SlideShare a Scribd company logo
1 of 13
CONFIDENTIAL INFORMATION
This document is confidential and proprietary information
of Target Soft Systems. Confidential Information includes,
but is not limited to, the following:
Corporate, Employee and Infrastructure Information about
Target Soft Systems.
Target Soft Systems implementation , Training
methodology, cost, project management and quality
processes.
Any disclosure of Confidential Information to, or use of it
by a third party (i.e., a party other than authorised , will be
damaging to Target Soft Systems). Ownership of all
Confidential Information, no matter in what media it
resides, remains with Target Soft Systems( TSS ).
Confidential Information in this document shall not be
disclosed outside the buyer’s proposal evaluators and shall
not be duplicated, used, or disclosed – in whole or in part –
for any purpose other than to evaluate this proposal
without specific written permission of an authorized
representative of Target Soft Systems.
SECURITY ISSUES IN IOT
• More things are being connected to address a growing range of business
needs. In fact, by 2020, more than 50 billion things will connect to the
Internet—seven times our human population. Examples are wearable health
and performance monitors, connected vehicles, smart grids, connected
oilrigs, and connected manufacturing. This Internet of Things (IoT) will
revolutionize the way we work, live, play, and learn.
• Inadequate security will be a critical barrier to large-scale deployment of
IoT systems and broad customer adoption of IoT applications. Simply
extending existing IT security architectures to the IoT will not be
sufficient. The IoT world requires new security approaches, creating fertile
ground for innovative and disruptive thinking and solutions.
The security challenge
• Devices are not reachable
– Most of the time a device is not connected
• Devices can be lost and stolen
– Makes security difficult when the device is not connected
• Devices are not crypto-engines
– Strong security difficult without processing power
• Devices have finite life
– Credentials need to be tied to lifetime
• Devices are transportable
– Will cross borders
• Devices need to be recognised by many readers
– What data is released to what reader?
4
Security work in an Internet of
Things
Assurance
Risk analysis
Device analysis
Crypto capability and export analysis
• RFID tags will not do crypto for some years
Security objective
• Privacy protection
• Identity protection
• Traffic analysis protection
Identity and identifier management
Separation of identity and identifier
How to secure the internet of things ?
• With the expansion of the IoT market,
protecting the company's data and IP is
more important than ever. Here are four
ways organisations can put security at the
core of the IoT value proposition
SECURITY TIPS FOR ORGANIZATIONS
1. Set up an integrated team of business
executives and security specialists
2. Integrate security best practice with the
IoT product development process
3. Educate consumers as well as front-line
staff in security best practice
4. Address privacy concerns with
transparent privacy policies
1. Set up an integrated team of business
executives and security specialists
Product managers working alongside security
specialists to plan the product roadmap will ensure
security is a key consideration when designing core
features and functionality. An integrated team will
allow for greater collaboration, ensure the business
and security concerns are well balanced and any
vulnerabilities can be identified early in the product
lifecycle.
2. Integrate security best practice with
the IoT product development process
Business leaders need to identify
where their organisation might be
vulnerable through an analysis of
disruptive attack scenarios, and the
financial and non-financial impact of an
attack on the organisation as well as the
users.
3. Educate consumers as well as front-
line staff in security best practice
Organisations must inform and
educate consumers on best practice
including regularly changing passwords,
which is still one of the most common
causes of a security breach, and offering
advice on security patches.
4. Address privacy concerns with
transparent privacy policies
To protect consumers from potential
data privacy breaches, businesses need to
develop privacy policies that clearly
detail how the data collected from IoT
products will be used, and these policies
should be easily accessible to consumers.
THANK YOU

More Related Content

What's hot

gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1
Anne Starr
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
ecommerce
 

What's hot (20)

Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
 
101 Basic concepts of information security
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information security
 
Cyber Security in the Interconnected World
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected World
 
Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)
 
102 Information security standards and specifications
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specifications
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
A DISA Presentaion
A DISA PresentaionA DISA Presentaion
A DISA Presentaion
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from Patents
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
IoT PPT Deck
IoT PPT DeckIoT PPT Deck
IoT PPT Deck
 
Odoo iot box integration
Odoo iot box integrationOdoo iot box integration
Odoo iot box integration
 

Viewers also liked

Fundprogjoyagu3ed 110508005059-phpapp01(2)
Fundprogjoyagu3ed 110508005059-phpapp01(2)Fundprogjoyagu3ed 110508005059-phpapp01(2)
Fundprogjoyagu3ed 110508005059-phpapp01(2)
Jessica Maribel
 
Aide De Visite Pharmaceutique Numérique
Aide De Visite Pharmaceutique NumériqueAide De Visite Pharmaceutique Numérique
Aide De Visite Pharmaceutique Numérique
Morgan REMOLEUR
 
Sinergia en equipos de alto desempeño participantes
Sinergia en equipos de alto desempeño participantesSinergia en equipos de alto desempeño participantes
Sinergia en equipos de alto desempeño participantes
Link Gerencial Consultores
 

Viewers also liked (19)

SENSORS AND ITS DETAILS
SENSORS AND ITS DETAILSSENSORS AND ITS DETAILS
SENSORS AND ITS DETAILS
 
Líneas de productos de software y método watch
Líneas de productos de software y método watchLíneas de productos de software y método watch
Líneas de productos de software y método watch
 
MSDS
MSDSMSDS
MSDS
 
Reciclaje informatico
Reciclaje informaticoReciclaje informatico
Reciclaje informatico
 
Ejercico Resuelto Ecuaciones Lineales
Ejercico Resuelto Ecuaciones LinealesEjercico Resuelto Ecuaciones Lineales
Ejercico Resuelto Ecuaciones Lineales
 
Pr.posibnyk modul.3
Pr.posibnyk modul.3Pr.posibnyk modul.3
Pr.posibnyk modul.3
 
Pintura Basica
Pintura BasicaPintura Basica
Pintura Basica
 
Multinational environment and needs to attract locals, what to do? - By Moham...
Multinational environment and needs to attract locals, what to do? - By Moham...Multinational environment and needs to attract locals, what to do? - By Moham...
Multinational environment and needs to attract locals, what to do? - By Moham...
 
Fundprogjoyagu3ed 110508005059-phpapp01(2)
Fundprogjoyagu3ed 110508005059-phpapp01(2)Fundprogjoyagu3ed 110508005059-phpapp01(2)
Fundprogjoyagu3ed 110508005059-phpapp01(2)
 
How to create a photo caricature in adobe photoshop
How to create a photo caricature in adobe photoshopHow to create a photo caricature in adobe photoshop
How to create a photo caricature in adobe photoshop
 
Corel x6
Corel x6Corel x6
Corel x6
 
5 i v
5 i v5 i v
5 i v
 
Major Capital Projects
Major Capital ProjectsMajor Capital Projects
Major Capital Projects
 
Aide De Visite Pharmaceutique Numérique
Aide De Visite Pharmaceutique NumériqueAide De Visite Pharmaceutique Numérique
Aide De Visite Pharmaceutique Numérique
 
Iot intro
Iot introIot intro
Iot intro
 
Comunicación Política
Comunicación PolíticaComunicación Política
Comunicación Política
 
Sinergia en equipos de alto desempeño participantes
Sinergia en equipos de alto desempeño participantesSinergia en equipos de alto desempeño participantes
Sinergia en equipos de alto desempeño participantes
 
Classification, nomenclature, codification des médicaments : y-a-t-il un réf...
Classification, nomenclature, codification des médicaments :y-a-t-il un réf...Classification, nomenclature, codification des médicaments :y-a-t-il un réf...
Classification, nomenclature, codification des médicaments : y-a-t-il un réf...
 
The motivational approach to work design
The motivational approach to work designThe motivational approach to work design
The motivational approach to work design
 

Similar to Ravi i ot-security

Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
Sonny Hashmi
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
S .Ali Raza
 

Similar to Ravi i ot-security (20)

Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
 
Csa summit la transformación digital y el nuevo rol del ciso
Csa summit   la transformación digital y el nuevo rol del cisoCsa summit   la transformación digital y el nuevo rol del ciso
Csa summit la transformación digital y el nuevo rol del ciso
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 

More from skumartarget (16)

INTRODUCTION TO RASPI
INTRODUCTION TO RASPIINTRODUCTION TO RASPI
INTRODUCTION TO RASPI
 
Wsn in iot updated
Wsn in iot updatedWsn in iot updated
Wsn in iot updated
 
Ravi i ot-impact
Ravi i ot-impactRavi i ot-impact
Ravi i ot-impact
 
Ravi i ot-enablingtechnologies
Ravi i ot-enablingtechnologiesRavi i ot-enablingtechnologies
Ravi i ot-enablingtechnologies
 
Bigdata.pptx
Bigdata.pptxBigdata.pptx
Bigdata.pptx
 
Ap plication & research technologies.pptx
Ap plication & research technologies.pptxAp plication & research technologies.pptx
Ap plication & research technologies.pptx
 
Dr mgr chennai april 20th april
Dr mgr  chennai april 20th aprilDr mgr  chennai april 20th april
Dr mgr chennai april 20th april
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Cloudcomputing
CloudcomputingCloudcomputing
Cloudcomputing
 
Level 4
Level 4Level 4
Level 4
 
Level 3
Level 3Level 3
Level 3
 
Level 1 & 2
Level 1 & 2Level 1 & 2
Level 1 & 2
 
Level 1
Level 1Level 1
Level 1
 
School updated
School updatedSchool updated
School updated
 
ABOUT TSS PPT
ABOUT TSS PPTABOUT TSS PPT
ABOUT TSS PPT
 
ANDROID FDP PPT
ANDROID FDP PPTANDROID FDP PPT
ANDROID FDP PPT
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

Ravi i ot-security

  • 1. CONFIDENTIAL INFORMATION This document is confidential and proprietary information of Target Soft Systems. Confidential Information includes, but is not limited to, the following: Corporate, Employee and Infrastructure Information about Target Soft Systems. Target Soft Systems implementation , Training methodology, cost, project management and quality processes. Any disclosure of Confidential Information to, or use of it by a third party (i.e., a party other than authorised , will be damaging to Target Soft Systems). Ownership of all Confidential Information, no matter in what media it resides, remains with Target Soft Systems( TSS ). Confidential Information in this document shall not be disclosed outside the buyer’s proposal evaluators and shall not be duplicated, used, or disclosed – in whole or in part – for any purpose other than to evaluate this proposal without specific written permission of an authorized representative of Target Soft Systems.
  • 3. • More things are being connected to address a growing range of business needs. In fact, by 2020, more than 50 billion things will connect to the Internet—seven times our human population. Examples are wearable health and performance monitors, connected vehicles, smart grids, connected oilrigs, and connected manufacturing. This Internet of Things (IoT) will revolutionize the way we work, live, play, and learn. • Inadequate security will be a critical barrier to large-scale deployment of IoT systems and broad customer adoption of IoT applications. Simply extending existing IT security architectures to the IoT will not be sufficient. The IoT world requires new security approaches, creating fertile ground for innovative and disruptive thinking and solutions.
  • 4. The security challenge • Devices are not reachable – Most of the time a device is not connected • Devices can be lost and stolen – Makes security difficult when the device is not connected • Devices are not crypto-engines – Strong security difficult without processing power • Devices have finite life – Credentials need to be tied to lifetime • Devices are transportable – Will cross borders • Devices need to be recognised by many readers – What data is released to what reader? 4
  • 5. Security work in an Internet of Things Assurance Risk analysis Device analysis Crypto capability and export analysis • RFID tags will not do crypto for some years Security objective • Privacy protection • Identity protection • Traffic analysis protection Identity and identifier management Separation of identity and identifier
  • 6. How to secure the internet of things ? • With the expansion of the IoT market, protecting the company's data and IP is more important than ever. Here are four ways organisations can put security at the core of the IoT value proposition
  • 7. SECURITY TIPS FOR ORGANIZATIONS 1. Set up an integrated team of business executives and security specialists 2. Integrate security best practice with the IoT product development process 3. Educate consumers as well as front-line staff in security best practice 4. Address privacy concerns with transparent privacy policies
  • 8. 1. Set up an integrated team of business executives and security specialists Product managers working alongside security specialists to plan the product roadmap will ensure security is a key consideration when designing core features and functionality. An integrated team will allow for greater collaboration, ensure the business and security concerns are well balanced and any vulnerabilities can be identified early in the product lifecycle.
  • 9. 2. Integrate security best practice with the IoT product development process Business leaders need to identify where their organisation might be vulnerable through an analysis of disruptive attack scenarios, and the financial and non-financial impact of an attack on the organisation as well as the users.
  • 10. 3. Educate consumers as well as front- line staff in security best practice Organisations must inform and educate consumers on best practice including regularly changing passwords, which is still one of the most common causes of a security breach, and offering advice on security patches.
  • 11. 4. Address privacy concerns with transparent privacy policies To protect consumers from potential data privacy breaches, businesses need to develop privacy policies that clearly detail how the data collected from IoT products will be used, and these policies should be easily accessible to consumers.
  • 12.