SlideShare una empresa de Scribd logo
1 de 36
Descargar para leer sin conexión
October 4, 2016
Santa Clara Convention Center
Mission City Ballroom
The Need for Security In IoT
Who needs security anyway ?
Joe Pilozzi
The Rise of Connected Things 2
• ~33B connected devices by 2020
• $1.7 trillion in value added to the global economy in 2019
• 40% Compound Annual Growth Rate 2014–2020
The Connected Devices 3
Server Farms,
Server Clusters
Network Equipment
(routers, firewalls, ..)
PC/Laptop
Connected Media
Smart Phones, Tablets
Embedded Connected Devices
Smart Things

• Few Mu

• Tens of Mu

• ~ 1 Bu

• ~ 10 Bu

• ~ 10 Bu  20 Bu
 • ~ 30 Bu  50 Bu
Represents a very large
opportunity for business
and for mischief
Who Needs Security Anyway
Who Needs Security Anyway … 5
• It’s about protecting Assets
• Knowing the true value of those Assets you are
going to protect
• Assets are a wide range of items
• Consumers Personal Information
• Financial, Health, Location, Passwords, Accounts
• Your Product or Solution
• Processes, Services, Intellectual Property, Firmware, Brand
• Health and Safety
• Medical devices, Manufacturing Processes and Equipment, Transport and Vehicles
• The Work Place
• Production Equipment, Environmental and Access Controls
Assets
….. Your brand, your reputation
Photo source : Wired Magazine
Connected Device Are Subject to Attacks 6
• Hacking opportunities made significantly easier with devices
being connected to the internet
• Exploiting carelessly managed user private information, as in
the case of a connected SmartFridge
• Exploit flaws and genuine mistakes leading to weaknesses in
security
• Hacking opportunities come from a failure to correctly verify
the identity of devices on a network
• An attack may take an indirect route to an asset by targeting
the weakest link in a system, as in the case of a remotely
hacked vehicle
https://www.wired.com/2016/02/flaws-in-wireless-mice-and-keyboards-let-hackers-type-on-your-pc/
And More … 7
Threats and Vulnerabilities
General Threats To IoT Systems
9
• Access / misuse of services and networks
• Access / misuse of devices
• Theft of confidential data or identity
• Counterfeit devices or services
Threat Analysis 10
• Asset
• In general terms is information, a capability, an advantage, a feature, financial or technical
resource that may be damaged, lost or disrupted
• Assets may be digital (software sources), physical (a car or a server) or commercial (brand)
• Damage to an asset may affect the normal operation of the system as well as that of
individuals and organizations involved with the system
• Threat
• Threat is a specific scenario or a sequence of actions that exploits a set of vulnerabilities and
may cause damage to one or more of the system's Assets
Threat Analysis 11
• Vulnerabilities
• Is a weakness, limitation or a defect in one or more of the system's elements that can be
exploited to disrupt the normal operation of the system
• They may be in specific modules of the system, its architecture, its users and operators,
and/or in its associated regulations, operational and business procedures
• Countermeasures, "safeguards“ or Barriers
• Is a procedure, function, process, action or a means of mitigating a specific vulnerability
or several different vulnerabilities
Threat Analysis 12
Concepts and Relationships
Assets
Value Assets
Vulnerabilities
Threats
Wish to abuse
Exploit• Countermeasures mitigate Vulnerabilities and therefore
mitigate Threats and hence reduces Risk
Increases
Wish to minimize Risk
Value
Hence evaluate Attacks
To Protect
Countermeasures / Barriers
Mitigates
Develop
Reduces
• Threats exploit Vulnerabilities and to gain access to Assets
Customer
Owner
Threat Analysis 13
Smart Metering System
Gateway
Cloud Services
Network
Smart Meter
Threat
• Commercial and cyber crime
• Disruption of administration system
• Supply shut down – disruption of service
• Spread of wrong information (e.g. invoices)
Fake Service
• Commercial and cyber crime
• Identifying empty houses
• Invoice Fraud
• Manipulating meter readings
• Misuse of private customer data
Eavesdropper Data Corruption
• Identifying empty houses
• Manipulating meter readings
• Misuse of private customer data
• Invoice fraud
Compromised Device Data Corruption
• Distributed Denial-of-Service (DDoS)
• Malicious code
Counterfeit Device
Classes of Attacks 14
Invasive Product Attacks
With the case opened / removed
• Test / debug port access
• Inter device bus and IO probing
• Reset, clock attacks
• Power analysis
• Temperature / electrical attacks
Invasive Silicon Attacks
Device de-packaged
• Circuit analysis and probing
Non Invasive Attacks
Misuse of network protocols
• Exploit communication protocol errors
• Flaws in software design / implementation
Box Internet
The
Cloud
BOX
Invasive Silicon Attacks 15
• Silicon Reverse Engineering
• FLASH or ROM code retrieval
• Whole or partial gate net-list extraction
Prepared for probing
• Identification of Internal Structure of the Chip
• Layout analysis, feature, buses, …
• Find “good“ location for probing
• Buses and memory to obtain keys, data, code
• A Fault Injection Attack - Non or Semi-Invasive
• Disturb normal behavior
• Exploit unexpected behavior
• Sources
• Laser, UV, X-rays
Software Attacks 16
• >95% attacks today exploit software implementation flaws
• Heartbleed - wrong buffer size
• Apple IOS web authentication by-pass - software line duplicated
Human error contributes to
nearly all of these incidents
Cost /
Effort
Relative Cost Of Attacks 17
Software Attacks
• Stack overflow
• Malware
• Virus
• Trojans
Invasive
Silicon Attacks
• Reverse Engineering
• Probing
• Fault Injection ( Laser, X-Ray, VU)
Invasive
Product Attacks
• Physical access ( JTAG, IOs)
• Environment Perturbation
• Side Channel Attacks
(SPA, DPA, DEMA)
Today
95 % attacks
Complexity
Fortifying an IoT Device
Countermeasures
An IoT Device’s Security Needs 19
Prevent device misuse
Prevent device or server counterfeiting
Resistance against
hacking, cloning
Authentication
• Device to device
• Device to server
Service and network access corruption
Prevent device
misuse
Integrity and Availability
• Secure Boot
• Secure firmware upgrade
• Trusted processing
Data privacy
Prevent data collection or corruption
Confidentiality
• Data / identity protection
• Secure communications
• Secure storage
Upgradability
Secure Communications
• Secure firmware upgrade
Prevent device misuse
Need Solution
Countermeasures 20
• Cryptography algorithms are used to protect data and establish trust
Cryptography
Authentication
• Challenge – Response
• TLS/DTLS protocols
challenge
response
Authentication Process
Availability
Service protection
• Secure Boot
• Secure Firmware Upgrade
• Trusted Processing
Data Integrity
• Data with Signature
- using RSA / ECC
• Cryptography ciphers (AES, DES, ECC, RSA) are public
• Protecting keys is the key to success
Confidentiality
Data encryption
• Symmetric DES / AES
• Asymmetric RSA / ECC
Countermeasures 21
• Smaller silicon geometries the better – more difficult to probe
• Layout flattening – just a sea-of-gates
• Easier to hide busses and critical signal routing
• More difficult to identify functions / features
• Camouflage to prevent reverse engineering
Physical Design Techniques
Standard routing Camouflaged routing
Managing Risk
Cost
Managing Risk 23
• Always seek better level of security/integrity
• Use the integrity and cryptographic tools offered
• Seek out advise for best practices
Risk
Robustness
Security
Optimal
Government
Mandated
Security
Fort KnoxPoor
Always seek better
Increase
due to
Hacking
Vulnerable
Invasive Product Attacks
With the case opened / removed
• Test / debug port access
• Inter device bus and IO probing
• Reset, clock attacks
• Power analysis
• Temperature / electrical attacks
Non Invasive Attacks
Misuse of network protocols
• Exploit communication protocol errors
• Flaws in software design / implementation
Invasive Silicon Attacks
Device de-packaged
• Circuit analysis and probing
• Fault injection
Solutions 24
Box Internet
The
Cloud
BOX
Add a Secure Element
• Much Better Tamper Resistant
• Trusted Crypto Services
• Secure Storage
• Independently Certified
A Better
Solution
Use an MCU’s security features
• Unique Device IDs
• Memory Protection
• Firewall
• Tamper Detection
• Crypto Hardware
• AES, T-RNG
• Debug Port Protection
Solution
SOLUTIONS
Layers of Security Services 25
• Security services should be handled
independently in silo’ed processes
System Layers
Application / Cloud
• Access control and right management
• Feature and product management
Data / Transport Layer
• TLS/DTLS, HTTPS etc
Link Layer / Physical Layer
• Network physical layer security
• e.g. WiFi – WPA2, 802.11i
Device Security Services
• Secure Boot
Cybercriminals 26
• Cybercriminals are motivated by various factors
• Financial gain, brand damage, political or terrorism, or plain old mischief making
• Todays cybercriminals are increasingly well funded criminal organizations
• Cybercriminals don’t necessarily target the final asset directly, but target less
secure devices connected to the same network
Never Underestimate …..
• Minimize your vulnerabilities or “attack surface”
• Seek out advise on threat analysis
Risk Management 27
• Understand the value of the Assets you are going to protect
• Understand your Threats and Vulnerabilities
• Develop a security strategy to reduce Risk
• At the right level of security for the value of the Assets being
protected
• Make use of the microcontrollers integrity and hardware based
cryptography tools available
• Crypto libraries, crypto accelerators
• Robustness features like debug port protection, memory
partitioning, firewall and tamper detection
Fortified Solutions
• A well Fortified Solution makes use of these features
• Don’t make it easy for a cybercriminal!
Is Your Product Secure ?
Is Your Product Secure … 29
• Device Integrity
• Can you determine if the product is authentic and can it be trusted?
• Security of Communications
• Is private data being transferred confidentially and with integrity?
• Security of Stored Information
• Is private data being stored in a protected manner ?
A Simple Check List
Security of Connected Devices Does Matter 30
Even our election could be a risk ..
Source: Engadget
Conclusion
Conclusion 32
Work with ST, your experienced partner
• Internet of Things presents a wealth of opportunities, a growth for commerce and an increased
risk of theft, mischief and damage or loss of life
• Understand the value of Assets in your system or product
• Perform threat analysis to better understand your Risks
• Reduce risk by designing and managing secure products well fortified against threats
• Design and manage your products using good design practices
• Design products and systems resilient against threats throughout their life-cycle
• A robust product is achieved through the use of security features and tools
• Most of the software attacks today can be thwarted by good firmware development practices
Demos
ST Solutions for Security in IoT 34
Smart City Solution
for IoT Node
35
Thank You

Más contenido relacionado

La actualidad más candente

Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesDenim Group
 
S_IOT_Intro.pptx
S_IOT_Intro.pptxS_IOT_Intro.pptx
S_IOT_Intro.pptxrutika12345
 
Track 5 session 4 - st dev con 2016 - life cycle management for web
Track 5   session 4 - st dev con 2016 - life cycle management for webTrack 5   session 4 - st dev con 2016 - life cycle management for web
Track 5 session 4 - st dev con 2016 - life cycle management for webST_World
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityTutun Juhana
 
Week2 fundamental of IoT
Week2 fundamental of IoTWeek2 fundamental of IoT
Week2 fundamental of IoTsomphongt
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process EC-Council
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challengesHadi Fadlallah
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of ThingsBryan Len
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalFrank Siepmann
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamAmit Rohatgi
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsDesign World
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay KumarOWASP Delhi
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTWSO2
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTgr9293
 

La actualidad más candente (20)

Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
IoT security
IoT securityIoT security
IoT security
 
S_IOT_Intro.pptx
S_IOT_Intro.pptxS_IOT_Intro.pptx
S_IOT_Intro.pptx
 
Track 5 session 4 - st dev con 2016 - life cycle management for web
Track 5   session 4 - st dev con 2016 - life cycle management for webTrack 5   session 4 - st dev con 2016 - life cycle management for web
Track 5 session 4 - st dev con 2016 - life cycle management for web
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
Week2 fundamental of IoT
Week2 fundamental of IoTWeek2 fundamental of IoT
Week2 fundamental of IoT
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challenges
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you Spam
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay Kumar
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoT
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 

Destacado

Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...ST_World
 
Track 5 session 5 - st dev con 2016 - stm32 hands on seminar - cloud connec...
Track 5   session 5 - st dev con 2016 - stm32 hands on seminar - cloud connec...Track 5   session 5 - st dev con 2016 - stm32 hands on seminar - cloud connec...
Track 5 session 5 - st dev con 2016 - stm32 hands on seminar - cloud connec...ST_World
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns Exosite
 
Are You Safe in IOT? - Know About Different Types of Threats
Are You Safe in IOT? - Know About Different Types of ThreatsAre You Safe in IOT? - Know About Different Types of Threats
Are You Safe in IOT? - Know About Different Types of ThreatsAjeet Singh
 
Smart Enabling Technologies for Automated Driving
Smart Enabling Technologies for Automated DrivingSmart Enabling Technologies for Automated Driving
Smart Enabling Technologies for Automated DrivingST_World
 
3GPP TR 22.885 study on LTE support for V2X services
3GPP TR 22.885 study on LTE support for V2X services3GPP TR 22.885 study on LTE support for V2X services
3GPP TR 22.885 study on LTE support for V2X servicesYi-Hsueh Tsai
 
LAS16-300K2: Geoff Thorpe - IoT Zephyr
LAS16-300K2: Geoff Thorpe - IoT ZephyrLAS16-300K2: Geoff Thorpe - IoT Zephyr
LAS16-300K2: Geoff Thorpe - IoT ZephyrShovan Sargunam
 
When Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your BusinessWhen Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your BusinessKaspersky Lab
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsStanford School of Engineering
 
IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetNathan Wallace, PhD, PE
 
사물인터넷 노트14_사물인터넷보안
사물인터넷 노트14_사물인터넷보안사물인터넷 노트14_사물인터넷보안
사물인터넷 노트14_사물인터넷보안Dong Hwa Jeong
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
Track 2 session 1 - st dev con 2016 - avnet - making things real
Track 2   session 1 - st dev con 2016 - avnet - making things realTrack 2   session 1 - st dev con 2016 - avnet - making things real
Track 2 session 1 - st dev con 2016 - avnet - making things realST_World
 

Destacado (18)

Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Track 5 session 5 - st dev con 2016 - stm32 hands on seminar - cloud connec...
Track 5   session 5 - st dev con 2016 - stm32 hands on seminar - cloud connec...Track 5   session 5 - st dev con 2016 - stm32 hands on seminar - cloud connec...
Track 5 session 5 - st dev con 2016 - stm32 hands on seminar - cloud connec...
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 
Are You Safe in IOT? - Know About Different Types of Threats
Are You Safe in IOT? - Know About Different Types of ThreatsAre You Safe in IOT? - Know About Different Types of Threats
Are You Safe in IOT? - Know About Different Types of Threats
 
Challenges of the io t v1
Challenges of the io t v1Challenges of the io t v1
Challenges of the io t v1
 
Iot
IotIot
Iot
 
Internet of Things(IOT)
Internet of Things(IOT)Internet of Things(IOT)
Internet of Things(IOT)
 
Smart Enabling Technologies for Automated Driving
Smart Enabling Technologies for Automated DrivingSmart Enabling Technologies for Automated Driving
Smart Enabling Technologies for Automated Driving
 
3GPP TR 22.885 study on LTE support for V2X services
3GPP TR 22.885 study on LTE support for V2X services3GPP TR 22.885 study on LTE support for V2X services
3GPP TR 22.885 study on LTE support for V2X services
 
LAS16-300K2: Geoff Thorpe - IoT Zephyr
LAS16-300K2: Geoff Thorpe - IoT ZephyrLAS16-300K2: Geoff Thorpe - IoT Zephyr
LAS16-300K2: Geoff Thorpe - IoT Zephyr
 
When Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your BusinessWhen Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your Business
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the Internet
 
사물인터넷 노트14_사물인터넷보안
사물인터넷 노트14_사물인터넷보안사물인터넷 노트14_사물인터넷보안
사물인터넷 노트14_사물인터넷보안
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Ransomware
RansomwareRansomware
Ransomware
 
Track 2 session 1 - st dev con 2016 - avnet - making things real
Track 2   session 1 - st dev con 2016 - avnet - making things realTrack 2   session 1 - st dev con 2016 - avnet - making things real
Track 2 session 1 - st dev con 2016 - avnet - making things real
 

Similar a Track 5 session 1 - st dev con 2016 - need for security for iot

It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCharles Cline
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Intrusion detection 2001
Intrusion detection 2001Intrusion detection 2001
Intrusion detection 2001eaiti
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataPrecisely
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsBilalMehmood44
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataPrecisely
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsAbbie Hosta
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cCharles Li
 
Power Grid Communications & Control Systems
Power Grid Communications & Control SystemsPower Grid Communications & Control Systems
Power Grid Communications & Control Systemsfajjarrehman
 
IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationAuliaArifWardana
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsChristopher Frenz
 
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosAmazon Web Services
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for businessDaniel Thomas
 

Similar a Track 5 session 1 - st dev con 2016 - need for security for iot (20)

It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
 
Network Security
Network SecurityNetwork Security
Network Security
 
Intrusion detection 2001
Intrusion detection 2001Intrusion detection 2001
Intrusion detection 2001
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
 
Security Issues in Internet of Things
Security Issues in Internet of ThingsSecurity Issues in Internet of Things
Security Issues in Internet of Things
 
Power Grid Communications & Control Systems
Power Grid Communications & Control SystemsPower Grid Communications & Control Systems
Power Grid Communications & Control Systems
 
IoT-Device-Security.pptx
IoT-Device-Security.pptxIoT-Device-Security.pptx
IoT-Device-Security.pptx
 
IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentation
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Chapter 5 MIS
Chapter 5 MISChapter 5 MIS
Chapter 5 MIS
 
cscnapd.ppt
cscnapd.pptcscnapd.ppt
cscnapd.ppt
 

Más de ST_World

Track 4 session 3 - st dev con 2016 - pedestrian dead reckoning
Track 4   session 3 - st dev con 2016 - pedestrian dead reckoningTrack 4   session 3 - st dev con 2016 - pedestrian dead reckoning
Track 4 session 3 - st dev con 2016 - pedestrian dead reckoningST_World
 
Track 4 session 2 - st dev con 2016 - valencell - integrated ohr, biometric...
Track 4   session 2 - st dev con 2016 - valencell - integrated ohr, biometric...Track 4   session 2 - st dev con 2016 - valencell - integrated ohr, biometric...
Track 4 session 2 - st dev con 2016 - valencell - integrated ohr, biometric...ST_World
 
Track 4 session 1 - st dev con 2016 - body area network and sensor synchron...
Track 4   session 1 - st dev con 2016 - body area network and sensor synchron...Track 4   session 1 - st dev con 2016 - body area network and sensor synchron...
Track 4 session 1 - st dev con 2016 - body area network and sensor synchron...ST_World
 
Track 4 session 8 - st dev con 2016 - time of flight
Track 4   session 8 - st dev con 2016 - time of flightTrack 4   session 8 - st dev con 2016 - time of flight
Track 4 session 8 - st dev con 2016 - time of flightST_World
 
Track 4 session 6 - st dev con 2016 - samsung artik
Track 4   session 6 - st dev con 2016 - samsung artikTrack 4   session 6 - st dev con 2016 - samsung artik
Track 4 session 6 - st dev con 2016 - samsung artikST_World
 
Track 4 session 5 - st dev con 2016 - simplifying the setup and use of iot ...
Track 4   session 5 - st dev con 2016 - simplifying the setup and use of iot ...Track 4   session 5 - st dev con 2016 - simplifying the setup and use of iot ...
Track 4 session 5 - st dev con 2016 - simplifying the setup and use of iot ...ST_World
 
Track 4 session 4 - st dev con 2016 - sigfox - iot 2 the evolution of conne...
Track 4   session 4 - st dev con 2016 - sigfox - iot 2 the evolution of conne...Track 4   session 4 - st dev con 2016 - sigfox - iot 2 the evolution of conne...
Track 4 session 4 - st dev con 2016 - sigfox - iot 2 the evolution of conne...ST_World
 
Track 3 session 4 - st dev con 2016 - sensortile
Track 3   session 4 - st dev con 2016 - sensortileTrack 3   session 4 - st dev con 2016 - sensortile
Track 3 session 4 - st dev con 2016 - sensortileST_World
 
Track 3 session 3 - st dev con 2016 - flex - modern product developmert for...
Track 3   session 3 - st dev con 2016 - flex - modern product developmert for...Track 3   session 3 - st dev con 2016 - flex - modern product developmert for...
Track 3 session 3 - st dev con 2016 - flex - modern product developmert for...ST_World
 
Track 3 session 2 - st dev con 2016 - arrow - identifying business challeng...
Track 3   session 2 - st dev con 2016 - arrow - identifying business challeng...Track 3   session 2 - st dev con 2016 - arrow - identifying business challeng...
Track 3 session 2 - st dev con 2016 - arrow - identifying business challeng...ST_World
 
Track 3 session 1 - st dev con 2016 -ieee- iot standards adn open source
Track 3   session 1 - st dev con 2016 -ieee- iot standards adn open sourceTrack 3   session 1 - st dev con 2016 -ieee- iot standards adn open source
Track 3 session 1 - st dev con 2016 -ieee- iot standards adn open sourceST_World
 
Track 3 session 8 - st dev con 2016 - music and voice over ble
Track 3   session 8 - st dev con 2016 - music and voice over bleTrack 3   session 8 - st dev con 2016 - music and voice over ble
Track 3 session 8 - st dev con 2016 - music and voice over bleST_World
 
Track 3 session 7 - st dev con 2016 - silicon photonics
Track 3   session 7 - st dev con 2016 - silicon photonicsTrack 3   session 7 - st dev con 2016 - silicon photonics
Track 3 session 7 - st dev con 2016 - silicon photonicsST_World
 
Track 3 session 6 - st dev con 2016 - qualcomm - wi-fi connectivity for iot
Track 3   session 6 - st dev con 2016 - qualcomm - wi-fi connectivity for iotTrack 3   session 6 - st dev con 2016 - qualcomm - wi-fi connectivity for iot
Track 3 session 6 - st dev con 2016 - qualcomm - wi-fi connectivity for iotST_World
 
Track 3 session 5 - st dev con 2016 - microsoft - from sensors to business ...
Track 3   session 5 - st dev con 2016 - microsoft - from sensors to business ...Track 3   session 5 - st dev con 2016 - microsoft - from sensors to business ...
Track 3 session 5 - st dev con 2016 - microsoft - from sensors to business ...ST_World
 
Track 2 session 4 - st dev con 2016 - opensoftwarex
Track 2   session 4 - st dev con 2016 - opensoftwarexTrack 2   session 4 - st dev con 2016 - opensoftwarex
Track 2 session 4 - st dev con 2016 - opensoftwarexST_World
 
Track 2 session 3 - st dev con 2016 - simplifying cloud connectivity
Track 2   session 3 - st dev con 2016 - simplifying cloud connectivityTrack 2   session 3 - st dev con 2016 - simplifying cloud connectivity
Track 2 session 3 - st dev con 2016 - simplifying cloud connectivityST_World
 
Track 2 session 2 - st dev con 2016 - stm32 open development environment
Track 2   session 2 - st dev con 2016 - stm32 open development  environmentTrack 2   session 2 - st dev con 2016 - stm32 open development  environment
Track 2 session 2 - st dev con 2016 - stm32 open development environmentST_World
 
Track 2 session 8 - st dev con 2016 - lora(senet)
Track 2   session 8 - st dev con 2016 - lora(senet)Track 2   session 8 - st dev con 2016 - lora(senet)
Track 2 session 8 - st dev con 2016 - lora(senet)ST_World
 
Track 2 session 8 - st dev con 2016 - lora (mydevices)
Track 2   session 8 - st dev con 2016 - lora (mydevices)Track 2   session 8 - st dev con 2016 - lora (mydevices)
Track 2 session 8 - st dev con 2016 - lora (mydevices)ST_World
 

Más de ST_World (20)

Track 4 session 3 - st dev con 2016 - pedestrian dead reckoning
Track 4   session 3 - st dev con 2016 - pedestrian dead reckoningTrack 4   session 3 - st dev con 2016 - pedestrian dead reckoning
Track 4 session 3 - st dev con 2016 - pedestrian dead reckoning
 
Track 4 session 2 - st dev con 2016 - valencell - integrated ohr, biometric...
Track 4   session 2 - st dev con 2016 - valencell - integrated ohr, biometric...Track 4   session 2 - st dev con 2016 - valencell - integrated ohr, biometric...
Track 4 session 2 - st dev con 2016 - valencell - integrated ohr, biometric...
 
Track 4 session 1 - st dev con 2016 - body area network and sensor synchron...
Track 4   session 1 - st dev con 2016 - body area network and sensor synchron...Track 4   session 1 - st dev con 2016 - body area network and sensor synchron...
Track 4 session 1 - st dev con 2016 - body area network and sensor synchron...
 
Track 4 session 8 - st dev con 2016 - time of flight
Track 4   session 8 - st dev con 2016 - time of flightTrack 4   session 8 - st dev con 2016 - time of flight
Track 4 session 8 - st dev con 2016 - time of flight
 
Track 4 session 6 - st dev con 2016 - samsung artik
Track 4   session 6 - st dev con 2016 - samsung artikTrack 4   session 6 - st dev con 2016 - samsung artik
Track 4 session 6 - st dev con 2016 - samsung artik
 
Track 4 session 5 - st dev con 2016 - simplifying the setup and use of iot ...
Track 4   session 5 - st dev con 2016 - simplifying the setup and use of iot ...Track 4   session 5 - st dev con 2016 - simplifying the setup and use of iot ...
Track 4 session 5 - st dev con 2016 - simplifying the setup and use of iot ...
 
Track 4 session 4 - st dev con 2016 - sigfox - iot 2 the evolution of conne...
Track 4   session 4 - st dev con 2016 - sigfox - iot 2 the evolution of conne...Track 4   session 4 - st dev con 2016 - sigfox - iot 2 the evolution of conne...
Track 4 session 4 - st dev con 2016 - sigfox - iot 2 the evolution of conne...
 
Track 3 session 4 - st dev con 2016 - sensortile
Track 3   session 4 - st dev con 2016 - sensortileTrack 3   session 4 - st dev con 2016 - sensortile
Track 3 session 4 - st dev con 2016 - sensortile
 
Track 3 session 3 - st dev con 2016 - flex - modern product developmert for...
Track 3   session 3 - st dev con 2016 - flex - modern product developmert for...Track 3   session 3 - st dev con 2016 - flex - modern product developmert for...
Track 3 session 3 - st dev con 2016 - flex - modern product developmert for...
 
Track 3 session 2 - st dev con 2016 - arrow - identifying business challeng...
Track 3   session 2 - st dev con 2016 - arrow - identifying business challeng...Track 3   session 2 - st dev con 2016 - arrow - identifying business challeng...
Track 3 session 2 - st dev con 2016 - arrow - identifying business challeng...
 
Track 3 session 1 - st dev con 2016 -ieee- iot standards adn open source
Track 3   session 1 - st dev con 2016 -ieee- iot standards adn open sourceTrack 3   session 1 - st dev con 2016 -ieee- iot standards adn open source
Track 3 session 1 - st dev con 2016 -ieee- iot standards adn open source
 
Track 3 session 8 - st dev con 2016 - music and voice over ble
Track 3   session 8 - st dev con 2016 - music and voice over bleTrack 3   session 8 - st dev con 2016 - music and voice over ble
Track 3 session 8 - st dev con 2016 - music and voice over ble
 
Track 3 session 7 - st dev con 2016 - silicon photonics
Track 3   session 7 - st dev con 2016 - silicon photonicsTrack 3   session 7 - st dev con 2016 - silicon photonics
Track 3 session 7 - st dev con 2016 - silicon photonics
 
Track 3 session 6 - st dev con 2016 - qualcomm - wi-fi connectivity for iot
Track 3   session 6 - st dev con 2016 - qualcomm - wi-fi connectivity for iotTrack 3   session 6 - st dev con 2016 - qualcomm - wi-fi connectivity for iot
Track 3 session 6 - st dev con 2016 - qualcomm - wi-fi connectivity for iot
 
Track 3 session 5 - st dev con 2016 - microsoft - from sensors to business ...
Track 3   session 5 - st dev con 2016 - microsoft - from sensors to business ...Track 3   session 5 - st dev con 2016 - microsoft - from sensors to business ...
Track 3 session 5 - st dev con 2016 - microsoft - from sensors to business ...
 
Track 2 session 4 - st dev con 2016 - opensoftwarex
Track 2   session 4 - st dev con 2016 - opensoftwarexTrack 2   session 4 - st dev con 2016 - opensoftwarex
Track 2 session 4 - st dev con 2016 - opensoftwarex
 
Track 2 session 3 - st dev con 2016 - simplifying cloud connectivity
Track 2   session 3 - st dev con 2016 - simplifying cloud connectivityTrack 2   session 3 - st dev con 2016 - simplifying cloud connectivity
Track 2 session 3 - st dev con 2016 - simplifying cloud connectivity
 
Track 2 session 2 - st dev con 2016 - stm32 open development environment
Track 2   session 2 - st dev con 2016 - stm32 open development  environmentTrack 2   session 2 - st dev con 2016 - stm32 open development  environment
Track 2 session 2 - st dev con 2016 - stm32 open development environment
 
Track 2 session 8 - st dev con 2016 - lora(senet)
Track 2   session 8 - st dev con 2016 - lora(senet)Track 2   session 8 - st dev con 2016 - lora(senet)
Track 2 session 8 - st dev con 2016 - lora(senet)
 
Track 2 session 8 - st dev con 2016 - lora (mydevices)
Track 2   session 8 - st dev con 2016 - lora (mydevices)Track 2   session 8 - st dev con 2016 - lora (mydevices)
Track 2 session 8 - st dev con 2016 - lora (mydevices)
 

Último

Call Girls in Vashi Escorts Services - 7738631006
Call Girls in Vashi Escorts Services - 7738631006Call Girls in Vashi Escorts Services - 7738631006
Call Girls in Vashi Escorts Services - 7738631006Pooja Nehwal
 
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...amitlee9823
 
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...Call Girls in Nagpur High Profile
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...drmarathore
 
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...amitlee9823
 
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Call Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
 
Develop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power pointDevelop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power pointGetawu
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证ehyxf
 
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...Pooja Nehwal
 
CALL GIRLS IN Saket 83778-77756 | Escort Service In DELHI NcR
CALL GIRLS IN Saket 83778-77756 | Escort Service In DELHI NcRCALL GIRLS IN Saket 83778-77756 | Escort Service In DELHI NcR
CALL GIRLS IN Saket 83778-77756 | Escort Service In DELHI NcRdollysharma2066
 
SM-N975F esquematico completo - reparación.pdf
SM-N975F esquematico completo - reparación.pdfSM-N975F esquematico completo - reparación.pdf
SM-N975F esquematico completo - reparación.pdfStefanoBiamonte1
 
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...amitlee9823
 
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...MOHANI PANDEY
 
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证tufbav
 
↑Top celebrity ( Pune ) Nagerbazar Call Girls8250192130 unlimited shot and al...
↑Top celebrity ( Pune ) Nagerbazar Call Girls8250192130 unlimited shot and al...↑Top celebrity ( Pune ) Nagerbazar Call Girls8250192130 unlimited shot and al...
↑Top celebrity ( Pune ) Nagerbazar Call Girls8250192130 unlimited shot and al...Call Girls in Nagpur High Profile
 
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 

Último (20)

Call Girls in Vashi Escorts Services - 7738631006
Call Girls in Vashi Escorts Services - 7738631006Call Girls in Vashi Escorts Services - 7738631006
Call Girls in Vashi Escorts Services - 7738631006
 
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
 
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...
VVIP Pune Call Girls Warje (7001035870) Pune Escorts Nearby with Complete Sat...
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
 
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...
 
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
Develop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power pointDevelop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power point
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
 
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
 
CALL GIRLS IN Saket 83778-77756 | Escort Service In DELHI NcR
CALL GIRLS IN Saket 83778-77756 | Escort Service In DELHI NcRCALL GIRLS IN Saket 83778-77756 | Escort Service In DELHI NcR
CALL GIRLS IN Saket 83778-77756 | Escort Service In DELHI NcR
 
SM-N975F esquematico completo - reparación.pdf
SM-N975F esquematico completo - reparación.pdfSM-N975F esquematico completo - reparación.pdf
SM-N975F esquematico completo - reparación.pdf
 
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
 
CHEAP Call Girls in Ashok Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Ashok Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Ashok Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Ashok Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
 
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
 
↑Top celebrity ( Pune ) Nagerbazar Call Girls8250192130 unlimited shot and al...
↑Top celebrity ( Pune ) Nagerbazar Call Girls8250192130 unlimited shot and al...↑Top celebrity ( Pune ) Nagerbazar Call Girls8250192130 unlimited shot and al...
↑Top celebrity ( Pune ) Nagerbazar Call Girls8250192130 unlimited shot and al...
 
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 

Track 5 session 1 - st dev con 2016 - need for security for iot

  • 1. October 4, 2016 Santa Clara Convention Center Mission City Ballroom The Need for Security In IoT Who needs security anyway ? Joe Pilozzi
  • 2. The Rise of Connected Things 2 • ~33B connected devices by 2020 • $1.7 trillion in value added to the global economy in 2019 • 40% Compound Annual Growth Rate 2014–2020
  • 3. The Connected Devices 3 Server Farms, Server Clusters Network Equipment (routers, firewalls, ..) PC/Laptop Connected Media Smart Phones, Tablets Embedded Connected Devices Smart Things  • Few Mu  • Tens of Mu  • ~ 1 Bu  • ~ 10 Bu  • ~ 10 Bu  20 Bu  • ~ 30 Bu  50 Bu Represents a very large opportunity for business and for mischief
  • 5. Who Needs Security Anyway … 5 • It’s about protecting Assets • Knowing the true value of those Assets you are going to protect • Assets are a wide range of items • Consumers Personal Information • Financial, Health, Location, Passwords, Accounts • Your Product or Solution • Processes, Services, Intellectual Property, Firmware, Brand • Health and Safety • Medical devices, Manufacturing Processes and Equipment, Transport and Vehicles • The Work Place • Production Equipment, Environmental and Access Controls Assets ….. Your brand, your reputation Photo source : Wired Magazine
  • 6. Connected Device Are Subject to Attacks 6 • Hacking opportunities made significantly easier with devices being connected to the internet • Exploiting carelessly managed user private information, as in the case of a connected SmartFridge • Exploit flaws and genuine mistakes leading to weaknesses in security • Hacking opportunities come from a failure to correctly verify the identity of devices on a network • An attack may take an indirect route to an asset by targeting the weakest link in a system, as in the case of a remotely hacked vehicle https://www.wired.com/2016/02/flaws-in-wireless-mice-and-keyboards-let-hackers-type-on-your-pc/
  • 9. General Threats To IoT Systems 9 • Access / misuse of services and networks • Access / misuse of devices • Theft of confidential data or identity • Counterfeit devices or services
  • 10. Threat Analysis 10 • Asset • In general terms is information, a capability, an advantage, a feature, financial or technical resource that may be damaged, lost or disrupted • Assets may be digital (software sources), physical (a car or a server) or commercial (brand) • Damage to an asset may affect the normal operation of the system as well as that of individuals and organizations involved with the system • Threat • Threat is a specific scenario or a sequence of actions that exploits a set of vulnerabilities and may cause damage to one or more of the system's Assets
  • 11. Threat Analysis 11 • Vulnerabilities • Is a weakness, limitation or a defect in one or more of the system's elements that can be exploited to disrupt the normal operation of the system • They may be in specific modules of the system, its architecture, its users and operators, and/or in its associated regulations, operational and business procedures • Countermeasures, "safeguards“ or Barriers • Is a procedure, function, process, action or a means of mitigating a specific vulnerability or several different vulnerabilities
  • 12. Threat Analysis 12 Concepts and Relationships Assets Value Assets Vulnerabilities Threats Wish to abuse Exploit• Countermeasures mitigate Vulnerabilities and therefore mitigate Threats and hence reduces Risk Increases Wish to minimize Risk Value Hence evaluate Attacks To Protect Countermeasures / Barriers Mitigates Develop Reduces • Threats exploit Vulnerabilities and to gain access to Assets Customer Owner
  • 13. Threat Analysis 13 Smart Metering System Gateway Cloud Services Network Smart Meter Threat • Commercial and cyber crime • Disruption of administration system • Supply shut down – disruption of service • Spread of wrong information (e.g. invoices) Fake Service • Commercial and cyber crime • Identifying empty houses • Invoice Fraud • Manipulating meter readings • Misuse of private customer data Eavesdropper Data Corruption • Identifying empty houses • Manipulating meter readings • Misuse of private customer data • Invoice fraud Compromised Device Data Corruption • Distributed Denial-of-Service (DDoS) • Malicious code Counterfeit Device
  • 14. Classes of Attacks 14 Invasive Product Attacks With the case opened / removed • Test / debug port access • Inter device bus and IO probing • Reset, clock attacks • Power analysis • Temperature / electrical attacks Invasive Silicon Attacks Device de-packaged • Circuit analysis and probing Non Invasive Attacks Misuse of network protocols • Exploit communication protocol errors • Flaws in software design / implementation Box Internet The Cloud BOX
  • 15. Invasive Silicon Attacks 15 • Silicon Reverse Engineering • FLASH or ROM code retrieval • Whole or partial gate net-list extraction Prepared for probing • Identification of Internal Structure of the Chip • Layout analysis, feature, buses, … • Find “good“ location for probing • Buses and memory to obtain keys, data, code • A Fault Injection Attack - Non or Semi-Invasive • Disturb normal behavior • Exploit unexpected behavior • Sources • Laser, UV, X-rays
  • 16. Software Attacks 16 • >95% attacks today exploit software implementation flaws • Heartbleed - wrong buffer size • Apple IOS web authentication by-pass - software line duplicated Human error contributes to nearly all of these incidents
  • 17. Cost / Effort Relative Cost Of Attacks 17 Software Attacks • Stack overflow • Malware • Virus • Trojans Invasive Silicon Attacks • Reverse Engineering • Probing • Fault Injection ( Laser, X-Ray, VU) Invasive Product Attacks • Physical access ( JTAG, IOs) • Environment Perturbation • Side Channel Attacks (SPA, DPA, DEMA) Today 95 % attacks Complexity
  • 18. Fortifying an IoT Device Countermeasures
  • 19. An IoT Device’s Security Needs 19 Prevent device misuse Prevent device or server counterfeiting Resistance against hacking, cloning Authentication • Device to device • Device to server Service and network access corruption Prevent device misuse Integrity and Availability • Secure Boot • Secure firmware upgrade • Trusted processing Data privacy Prevent data collection or corruption Confidentiality • Data / identity protection • Secure communications • Secure storage Upgradability Secure Communications • Secure firmware upgrade Prevent device misuse Need Solution
  • 20. Countermeasures 20 • Cryptography algorithms are used to protect data and establish trust Cryptography Authentication • Challenge – Response • TLS/DTLS protocols challenge response Authentication Process Availability Service protection • Secure Boot • Secure Firmware Upgrade • Trusted Processing Data Integrity • Data with Signature - using RSA / ECC • Cryptography ciphers (AES, DES, ECC, RSA) are public • Protecting keys is the key to success Confidentiality Data encryption • Symmetric DES / AES • Asymmetric RSA / ECC
  • 21. Countermeasures 21 • Smaller silicon geometries the better – more difficult to probe • Layout flattening – just a sea-of-gates • Easier to hide busses and critical signal routing • More difficult to identify functions / features • Camouflage to prevent reverse engineering Physical Design Techniques Standard routing Camouflaged routing
  • 23. Cost Managing Risk 23 • Always seek better level of security/integrity • Use the integrity and cryptographic tools offered • Seek out advise for best practices Risk Robustness Security Optimal Government Mandated Security Fort KnoxPoor Always seek better Increase due to Hacking Vulnerable
  • 24. Invasive Product Attacks With the case opened / removed • Test / debug port access • Inter device bus and IO probing • Reset, clock attacks • Power analysis • Temperature / electrical attacks Non Invasive Attacks Misuse of network protocols • Exploit communication protocol errors • Flaws in software design / implementation Invasive Silicon Attacks Device de-packaged • Circuit analysis and probing • Fault injection Solutions 24 Box Internet The Cloud BOX Add a Secure Element • Much Better Tamper Resistant • Trusted Crypto Services • Secure Storage • Independently Certified A Better Solution Use an MCU’s security features • Unique Device IDs • Memory Protection • Firewall • Tamper Detection • Crypto Hardware • AES, T-RNG • Debug Port Protection Solution SOLUTIONS
  • 25. Layers of Security Services 25 • Security services should be handled independently in silo’ed processes System Layers Application / Cloud • Access control and right management • Feature and product management Data / Transport Layer • TLS/DTLS, HTTPS etc Link Layer / Physical Layer • Network physical layer security • e.g. WiFi – WPA2, 802.11i Device Security Services • Secure Boot
  • 26. Cybercriminals 26 • Cybercriminals are motivated by various factors • Financial gain, brand damage, political or terrorism, or plain old mischief making • Todays cybercriminals are increasingly well funded criminal organizations • Cybercriminals don’t necessarily target the final asset directly, but target less secure devices connected to the same network Never Underestimate ….. • Minimize your vulnerabilities or “attack surface” • Seek out advise on threat analysis
  • 27. Risk Management 27 • Understand the value of the Assets you are going to protect • Understand your Threats and Vulnerabilities • Develop a security strategy to reduce Risk • At the right level of security for the value of the Assets being protected • Make use of the microcontrollers integrity and hardware based cryptography tools available • Crypto libraries, crypto accelerators • Robustness features like debug port protection, memory partitioning, firewall and tamper detection Fortified Solutions • A well Fortified Solution makes use of these features • Don’t make it easy for a cybercriminal!
  • 28. Is Your Product Secure ?
  • 29. Is Your Product Secure … 29 • Device Integrity • Can you determine if the product is authentic and can it be trusted? • Security of Communications • Is private data being transferred confidentially and with integrity? • Security of Stored Information • Is private data being stored in a protected manner ? A Simple Check List
  • 30. Security of Connected Devices Does Matter 30 Even our election could be a risk .. Source: Engadget
  • 32. Conclusion 32 Work with ST, your experienced partner • Internet of Things presents a wealth of opportunities, a growth for commerce and an increased risk of theft, mischief and damage or loss of life • Understand the value of Assets in your system or product • Perform threat analysis to better understand your Risks • Reduce risk by designing and managing secure products well fortified against threats • Design and manage your products using good design practices • Design products and systems resilient against threats throughout their life-cycle • A robust product is achieved through the use of security features and tools • Most of the software attacks today can be thwarted by good firmware development practices
  • 33. Demos
  • 34. ST Solutions for Security in IoT 34 Smart City Solution for IoT Node
  • 35. 35