The Mobile Internet of Things and Cyber Security
Upcoming SlideShare
Loading in...5
×
 

The Mobile Internet of Things and Cyber Security

on

  • 202 views

 

Statistics

Views

Total Views
202
Views on SlideShare
201
Embed Views
1

Actions

Likes
0
Downloads
4
Comments
0

1 Embed 1

http://www.slideee.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

The Mobile Internet of Things and Cyber Security The Mobile Internet of Things and Cyber Security Presentation Transcript

  • The Mobile Internet of Things and Cyber Security Andy Davis, Research Director NCC Group Image from: vint.sogeti.com
  • Which has recently been in the news with security issues? 1. Rubbish bin Images from: www.dreamstime.com www.nationaltransaction.com www.remodelista.com 2. POS terminal 3. Refrigerator
  • Price is low Gartner: The Internet of Things, which excludes PCs, tablets and smartphones, will grow to 26 billion units installed in 2020 Image from: www.bookcoupon.info
  • Machine to Machine communications • Assumptions about who can communicate with these devices Image from: www.telecoms.com
  • Security through obscurity • Outdated concept • Hidden != Protected • Still alive in the embedded world • Who would want to reverse-engineer this? Image from: www.treachery.net
  • Software updates? • Auto-updates? • Manual updates unlikely • Vulnerabilities persist for years Image: us.blackberry.com
  • End users / OEMs: What do you need to know? • Devices are cheap (for you and for an attacker) • If machines can talk to your machine then so can humans • If data need protecting, encrypt it, don’t hide it – someone will find it • If updates are available, make sure you install them • Attackers are actively targeting these devices