SlideShare a Scribd company logo
1 of 10
Download to read offline
SECURITY of THINGS
2014
Everyone today is vulnerable to security breach since it is relying on 1976 D&H old PKI Technologies
When D&H created PKI, it gave birth to Alice and Bob(Key Exchange).
However Alice and Bob, usually allow uninvited evil guests such as Eve, Chuck, Craig, Oscar, Sybill and Wendy,
as Alice and Bob, attempt to secure IoT, M2M, Banks,ATM, EMV, Cloud, ConnectedCar, ConnectedHome, Industrial Internet, etc.
Here is a short list of attacks / security issues with PKI:
- Impersonation, MiTM (Main In the Middle), MiTB(Main in the Browser)
- RA /VA Compromise
- CA System Compromise
- CA Signing Key Compromise
- SideChannel, KnapSack, BruteForce
http://www.reuters.com/article/2014/10/21/us-usa-justice-cybersecurity-idUSKCN0IA0BM20141021
http://www.businessinsider.in/Hackers-Are-Stealing-Millions-From-ATM-Worldwide-With-New-Malware/articleshow/44629993.cms
The U.S. Department of Commerce estimates that the theft of intellectual property costs businesses
more than US$250 billion and results in the loss of 750,000 jobs in the United States every year
PROPOSED SOLUTION
NEW GLOBAL CyberSecurity Infrastructure : Private Cloud - Hybrid Cloud forVetted Companies and their clients.
Initial Tenants: Payment Processors, Banks, Financial Networks, ATM networks, Utilities,TelCOs, CableCOs, M2M, ISPs
CyberSECURITY ISSUES
2014
2014
BEAST ATTACK
CRIME ATTACK
PKI - CA - SSL VULNERABILITIES
Poodle
SSL DOS
Man In The Middle SSL, Man in the Browser, Man In the Phone,
Perfect Forward Secrecy, Strict Transport Security, Keylogger.
http://www.macworld.com/article/2841965/swedish-hacker-finds-serious-vulnerability-in-os-x-yosemite.html
CERTIFICATE AUTHORITIES
Can be Fake
SSL KEYS
Can be Broken
+
PKI - CA - SSL
Facebook - Twitter : Edpimentl
2014
IDENTITY STRONG KEY
+
CERTIFICATES & WEAK KEY ESCROW
NO
iSEC
InternetID Secured Encryption
Facebook - Twitter : Edpimentl
2014
EXCEEDS NIST - ISO - PCI-DSS - HIPPA REQUIREMENTS
Security of Things
HeTNet, FOG, SDN-NFV, Secured MicroServices, eSIM,TrustZone,
SmartCity, Fintech, iIoT, IoT / WoT / WebRTC. mHealth,Wearable,
2014
M2M
EXCEEDS NIST - ISO - PCI-DSS - HIPPA REQUIREMENTS
Bring Your Own Cloud
viasip
VIRTUAL INFRASTRUCTIRE - APPLICATIONS & SERVICES over IP
1 Dynamic Network Encryption - ISP - Cloud Provider Agnostic
2- WiFi Encrypted Personal Cloud Storage (Biometric Access)
3- Corporate and Personal DATA LEAK DETECTION and PROTECTION
4- Does not use Weak - Diluted PKI - CA - SSL
5- End to End Encrypted VOIP, eMail, Data, Messaging NO MITM
6- Private WEB & Encrypted File Sharing (Intellectual Property - Legal -HIPPA)
7- Vaulted (TOKENIZED) DebitCard / CC = Recurring Billing / Payment
8- Modified FireFox & Chrome Browser No MITB Man In The Browser
9- BitCOIN Wallet - Prepaid Debit - Prepaid Minutes - P2P Payment
10- Secure Social VPN - Providers and Consumer MUST be vetted
11- Software as a Contract MiddleWare / APIs (no unauthorized BigData )
12- Modified Android CyanogenMod OS
byoc
viasip
1- Cyber-Secure and Cyber-Reslient Private / Hybrid / Embedded Cloud
2- Does not use today’s Weak - Diluted - Forgeable CA and SSL/TLS
3- Corporate & Personal DATA LEAK DETECTION and PROTECTION
4 - Dynamic Personal - Device - Network Encryption - ISP Cloud Provider Agnostic
5- End to End Encrypted MetaData - Messaging - Data - Email - Voice NO MITM
6- Next Gen eMAIL .. D2D / P2P Only and not Archaic Stored-Forward email
7- Private WEB & Encrypted File Sharing (Intellectual Property - Legal - PII - EMR )
8- Software as a Contract MiddleWare / API (no unauthorized BigData data mining)
9- Modified Firefox & Chrome Browser .. no MITB Man In The Browser
10-BlockChain xPayment / Banking / IoT-M2M ATM / MobileMoney Networks
11- Modified Android CynaogenMOD OS and Embedded SOC OS
12- MRC “ Managed Relations by Customer” and “not” CRM
Ed Pimentel
- TEE-TrustZone
2014
V.Risk Management - Fraud Detection - Using BigData - Machine Learning - Augmente Intelligence - Artificial Intelligence - Predictive & Prescriptive Analytics
CyberResilient Financial Transactions
( IoT / FOG / EDGE / Cognitive Radio )
Beyond PCI - EMV
Disable or Enable List of Merchants(National or Intl.) that can charge your ChainAPP Issue Prepaid Card
Chain-APP BLE Sensor, (Voice, Face, Finger)Biometric, Blockchain, Image & Audio Capturing.
AgileCHAIN (blockchain) APP Debit Card Issuing - HCE - eSIM - TrustZone- OTA
Weak 3DES, MD5, CR4, SHA1, Unsafe PKI, CA, DH, or even the latest ECDSA
2014
IoT Cloud - CyberSecurity
Infrastructure
WANT TO PARTNER WITH US?
CONTACT
MobileMondayATL at GMAIL dot COM
SECURITY of THINGS
Twitter / Skype : EdPimentl2014

More Related Content

What's hot

Mwc 2013 a devices review
Mwc 2013 a devices reviewMwc 2013 a devices review
Mwc 2013 a devices review
MTKDMI
 
Gemalto corporate presentation & m health introduction
Gemalto corporate presentation & m health introductionGemalto corporate presentation & m health introduction
Gemalto corporate presentation & m health introduction
3GDR
 
Future of mobile payment and mobile commerce may 2013
Future of mobile payment and mobile commerce may 2013Future of mobile payment and mobile commerce may 2013
Future of mobile payment and mobile commerce may 2013
Tarang Shah
 
Payment revolution by Yoav Elgrichi
Payment revolution by Yoav ElgrichiPayment revolution by Yoav Elgrichi
Payment revolution by Yoav Elgrichi
Siti Aishah Zahari
 
2 D Barcodes ,Wallets for Mobiles
2 D Barcodes ,Wallets for Mobiles 2 D Barcodes ,Wallets for Mobiles
2 D Barcodes ,Wallets for Mobiles
Atul Singh
 

What's hot (20)

Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and Market
 
Secure mobile payment
Secure mobile paymentSecure mobile payment
Secure mobile payment
 
Beyond cards, phones and terminals: New payment form factors
Beyond cards, phones and terminals: New payment form factorsBeyond cards, phones and terminals: New payment form factors
Beyond cards, phones and terminals: New payment form factors
 
Mwc 2013 a devices review
Mwc 2013 a devices reviewMwc 2013 a devices review
Mwc 2013 a devices review
 
Overview of Mobile Payment Systems
Overview of Mobile Payment SystemsOverview of Mobile Payment Systems
Overview of Mobile Payment Systems
 
Gemalto corporate presentation & m health introduction
Gemalto corporate presentation & m health introductionGemalto corporate presentation & m health introduction
Gemalto corporate presentation & m health introduction
 
Next Big Trends: A Librarian’s Field Guide to Near Field Communication
Next Big Trends: A Librarian’s Field Guide to Near Field CommunicationNext Big Trends: A Librarian’s Field Guide to Near Field Communication
Next Big Trends: A Librarian’s Field Guide to Near Field Communication
 
Future of mobile payment and mobile commerce may 2013
Future of mobile payment and mobile commerce may 2013Future of mobile payment and mobile commerce may 2013
Future of mobile payment and mobile commerce may 2013
 
Payment revolution by Yoav Elgrichi
Payment revolution by Yoav ElgrichiPayment revolution by Yoav Elgrichi
Payment revolution by Yoav Elgrichi
 
Near field communication
Near field communicationNear field communication
Near field communication
 
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula HunterRFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
 
Virtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe SolutionVirtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe Solution
 
Mobile Payments
Mobile PaymentsMobile Payments
Mobile Payments
 
Digital reality nxp final.pptx
Digital reality nxp final.pptxDigital reality nxp final.pptx
Digital reality nxp final.pptx
 
Report
ReportReport
Report
 
e-wallet , The future of Cards and Money
e-wallet , The future of Cards and Moneye-wallet , The future of Cards and Money
e-wallet , The future of Cards and Money
 
Best Practices in Risk Management for Mobile Payments - MRC 2011
Best Practices in Risk Management for Mobile Payments - MRC 2011Best Practices in Risk Management for Mobile Payments - MRC 2011
Best Practices in Risk Management for Mobile Payments - MRC 2011
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentation
 
Mobile Payments: An IBM Point of View
Mobile Payments: An IBM Point of ViewMobile Payments: An IBM Point of View
Mobile Payments: An IBM Point of View
 
2 D Barcodes ,Wallets for Mobiles
2 D Barcodes ,Wallets for Mobiles 2 D Barcodes ,Wallets for Mobiles
2 D Barcodes ,Wallets for Mobiles
 

Viewers also liked

Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
DigiCert, Inc.
 
IoT Cloud architecture
IoT Cloud architectureIoT Cloud architecture
IoT Cloud architecture
MachinePulse
 

Viewers also liked (20)

Resource Public Key Infrastructure presentation, Mynog5
Resource Public Key Infrastructure presentation, Mynog5Resource Public Key Infrastructure presentation, Mynog5
Resource Public Key Infrastructure presentation, Mynog5
 
Best practise Infrastructure pki
Best practise Infrastructure pkiBest practise Infrastructure pki
Best practise Infrastructure pki
 
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
 
Lab IoT 2016
Lab IoT 2016Lab IoT 2016
Lab IoT 2016
 
Programming IoT Gateways in JavaScript with macchina.io
Programming IoT Gateways in JavaScript with macchina.ioProgramming IoT Gateways in JavaScript with macchina.io
Programming IoT Gateways in JavaScript with macchina.io
 
Building Open Source IoT Cloud
Building Open Source IoT CloudBuilding Open Source IoT Cloud
Building Open Source IoT Cloud
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
 
Internet of Things (IoT) reference architecture using Azure -MIC - Lahore
Internet of Things (IoT) reference architecture using Azure -MIC - LahoreInternet of Things (IoT) reference architecture using Azure -MIC - Lahore
Internet of Things (IoT) reference architecture using Azure -MIC - Lahore
 
Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing
 
Real World IoT Architectures and Projects with Eclipse IoT
Real World IoT Architectures and Projects with Eclipse IoTReal World IoT Architectures and Projects with Eclipse IoT
Real World IoT Architectures and Projects with Eclipse IoT
 
Introduction to Internet of Things Hardware
Introduction to Internet of Things HardwareIntroduction to Internet of Things Hardware
Introduction to Internet of Things Hardware
 
Building IoT with Arduino Day One
Building IoT with Arduino Day One Building IoT with Arduino Day One
Building IoT with Arduino Day One
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
IoT Architecture - Are Traditional Architectures Good Enough or do we Need Ne...
IoT Architecture - Are Traditional Architectures Good Enough or do we Need Ne...IoT Architecture - Are Traditional Architectures Good Enough or do we Need Ne...
IoT Architecture - Are Traditional Architectures Good Enough or do we Need Ne...
 
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsIoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
 
MySQL
MySQLMySQL
MySQL
 
MySQL Atchitecture and Concepts
MySQL Atchitecture and ConceptsMySQL Atchitecture and Concepts
MySQL Atchitecture and Concepts
 
Open IoT Cloud Architecture, Web of Things, Shenzhen, China.
Open IoT Cloud Architecture, Web of Things, Shenzhen, China.Open IoT Cloud Architecture, Web of Things, Shenzhen, China.
Open IoT Cloud Architecture, Web of Things, Shenzhen, China.
 
MySql slides (ppt)
MySql slides (ppt)MySql slides (ppt)
MySql slides (ppt)
 
IoT Cloud architecture
IoT Cloud architectureIoT Cloud architecture
IoT Cloud architecture
 

Similar to IoTcloud-cybersecurity-securityofthings

Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
OKsystem
 

Similar to IoTcloud-cybersecurity-securityofthings (20)

Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
AgileCO-Labs WhiteLabel ICO-Services Blockchain-Solutions
AgileCO-Labs WhiteLabel ICO-Services Blockchain-SolutionsAgileCO-Labs WhiteLabel ICO-Services Blockchain-Solutions
AgileCO-Labs WhiteLabel ICO-Services Blockchain-Solutions
 
Unwired Ground-Cloud Ecosystem
Unwired Ground-Cloud EcosystemUnwired Ground-Cloud Ecosystem
Unwired Ground-Cloud Ecosystem
 
AgileCO PDIOO - SmartCITY - IOT - IIOT - FINTECH SOLUTIONS
AgileCO PDIOO - SmartCITY - IOT - IIOT - FINTECH SOLUTIONSAgileCO PDIOO - SmartCITY - IOT - IIOT - FINTECH SOLUTIONS
AgileCO PDIOO - SmartCITY - IOT - IIOT - FINTECH SOLUTIONS
 
ViaSip beta
ViaSip betaViaSip beta
ViaSip beta
 
Mobile Authentication on the Internet
Mobile Authentication on the InternetMobile Authentication on the Internet
Mobile Authentication on the Internet
 
Big data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursBig data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is Yours
 
Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
6 Trends in Telecom for 2020
6 Trends in Telecom for 20206 Trends in Telecom for 2020
6 Trends in Telecom for 2020
 
IoT and Embedded OS Lecture - Cristian Toma and George Iosif
IoT and Embedded OS Lecture - Cristian Toma and George IosifIoT and Embedded OS Lecture - Cristian Toma and George Iosif
IoT and Embedded OS Lecture - Cristian Toma and George Iosif
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Blockchain 2Gether - EthEDU Training & Education
Blockchain 2Gether - EthEDU Training & EducationBlockchain 2Gether - EthEDU Training & Education
Blockchain 2Gether - EthEDU Training & Education
 
Hacking Point of Sale
Hacking Point of SaleHacking Point of Sale
Hacking Point of Sale
 
State of Blockchain 2017
State of Blockchain 2017State of Blockchain 2017
State of Blockchain 2017
 
Security is sexy again
Security is sexy againSecurity is sexy again
Security is sexy again
 
Securing IoT devices
Securing IoT devicesSecuring IoT devices
Securing IoT devices
 
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New AuthenticationPasswords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
 
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCOEl IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
 
Five Trends Enabled by 5G that will Change Networking Forever
Five Trends Enabled by 5G that will Change Networking ForeverFive Trends Enabled by 5G that will Change Networking Forever
Five Trends Enabled by 5G that will Change Networking Forever
 

More from Ed Pimentel

More from Ed Pimentel (12)

AgileCO Labs Blockchain Consortium 2018
AgileCO Labs Blockchain Consortium 2018AgileCO Labs Blockchain Consortium 2018
AgileCO Labs Blockchain Consortium 2018
 
Meetups: Event Matchmaker - Social Biz Networking Broker
Meetups: Event Matchmaker - Social Biz Networking BrokerMeetups: Event Matchmaker - Social Biz Networking Broker
Meetups: Event Matchmaker - Social Biz Networking Broker
 
Internet of Things Reverse-Pitch
Internet of Things Reverse-PitchInternet of Things Reverse-Pitch
Internet of Things Reverse-Pitch
 
MobileMonday(Atlanta) SmartCity IoT-Cloud Labs
MobileMonday(Atlanta) SmartCity IoT-Cloud LabsMobileMonday(Atlanta) SmartCity IoT-Cloud Labs
MobileMonday(Atlanta) SmartCity IoT-Cloud Labs
 
SCaaS SmartCity As A Service
SCaaS SmartCity As A ServiceSCaaS SmartCity As A Service
SCaaS SmartCity As A Service
 
Viasip Unwired GroundCloud IoT-WoT Ecosystem
Viasip Unwired GroundCloud IoT-WoT EcosystemViasip Unwired GroundCloud IoT-WoT Ecosystem
Viasip Unwired GroundCloud IoT-WoT Ecosystem
 
NarrowBand IoT Cloud
NarrowBand IoT CloudNarrowBand IoT Cloud
NarrowBand IoT Cloud
 
Mobile monday atlanta-smartcity-iot-for-startu_ps
Mobile monday atlanta-smartcity-iot-for-startu_psMobile monday atlanta-smartcity-iot-for-startu_ps
Mobile monday atlanta-smartcity-iot-for-startu_ps
 
Mobile mondayatlantaaug10 2009
Mobile mondayatlantaaug10 2009Mobile mondayatlantaaug10 2009
Mobile mondayatlantaaug10 2009
 
mCommerce NFC Payments - QrCode Payment
mCommerce NFC Payments - QrCode PaymentmCommerce NFC Payments - QrCode Payment
mCommerce NFC Payments - QrCode Payment
 
Mobile Monday Atlanta Aug10 2009v2 Short
Mobile Monday Atlanta Aug10 2009v2 ShortMobile Monday Atlanta Aug10 2009v2 Short
Mobile Monday Atlanta Aug10 2009v2 Short
 
Iptv Latino Von Mexico
Iptv Latino Von MexicoIptv Latino Von Mexico
Iptv Latino Von Mexico
 

Recently uploaded

Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 

Recently uploaded (20)

Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 

IoTcloud-cybersecurity-securityofthings

  • 2. Everyone today is vulnerable to security breach since it is relying on 1976 D&H old PKI Technologies When D&H created PKI, it gave birth to Alice and Bob(Key Exchange). However Alice and Bob, usually allow uninvited evil guests such as Eve, Chuck, Craig, Oscar, Sybill and Wendy, as Alice and Bob, attempt to secure IoT, M2M, Banks,ATM, EMV, Cloud, ConnectedCar, ConnectedHome, Industrial Internet, etc. Here is a short list of attacks / security issues with PKI: - Impersonation, MiTM (Main In the Middle), MiTB(Main in the Browser) - RA /VA Compromise - CA System Compromise - CA Signing Key Compromise - SideChannel, KnapSack, BruteForce http://www.reuters.com/article/2014/10/21/us-usa-justice-cybersecurity-idUSKCN0IA0BM20141021 http://www.businessinsider.in/Hackers-Are-Stealing-Millions-From-ATM-Worldwide-With-New-Malware/articleshow/44629993.cms The U.S. Department of Commerce estimates that the theft of intellectual property costs businesses more than US$250 billion and results in the loss of 750,000 jobs in the United States every year PROPOSED SOLUTION NEW GLOBAL CyberSecurity Infrastructure : Private Cloud - Hybrid Cloud forVetted Companies and their clients. Initial Tenants: Payment Processors, Banks, Financial Networks, ATM networks, Utilities,TelCOs, CableCOs, M2M, ISPs CyberSECURITY ISSUES 2014
  • 4. BEAST ATTACK CRIME ATTACK PKI - CA - SSL VULNERABILITIES Poodle SSL DOS Man In The Middle SSL, Man in the Browser, Man In the Phone, Perfect Forward Secrecy, Strict Transport Security, Keylogger. http://www.macworld.com/article/2841965/swedish-hacker-finds-serious-vulnerability-in-os-x-yosemite.html
  • 5. CERTIFICATE AUTHORITIES Can be Fake SSL KEYS Can be Broken + PKI - CA - SSL Facebook - Twitter : Edpimentl 2014
  • 6. IDENTITY STRONG KEY + CERTIFICATES & WEAK KEY ESCROW NO iSEC InternetID Secured Encryption Facebook - Twitter : Edpimentl 2014
  • 7. EXCEEDS NIST - ISO - PCI-DSS - HIPPA REQUIREMENTS Security of Things HeTNet, FOG, SDN-NFV, Secured MicroServices, eSIM,TrustZone, SmartCity, Fintech, iIoT, IoT / WoT / WebRTC. mHealth,Wearable, 2014
  • 8. M2M EXCEEDS NIST - ISO - PCI-DSS - HIPPA REQUIREMENTS Bring Your Own Cloud viasip VIRTUAL INFRASTRUCTIRE - APPLICATIONS & SERVICES over IP 1 Dynamic Network Encryption - ISP - Cloud Provider Agnostic 2- WiFi Encrypted Personal Cloud Storage (Biometric Access) 3- Corporate and Personal DATA LEAK DETECTION and PROTECTION 4- Does not use Weak - Diluted PKI - CA - SSL 5- End to End Encrypted VOIP, eMail, Data, Messaging NO MITM 6- Private WEB & Encrypted File Sharing (Intellectual Property - Legal -HIPPA) 7- Vaulted (TOKENIZED) DebitCard / CC = Recurring Billing / Payment 8- Modified FireFox & Chrome Browser No MITB Man In The Browser 9- BitCOIN Wallet - Prepaid Debit - Prepaid Minutes - P2P Payment 10- Secure Social VPN - Providers and Consumer MUST be vetted 11- Software as a Contract MiddleWare / APIs (no unauthorized BigData ) 12- Modified Android CyanogenMod OS byoc viasip 1- Cyber-Secure and Cyber-Reslient Private / Hybrid / Embedded Cloud 2- Does not use today’s Weak - Diluted - Forgeable CA and SSL/TLS 3- Corporate & Personal DATA LEAK DETECTION and PROTECTION 4 - Dynamic Personal - Device - Network Encryption - ISP Cloud Provider Agnostic 5- End to End Encrypted MetaData - Messaging - Data - Email - Voice NO MITM 6- Next Gen eMAIL .. D2D / P2P Only and not Archaic Stored-Forward email 7- Private WEB & Encrypted File Sharing (Intellectual Property - Legal - PII - EMR ) 8- Software as a Contract MiddleWare / API (no unauthorized BigData data mining) 9- Modified Firefox & Chrome Browser .. no MITB Man In The Browser 10-BlockChain xPayment / Banking / IoT-M2M ATM / MobileMoney Networks 11- Modified Android CynaogenMOD OS and Embedded SOC OS 12- MRC “ Managed Relations by Customer” and “not” CRM Ed Pimentel - TEE-TrustZone 2014
  • 9. V.Risk Management - Fraud Detection - Using BigData - Machine Learning - Augmente Intelligence - Artificial Intelligence - Predictive & Prescriptive Analytics CyberResilient Financial Transactions ( IoT / FOG / EDGE / Cognitive Radio ) Beyond PCI - EMV Disable or Enable List of Merchants(National or Intl.) that can charge your ChainAPP Issue Prepaid Card Chain-APP BLE Sensor, (Voice, Face, Finger)Biometric, Blockchain, Image & Audio Capturing. AgileCHAIN (blockchain) APP Debit Card Issuing - HCE - eSIM - TrustZone- OTA Weak 3DES, MD5, CR4, SHA1, Unsafe PKI, CA, DH, or even the latest ECDSA 2014
  • 10. IoT Cloud - CyberSecurity Infrastructure WANT TO PARTNER WITH US? CONTACT MobileMondayATL at GMAIL dot COM SECURITY of THINGS Twitter / Skype : EdPimentl2014