SlideShare a Scribd company logo
1 of 43
Download to read offline
Leading the Conversation
in
IoT Security
#ISSLearningDay2018
Mr. Ng Kok Leong, NUS-ISS
13 July 2018
Learning Outcome
1) Understand cybersecurity requirements in context of IoT
a) Safety
b) Privacy
c) Resilience
d) Confidentiality
e) Authentication
f) Integrity
2) Communicate with IT/cybersecurity team
#ISSLearningDay2018
Problem:
Communicating cybersecurity
#ISSLearningDay2018
#ISSLearningDay2018
I want to put up smart
camera to capture objects
and faces, analyzing faces
down to race, gender and
age.
Err…
No, security risk …
#ISSLearningDay2018
Source: www.washingtonpost.com
#ISSLearningDay2018
#ISSLearningDay2018
#ISSLearningDay2018
#ISSLearningDay2018
#ISSLearningDay2018
How do we carry on the
conversation?
#ISSLearningDay2018
Case:
Smart Lamp Posts
#ISSLearningDay2018
#ISSLearningDay2018
Source: https://www.straitstimes.com/singapore/smart-street-lamps-with-high-tech-sensors-set-for-trial
#ISSLearningDay2018
Source: https://www.straitstimes.com/singapore/smart-street-lamps-with-high-tech-sensors-set-for-trial
What security risk?
*What are we afraid of losing?
What do we want?
#ISSLearningDay2018
(1) Privacy
What are we afraid of losing?
What do we want?
#ISSLearningDay2018
Losing of whose Privacy?
#ISSLearningDay2018
The Subject
You
&
Me
(2) Safety
What are we afraid of losing?
What do we want?
#ISSLearningDay2018
Safety
#ISSLearningDay2018
Pacemaker
20
A pacemaker is a small, battery-operated
device that senses when your heart is
beating irregularly or too slowly. It sends a
signal to your heart that makes your heart
beat at the correct pace.
(Barnaby Jack, the director of embedded
device security for computer security firm
IOActive), developed software that
allowed him to remotely send an electric
shock to anyone wearing a pacemaker
within a 15m radius.
#ISSLearningDay2018
The hackers could deliberately run the battery flat, or conduct “administration of inappropriate
pacing”. Both could, in the worst case, result in the death of an affected patient.
IoT: beyond Information security
#ISSLearningDay2018
Cyber-physical security
#ISSLearningDay2018
(3) Resilience against attack
What are we afraid of losing?
What do we want?
#ISSLearningDay2018
Resilience against attack
#ISSLearningDay2018
Compromised IoT brought together to
bring down victim’s services
#ISSLearningDay2018
What if 100,000 smart lamp posts
were compromised and being
used as zombies to attack victims?
#ISSLearningDay2018
(4) Confidentiality
What are we afraid of losing?
What do we want?
#ISSLearningDay2018
Data Classification
#ISSLearningDay2018
Public
Internal
Restricted
Confidential
Secret
How should facial
recognition biometric
data be classified?
Collect & Transfer of Confidential Data
#ISSLearningDay2018
facial recognition
biometric data
mothership
Don’t want these data to be copied/stolen
Data Confidentiality
(5) Authentication
What are we afraid of losing?
What do we want?
#ISSLearningDay2018
Transfer of Data
#ISSLearningDay2018
Ensure data is collected from
“authentic” lamp post
mothership
Ensure communication is
really from mothership
Mutual Authentication
(6) Integrity
What are we afraid of losing?
What do we want?
#ISSLearningDay2018
Collect & Transfer of Confidential Data
#ISSLearningDay2018
facial recognition
biometric data
mothership
Don’t want these data to be modified
Data Integrity
If we are afraid of losing…
then what can we do?
Conduct risk assessment
Get the IT/cybersecurity expert to do the job
#ISSLearningDay2018
Conduct Risk Assessment
• To understand the chances of losing …
• To understand the impact if we lost it
• With the assessment, we determine if
• we can afford to do nothing and accept the risk or
• we need to mitigate the risk to reduce the chances of losing…
#ISSLearningDay2018
What do we do to mitigate the risk?
If we cannot accept the risk
#ISSLearningDay2018
Design & implement Security Control
What is Security Control?
• Similar to finance, when they separate doer and checker,
they put in place – internal control.
• Security controls are safeguards or countermeasures to
protect your information asset (including physical for IoT)
• Example,
• Anti-virus software in our computer is a security control protect
our information against compromise by malware.
#ISSLearningDay2018
What does IT/cybersecurity
team needs to do?
#ISSLearningDay2018
(1) Break down ecosystem into
components
#ISSLearningDay2018
Source: http://linuxgizmos.com/intel-extends-its-internet-of-things-ecosystem/
(1) Break down ecosystem into domains
• IoT asset (IoT physical and software aspect)
• Communication and network (between IoT and
mothership)
• Identity and access management (mutually between IoT
and mothership)
• Operation security
#ISSLearningDay2018
(2) Assess risk & design security controls
#ISSLearningDay2018
mothership
Asset – physical &
software
Communication & Network
Identity & Access
Operation security
In summary, ask the right questions
1. What are we afraid of losing? What do we want? …
a) Privacy
b) Safety
c) Resilience
d) Confidentiality
e) Authentication
f) Integrity
2. Could you (IT/cybersecurity) help to assess the risks of
losing …?
3. Could you recommend security controls to protect …?
#ISSLearningDay2018

More Related Content

What's hot

Blockchain + Big Data + AI + IoT Integration
Blockchain + Big Data + AI + IoT IntegrationBlockchain + Big Data + AI + IoT Integration
Blockchain + Big Data + AI + IoT Integration
Alex G. Lee, Ph.D. Esq. CLP
 

What's hot (20)

2018 Big Data Trends: Liberate, Integrate, and Trust Your Data
2018 Big Data Trends: Liberate, Integrate, and Trust Your Data2018 Big Data Trends: Liberate, Integrate, and Trust Your Data
2018 Big Data Trends: Liberate, Integrate, and Trust Your Data
 
AXA x DSSG Meetup Sharing (Feb 2016)
AXA x DSSG Meetup Sharing (Feb 2016)AXA x DSSG Meetup Sharing (Feb 2016)
AXA x DSSG Meetup Sharing (Feb 2016)
 
Responsible AI
Responsible AIResponsible AI
Responsible AI
 
Top 6 Upcoming Big Data Trends of 2018!
Top 6 Upcoming Big Data Trends of 2018!Top 6 Upcoming Big Data Trends of 2018!
Top 6 Upcoming Big Data Trends of 2018!
 
Introduction to AI with Business Use Cases
Introduction to AI with Business Use CasesIntroduction to AI with Business Use Cases
Introduction to AI with Business Use Cases
 
The Engine Behind 'Discovery': Elasticsearch Service @ CreatorIQ
The Engine Behind 'Discovery': Elasticsearch Service @ CreatorIQThe Engine Behind 'Discovery': Elasticsearch Service @ CreatorIQ
The Engine Behind 'Discovery': Elasticsearch Service @ CreatorIQ
 
11/4 Top 5 Deep Learning Stories
11/4 Top 5 Deep Learning Stories11/4 Top 5 Deep Learning Stories
11/4 Top 5 Deep Learning Stories
 
Top 5 Deep Learning and AI Stories 2/10
Top 5 Deep Learning and AI Stories 2/10Top 5 Deep Learning and AI Stories 2/10
Top 5 Deep Learning and AI Stories 2/10
 
[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditing[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditing
 
Cool Infographics: what venture capitalists tell us about Homeland Security
Cool Infographics: what venture capitalists tell us about Homeland SecurityCool Infographics: what venture capitalists tell us about Homeland Security
Cool Infographics: what venture capitalists tell us about Homeland Security
 
Turn Data to Gold using Data Science and IoT
Turn Data to Gold using Data Science and IoTTurn Data to Gold using Data Science and IoT
Turn Data to Gold using Data Science and IoT
 
Towards a Digital teammate to support sensemaking in Cyber Security teams
Towards a Digital teammate to support sensemaking in Cyber Security teamsTowards a Digital teammate to support sensemaking in Cyber Security teams
Towards a Digital teammate to support sensemaking in Cyber Security teams
 
Ai in compliance
Ai in compliance Ai in compliance
Ai in compliance
 
Top 5 Deep Learning Stories 2/24
Top 5 Deep Learning Stories 2/24Top 5 Deep Learning Stories 2/24
Top 5 Deep Learning Stories 2/24
 
Blockchain + Big Data + AI + IoT Integration
Blockchain + Big Data + AI + IoT IntegrationBlockchain + Big Data + AI + IoT Integration
Blockchain + Big Data + AI + IoT Integration
 
Future of IT
Future of ITFuture of IT
Future of IT
 
AI & Machine Learning - Webinar Deck
AI & Machine Learning - Webinar DeckAI & Machine Learning - Webinar Deck
AI & Machine Learning - Webinar Deck
 
Top 5 Deep Learning and AI Stories - April 20, 2018
Top 5 Deep Learning and AI Stories - April 20, 2018Top 5 Deep Learning and AI Stories - April 20, 2018
Top 5 Deep Learning and AI Stories - April 20, 2018
 
Understanding Human Mobility
Understanding Human MobilityUnderstanding Human Mobility
Understanding Human Mobility
 
Jen Q. Public: How analytics is impacting government, education and public sa...
Jen Q. Public: How analytics is impacting government, education and public sa...Jen Q. Public: How analytics is impacting government, education and public sa...
Jen Q. Public: How analytics is impacting government, education and public sa...
 

Similar to NUS-ISS Learning Day 2018-Leading conversation in IoT security

Intel and the Internet of Things
Intel and the Internet of ThingsIntel and the Internet of Things
Intel and the Internet of Things
Daren Dunkel
 

Similar to NUS-ISS Learning Day 2018-Leading conversation in IoT security (20)

Scottish Government Ministerial Summit December 2013 Emerging issues for E-Sa...
Scottish Government Ministerial Summit December 2013 Emerging issues for E-Sa...Scottish Government Ministerial Summit December 2013 Emerging issues for E-Sa...
Scottish Government Ministerial Summit December 2013 Emerging issues for E-Sa...
 
The 4 Eyes of Information Security - AiS 2019
The 4 Eyes of Information Security - AiS 2019The 4 Eyes of Information Security - AiS 2019
The 4 Eyes of Information Security - AiS 2019
 
Intel and the Internet of Things
Intel and the Internet of ThingsIntel and the Internet of Things
Intel and the Internet of Things
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
Artificial Intelligence.pptx
Artificial Intelligence.pptxArtificial Intelligence.pptx
Artificial Intelligence.pptx
 
Big Data and Information Security
Big Data and Information SecurityBig Data and Information Security
Big Data and Information Security
 
Is the SOC working as a viable business model (or security model)?
Is the SOC working as a viable business model (or security model)?Is the SOC working as a viable business model (or security model)?
Is the SOC working as a viable business model (or security model)?
 
Security Transformation
Security TransformationSecurity Transformation
Security Transformation
 
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iotIo t business-index-2020-securing-iot
Io t business-index-2020-securing-iot
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
AMW_RAT_2022-04-28 (2).pptx
AMW_RAT_2022-04-28 (2).pptxAMW_RAT_2022-04-28 (2).pptx
AMW_RAT_2022-04-28 (2).pptx
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
Digital Age-Preparing Yourself
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourself
 
GITA March 2015 Newsletter
GITA March 2015 NewsletterGITA March 2015 Newsletter
GITA March 2015 Newsletter
 
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...
 

More from NUS-ISS

More from NUS-ISS (20)

Designing Impactful Services and User Experience - Lim Wee Khee
Designing Impactful Services and User Experience - Lim Wee KheeDesigning Impactful Services and User Experience - Lim Wee Khee
Designing Impactful Services and User Experience - Lim Wee Khee
 
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
 
How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
 
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
 
Understanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix Goh
 
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeDigital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
 
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
 
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
 
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnSupply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
 
Future of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdfFuture of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdf
 
Future of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan MengFuture of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan Meng
 
Site Reliability Engineer (SRE), We Keep The Lights On 24/7
Site Reliability Engineer (SRE), We Keep The Lights On 24/7Site Reliability Engineer (SRE), We Keep The Lights On 24/7
Site Reliability Engineer (SRE), We Keep The Lights On 24/7
 
Product Management in The Trenches for a Cloud Service
Product Management in The Trenches for a Cloud ServiceProduct Management in The Trenches for a Cloud Service
Product Management in The Trenches for a Cloud Service
 
Overview of Data and Analytics Essentials and Foundations
Overview of Data and Analytics Essentials and FoundationsOverview of Data and Analytics Essentials and Foundations
Overview of Data and Analytics Essentials and Foundations
 
Predictive Analytics
Predictive AnalyticsPredictive Analytics
Predictive Analytics
 
Feature Engineering for IoT
Feature Engineering for IoTFeature Engineering for IoT
Feature Engineering for IoT
 
Master of Technology in Software Engineering
Master of Technology in Software EngineeringMaster of Technology in Software Engineering
Master of Technology in Software Engineering
 
Master of Technology in Enterprise Business Analytics
Master of Technology in Enterprise Business AnalyticsMaster of Technology in Enterprise Business Analytics
Master of Technology in Enterprise Business Analytics
 
Diagnosing Complex Problems Using System Archetypes
Diagnosing Complex Problems Using System ArchetypesDiagnosing Complex Problems Using System Archetypes
Diagnosing Complex Problems Using System Archetypes
 

Recently uploaded

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

NUS-ISS Learning Day 2018-Leading conversation in IoT security