1. CONFIDENTIAL INFORMATION
This document is confidential and proprietary information
of Target Soft Systems. Confidential Information includes,
but is not limited to, the following:
Corporate, Employee and Infrastructure Information about
Target Soft Systems.
Target Soft Systems implementation , Training
methodology, cost, project management and quality
processes.
Any disclosure of Confidential Information to, or use of it
by a third party (i.e., a party other than authorised , will be
damaging to Target Soft Systems). Ownership of all
Confidential Information, no matter in what media it
resides, remains with Target Soft Systems( TSS ).
Confidential Information in this document shall not be
disclosed outside the buyer’s proposal evaluators and shall
not be duplicated, used, or disclosed – in whole or in part –
for any purpose other than to evaluate this proposal
without specific written permission of an authorized
representative of Target Soft Systems.
3. • More things are being connected to address a growing range of business
needs. In fact, by 2020, more than 50 billion things will connect to the
Internet—seven times our human population. Examples are wearable health
and performance monitors, connected vehicles, smart grids, connected
oilrigs, and connected manufacturing. This Internet of Things (IoT) will
revolutionize the way we work, live, play, and learn.
• Inadequate security will be a critical barrier to large-scale deployment of
IoT systems and broad customer adoption of IoT applications. Simply
extending existing IT security architectures to the IoT will not be
sufficient. The IoT world requires new security approaches, creating fertile
ground for innovative and disruptive thinking and solutions.
4. The security challenge
• Devices are not reachable
– Most of the time a device is not connected
• Devices can be lost and stolen
– Makes security difficult when the device is not connected
• Devices are not crypto-engines
– Strong security difficult without processing power
• Devices have finite life
– Credentials need to be tied to lifetime
• Devices are transportable
– Will cross borders
• Devices need to be recognised by many readers
– What data is released to what reader?
4
5. Security work in an Internet of
Things
Assurance
Risk analysis
Device analysis
Crypto capability and export analysis
• RFID tags will not do crypto for some years
Security objective
• Privacy protection
• Identity protection
• Traffic analysis protection
Identity and identifier management
Separation of identity and identifier
6. How to secure the internet of things ?
• With the expansion of the IoT market,
protecting the company's data and IP is
more important than ever. Here are four
ways organisations can put security at the
core of the IoT value proposition
7. SECURITY TIPS FOR ORGANIZATIONS
1. Set up an integrated team of business
executives and security specialists
2. Integrate security best practice with the
IoT product development process
3. Educate consumers as well as front-line
staff in security best practice
4. Address privacy concerns with
transparent privacy policies
8. 1. Set up an integrated team of business
executives and security specialists
Product managers working alongside security
specialists to plan the product roadmap will ensure
security is a key consideration when designing core
features and functionality. An integrated team will
allow for greater collaboration, ensure the business
and security concerns are well balanced and any
vulnerabilities can be identified early in the product
lifecycle.
9. 2. Integrate security best practice with
the IoT product development process
Business leaders need to identify
where their organisation might be
vulnerable through an analysis of
disruptive attack scenarios, and the
financial and non-financial impact of an
attack on the organisation as well as the
users.
10. 3. Educate consumers as well as front-
line staff in security best practice
Organisations must inform and
educate consumers on best practice
including regularly changing passwords,
which is still one of the most common
causes of a security breach, and offering
advice on security patches.
11. 4. Address privacy concerns with
transparent privacy policies
To protect consumers from potential
data privacy breaches, businesses need to
develop privacy policies that clearly
detail how the data collected from IoT
products will be used, and these policies
should be easily accessible to consumers.