thought leadership webinar - internet of things (iot): the next cyber security target

25
Internet of Things(IoT):The Next Cyber Security Target Praveen Kumar Gandi Head Information Security Services ClicTest [email protected] By Disclaimer: The images used in this presentation belong to their respective copyright holders and are used for educational purposes only. All other rights are reserved.

Upload: clictest

Post on 16-Apr-2017

1.138 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

Internet of Things(IoT):The Next Cyber Security Target

Praveen Kumar GandiHead Information Security [email protected]

By

Disclaimer: The images used in this presentation belong to their respective copyright holders and are used for educational purposes only. All other rights are reserved.

Page 2: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

Pre-Internet

Internet of CONTENT

Internet of SERVICES

Internet of PEOP

LE

Internet of THIN

GS

“HUMAN TO

HUMAN”“WWW” “WEB 2.0” “SOCIAL

MEDIA”

“MACHINE TO MACHINE”

• Fixed & mobile telephony• SMS

• E-mail• Information• Entertainment

• E-productivity• E-commerce• …

• Skype• Facebook• YouTube• Twitter• ….

• Identification, tracking, monitoring, metering ….• Semantically structured and shared data …

+ Smartnetworks

+ SmartIT platforms & services

+ SmartPhones & applications

+ SmartDevices, objects & tags

+ SmartData & ambient context

Evolution of Internet of Things

Page 3: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

• According to Gartner's analysis, there will be nearly 26 billion devices on the Internet of Things by 2020.

• As per ABI Research, an estimation of more than 30 billion devices will be wirelessly connected to Internet of Things.

• And as per the MarketsandMarkets Analysis, the estimated revenue generated on these smart product sales by 2016 will be $1 Trillion.

Importance of Internet of Things

Source: Cisco

Page 4: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

Internet of Things(IoT)• Originally, The Internet of Things (IoT) refers

to “the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure”.

• As the technology advances, the term Internet of Things(IoT) denotes to “Advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications (M2M) and covers a variety of protocols, domains, and applications”.

Source: http://en.wikipedia.org/wiki/Internet_of_Things

Page 5: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

Internet of Things(IoT)

• The IoT represents an evolution of future as many physical devices communicate with each other everyday through internet and identify themselves with other devices.

• The other technologies like RFID, Sensor technologies, Wireless technologies, etc. will also be used as method of communication.

Page 6: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

IPV6

Inexpensive and High Speed Connection

Big Data and

Cloud

Inexpensive and Powerful Hardware

Internet Evolution

Page 7: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

Source:Cisco

Page 8: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

Types of Internet of Things

Information Technology

• PCs• Servers• Virtualization• Routers• Switches

Personal Technology

• Tablets• Smart phones• Smart watches• Home energy• Home entertainment• Home control• Medical implants• Medical wearables

Operational Technology

• Industrial Control Systems(ICS)

• Supervisory control and data acquisition

• Medical machines• Kiosks• Manufacturing• Cloud service

infrastructure• Environmental

Monitoring

Page 9: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

Do you know?• The First IOT device

is Internet Coke Machine at Carnegie Mellon University introduced in the year 1982”.

Page 10: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

Internet of Things In Everyday Life

Page 11: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

Internet of Things in Homes(Smart Homes)

Page 12: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

How IoT works?

Source: Securing the IoT World by Aaron Guzman

Page 13: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

Are Internet of Things Secure?

Page 14: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

Smart Cars got pwned!!

Page 15: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

Smart Lights can be Hacked

• Unsecure communication between bridge and application

•Vulnerability in smart bulb makes home black out by security researcher

•Fixed in Latest Version

Page 16: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

Vulnerabilities in IoT Devices• Due to improper security model implementation and unsecure communication between the device and application. • Any device on the same Wi-Fi network can command or control these devices.

Page 17: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

How far IoT can be hacked?

Remember “Fire Sale” in Die Hard 4.0

Page 18: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

Hurdles Securing the IoT• There is no consistent or

official software update process or mechanism

• There is little or no understanding of the cyber threats embedded in their systems

• There is lack of accountability for device security

• Improper configuration or purpose-built features that equate to security flaws

• Data privacy

Page 19: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

Securing the IoT

• Keep your Software/firmware Updated

• Ensure that connectivity is Secure. eg: Two Factor Authentication

Page 20: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

• Secure the location of the data being reported by IoT-linked devices.

• Encrypt the System.eg: Two-Person Controls

Securing the IoT

Page 21: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

• Ensure Supply Chain Security. Prevention of counterfeit hardware by procedures to certify manufacturers’ supply chain processes to prevent the introduction of malicious code.

• Support IoT security. We must support regulation that requires that IoT devices meet security standards, just as we require standards for our electrical devices with UL approval requirements.

Securing the IoT

Page 22: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

• Use out of band (OOB) systems – closed systems (intranets) that are not open to the public.

The Defence Department uses IoT linked devices, but they are mainly out of reach from hackers because they are OOB. Defence weapons systems and even sensor-wearing soldiers report critical status information to centralized control centres that feed decision makers. While less vulnerable to being hacked, these OOB systems are subject to insider attacks.

Securing the IoT

Page 23: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

• Support Standardization. Eg: OWASP

Securing the IoT

Source: IoT-Attack-Surfaces-Defcon-2015

Page 24: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

Securing the IoT

• Stay informed. National Institute of Standards and Technology and Federal Guidance such as Federal Information Processing Standards (FIPS) address critical steps that are needed to secure and protect information and critical systems.

Page 25: Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

Thank You !

Praveen Kumar G

Head Information Security Services |ClicTest

E-mail: [email protected]