SlideShare a Scribd company logo
1 of 23
Download to read offline
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Peter Yang, Sr. Product Manager
June 7th 2017
從雲到端,打造安全的物聯網
Trend Micro IoT Security
趨勢科技
趨勢科技
 Founded in 1989 (28 years), IT security dedicated company
 5,258 employees, cover 30 countries, 60% (3,300+) are engineers
 500,000 enterprise customer and 155 million endpoints globally
 >$1 billion annual sales
 Founded in U.S. Headquartered in Japan
 Tokyo Exchange Nikkei Index (4704) | >$5 billion market cap
 Customers include 45 of top 50 global corporations, and 100% of
the top 10:
Auto Telecom Banks Oil
Gartner Magic Quadrant for
Endpoint Protection Platforms
Feb 2016
This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated
in the context of the entire document. The Gartner document is available upon request from
https://resources.trendmicro.com/Gartner-Magic-Quadrant-Endpoints.html
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not
advise technology users to select only those vendors with the highest ratings or other designation. Gartner
research publications consist of the opinions of Gartner's research organization and should not be construed
as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research,
including any warranties of merchantability or fitness for a particular purpose.
Trend Micro TippingPoint®
Named a Leader in 2017
Gartner Magic Quadrant for
Intrusion Detection and
Prevention Systems (IDPS)
Jan 2017
重大 IoT 駭客案例回顧
2009 2010 2011 2012 2013 2014 2015 2016
CarShark Software Lets
You Hack Into, Control
And Kill Any Car
Tesla fixes bug
after hackers
hijack Model S
Hackers remotely kill a Jeep
on the highway
• Recall of 1.4M vehicles
• Cost of $140M+
Controlling vehicle features of
Nissan LEAFs across the globe
• Nissan shut down an app
which controls Leaf cars
Hackers take remote
control of Tesla Model S
from 12 miles away
• Push Tesla to provide
new firmware for bug fix
Researchers reveal
methods behind car
hack (2010 Ford Escape)
at Defcon
Hack into the OnStar telematics
system of a 2009 Chevrolet Impala
• GM TOOK 5 YEARS TO FIX FULL
CONTROL HACK IN MILLIONS OF
VEHICLES EQUIPPED WITH ONSTAR
Flaws in 2.2M BMW
ConnectedDrive
Infotainment System
allow remote hack
OnStar hack remotely
starts cars
• GM fix the
RemoteLink App
download 3M+ times
Hackers compromise
Prius, seize control of
wheel, brakes and more
Friendly Hackers
Exploit Loophole to
Disable Alarm on
Mitsubishi Outlander
Car Hacking
IoT DDoS 攻擊事件簿
Dyn
2016/10/21
KrebsOnSecurity
2016/9/20
Jun, 2016
2014
OVH
2016/9/21 Mirai 殭屍
網路程式
碼公開
75萬封垃圾
郵件 (家電)
5萬次/秒
HTTP連線要求
(2萬5千台 CCTV)
620Gbs
DDoS攻擊
(18萬台IoT設備)
14.5萬台IoT設備
發動DDoS攻擊
49.3萬台IoT
發動1.2Tbs
DNS DDoS
IoT 裝置 = 受害者 + 幫凶
問題的根源以及解決方式
IoT 終端裝置的安全考量
雲端終端雲端
IoT 終端裝置威脅來源
• Insecure Design/Code
• Third Party Libraries
• Existing Vulnerabilities
Open Network Ports
(WannaCry)
• Insecure Network Protocols
• Insecure FOTA/SOTA
Poor Authentication/Authorization
(Mirai)
• Undetected File Changes
• Undetected Process Behavior
Device is loading up
the firmware and
start to work as it
defined.
1. Boot Up
Boot up completed,
system will read
configuration,
establish connection
or sync up data etc.
2. Initialization
Device performs its
designed purpose
continually.
3. Operation
New firmware
arrived, devices
reboots then start to
load the new
firmware.
4. Update
Device is loading up
the firmware and
start to work as it
defined.
1. Boot Up
Boot up completed,
system will read
configuration,
establish connection
or sync up data etc.
2. Initialization
Device performs its
designed purpose
continually.
3. Operation
New firmware
arrived, devices
reboots then start to
load the new
firmware.
4. Update
Device is loading up
the firmware and
start to work as it
defined.
1. Boot Up
Boot up completed,
system will read
configuration,
establish connection
or sync up data etc.
2. Initialization
Device performs its
designed purpose
continually.
3. Operation
New firmware
arrived, devices
reboots then start to
load the new
firmware.
4. Update
..….............. Retiring
First cycle Second cycle N cycle Last cycle Termination
Device is loading up
the firmware and
start to work as it
defined.
1. Boot Up
Boot up completed,
system will read
configuration,
establish connection
or sync up data etc.
2. Initialization
Device performs its
designed purpose
continually.
3. Operation
New firmware
arrived, devices
reboots then start to
load the new
firmware.
4. Update
Next Cycle
IoT 終端設備生命週期
IoT 終端設備生命週期及保護
Device is loading up
the firmware and
start to work as it
defined.
1. Boot Up
Boot up completed,
system will read
configuration,
establish connection
or sync up data etc.
2. Initialization
Device performs its
designed purpose
continually.
3. Operation
New firmware
arrived, devices
reboots then start to
load the new
firmware.
4. Update
Next Cycle
(Secure) FOTA
Secure Boot
Firmware Check Reduce the Attack Surface
Health / Risk Check
Block Attack Attempts
Trend Micro FocusPlatform Provider Platform Provider
TMIS
File Integrity &
App
Whitelisting
System
Vulnerability
Self Protection
(Whitelist
lockdown)
Network
Protection
(IPS)
Security
Management
Console
Risk Detection System Protection Incident Response
TMIS
IoT Security
SDK/API
1 2 3
Network
Behavior
Anomaly
Trend Micro IoT Security 功能概述
須於產品開發
階段整合
TMIS 架構及設計理念
Security Service
Security Management
Endpoint SDK/ API
Learning Device
Behavior
Global Threats
Intelligent
Behavior
Baseline
Anomaly
Detection
Engine
Security
Attestation
Logs
Baseline (WL)
Management
Protection Rule
Management
Alert/Report
Responder
Protection
Rule Execution
Behavior
Collector
Feedback
Validate
最小化終端負擔
(運算, 儲存, 耗電…)
最大化雲端效用
(全球威脅搜集,
機器學習,準確性,
即時回應)
全面整合控管
(終端安全管理,
視覺化威脅分析,
SOC整合)
客戶案例分享
使用 TMIS 保護關鍵物聯網終端裝置
CoralEdge Box
利用弱點攻擊
(或是Mirai案例)
入侵 IoT 終端
• 竊取機密監控影片
• 銷毀監控影片
• 癱瘓監視器
• ….
• NAD
• File Integrity
• App WL
Virtual Patch
TMIS
Anomaly Detection
Make sure all IoT devices still work as
originally design.
Vulnerability Detection & Virtual Patch
Understand whether IoT devices were
exposed to the latest threats and take
action to protect them.
Detail the cyber security status of the
firmware.
Find an anomaly of IoT devices, track
trends of the anomaly, and plan the
next fix or take mitigate actions.
TMIS 管理平台
Unusual IP
Unusual Access Timing
Unusual Data Usage
檢視你的 IoT 裝置
Class 1 Class 2 Class 3 Class 4
Control unit MCU (8 bit/16bit) MCU (32bit) MPU (32bit) GPU, MPU, CPU (32bit/64bit)
OS Non Low cost RTOS RTOS/Embedded Linux Embedded Linux/Android/Full
feature RTOS/Win 10 IoT Core
Network ZigBee, NFC, Bluetooth Cellar, Wi-Fi Ethernet, Wi-Fi Wi-Fi with other multiple
network protocols
Application Lighting, Wearables,
Thermostats
Medical devices, low-end
network appliances,
telematics
Larger/ expensive medical
or industrial automation
devices; robotics; vending
machines
Gateways, high-end medical
devices, military devices,
autonomous driving car
IoT Device Security
Root of Trust HW SE (Secure Element) HW/SW PKI HW/SW PKI PKI/TPM
TMIS
(Function)
Risk Detection (Planning) Risk Detection (Planning) Risk Detection/System
Protection
Risk Detection/System
Protection
TMIS (Method) Restful API (Planning) Restful API (Planning) SDK (Agent) SDK (Agent)
OTA/Roll back OTA OTA OTA/Roll back OTA/Roll back
DeviceLifeCycle
IoT 終端裝置分類以及安全防護對策
以 AWS Greengrass 為例
TMIS
Cloud
DATA
+
雲端保護
SecurityIoTProtection
VMEDGE
DEVICES
CLOUDDEVICES
MANAGEMENT
USAGE
ENVIRONMENT
IoT Devices
Security
終端保護
+
Security SecuritySecurity
趨勢科技與AWS打造雲到端的安全物聯網環境
Thank You
Peter_yang@trend.com.tw

More Related Content

What's hot

エッジ/フォグコンピューティング環境におけるコンテナ/マイクロサービスのメリットとリスク
エッジ/フォグコンピューティング環境におけるコンテナ/マイクロサービスのメリットとリスクエッジ/フォグコンピューティング環境におけるコンテナ/マイクロサービスのメリットとリスク
エッジ/フォグコンピューティング環境におけるコンテナ/マイクロサービスのメリットとリスクEiji Sasahara, Ph.D., MBA 笹原英司
 
試験前に抑えておきたいRTX/vRX VPN接続
試験前に抑えておきたいRTX/vRX VPN接続試験前に抑えておきたいRTX/vRX VPN接続
試験前に抑えておきたいRTX/vRX VPN接続Yasutaka Hamada
 
あらためて Azure virtual network
あらためて Azure virtual networkあらためて Azure virtual network
あらためて Azure virtual networkKuniteru Asami
 
AWSのセキュリティについて
AWSのセキュリティについてAWSのセキュリティについて
AWSのセキュリティについてYasuhiro Horiuchi
 
AWS Black Belt Online Seminar 2017 Amazon Pinpoint で始めるモバイルアプリのグロースハック
AWS Black Belt Online Seminar 2017 Amazon Pinpoint で始めるモバイルアプリのグロースハックAWS Black Belt Online Seminar 2017 Amazon Pinpoint で始めるモバイルアプリのグロースハック
AWS Black Belt Online Seminar 2017 Amazon Pinpoint で始めるモバイルアプリのグロースハックAmazon Web Services Japan
 
AWS Black Belt Online Seminar 2017 Amazon Relational Database Service (Amazon...
AWS Black Belt Online Seminar 2017 Amazon Relational Database Service (Amazon...AWS Black Belt Online Seminar 2017 Amazon Relational Database Service (Amazon...
AWS Black Belt Online Seminar 2017 Amazon Relational Database Service (Amazon...Amazon Web Services Japan
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
V sphere 7 update 3 へのアップグレードについて
V sphere 7 update 3 へのアップグレードについてV sphere 7 update 3 へのアップグレードについて
V sphere 7 update 3 へのアップグレードについてSatoshi Imai
 
Amazon Game Tech Night #25 ゲーム業界向け機械学習最新状況アップデート
Amazon Game Tech Night #25 ゲーム業界向け機械学習最新状況アップデートAmazon Game Tech Night #25 ゲーム業界向け機械学習最新状況アップデート
Amazon Game Tech Night #25 ゲーム業界向け機械学習最新状況アップデートAmazon Web Services Japan
 
PenTesterが知っている危ないAWS環境の共通点
PenTesterが知っている危ないAWS環境の共通点 PenTesterが知っている危ないAWS環境の共通点
PenTesterが知っている危ないAWS環境の共通点 zaki4649
 
いまさら、AWSのネットワーク設計
いまさら、AWSのネットワーク設計いまさら、AWSのネットワーク設計
いまさら、AWSのネットワーク設計Serverworks Co.,Ltd.
 
セキュリティ設計の頻出論点
セキュリティ設計の頻出論点セキュリティ設計の頻出論点
セキュリティ設計の頻出論点Tomohiro Nakashima
 
開発者におくるサーバーレスモニタリング
開発者におくるサーバーレスモニタリング開発者におくるサーバーレスモニタリング
開発者におくるサーバーレスモニタリングAmazon Web Services Japan
 
AD FS deep dive - claim rule set
AD FS deep dive - claim rule setAD FS deep dive - claim rule set
AD FS deep dive - claim rule setjunichi anno
 
AWS Black Belt Online Seminar 2018 AWS Certificate Manager
AWS Black Belt Online Seminar 2018 AWS Certificate ManagerAWS Black Belt Online Seminar 2018 AWS Certificate Manager
AWS Black Belt Online Seminar 2018 AWS Certificate ManagerAmazon Web Services Japan
 
AWS Black Belt Online Seminar 2017 Deployment on AWS
AWS Black Belt Online Seminar 2017 Deployment on AWSAWS Black Belt Online Seminar 2017 Deployment on AWS
AWS Black Belt Online Seminar 2017 Deployment on AWSAmazon Web Services Japan
 
Windowsシステムの AWS移行とMulti-AZ化 - JAWS DAYS 2015
WindowsシステムのAWS移行とMulti-AZ化 - JAWS DAYS 2015 WindowsシステムのAWS移行とMulti-AZ化 - JAWS DAYS 2015
Windowsシステムの AWS移行とMulti-AZ化 - JAWS DAYS 2015 Takayuki Enomoto
 
Sergio Silva - CyberS3c - OSL19
Sergio Silva - CyberS3c - OSL19Sergio Silva - CyberS3c - OSL19
Sergio Silva - CyberS3c - OSL19marketingsyone
 

What's hot (20)

エッジ/フォグコンピューティング環境におけるコンテナ/マイクロサービスのメリットとリスク
エッジ/フォグコンピューティング環境におけるコンテナ/マイクロサービスのメリットとリスクエッジ/フォグコンピューティング環境におけるコンテナ/マイクロサービスのメリットとリスク
エッジ/フォグコンピューティング環境におけるコンテナ/マイクロサービスのメリットとリスク
 
試験前に抑えておきたいRTX/vRX VPN接続
試験前に抑えておきたいRTX/vRX VPN接続試験前に抑えておきたいRTX/vRX VPN接続
試験前に抑えておきたいRTX/vRX VPN接続
 
あらためて Azure virtual network
あらためて Azure virtual networkあらためて Azure virtual network
あらためて Azure virtual network
 
AWSのセキュリティについて
AWSのセキュリティについてAWSのセキュリティについて
AWSのセキュリティについて
 
私がなぜZscalerに?
私がなぜZscalerに?私がなぜZscalerに?
私がなぜZscalerに?
 
AWS Black Belt Online Seminar 2017 Amazon Pinpoint で始めるモバイルアプリのグロースハック
AWS Black Belt Online Seminar 2017 Amazon Pinpoint で始めるモバイルアプリのグロースハックAWS Black Belt Online Seminar 2017 Amazon Pinpoint で始めるモバイルアプリのグロースハック
AWS Black Belt Online Seminar 2017 Amazon Pinpoint で始めるモバイルアプリのグロースハック
 
AWS Black Belt Online Seminar 2017 Amazon Relational Database Service (Amazon...
AWS Black Belt Online Seminar 2017 Amazon Relational Database Service (Amazon...AWS Black Belt Online Seminar 2017 Amazon Relational Database Service (Amazon...
AWS Black Belt Online Seminar 2017 Amazon Relational Database Service (Amazon...
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
V sphere 7 update 3 へのアップグレードについて
V sphere 7 update 3 へのアップグレードについてV sphere 7 update 3 へのアップグレードについて
V sphere 7 update 3 へのアップグレードについて
 
Amazon Game Tech Night #25 ゲーム業界向け機械学習最新状況アップデート
Amazon Game Tech Night #25 ゲーム業界向け機械学習最新状況アップデートAmazon Game Tech Night #25 ゲーム業界向け機械学習最新状況アップデート
Amazon Game Tech Night #25 ゲーム業界向け機械学習最新状況アップデート
 
PenTesterが知っている危ないAWS環境の共通点
PenTesterが知っている危ないAWS環境の共通点 PenTesterが知っている危ないAWS環境の共通点
PenTesterが知っている危ないAWS環境の共通点
 
Présentation AzureAD ( Identité hybrides et securité)
Présentation AzureAD ( Identité hybrides et securité)Présentation AzureAD ( Identité hybrides et securité)
Présentation AzureAD ( Identité hybrides et securité)
 
いまさら、AWSのネットワーク設計
いまさら、AWSのネットワーク設計いまさら、AWSのネットワーク設計
いまさら、AWSのネットワーク設計
 
セキュリティ設計の頻出論点
セキュリティ設計の頻出論点セキュリティ設計の頻出論点
セキュリティ設計の頻出論点
 
開発者におくるサーバーレスモニタリング
開発者におくるサーバーレスモニタリング開発者におくるサーバーレスモニタリング
開発者におくるサーバーレスモニタリング
 
AD FS deep dive - claim rule set
AD FS deep dive - claim rule setAD FS deep dive - claim rule set
AD FS deep dive - claim rule set
 
AWS Black Belt Online Seminar 2018 AWS Certificate Manager
AWS Black Belt Online Seminar 2018 AWS Certificate ManagerAWS Black Belt Online Seminar 2018 AWS Certificate Manager
AWS Black Belt Online Seminar 2018 AWS Certificate Manager
 
AWS Black Belt Online Seminar 2017 Deployment on AWS
AWS Black Belt Online Seminar 2017 Deployment on AWSAWS Black Belt Online Seminar 2017 Deployment on AWS
AWS Black Belt Online Seminar 2017 Deployment on AWS
 
Windowsシステムの AWS移行とMulti-AZ化 - JAWS DAYS 2015
WindowsシステムのAWS移行とMulti-AZ化 - JAWS DAYS 2015 WindowsシステムのAWS移行とMulti-AZ化 - JAWS DAYS 2015
Windowsシステムの AWS移行とMulti-AZ化 - JAWS DAYS 2015
 
Sergio Silva - CyberS3c - OSL19
Sergio Silva - CyberS3c - OSL19Sergio Silva - CyberS3c - OSL19
Sergio Silva - CyberS3c - OSL19
 

Viewers also liked

Digital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collideDigital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collideISSA LA
 
全面保護企業的關鍵智慧資產
全面保護企業的關鍵智慧資產全面保護企業的關鍵智慧資產
全面保護企業的關鍵智慧資產NVIDIA Taiwan
 
Deep Learning - CNN and RNN
Deep Learning - CNN and RNNDeep Learning - CNN and RNN
Deep Learning - CNN and RNNAshray Bhandare
 
Future of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep LearningFuture of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep LearningMelanie Swan
 
Top 5 Deep Learning and AI Stories - October 6, 2017
Top 5 Deep Learning and AI Stories - October 6, 2017Top 5 Deep Learning and AI Stories - October 6, 2017
Top 5 Deep Learning and AI Stories - October 6, 2017NVIDIA
 

Viewers also liked (6)

Pancreas Cancer
Pancreas CancerPancreas Cancer
Pancreas Cancer
 
Digital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collideDigital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collide
 
全面保護企業的關鍵智慧資產
全面保護企業的關鍵智慧資產全面保護企業的關鍵智慧資產
全面保護企業的關鍵智慧資產
 
Deep Learning - CNN and RNN
Deep Learning - CNN and RNNDeep Learning - CNN and RNN
Deep Learning - CNN and RNN
 
Future of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep LearningFuture of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep Learning
 
Top 5 Deep Learning and AI Stories - October 6, 2017
Top 5 Deep Learning and AI Stories - October 6, 2017Top 5 Deep Learning and AI Stories - October 6, 2017
Top 5 Deep Learning and AI Stories - October 6, 2017
 

Similar to Trend Micro IoT Security Protects Critical Devices

Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsAlan Tatourian
 
Global IoT Cloud Services Survey-Aug-20160527
Global IoT Cloud Services Survey-Aug-20160527Global IoT Cloud Services Survey-Aug-20160527
Global IoT Cloud Services Survey-Aug-20160527August Lin
 
How to secure and manage modern IT - Ondrej Vysek
 How to secure and manage modern IT - Ondrej Vysek How to secure and manage modern IT - Ondrej Vysek
How to secure and manage modern IT - Ondrej VysekITCamp
 
Highly dependable automotive software
Highly dependable automotive softwareHighly dependable automotive software
Highly dependable automotive softwareAlan Tatourian
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfssuser57b3e5
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckSecurity Innovation
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltdNehul Gupta
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCase IQ
 
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?MarketingArrowECS_CZ
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAPNIC
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Barry Greene
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing SuiteIRJET Journal
 
2008 Trends
2008 Trends2008 Trends
2008 TrendsTBledsoe
 

Similar to Trend Micro IoT Security Protects Critical Devices (20)

Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 
Global IoT Cloud Services Survey-Aug-20160527
Global IoT Cloud Services Survey-Aug-20160527Global IoT Cloud Services Survey-Aug-20160527
Global IoT Cloud Services Survey-Aug-20160527
 
How to secure and manage modern IT - Ondrej Vysek
 How to secure and manage modern IT - Ondrej Vysek How to secure and manage modern IT - Ondrej Vysek
How to secure and manage modern IT - Ondrej Vysek
 
Fortinet k
Fortinet kFortinet k
Fortinet k
 
JacksonvilleJUG_CVE101.pdf
JacksonvilleJUG_CVE101.pdfJacksonvilleJUG_CVE101.pdf
JacksonvilleJUG_CVE101.pdf
 
Highly dependable automotive software
Highly dependable automotive softwareHighly dependable automotive software
Highly dependable automotive software
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
Fortinet broch
Fortinet brochFortinet broch
Fortinet broch
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality Check
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltd
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Trend Micro IoT Security Protects Critical Devices

  • 1. © 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Peter Yang, Sr. Product Manager June 7th 2017 從雲到端,打造安全的物聯網 Trend Micro IoT Security
  • 3. 趨勢科技  Founded in 1989 (28 years), IT security dedicated company  5,258 employees, cover 30 countries, 60% (3,300+) are engineers  500,000 enterprise customer and 155 million endpoints globally  >$1 billion annual sales  Founded in U.S. Headquartered in Japan  Tokyo Exchange Nikkei Index (4704) | >$5 billion market cap  Customers include 45 of top 50 global corporations, and 100% of the top 10: Auto Telecom Banks Oil
  • 4. Gartner Magic Quadrant for Endpoint Protection Platforms Feb 2016 This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from https://resources.trendmicro.com/Gartner-Magic-Quadrant-Endpoints.html Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Trend Micro TippingPoint® Named a Leader in 2017 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS) Jan 2017
  • 6. 2009 2010 2011 2012 2013 2014 2015 2016 CarShark Software Lets You Hack Into, Control And Kill Any Car Tesla fixes bug after hackers hijack Model S Hackers remotely kill a Jeep on the highway • Recall of 1.4M vehicles • Cost of $140M+ Controlling vehicle features of Nissan LEAFs across the globe • Nissan shut down an app which controls Leaf cars Hackers take remote control of Tesla Model S from 12 miles away • Push Tesla to provide new firmware for bug fix Researchers reveal methods behind car hack (2010 Ford Escape) at Defcon Hack into the OnStar telematics system of a 2009 Chevrolet Impala • GM TOOK 5 YEARS TO FIX FULL CONTROL HACK IN MILLIONS OF VEHICLES EQUIPPED WITH ONSTAR Flaws in 2.2M BMW ConnectedDrive Infotainment System allow remote hack OnStar hack remotely starts cars • GM fix the RemoteLink App download 3M+ times Hackers compromise Prius, seize control of wheel, brakes and more Friendly Hackers Exploit Loophole to Disable Alarm on Mitsubishi Outlander Car Hacking
  • 7. IoT DDoS 攻擊事件簿 Dyn 2016/10/21 KrebsOnSecurity 2016/9/20 Jun, 2016 2014 OVH 2016/9/21 Mirai 殭屍 網路程式 碼公開 75萬封垃圾 郵件 (家電) 5萬次/秒 HTTP連線要求 (2萬5千台 CCTV) 620Gbs DDoS攻擊 (18萬台IoT設備) 14.5萬台IoT設備 發動DDoS攻擊 49.3萬台IoT 發動1.2Tbs DNS DDoS IoT 裝置 = 受害者 + 幫凶
  • 10. IoT 終端裝置威脅來源 • Insecure Design/Code • Third Party Libraries • Existing Vulnerabilities Open Network Ports (WannaCry) • Insecure Network Protocols • Insecure FOTA/SOTA Poor Authentication/Authorization (Mirai) • Undetected File Changes • Undetected Process Behavior
  • 11. Device is loading up the firmware and start to work as it defined. 1. Boot Up Boot up completed, system will read configuration, establish connection or sync up data etc. 2. Initialization Device performs its designed purpose continually. 3. Operation New firmware arrived, devices reboots then start to load the new firmware. 4. Update Device is loading up the firmware and start to work as it defined. 1. Boot Up Boot up completed, system will read configuration, establish connection or sync up data etc. 2. Initialization Device performs its designed purpose continually. 3. Operation New firmware arrived, devices reboots then start to load the new firmware. 4. Update Device is loading up the firmware and start to work as it defined. 1. Boot Up Boot up completed, system will read configuration, establish connection or sync up data etc. 2. Initialization Device performs its designed purpose continually. 3. Operation New firmware arrived, devices reboots then start to load the new firmware. 4. Update ..….............. Retiring First cycle Second cycle N cycle Last cycle Termination Device is loading up the firmware and start to work as it defined. 1. Boot Up Boot up completed, system will read configuration, establish connection or sync up data etc. 2. Initialization Device performs its designed purpose continually. 3. Operation New firmware arrived, devices reboots then start to load the new firmware. 4. Update Next Cycle IoT 終端設備生命週期
  • 12. IoT 終端設備生命週期及保護 Device is loading up the firmware and start to work as it defined. 1. Boot Up Boot up completed, system will read configuration, establish connection or sync up data etc. 2. Initialization Device performs its designed purpose continually. 3. Operation New firmware arrived, devices reboots then start to load the new firmware. 4. Update Next Cycle (Secure) FOTA Secure Boot Firmware Check Reduce the Attack Surface Health / Risk Check Block Attack Attempts Trend Micro FocusPlatform Provider Platform Provider TMIS
  • 13. File Integrity & App Whitelisting System Vulnerability Self Protection (Whitelist lockdown) Network Protection (IPS) Security Management Console Risk Detection System Protection Incident Response TMIS IoT Security SDK/API 1 2 3 Network Behavior Anomaly Trend Micro IoT Security 功能概述 須於產品開發 階段整合
  • 14. TMIS 架構及設計理念 Security Service Security Management Endpoint SDK/ API Learning Device Behavior Global Threats Intelligent Behavior Baseline Anomaly Detection Engine Security Attestation Logs Baseline (WL) Management Protection Rule Management Alert/Report Responder Protection Rule Execution Behavior Collector Feedback Validate 最小化終端負擔 (運算, 儲存, 耗電…) 最大化雲端效用 (全球威脅搜集, 機器學習,準確性, 即時回應) 全面整合控管 (終端安全管理, 視覺化威脅分析, SOC整合)
  • 16. 使用 TMIS 保護關鍵物聯網終端裝置 CoralEdge Box 利用弱點攻擊 (或是Mirai案例) 入侵 IoT 終端 • 竊取機密監控影片 • 銷毀監控影片 • 癱瘓監視器 • …. • NAD • File Integrity • App WL Virtual Patch TMIS
  • 17. Anomaly Detection Make sure all IoT devices still work as originally design. Vulnerability Detection & Virtual Patch Understand whether IoT devices were exposed to the latest threats and take action to protect them. Detail the cyber security status of the firmware. Find an anomaly of IoT devices, track trends of the anomaly, and plan the next fix or take mitigate actions. TMIS 管理平台
  • 18. Unusual IP Unusual Access Timing Unusual Data Usage
  • 20. Class 1 Class 2 Class 3 Class 4 Control unit MCU (8 bit/16bit) MCU (32bit) MPU (32bit) GPU, MPU, CPU (32bit/64bit) OS Non Low cost RTOS RTOS/Embedded Linux Embedded Linux/Android/Full feature RTOS/Win 10 IoT Core Network ZigBee, NFC, Bluetooth Cellar, Wi-Fi Ethernet, Wi-Fi Wi-Fi with other multiple network protocols Application Lighting, Wearables, Thermostats Medical devices, low-end network appliances, telematics Larger/ expensive medical or industrial automation devices; robotics; vending machines Gateways, high-end medical devices, military devices, autonomous driving car IoT Device Security Root of Trust HW SE (Secure Element) HW/SW PKI HW/SW PKI PKI/TPM TMIS (Function) Risk Detection (Planning) Risk Detection (Planning) Risk Detection/System Protection Risk Detection/System Protection TMIS (Method) Restful API (Planning) Restful API (Planning) SDK (Agent) SDK (Agent) OTA/Roll back OTA OTA OTA/Roll back OTA/Roll back DeviceLifeCycle IoT 終端裝置分類以及安全防護對策
  • 21. 以 AWS Greengrass 為例 TMIS