SlideShare a Scribd company logo
1 of 14
Brandon Walston
Charles Mayhew
 Internet of Things or IoT is a network of
devices/objects that are interconnected, making
them programmable, adaptable, and potentially
capable of interacting with people
 FTC held a workshop to discuss whether legislation is needed to
ensure appropriate protections for data collected through
connected devices
◦ They decided IoT specific-legislation is not needed, the
workshop proved that Congress should enact general data
security legislation
 FTC Workshop Recommendations
◦ Congress enact strong, flexible, and technology-neutral
legislation to strengthen the Commission’s existing data
security enforcement tools
◦ Companies should implement security before design
◦ Train employees on “good” security practices
◦ Only use outside service providers that can protect consumers
data, and are allowed to oversee the providers work
◦ Implement “defense-in-depth”, which means using multiple
layers of security for systems at risk
◦ Have a strong authentication system to limit unauthorized
access to consumers devices, data, or networks
◦ Monitor products and issue patches to fix vulnerabilities
 Chart the course for adoption
 Lead by example
 Look to partnerships to overcome obstacles
 Reduce regulatory barriers and delays for getting smart
devices to market
 Minimize the regulatory cost of data collection
 Make it easy to share and reuse data
 Relentlessly pursue better data
 Reduce the “Data Divide”
 Use data to tackle hard problems
 Where rules are needed to protect consumers, keep them
narrow and targeted
 Employees undergo specialized training
◦ Internet of Things Training
◦ Privacy Training
◦ Security Awareness Training
 Consider Data Minimization
◦ Companies/agencies should place a limit on the
data they collect, retain, and dispose once the
information is no longer needed
 Ethics Committee
 Office of Inspector General
 General Council
 Chief Information Security Officer
 Policy
 Governance
Customers Partners
 More important to protect
your information and
update passwords more
often
 More IoT devices leads to
more launch points for
hackers to gain access to
information
 FTC guidelines regarding
IoT will help companies
make sure they can trust
service providers
 Providers will have to
implement more secure
software and tools
Security Risks Privacy Risks
 Enabling unauthorized
access and misuse of
personal information
 Using IoT devices as launch
points on other systems
 Direct collection of personal
information
 Amount of data that is
collected
 IoT devices collect
information and can be
invisible to the user/owner
 Google
◦ Encrypt many services using Secure Sockets Layer (SSL)
 SSL encrypts connection between your computer and Google.
 Helps prevent others (service providers, internet cafes) from
seeing your search results
 SSL doesn’t always hide when user visited Google and typed
search items
◦ Two step verification when accessing personal Google
account and Safe Browsing within Google Chrome
◦ Restrict access to personal information on need to know
basis between Google employees, contractors, and
agents
◦ Undergoing Project Brillo
 Brillo will expand the Android OS to all connected devices
 Weave is IoT protocol to provide secure communication between
devices (local and cloud)
 Amazon
◦ Encrypts information about customers using SSL
◦ Amazon Web Services (AWS): IoT Service Provider
 Built-In Firewalls
 Encrypt data storage using Advanced Encryption
Standard (AES) 256, a secure symmetric key encryption
standard using 256-bit encryption keys
 Security Logs
 Secure access which allow use of https for secure
communication
 Built-In support for multi-factor authentication
◦ Amazon 2lementary
 Samsung
◦ ARTIK
 Hardware Security
 Unique ID
 Cryptographic Keys
 Remediation Support
 Secure Firmware Updates
 Platform Security
 Storage Encryption
 Anomaly Detection
 Data Replication and Device Failover
 Local Intelligence (no need to access cloud)
 http://abovethelaw.com/2015/02/ftc-staff-report-on-
internet-of-things-recommends-self-regulation-best-
practices-but-leaves-key-issues-unresolved/
 http://aws.amazon.com/security/
 http://www.google.com/policies/privacy/
 http://www.fiercewireless.com/tech/story/think-tank-calls-
regulators-think-more-positively-about-iot/2014-12-07
 https://developer.samsungsami.io/sami/sami-
documentation/secure-your-devices.html

More Related Content

What's hot

[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...CODE BLUE
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and driversFreeform Dynamics
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data ProtectionSeclore
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2Kyle Lai
 
DLP Solutions Protection | Seclore
DLP Solutions Protection |  SecloreDLP Solutions Protection |  Seclore
DLP Solutions Protection | SecloreSeclore
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standardsautomatskicorporation
 
Internet of things
Internet of thingsInternet of things
Internet of thingsvarungoyal98
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Seclore
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPandreasschuster
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Netpluz Asia Pte Ltd
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at ScaleWinston Morton
 
Securing IBM ECM with Rights Management
Securing IBM ECM with Rights ManagementSecuring IBM ECM with Rights Management
Securing IBM ECM with Rights ManagementSeclore
 
Seclore: Information Rights Management
Seclore: Information Rights ManagementSeclore: Information Rights Management
Seclore: Information Rights ManagementRahul Neel Mani
 

What's hot (20)

[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
DLP Solutions Protection | Seclore
DLP Solutions Protection |  SecloreDLP Solutions Protection |  Seclore
DLP Solutions Protection | Seclore
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at Scale
 
Securing IBM ECM with Rights Management
Securing IBM ECM with Rights ManagementSecuring IBM ECM with Rights Management
Securing IBM ECM with Rights Management
 
Seclore: Information Rights Management
Seclore: Information Rights ManagementSeclore: Information Rights Management
Seclore: Information Rights Management
 

Viewers also liked

Economy-Environment-DiscussionPaper-v2-4
Economy-Environment-DiscussionPaper-v2-4Economy-Environment-DiscussionPaper-v2-4
Economy-Environment-DiscussionPaper-v2-4Shannon Rohan
 
resume for business sem
resume for business semresume for business sem
resume for business semMichael Thurin
 
かねぐら法人版操作マニュアル
かねぐら法人版操作マニュアルかねぐら法人版操作マニュアル
かねぐら法人版操作マニュアルManabu Kondo
 
Fire alarm 3-f-single_and_multiple-station_alarms_and_household_fire_alarm_sy...
Fire alarm 3-f-single_and_multiple-station_alarms_and_household_fire_alarm_sy...Fire alarm 3-f-single_and_multiple-station_alarms_and_household_fire_alarm_sy...
Fire alarm 3-f-single_and_multiple-station_alarms_and_household_fire_alarm_sy...grantlerc
 
Reading comprehensión power tools
Reading comprehensión power toolsReading comprehensión power tools
Reading comprehensión power toolsstevencas21
 
Om0010 operations management
Om0010 operations managementOm0010 operations management
Om0010 operations managementconsult4solutions
 
(EOR/MEOR/BERO)Application of bero™ biosurfactant in oklahoma and its effect
(EOR/MEOR/BERO)Application of bero™ biosurfactant in oklahoma and its effect(EOR/MEOR/BERO)Application of bero™ biosurfactant in oklahoma and its effect
(EOR/MEOR/BERO)Application of bero™ biosurfactant in oklahoma and its effectJany Li
 
Apple Presentation Final-20151210-151407512
Apple Presentation Final-20151210-151407512Apple Presentation Final-20151210-151407512
Apple Presentation Final-20151210-151407512MD RUHUL QUDDUS
 
Conventions of our opening seqeuence
Conventions of our opening seqeuenceConventions of our opening seqeuence
Conventions of our opening seqeuenceJackyBoi1998
 

Viewers also liked (20)

El tequila en el mundo
El tequila en el mundoEl tequila en el mundo
El tequila en el mundo
 
Economy-Environment-DiscussionPaper-v2-4
Economy-Environment-DiscussionPaper-v2-4Economy-Environment-DiscussionPaper-v2-4
Economy-Environment-DiscussionPaper-v2-4
 
resume for business sem
resume for business semresume for business sem
resume for business sem
 
OBrienR_Resume_2016
OBrienR_Resume_2016OBrienR_Resume_2016
OBrienR_Resume_2016
 
かねぐら法人版操作マニュアル
かねぐら法人版操作マニュアルかねぐら法人版操作マニュアル
かねぐら法人版操作マニュアル
 
My 5 minutes bell
My 5 minutes bellMy 5 minutes bell
My 5 minutes bell
 
Fire alarm 3-f-single_and_multiple-station_alarms_and_household_fire_alarm_sy...
Fire alarm 3-f-single_and_multiple-station_alarms_and_household_fire_alarm_sy...Fire alarm 3-f-single_and_multiple-station_alarms_and_household_fire_alarm_sy...
Fire alarm 3-f-single_and_multiple-station_alarms_and_household_fire_alarm_sy...
 
Reading comprehensión power tools
Reading comprehensión power toolsReading comprehensión power tools
Reading comprehensión power tools
 
Usama_Amer
Usama_AmerUsama_Amer
Usama_Amer
 
Film openings
Film openingsFilm openings
Film openings
 
Om0010 operations management
Om0010 operations managementOm0010 operations management
Om0010 operations management
 
Redes sociales
Redes socialesRedes sociales
Redes sociales
 
IoT_Ethics
IoT_EthicsIoT_Ethics
IoT_Ethics
 
UA Football 2016
UA Football 2016UA Football 2016
UA Football 2016
 
modelos de camionetas 2016
modelos de camionetas 2016modelos de camionetas 2016
modelos de camionetas 2016
 
NewResume-Samples_v2
NewResume-Samples_v2NewResume-Samples_v2
NewResume-Samples_v2
 
Slide share
Slide shareSlide share
Slide share
 
(EOR/MEOR/BERO)Application of bero™ biosurfactant in oklahoma and its effect
(EOR/MEOR/BERO)Application of bero™ biosurfactant in oklahoma and its effect(EOR/MEOR/BERO)Application of bero™ biosurfactant in oklahoma and its effect
(EOR/MEOR/BERO)Application of bero™ biosurfactant in oklahoma and its effect
 
Apple Presentation Final-20151210-151407512
Apple Presentation Final-20151210-151407512Apple Presentation Final-20151210-151407512
Apple Presentation Final-20151210-151407512
 
Conventions of our opening seqeuence
Conventions of our opening seqeuenceConventions of our opening seqeuence
Conventions of our opening seqeuence
 

Similar to IoT_Implemented

Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesKristin Helgeson
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Brianna Johnson
 
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...cyberprosocial
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfezzAyman1
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using BlockchainIRJET Journal
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptxinfosec train
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptxInfosectrain3
 
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxRunning head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxtoltonkendal
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyersNicole Black
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdfonline Marketing
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 

Similar to IoT_Implemented (20)

Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
IoT_Structure
IoT_StructureIoT_Structure
IoT_Structure
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
Basics of IoT Testing
Basics of IoT TestingBasics of IoT Testing
Basics of IoT Testing
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptx
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptx
 
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxRunning head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 

IoT_Implemented

  • 2.  Internet of Things or IoT is a network of devices/objects that are interconnected, making them programmable, adaptable, and potentially capable of interacting with people
  • 3.  FTC held a workshop to discuss whether legislation is needed to ensure appropriate protections for data collected through connected devices ◦ They decided IoT specific-legislation is not needed, the workshop proved that Congress should enact general data security legislation  FTC Workshop Recommendations ◦ Congress enact strong, flexible, and technology-neutral legislation to strengthen the Commission’s existing data security enforcement tools ◦ Companies should implement security before design ◦ Train employees on “good” security practices ◦ Only use outside service providers that can protect consumers data, and are allowed to oversee the providers work ◦ Implement “defense-in-depth”, which means using multiple layers of security for systems at risk ◦ Have a strong authentication system to limit unauthorized access to consumers devices, data, or networks ◦ Monitor products and issue patches to fix vulnerabilities
  • 4.  Chart the course for adoption  Lead by example  Look to partnerships to overcome obstacles  Reduce regulatory barriers and delays for getting smart devices to market  Minimize the regulatory cost of data collection  Make it easy to share and reuse data  Relentlessly pursue better data  Reduce the “Data Divide”  Use data to tackle hard problems  Where rules are needed to protect consumers, keep them narrow and targeted
  • 5.  Employees undergo specialized training ◦ Internet of Things Training ◦ Privacy Training ◦ Security Awareness Training  Consider Data Minimization ◦ Companies/agencies should place a limit on the data they collect, retain, and dispose once the information is no longer needed
  • 6.  Ethics Committee  Office of Inspector General  General Council  Chief Information Security Officer  Policy  Governance
  • 7. Customers Partners  More important to protect your information and update passwords more often  More IoT devices leads to more launch points for hackers to gain access to information  FTC guidelines regarding IoT will help companies make sure they can trust service providers  Providers will have to implement more secure software and tools
  • 8. Security Risks Privacy Risks  Enabling unauthorized access and misuse of personal information  Using IoT devices as launch points on other systems  Direct collection of personal information  Amount of data that is collected  IoT devices collect information and can be invisible to the user/owner
  • 9.  Google ◦ Encrypt many services using Secure Sockets Layer (SSL)  SSL encrypts connection between your computer and Google.  Helps prevent others (service providers, internet cafes) from seeing your search results  SSL doesn’t always hide when user visited Google and typed search items ◦ Two step verification when accessing personal Google account and Safe Browsing within Google Chrome ◦ Restrict access to personal information on need to know basis between Google employees, contractors, and agents ◦ Undergoing Project Brillo  Brillo will expand the Android OS to all connected devices  Weave is IoT protocol to provide secure communication between devices (local and cloud)
  • 10.  Amazon ◦ Encrypts information about customers using SSL ◦ Amazon Web Services (AWS): IoT Service Provider  Built-In Firewalls  Encrypt data storage using Advanced Encryption Standard (AES) 256, a secure symmetric key encryption standard using 256-bit encryption keys  Security Logs  Secure access which allow use of https for secure communication  Built-In support for multi-factor authentication ◦ Amazon 2lementary
  • 11.
  • 12.  Samsung ◦ ARTIK  Hardware Security  Unique ID  Cryptographic Keys  Remediation Support  Secure Firmware Updates  Platform Security  Storage Encryption  Anomaly Detection  Data Replication and Device Failover  Local Intelligence (no need to access cloud)
  • 13.
  • 14.  http://abovethelaw.com/2015/02/ftc-staff-report-on- internet-of-things-recommends-self-regulation-best- practices-but-leaves-key-issues-unresolved/  http://aws.amazon.com/security/  http://www.google.com/policies/privacy/  http://www.fiercewireless.com/tech/story/think-tank-calls- regulators-think-more-positively-about-iot/2014-12-07  https://developer.samsungsami.io/sami/sami- documentation/secure-your-devices.html