’s not that simple. You might not know how to contact them, where to find a phone number or email address. Furthermore, you wouldn’t know if your email or voicemail ever made it to the correct person, or anyone at all. Or, after looking for and not finding an appropriate contact channel, most of us would probably just give up. The result, nearly every time, is that nothing happens...except that the vulnerability remains and the organization is unaware.
  9. Actually, this happened because some IP camera models didn’t authenticate users exposing video feeds of people’s cameras, but also if it had credentials, it stored them in plain text etc.
  10. thousands of potentially exploitable vulnerabilities that would have gone unfixed had they not been reported. A VDP is the digital equivalent of “if you see something, say something.” It’s intended to give ethical hackers (also known as “researchers” or “finders”), or anyone who stumbles across something amiss—clear guidelines for reporting potentially unknown or harmful security vulnerabilities to the proper person or team responsible. Think of this real-life analogy: you walk past a neighbor’s house and see their back door was left wide open. What would you do? You’d probably knock on their door, holler to see if they were home, or maybe even call them. But for technology, it’s not that simple. You might not know how to contact them, where to find a phone number or email address. Furthermore, you wouldn’t know if your email or voicemail ever made it to the correct person, or anyone at all. Or, after looking for and not finding an appropriate contact channel, most of us would probably just give up. The result, nearly every time, is that nothing happens...except that the vulnerability remains and the organization is unaware.
  11. thousands of potentially exploitable vulnerabilities that would have gone unfixed had they not been reported. A VDP is the digital equivalent of “if you see something, say something.” It’s intended to give ethical hackers (also known as “researchers” or “finders”), or anyone who stumbles across something amiss—clear guidelines for reporting potentially unknown or harmful security vulnerabilities to the proper person or team responsible. Think of this real-life analogy: you walk past a neighbor’s house and see their back door was left wide open. What would you do? You’d probably knock on their door, holler to see if they were home, or maybe even call them. But for technology, it’s not that simple. You might not know how to contact them, where to find a phone number or email address. Furthermore, you wouldn’t know if your email or voicemail ever made it to the correct person, or anyone at all. Or, after looking for and not finding an appropriate contact channel, most of us would probably just give up. The result, nearly every time, is that nothing happens...except that the vulnerability remains and the organization is unaware.
  12. thousands of potentially exploitable vulnerabilities that would have gone unfixed had they not been reported. A VDP is the digital equivalent of “if you see something, say something.” It’s intended to give ethical hackers (also known as “researchers” or “finders”), or anyone who stumbles across something amiss—clear guidelines for reporting potentially unknown or harmful security vulnerabilities to the proper person or team responsible. Think of this real-life analogy: you walk past a neighbor’s house and see their back door was left wide open. What would you do? You’d probably knock on their door, holler to see if they were home, or maybe even call them. But for technology, it’s not that simple. You might not know how to contact them, where to find a phone number or email address. Furthermore, you wouldn’t know if your email or voicemail ever made it to the correct person, or anyone at all. Or, after looking for and not finding an appropriate contact channel, most of us would probably just give up. The result, nearly every time, is that nothing happens...except that the vulnerability remains and the organization is unaware.
  13. thousands of potentially exploitable vulnerabilities that would have gone unfixed had they not been reported. A VDP is the digital equivalent of “if you see something, say something.” It’s intended to give ethical hackers (also known as “researchers” or “finders”), or anyone who stumbles across something amiss—clear guidelines for reporting potentially unknown or harmful security vulnerabilities to the proper person or team responsible. Think of this real-life analogy: you walk past a neighbor’s house and see their back door was left wide open. What would you do? You’d probably knock on their door, holler to see if they were home, or maybe even call them. But for technology, it’s not that simple. You might not know how to contact them, where to find a phone number or email address. Furthermore, you wouldn’t know if your email or voicemail ever made it to the correct person, or anyone at all. Or, after looking for and not finding an appropriate contact channel, most of us would probably just give up. The result, nearly every time, is that nothing happens...except that the vulnerability remains and the organization is unaware.
  14. thousands of potentially exploitable vulnerabilities that would have gone unfixed had they not been reported. A VDP is the digital equivalent of “if you see something, say something.” It’s intended to give ethical hackers (also known as “researchers” or “finders”), or anyone who stumbles across something amiss—clear guidelines for reporting potentially unknown or harmful security vulnerabilities to the proper person or team responsible. Think of this real-life analogy: you walk past a neighbor’s house and see their back door was left wide open. What would you do? You’d probably knock on their door, holler to see if they were home, or maybe even call them. But for technology, it’s not that simple. You might not know how to contact them, where to find a phone number or email address. Furthermore, you wouldn’t know if your email or voicemail ever made it to the correct person, or anyone at all. Or, after looking for and not finding an appropriate contact channel, most of us would probably just give up. The result, nearly every time, is that nothing happens...except that the vulnerability remains and the organization is unaware.
  15. thousands of potentially exploitable vulnerabilities that would have gone unfixed had they not been reported. A VDP is the digital equivalent of “if you see something, say something.” It’s intended to give ethical hackers (also known as “researchers” or “finders”), or anyone who stumbles across something amiss—clear guidelines for reporting potentially unknown or harmful security vulnerabilities to the proper person or team responsible. Think of this real-life analogy: you walk past a neighbor’s house and see their back door was left wide open. What would you do? You’d probably knock on their door, holler to see if they were home, or maybe even call them. But for technology, it’s not that simple. You might not know how to contact them, where to find a phone number or email address. Furthermore, you wouldn’t know if your email or voicemail ever made it to the correct person, or anyone at all. Or, after looking for and not finding an appropriate contact channel, most of us would probably just give up. The result, nearly every time, is that nothing happens...except that the vulnerability remains and the organization is unaware.
  16. Locus Energy has patched 100,000 of its residential and commercial power meters that were vulnerable to command injection attacks and code execution.
  17. Requires system to be correct, non-by passable, and tamperproof Requires monitoring for unauthorized changes Extends to secure updates and maintenance
  18. thousands of potentially exploitable vulnerabilities that would have gone unfixed had they not been reported. A VDP is the digital equivalent of “if you see something, say something.” It’s intended to give ethical hackers (also known as “researchers” or “finders”), or anyone who stumbles across something amiss—clear guidelines for reporting potentially unknown or harmful security vulnerabilities to the proper person or team responsible. Think of this real-life analogy: you walk past a neighbor’s house and see their back door was left wide open. What would you do? You’d probably knock on their door, holler to see if they were home, or maybe even call them. But for technology, it’s not that simple. You might not know how to contact them, where to find a phone number or email address. Furthermore, you wouldn’t know if your email or voicemail ever made it to the correct person, or anyone at all. Or, after looking for and not finding an appropriate contact channel, most of us would probably just give up. The result, nearly every time, is that nothing happens...except that the vulnerability remains and the organization is unaware.