Ravi i ot-security

CONFIDENTIAL INFORMATION
This document is confidential and proprietary information
of Target Soft Systems. Confidential Information includes,
but is not limited to, the following:
Corporate, Employee and Infrastructure Information about
Target Soft Systems.
Target Soft Systems implementation , Training
methodology, cost, project management and quality
processes.
Any disclosure of Confidential Information to, or use of it
by a third party (i.e., a party other than authorised , will be
damaging to Target Soft Systems). Ownership of all
Confidential Information, no matter in what media it
resides, remains with Target Soft Systems( TSS ).
Confidential Information in this document shall not be
disclosed outside the buyer’s proposal evaluators and shall
not be duplicated, used, or disclosed – in whole or in part –
for any purpose other than to evaluate this proposal
without specific written permission of an authorized
representative of Target Soft Systems.
SECURITY ISSUES IN IOT
• More things are being connected to address a growing range of business
needs. In fact, by 2020, more than 50 billion things will connect to the
Internet—seven times our human population. Examples are wearable health
and performance monitors, connected vehicles, smart grids, connected
oilrigs, and connected manufacturing. This Internet of Things (IoT) will
revolutionize the way we work, live, play, and learn.
• Inadequate security will be a critical barrier to large-scale deployment of
IoT systems and broad customer adoption of IoT applications. Simply
extending existing IT security architectures to the IoT will not be
sufficient. The IoT world requires new security approaches, creating fertile
ground for innovative and disruptive thinking and solutions.
The security challenge
• Devices are not reachable
– Most of the time a device is not connected
• Devices can be lost and stolen
– Makes security difficult when the device is not connected
• Devices are not crypto-engines
– Strong security difficult without processing power
• Devices have finite life
– Credentials need to be tied to lifetime
• Devices are transportable
– Will cross borders
• Devices need to be recognised by many readers
– What data is released to what reader?
4
Security work in an Internet of
Things
Assurance
Risk analysis
Device analysis
Crypto capability and export analysis
• RFID tags will not do crypto for some years
Security objective
• Privacy protection
• Identity protection
• Traffic analysis protection
Identity and identifier management
Separation of identity and identifier
How to secure the internet of things ?
• With the expansion of the IoT market,
protecting the company's data and IP is
more important than ever. Here are four
ways organisations can put security at the
core of the IoT value proposition
SECURITY TIPS FOR ORGANIZATIONS
1. Set up an integrated team of business
executives and security specialists
2. Integrate security best practice with the
IoT product development process
3. Educate consumers as well as front-line
staff in security best practice
4. Address privacy concerns with
transparent privacy policies
1. Set up an integrated team of business
executives and security specialists
Product managers working alongside security
specialists to plan the product roadmap will ensure
security is a key consideration when designing core
features and functionality. An integrated team will
allow for greater collaboration, ensure the business
and security concerns are well balanced and any
vulnerabilities can be identified early in the product
lifecycle.
2. Integrate security best practice with
the IoT product development process
Business leaders need to identify
where their organisation might be
vulnerable through an analysis of
disruptive attack scenarios, and the
financial and non-financial impact of an
attack on the organisation as well as the
users.
3. Educate consumers as well as front-
line staff in security best practice
Organisations must inform and
educate consumers on best practice
including regularly changing passwords,
which is still one of the most common
causes of a security breach, and offering
advice on security patches.
4. Address privacy concerns with
transparent privacy policies
To protect consumers from potential
data privacy breaches, businesses need to
develop privacy policies that clearly
detail how the data collected from IoT
products will be used, and these policies
should be easily accessible to consumers.
Ravi i ot-security
THANK YOU
1 de 13

Recomendados

Cybersecurity in the Era of IoT por
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoTAmy Daly
1.3K vistas26 diapositivas
IT compliance por
IT complianceIT compliance
IT compliancePhan Vuong
2.8K vistas29 diapositivas
Iot cyber security por
Iot cyber securityIot cyber security
Iot cyber securitysajid mehmood
120 vistas16 diapositivas
Role of Forensic Triage In Cyber Security Trends 2021 por
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Amrit Chhetri
188 vistas63 diapositivas
The difference between Cybersecurity and Information Security por
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityPECB
4.5K vistas16 diapositivas
Internet of Things: Dealing with the enterprise network of things por
Internet of Things: Dealing with the enterprise network of thingsInternet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsHuntsman Security
790 vistas11 diapositivas

Más contenido relacionado

La actualidad más candente

Information & Cyber Security Risk por
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security RiskMurray Security Services
621 vistas13 diapositivas
gkkSecurity essentials domain 1 por
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1Anne Starr
78 vistas100 diapositivas
Automatski - The Internet of Things - Security Standards por
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standardsautomatskicorporation
600 vistas18 diapositivas
101 Basic concepts of information security por
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information securitySsendiSamuel
956 vistas32 diapositivas
Cyber Security in the Interconnected World por
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected WorldRussell_Kennedy
782 vistas21 diapositivas
Emerging Technology Risk Series - Internet of Things (IoT) por
Emerging Technology Risk Series - Internet of Things (IoT)Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)Eryk Budi Pratama
721 vistas26 diapositivas

La actualidad más candente(20)

gkkSecurity essentials domain 1 por Anne Starr
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1
Anne Starr78 vistas
Automatski - The Internet of Things - Security Standards por automatskicorporation
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
101 Basic concepts of information security por SsendiSamuel
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information security
SsendiSamuel956 vistas
Cyber Security in the Interconnected World por Russell_Kennedy
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected World
Russell_Kennedy782 vistas
Emerging Technology Risk Series - Internet of Things (IoT) por Eryk Budi Pratama
Emerging Technology Risk Series - Internet of Things (IoT)Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)
Eryk Budi Pratama721 vistas
102 Information security standards and specifications por SsendiSamuel
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specifications
SsendiSamuel590 vistas
2021 English Part One Anti-phishing Webinar Presentation Slides por Ivanti
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides
Ivanti129 vistas
Cisco Cyber Security Essentials Chapter-1 por Mukesh Chinta
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
Mukesh Chinta12K vistas
Log Management for PCI Compliance [OLD] por Anton Chuvakin
Log Management for PCI Compliance [OLD]Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]
Anton Chuvakin1.3K vistas
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io... por CableLabs
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
CableLabs234 vistas
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee... por PECB
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
PECB 1.5K vistas
Two Peas in a Pod: Cloud Security and Mobile Security por Omar Khawaja
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
Omar Khawaja381 vistas
Maloney Slides por ecommerce
Maloney SlidesMaloney Slides
Maloney Slides
ecommerce491 vistas
Cyber Security Intelligence por ijtsrd
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
ijtsrd55 vistas
IoT PPT Deck por John Yates
IoT PPT DeckIoT PPT Deck
IoT PPT Deck
John Yates417 vistas
Odoo iot box integration por Celine George
Odoo iot box integrationOdoo iot box integration
Odoo iot box integration
Celine George569 vistas

Destacado

SENSORS AND ITS DETAILS por
SENSORS AND ITS DETAILSSENSORS AND ITS DETAILS
SENSORS AND ITS DETAILSskumartarget
86 vistas12 diapositivas
Líneas de productos de software y método watch por
Líneas de productos de software y método watchLíneas de productos de software y método watch
Líneas de productos de software y método watchAriagna Acevedo
273 vistas9 diapositivas
MSDS por
MSDSMSDS
MSDSPravin Sutar
126 vistas5 diapositivas
Reciclaje informatico por
Reciclaje informaticoReciclaje informatico
Reciclaje informaticomorenitaaguilar
89 vistas2 diapositivas
Ejercico Resuelto Ecuaciones Lineales por
Ejercico Resuelto Ecuaciones LinealesEjercico Resuelto Ecuaciones Lineales
Ejercico Resuelto Ecuaciones Linealesbrianjca
66 vistas7 diapositivas
Pr.posibnyk modul.3 por
Pr.posibnyk modul.3Pr.posibnyk modul.3
Pr.posibnyk modul.3Nova Gromada
811 vistas45 diapositivas

Destacado(19)

SENSORS AND ITS DETAILS por skumartarget
SENSORS AND ITS DETAILSSENSORS AND ITS DETAILS
SENSORS AND ITS DETAILS
skumartarget86 vistas
Líneas de productos de software y método watch por Ariagna Acevedo
Líneas de productos de software y método watchLíneas de productos de software y método watch
Líneas de productos de software y método watch
Ariagna Acevedo273 vistas
Ejercico Resuelto Ecuaciones Lineales por brianjca
Ejercico Resuelto Ecuaciones LinealesEjercico Resuelto Ecuaciones Lineales
Ejercico Resuelto Ecuaciones Lineales
brianjca66 vistas
Pr.posibnyk modul.3 por Nova Gromada
Pr.posibnyk modul.3Pr.posibnyk modul.3
Pr.posibnyk modul.3
Nova Gromada811 vistas
Pintura Basica por 158964
Pintura BasicaPintura Basica
Pintura Basica
158964165 vistas
Fundprogjoyagu3ed 110508005059-phpapp01(2) por Jessica Maribel
Fundprogjoyagu3ed 110508005059-phpapp01(2)Fundprogjoyagu3ed 110508005059-phpapp01(2)
Fundprogjoyagu3ed 110508005059-phpapp01(2)
Jessica Maribel194 vistas
Aide De Visite Pharmaceutique Numérique por Morgan REMOLEUR
Aide De Visite Pharmaceutique NumériqueAide De Visite Pharmaceutique Numérique
Aide De Visite Pharmaceutique Numérique
Morgan REMOLEUR2.4K vistas
Classification, nomenclature, codification des médicaments : y-a-t-il un réf... por Simon Letellier
Classification, nomenclature, codification des médicaments :y-a-t-il un réf...Classification, nomenclature, codification des médicaments :y-a-t-il un réf...
Classification, nomenclature, codification des médicaments : y-a-t-il un réf...
Simon Letellier7.2K vistas
The motivational approach to work design por topchurch310
The motivational approach to work designThe motivational approach to work design
The motivational approach to work design
topchurch3104.6K vistas

Similar a Ravi i ot-security

Security Implications of Accenture Technology Vision 2015 - Executive Report por
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
2.4K vistas8 diapositivas
Security for the IoT - Report Summary por
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report SummaryAccenture Technology
5.9K vistas4 diapositivas
Code of practice_for_consumer_io_t_security_october_2018 por
Code of practice_for_consumer_io_t_security_october_2018Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018Дзвенислава Карплюк
68 vistas24 diapositivas
Securing the Digital Economy: Reinventing the Internet por
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet accenture
907 vistas16 diapositivas
Securing the digital economy por
Securing the digital economySecuring the digital economy
Securing the digital economyaccenture
671 vistas16 diapositivas
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin... por
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
133 vistas21 diapositivas

Similar a Ravi i ot-security(20)

Security Implications of Accenture Technology Vision 2015 - Executive Report por Accenture Technology
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
Accenture Technology2.4K vistas
Securing the Digital Economy: Reinventing the Internet por accenture
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
accenture907 vistas
Securing the digital economy por accenture
Securing the digital economySecuring the digital economy
Securing the digital economy
accenture671 vistas
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin... por EC-Council
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
EC-Council133 vistas
Challenges & Opportunities the Data Privacy Act Brings por Robert 'Bob' Reyes
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
Robert 'Bob' Reyes733 vistas
Securing your digital world - Cybersecurity for SBEs por Sonny Hashmi
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
Sonny Hashmi148 vistas
Securing your digital world cybersecurity for sb es por Sonny Hashmi
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
Sonny Hashmi714 vistas
Software security, secure software development in the age of IoT, smart thing... por LabSharegroup
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
LabSharegroup5.3K vistas
Csa summit la transformación digital y el nuevo rol del ciso por CSA Argentina
Csa summit   la transformación digital y el nuevo rol del cisoCsa summit   la transformación digital y el nuevo rol del ciso
Csa summit la transformación digital y el nuevo rol del ciso
CSA Argentina1.4K vistas
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things... por Dr Dev Kambhampati
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati176 vistas
IoT security and privacy: main challenges and how ISOC-OTA address them por Radouane Mrabet
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
Radouane Mrabet3.1K vistas
Securing the Digital Economy: Reinventing the Internet por accenture
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
accenture5K vistas
Securing the Digital Economy: Reinventing the Internet por accenture
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
accenture707 vistas
What operational technology cyber security is? por sohailAhmad304
What operational technology cyber security is?What operational technology cyber security is?
What operational technology cyber security is?
sohailAhmad30439 vistas

Más de skumartarget

INTRODUCTION TO RASPI por
INTRODUCTION TO RASPIINTRODUCTION TO RASPI
INTRODUCTION TO RASPIskumartarget
152 vistas13 diapositivas
Wsn in iot updated por
Wsn in iot updatedWsn in iot updated
Wsn in iot updatedskumartarget
980 vistas33 diapositivas
Ravi i ot-impact por
Ravi i ot-impactRavi i ot-impact
Ravi i ot-impactskumartarget
102 vistas13 diapositivas
Ravi i ot-enablingtechnologies por
Ravi i ot-enablingtechnologiesRavi i ot-enablingtechnologies
Ravi i ot-enablingtechnologiesskumartarget
146 vistas18 diapositivas
Bigdata.pptx por
Bigdata.pptxBigdata.pptx
Bigdata.pptxskumartarget
879 vistas17 diapositivas
Ap plication & research technologies.pptx por
Ap plication & research technologies.pptxAp plication & research technologies.pptx
Ap plication & research technologies.pptxskumartarget
134 vistas14 diapositivas

Más de skumartarget(16)

Último

Mineral nutrition and Fertilizer use of Cashew por
 Mineral nutrition and Fertilizer use of Cashew Mineral nutrition and Fertilizer use of Cashew
Mineral nutrition and Fertilizer use of CashewAruna Srikantha Jayawardana
53 vistas107 diapositivas
Guidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptx por
Guidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptxGuidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptx
Guidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptxNiranjan Chavan
38 vistas48 diapositivas
MIXING OF PHARMACEUTICALS.pptx por
MIXING OF PHARMACEUTICALS.pptxMIXING OF PHARMACEUTICALS.pptx
MIXING OF PHARMACEUTICALS.pptxAnupkumar Sharma
117 vistas35 diapositivas
ICS3211_lecture 09_2023.pdf por
ICS3211_lecture 09_2023.pdfICS3211_lecture 09_2023.pdf
ICS3211_lecture 09_2023.pdfVanessa Camilleri
134 vistas10 diapositivas
A Guide to Applying for the Wells Mountain Initiative Scholarship 2023 por
A Guide to Applying for the Wells Mountain Initiative Scholarship 2023A Guide to Applying for the Wells Mountain Initiative Scholarship 2023
A Guide to Applying for the Wells Mountain Initiative Scholarship 2023Excellence Foundation for South Sudan
79 vistas26 diapositivas
Guess Papers ADC 1, Karachi University por
Guess Papers ADC 1, Karachi UniversityGuess Papers ADC 1, Karachi University
Guess Papers ADC 1, Karachi UniversityKhalid Aziz
83 vistas17 diapositivas

Último(20)

Guidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptx por Niranjan Chavan
Guidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptxGuidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptx
Guidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptx
Niranjan Chavan38 vistas
Guess Papers ADC 1, Karachi University por Khalid Aziz
Guess Papers ADC 1, Karachi UniversityGuess Papers ADC 1, Karachi University
Guess Papers ADC 1, Karachi University
Khalid Aziz83 vistas
11.28.23 Social Capital and Social Exclusion.pptx por mary850239
11.28.23 Social Capital and Social Exclusion.pptx11.28.23 Social Capital and Social Exclusion.pptx
11.28.23 Social Capital and Social Exclusion.pptx
mary850239409 vistas
The Accursed House by Émile Gaboriau por DivyaSheta
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile Gaboriau
DivyaSheta246 vistas
Education of marginalized and socially disadvantages segments.pptx por GarimaBhati5
Education of marginalized and socially disadvantages segments.pptxEducation of marginalized and socially disadvantages segments.pptx
Education of marginalized and socially disadvantages segments.pptx
GarimaBhati540 vistas
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37 por MysoreMuleSoftMeetup
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Monthly Information Session for MV Asterix (November) por Esquimalt MFRC
Monthly Information Session for MV Asterix (November)Monthly Information Session for MV Asterix (November)
Monthly Information Session for MV Asterix (November)
Esquimalt MFRC98 vistas
NodeJS and ExpressJS.pdf por ArthyR3
NodeJS and ExpressJS.pdfNodeJS and ExpressJS.pdf
NodeJS and ExpressJS.pdf
ArthyR347 vistas
Career Building in AI - Technologies, Trends and Opportunities por WebStackAcademy
Career Building in AI - Technologies, Trends and OpportunitiesCareer Building in AI - Technologies, Trends and Opportunities
Career Building in AI - Technologies, Trends and Opportunities
WebStackAcademy41 vistas
CUNY IT Picciano.pptx por apicciano
CUNY IT Picciano.pptxCUNY IT Picciano.pptx
CUNY IT Picciano.pptx
apicciano60 vistas
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice por Taste
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a ChoiceCreative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice
Taste41 vistas

Ravi i ot-security

  • 1. CONFIDENTIAL INFORMATION This document is confidential and proprietary information of Target Soft Systems. Confidential Information includes, but is not limited to, the following: Corporate, Employee and Infrastructure Information about Target Soft Systems. Target Soft Systems implementation , Training methodology, cost, project management and quality processes. Any disclosure of Confidential Information to, or use of it by a third party (i.e., a party other than authorised , will be damaging to Target Soft Systems). Ownership of all Confidential Information, no matter in what media it resides, remains with Target Soft Systems( TSS ). Confidential Information in this document shall not be disclosed outside the buyer’s proposal evaluators and shall not be duplicated, used, or disclosed – in whole or in part – for any purpose other than to evaluate this proposal without specific written permission of an authorized representative of Target Soft Systems.
  • 3. • More things are being connected to address a growing range of business needs. In fact, by 2020, more than 50 billion things will connect to the Internet—seven times our human population. Examples are wearable health and performance monitors, connected vehicles, smart grids, connected oilrigs, and connected manufacturing. This Internet of Things (IoT) will revolutionize the way we work, live, play, and learn. • Inadequate security will be a critical barrier to large-scale deployment of IoT systems and broad customer adoption of IoT applications. Simply extending existing IT security architectures to the IoT will not be sufficient. The IoT world requires new security approaches, creating fertile ground for innovative and disruptive thinking and solutions.
  • 4. The security challenge • Devices are not reachable – Most of the time a device is not connected • Devices can be lost and stolen – Makes security difficult when the device is not connected • Devices are not crypto-engines – Strong security difficult without processing power • Devices have finite life – Credentials need to be tied to lifetime • Devices are transportable – Will cross borders • Devices need to be recognised by many readers – What data is released to what reader? 4
  • 5. Security work in an Internet of Things Assurance Risk analysis Device analysis Crypto capability and export analysis • RFID tags will not do crypto for some years Security objective • Privacy protection • Identity protection • Traffic analysis protection Identity and identifier management Separation of identity and identifier
  • 6. How to secure the internet of things ? • With the expansion of the IoT market, protecting the company's data and IP is more important than ever. Here are four ways organisations can put security at the core of the IoT value proposition
  • 7. SECURITY TIPS FOR ORGANIZATIONS 1. Set up an integrated team of business executives and security specialists 2. Integrate security best practice with the IoT product development process 3. Educate consumers as well as front-line staff in security best practice 4. Address privacy concerns with transparent privacy policies
  • 8. 1. Set up an integrated team of business executives and security specialists Product managers working alongside security specialists to plan the product roadmap will ensure security is a key consideration when designing core features and functionality. An integrated team will allow for greater collaboration, ensure the business and security concerns are well balanced and any vulnerabilities can be identified early in the product lifecycle.
  • 9. 2. Integrate security best practice with the IoT product development process Business leaders need to identify where their organisation might be vulnerable through an analysis of disruptive attack scenarios, and the financial and non-financial impact of an attack on the organisation as well as the users.
  • 10. 3. Educate consumers as well as front- line staff in security best practice Organisations must inform and educate consumers on best practice including regularly changing passwords, which is still one of the most common causes of a security breach, and offering advice on security patches.
  • 11. 4. Address privacy concerns with transparent privacy policies To protect consumers from potential data privacy breaches, businesses need to develop privacy policies that clearly detail how the data collected from IoT products will be used, and these policies should be easily accessible to consumers.