SlideShare una empresa de Scribd logo
1 de 30
Presented To:
Presented By:
Bryan Miller
 Speaker Introduction
 Definition of IoT
 Why Should We Care About IoT
 IoT Security Challenges
 Final Thoughts
 Q&A
FTEMS - 10/23/15 2
 B.S. Info Systems, M.S. Computer Science – VCU
 CISSP, former Cisco CCIE R/S
 Speaker – FTEMS, CarolinaCon, ISACA, ISSA,
ILTA, IALR, VA SCAN, SPTC Tech Summit, VCU
Cybersecurity Fair
 Former Adjunct Faculty @ VCU in Information
Systems and Computer Science, CCNA Instructor
@ JTCC, JSR
 Published in Cutter IT Journal
FTEMS - 10/23/15 3
FTEMS - 10/23/15 4
 Wikipedia:
 IoT = “The Internet of Things”
 The Internet of Things (IoT) is the network of physical
objects or "things" embedded with electronics, software,
sensors, and network connectivity, which enables these
objects to collect and exchange data.
 British entrepreneur Kevin Ashton first coined the
term in 1999 while working at the Auto-ID Labs
(originally called Auto-ID centers - referring to a
global network of RFID connected objects).
FTEMS - 10/23/15 5
 Gartner, Inc. forecasts that 4.9 billion
connected things will be in use in 2015, up
30 percent from 2014, and will reach 25
billion by 2020.
 Consumer applications will drive the
number of connected things, while
enterprise will account for most of the
revenue.
 Gartner estimates that 2.9 billion connected
things will be in use in the consumer sector
in 2015 and will reach over 13 billion in
2020.
FTEMS - 10/23/15 6
FTEMS - 10/23/15 7
 The IoT market in manufacturing
operations will grow from $42.2 billion in
2013 to $98.8 billion in 2018.
 Digital signage use in retail outlets will
grow from $6.0 billion in 2013 to $27.5
billion in 2018.
 The hottest US market is in connected
vehicles, with 34.8% year-over-year
growth anticipated in 2015.
FTEMS - 10/23/15 8
FTEMS - 10/23/15 9
 Platforms/Frameworks/Standards
 Protocols/APIs
 Interoperability/Compatibility
 Management
 Liability
 Security
 Privacy
 Data Storage
 Maintenance
FTEMS - 10/23/15 10
FTEMS - 10/23/15 11
 IoT will become more integrated into the
following areas of our life:
 Medical Devices
 Transportation
 Home Automation
 Shopping/Retail
 Utilities
 Building Automation
FTEMS - 10/23/15 12
 Medical Devices:
 8/3/15 - FDA calls for hospitals to discontinue use of infusion
pumps due to security vulnerabilities.
 Hospira Symbiq Infusion Systems flaw lets unauthorized
users gain access to tools.
 9/30/15 - Thousands of critical medical devices open to attack.
 At one large U.S. healthcare organization, which was
unnamed, Erven and Collao said they found 68,000 medical
systems exposed, including anesthesia devices, infusion
systems, pacemakers and more.
FTEMS - 10/23/15 13
 Transportation:
 Over 5,000 devices used by gas stations in the U.S. to
monitor their fuel tank levels can be manipulated
from the Internet by malicious attackers.
 These devices, known as automated tank gauges
(ATGs), are also used to trigger alarms in case of
problems with the tanks, such as fuel spills.
 “If you look at these gas stations, they are using off-the-
shelf home routers from Best Buy.”
FTEMS - 10/23/15 14
 Transportation:
 Insecure Snapshot dongle puts 2 million cars at risk
 According to the Progressive Insurance website, you just
plug the Snapshot device into the OBD-II port in your
vehicle.
 Corey Thuen, a security researcher, scrutinized the
Snapshot and the access it has to the vehicle computer
systems and discovered some serious concerns.
 Thuen reports that the device is completely lacking in
security and can be exploited by a hacker to take
control over crucial vehicle functions—possibly putting
the lives of people inside the vehicle at risk.
FTEMS - 10/23/15 15
 Transportation:
 Tesla’s Model S can be located, unlocked, and
burglarized with a simple hack.
 BMW fixes security flaw that left locks open to
hackers
 The flaw affected models fitted with BMW's
ConnectedDrive software, which uses an on-board Sim
card. The software operated door locks, air
conditioning and traffic updates but no driving
firmware such as brakes or steering, BMW said.
 “Hackers Remotely Kill a Jeep on the Highway—
With Me in It”
FTEMS - 10/23/15 16
 Home Automation:
 Hacker shouts at baby through baby monitor
 An Ohio family is asleep when a man's voice reportedly
is heard coming from baby's room. It turns out to be
someone who thought it funny to hack into the device.
 Fridge sends spam emails as attack hits smart
gadgets
 A fridge has been discovered sending out spam after a
web attack managed to compromise smart gadgets. The
fridge was one of more than 100,000 devices used to
take part in the spam campaign.
FTEMS - 10/23/15 17
 Home Automation:
 Smart refrigerator hack exposes Gmail login
credentials
 The Register reported that a team of hackers recently
discovered a man-in-the-middle vulnerability in a
Samsung smart refrigerator that can be exploited to
steal Gmail users' login credentials.
FTEMS - 10/23/15 18
 Utilities:
 Traffic light vulnerabilities leave doors wide open to
Italian Job-style hacks
 Cesar Cerrudo, CTO at embedded security experts
IOActive Labs, discovered that traffic control systems
in cities around the world (US, UK, France, Australia,
China, etc.) were vulnerable to exploitation.
 The vulnerabilities he uncovered could allow anyone to
take complete control of the devices, to potentially
chaotic effect. According to Cerrudo there are more
than 50,000 traffic control devices out there that could
be hacked.
 Don’t forget Stuxnet
FTEMS - 10/23/15 19
 Building Automation:
 Researchers find hundreds of insecure building
control systems
 “Intruders used to creep in through ventilation ducts.
Now they break in using the software that controls the
ventilation.”
 Hundreds of organizations across Australia are using
out-of-date industrial control systems (ICS) to control
the lights, heating and cooling, access controls and even
the elevators.
 More than 230,000 instances of the NiagaraAX
platform, made by Honeywell subsidiary Tridium,
based in Richmond, Virginia, are running worldwide.
FTEMS - 10/23/15 20
FTEMS - 10/23/15 21
FTEMS - 10/23/15 22
http://blogs.wsj.com/cio/2015/10/14/internet-of-things-security-issues-require-a-rethink-on-risk-
management/
 "The mass adoption of the Internet of Things
may be coming at the expense of thorough
safeguards.“1
 "The exponential growth of the Internet of
Things (IoT) is far outpacing the ability of
stakeholders to address safety standards and
security concerns.“2
 1,2: https://www.linkedin.com/grp/post/6709546-
6061629468156452864?trk=groups-post-b-title
FTEMS - 10/23/15 23
 “Connecting devices creates opportunities, and
also likely leads to fundamental shifts in
business models. A connected product is no
longer just a product; it is a service, with big
business value to explore.”1
 1: http://deloitte.wsj.com/cio/2015/10/05/connected-device-
data-an-enterprise-windfall/
FTEMS - 10/23/15 24
 “Connecting devices creates opportunities, and
also likely leads to fundamental shifts in
business models. A connected product is no
longer just a product; it is a service, with big
business value to explore.”1
 1: http://deloitte.wsj.com/cio/2015/10/05/connected-device-
data-an-enterprise-windfall/
FTEMS - 10/23/15 25
 "Cool trumps safe. The capabilities themselves
are almost always developed without security
in mind. We need to change that [for IoT]."1
 1: http://searchsecurity.techtarget.com/news/4500254067/FBI-
CISO-warns-of-IoT-data-breaches
FTEMS - 10/23/15 26
 IoT Devices are going to exponentially multiply in
the next 5 years and will creep into all facets of life.
 How and to what extent security is considered and
managed during this growth period will determine
the overall success or failure of the movement.
 Remember the 3 P’s:
 Policies & Procedures
 Password Management
 Patching
FTEMS - 10/23/15 27
 Who owns the data?
 Do we really need Internet-connected
blenders?
 Are we ready for the added complexity of
everyday devices?
 How will the additional traffic add to the
current Internet congestion problems?
 Why should we believe security will be any
better than the systems we already have?
 Who will provide security testing?
FTEMS - 10/23/15 28
FTEMS - 10/23/15 29
Ease of
Use
Security
Rule #1 in Security
FTEMS - 10/23/15 30
Q&A
Bryan Miller
bryan@syrinxtech.com

Más contenido relacionado

La actualidad más candente

Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2
FitCEO, Inc. (FCI)
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
Sharpe Smith
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
Nirmal Misra
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
Austin Eppstein
 

La actualidad más candente (19)

IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
5 phases of IoT
5 phases of IoT5 phases of IoT
5 phases of IoT
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2
 
Trust in the mobile internet of things
Trust in the mobile internet of thingsTrust in the mobile internet of things
Trust in the mobile internet of things
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
 
Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...
 
Ivanti for msp
Ivanti for mspIvanti for msp
Ivanti for msp
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
Augmate connect deck
Augmate connect deckAugmate connect deck
Augmate connect deck
 
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingProtect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iotIo t business-index-2020-securing-iot
Io t business-index-2020-securing-iot
 
Ivanti Insights Podcast - FireEye Breach
Ivanti Insights Podcast - FireEye BreachIvanti Insights Podcast - FireEye Breach
Ivanti Insights Podcast - FireEye Breach
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
 

Destacado

Destacado (8)

T. Bradley Tanner, MD - Branched Path Learning and Gamification for Student T...
T. Bradley Tanner, MD - Branched Path Learning and Gamification for Student T...T. Bradley Tanner, MD - Branched Path Learning and Gamification for Student T...
T. Bradley Tanner, MD - Branched Path Learning and Gamification for Student T...
 
IOT HEALTH CARE
IOT HEALTH CAREIOT HEALTH CARE
IOT HEALTH CARE
 
Green Internet of things for Smart World
Green Internet of things for Smart WorldGreen Internet of things for Smart World
Green Internet of things for Smart World
 
Internet of Things for Smart Cities
Internet of Things for Smart CitiesInternet of Things for Smart Cities
Internet of Things for Smart Cities
 
Smart Cities are the Internet of Things
Smart Cities are the Internet of ThingsSmart Cities are the Internet of Things
Smart Cities are the Internet of Things
 
IoT in Healthcare
IoT in HealthcareIoT in Healthcare
IoT in Healthcare
 
Smart city presentation
Smart city presentationSmart city presentation
Smart city presentation
 
The many faces of IoT (Internet of Things) in Healthcare
The many faces of IoT (Internet of Things) in HealthcareThe many faces of IoT (Internet of Things) in Healthcare
The many faces of IoT (Internet of Things) in Healthcare
 

Similar a Security In an IoT World

ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2
Shane Kite
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
aulasnilda
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
jeffevans62972
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
odiliagilby
 
David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016
David Blanco
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
Samuel Kamuli
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Capgemini
 

Similar a Security In an IoT World (20)

IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
IBM Xforce Q4 2014
IBM Xforce Q4 2014IBM Xforce Q4 2014
IBM Xforce Q4 2014
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Trust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT DevicesTrust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT Devices
 
PTC Product Lifecycle Stories eMagazine - Spring 2014
PTC Product Lifecycle Stories eMagazine - Spring 2014PTC Product Lifecycle Stories eMagazine - Spring 2014
PTC Product Lifecycle Stories eMagazine - Spring 2014
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devices
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of things
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
 
David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
 

Más de syrinxtech (7)

Low Hanging Fruit from Penetration Testing
Low Hanging Fruit from Penetration TestingLow Hanging Fruit from Penetration Testing
Low Hanging Fruit from Penetration Testing
 
Virtual CSO
Virtual CSOVirtual CSO
Virtual CSO
 
Remote Access Security
Remote Access SecurityRemote Access Security
Remote Access Security
 
Virtualization Security
Virtualization SecurityVirtualization Security
Virtualization Security
 
Focus Your Business
Focus Your BusinessFocus Your Business
Focus Your Business
 
Penetration Testing as an auditing tool
Penetration Testing as an auditing toolPenetration Testing as an auditing tool
Penetration Testing as an auditing tool
 
Web Database Server Best Practices
Web Database Server Best PracticesWeb Database Server Best Practices
Web Database Server Best Practices
 

Último

Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
sexy call girls service in goa
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 

Último (20)

Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 

Security In an IoT World

  • 2.  Speaker Introduction  Definition of IoT  Why Should We Care About IoT  IoT Security Challenges  Final Thoughts  Q&A FTEMS - 10/23/15 2
  • 3.  B.S. Info Systems, M.S. Computer Science – VCU  CISSP, former Cisco CCIE R/S  Speaker – FTEMS, CarolinaCon, ISACA, ISSA, ILTA, IALR, VA SCAN, SPTC Tech Summit, VCU Cybersecurity Fair  Former Adjunct Faculty @ VCU in Information Systems and Computer Science, CCNA Instructor @ JTCC, JSR  Published in Cutter IT Journal FTEMS - 10/23/15 3
  • 5.  Wikipedia:  IoT = “The Internet of Things”  The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data.  British entrepreneur Kevin Ashton first coined the term in 1999 while working at the Auto-ID Labs (originally called Auto-ID centers - referring to a global network of RFID connected objects). FTEMS - 10/23/15 5
  • 6.  Gartner, Inc. forecasts that 4.9 billion connected things will be in use in 2015, up 30 percent from 2014, and will reach 25 billion by 2020.  Consumer applications will drive the number of connected things, while enterprise will account for most of the revenue.  Gartner estimates that 2.9 billion connected things will be in use in the consumer sector in 2015 and will reach over 13 billion in 2020. FTEMS - 10/23/15 6
  • 8.  The IoT market in manufacturing operations will grow from $42.2 billion in 2013 to $98.8 billion in 2018.  Digital signage use in retail outlets will grow from $6.0 billion in 2013 to $27.5 billion in 2018.  The hottest US market is in connected vehicles, with 34.8% year-over-year growth anticipated in 2015. FTEMS - 10/23/15 8
  • 10.  Platforms/Frameworks/Standards  Protocols/APIs  Interoperability/Compatibility  Management  Liability  Security  Privacy  Data Storage  Maintenance FTEMS - 10/23/15 10
  • 12.  IoT will become more integrated into the following areas of our life:  Medical Devices  Transportation  Home Automation  Shopping/Retail  Utilities  Building Automation FTEMS - 10/23/15 12
  • 13.  Medical Devices:  8/3/15 - FDA calls for hospitals to discontinue use of infusion pumps due to security vulnerabilities.  Hospira Symbiq Infusion Systems flaw lets unauthorized users gain access to tools.  9/30/15 - Thousands of critical medical devices open to attack.  At one large U.S. healthcare organization, which was unnamed, Erven and Collao said they found 68,000 medical systems exposed, including anesthesia devices, infusion systems, pacemakers and more. FTEMS - 10/23/15 13
  • 14.  Transportation:  Over 5,000 devices used by gas stations in the U.S. to monitor their fuel tank levels can be manipulated from the Internet by malicious attackers.  These devices, known as automated tank gauges (ATGs), are also used to trigger alarms in case of problems with the tanks, such as fuel spills.  “If you look at these gas stations, they are using off-the- shelf home routers from Best Buy.” FTEMS - 10/23/15 14
  • 15.  Transportation:  Insecure Snapshot dongle puts 2 million cars at risk  According to the Progressive Insurance website, you just plug the Snapshot device into the OBD-II port in your vehicle.  Corey Thuen, a security researcher, scrutinized the Snapshot and the access it has to the vehicle computer systems and discovered some serious concerns.  Thuen reports that the device is completely lacking in security and can be exploited by a hacker to take control over crucial vehicle functions—possibly putting the lives of people inside the vehicle at risk. FTEMS - 10/23/15 15
  • 16.  Transportation:  Tesla’s Model S can be located, unlocked, and burglarized with a simple hack.  BMW fixes security flaw that left locks open to hackers  The flaw affected models fitted with BMW's ConnectedDrive software, which uses an on-board Sim card. The software operated door locks, air conditioning and traffic updates but no driving firmware such as brakes or steering, BMW said.  “Hackers Remotely Kill a Jeep on the Highway— With Me in It” FTEMS - 10/23/15 16
  • 17.  Home Automation:  Hacker shouts at baby through baby monitor  An Ohio family is asleep when a man's voice reportedly is heard coming from baby's room. It turns out to be someone who thought it funny to hack into the device.  Fridge sends spam emails as attack hits smart gadgets  A fridge has been discovered sending out spam after a web attack managed to compromise smart gadgets. The fridge was one of more than 100,000 devices used to take part in the spam campaign. FTEMS - 10/23/15 17
  • 18.  Home Automation:  Smart refrigerator hack exposes Gmail login credentials  The Register reported that a team of hackers recently discovered a man-in-the-middle vulnerability in a Samsung smart refrigerator that can be exploited to steal Gmail users' login credentials. FTEMS - 10/23/15 18
  • 19.  Utilities:  Traffic light vulnerabilities leave doors wide open to Italian Job-style hacks  Cesar Cerrudo, CTO at embedded security experts IOActive Labs, discovered that traffic control systems in cities around the world (US, UK, France, Australia, China, etc.) were vulnerable to exploitation.  The vulnerabilities he uncovered could allow anyone to take complete control of the devices, to potentially chaotic effect. According to Cerrudo there are more than 50,000 traffic control devices out there that could be hacked.  Don’t forget Stuxnet FTEMS - 10/23/15 19
  • 20.  Building Automation:  Researchers find hundreds of insecure building control systems  “Intruders used to creep in through ventilation ducts. Now they break in using the software that controls the ventilation.”  Hundreds of organizations across Australia are using out-of-date industrial control systems (ICS) to control the lights, heating and cooling, access controls and even the elevators.  More than 230,000 instances of the NiagaraAX platform, made by Honeywell subsidiary Tridium, based in Richmond, Virginia, are running worldwide. FTEMS - 10/23/15 20
  • 22. FTEMS - 10/23/15 22 http://blogs.wsj.com/cio/2015/10/14/internet-of-things-security-issues-require-a-rethink-on-risk- management/
  • 23.  "The mass adoption of the Internet of Things may be coming at the expense of thorough safeguards.“1  "The exponential growth of the Internet of Things (IoT) is far outpacing the ability of stakeholders to address safety standards and security concerns.“2  1,2: https://www.linkedin.com/grp/post/6709546- 6061629468156452864?trk=groups-post-b-title FTEMS - 10/23/15 23
  • 24.  “Connecting devices creates opportunities, and also likely leads to fundamental shifts in business models. A connected product is no longer just a product; it is a service, with big business value to explore.”1  1: http://deloitte.wsj.com/cio/2015/10/05/connected-device- data-an-enterprise-windfall/ FTEMS - 10/23/15 24
  • 25.  “Connecting devices creates opportunities, and also likely leads to fundamental shifts in business models. A connected product is no longer just a product; it is a service, with big business value to explore.”1  1: http://deloitte.wsj.com/cio/2015/10/05/connected-device- data-an-enterprise-windfall/ FTEMS - 10/23/15 25
  • 26.  "Cool trumps safe. The capabilities themselves are almost always developed without security in mind. We need to change that [for IoT]."1  1: http://searchsecurity.techtarget.com/news/4500254067/FBI- CISO-warns-of-IoT-data-breaches FTEMS - 10/23/15 26
  • 27.  IoT Devices are going to exponentially multiply in the next 5 years and will creep into all facets of life.  How and to what extent security is considered and managed during this growth period will determine the overall success or failure of the movement.  Remember the 3 P’s:  Policies & Procedures  Password Management  Patching FTEMS - 10/23/15 27
  • 28.  Who owns the data?  Do we really need Internet-connected blenders?  Are we ready for the added complexity of everyday devices?  How will the additional traffic add to the current Internet congestion problems?  Why should we believe security will be any better than the systems we already have?  Who will provide security testing? FTEMS - 10/23/15 28
  • 29. FTEMS - 10/23/15 29 Ease of Use Security Rule #1 in Security
  • 30. FTEMS - 10/23/15 30 Q&A Bryan Miller bryan@syrinxtech.com