iot security for an evolving 5g world - cyber florida · hitting the sweet spot hackers love new...

13
IoT Security for an Evolving 5G World

Upload: others

Post on 17-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly

IoT Security for an Evolving

5G World

Page 2: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly

©2019

Joseph Cortese, Penetration Testing Practice Lead

• Accomplished cybersecurity leader with 12 years experience in defense, healthcare, and retail industries

• Certified Ethical Hacker of mobile, embedded, wireless, web-enabled devices

• Highly skilled in design, production, and execution of projects and deliverables

• Created capabilities using RaspberryPi & Arduino embedded boards, authored white-papers and training for clients and colleagues

Page 3: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly

IoT Disruption and HacksNot a matter of IF, but WHEN.

Page 4: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly

©2019

IoT Disruption and HacksIt’s not a matter of IF, but WHEN.

• Hackers don’t wait to find gaps in security• First to uncover vulnerabilities gets the “street cred”

• Vendors rush devices into market, many of them insecure• Open management ports, debug mode, test modes are still present

Page 5: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly

IoT and TechnologyNew Usage Cases

Page 6: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly

©2019

IoT and TechnologyNew Usage Cases

• Near real-time communications and low latency will give birth to new usage cases within IoT and Technology

• Solutions not previously used for IoT will be integrated• Communication will become more robust• IoT devices will communicate and exchange information• Many solutions proposed include smart buildings, auto industry, traffic control

Page 7: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly

Devices are ChangingWhat’s Changing in IoT

Page 8: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly

©2019

Devices are ChangingWhat’s Changing in IoT

• Newer devices that are not thought IoT may become “connected”• There are new risks, exploits and attack surfaces• Devices that interact with each other can traverse into hard to get networks• More capable devices may pose a risk to older IoT devices as legacy devices may have

vulnerabilities.• Privacy concerns with tracking, large footprint IoT networks.

Page 9: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly

Hitting the Sweet SpotHackers Love New Devices

Page 10: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly

©2019

Hitting the Sweet SpotHackers Love New Devices

• As new devices emerge, new exploits will surface• Hackers are constantly taking advantage of gaps in security

• Old exploits may return with new exploits• As old exploits resurface, attacks may happen faster• As IoT devices communicate together attacks become complex

Page 11: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly

Vendors, You Must ActNew Layers of Protection and Security

Page 12: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly

©2019

Vendors, You Must ActNew Layers of Protection and Security

• For new IoT devices, vendors must increase security on their network• Multiple layers of security must be used with new technology• Routine security reviews, sandboxing, penetration-testing• Continuous monitoring, possible tamper protection, file system integrity