SlideShare a Scribd company logo
1 of 52
Download to read offline
IoT securityand privacy:
main challenges and
how ISOC-OTA address them
Radouane Mrabet
Emeritus Professor - Mohammed V University - Rabat
President of the Internet Society Morocco Chapter
The 6th International Conference on Multimedia Computing and
Systems Rabat, 10-12 May 2018
2
4 priorities of
the Internet
Society
(ISOC)
2018 action
plan
A. Securing the Internet of Things
B. Strengthening the Global Routing
System (MANRS: Mutually Agreed
Norms for Routing Security)
C. Innovate to connect the world
(community networks)
D. Promoting concerted governance
(multiparty consultation model)
3
Securing the
Internet of
Things
Internet Society (ISOC) aims are:
 make security an integrated function of
connected objects and encourages IoT device
and service providers for consumers to
adopt the Online Trust Alliance (OTA)
security and privacy principles ;
 increase the consumer demand for security
and privacy in the IoT devices they
purchase;
 create government policies and regulations
that promote better security and privacy
features in IoT devices.
4
Online Trust Alliance is an initiative of
the Internet Society;
Online Trust Alliance's mission is to:
 improve online trust, user empowerment
and innovation by organizing multi-
stakeholder initiatives,
 develop and advance best practices and
tools to enhance security protection,
confidentiality and the identity of the
users.
5
6
IoT Security & Privacy Trust
Framework v2.5
Updated October 14, 2017
7
Smart Alarm Clock
Wi-Fi VideoCamera
Smart plug that
tracks air quality
Wireless blood
pressure monitor
Toys for kids
Fitness tracker
Connected coffee machine
Sensing cooker
Source : http://iotlist.co/
8
Internet of
Things
9
The term "Internet of Things" refers
to scenarios in which network
connectivity and computing capacity
extend to objects, sensors, and
everyday objects that are not normally
considered computers, allowing these
devices to generate, exchange, and
consume data with minimal human
intervention.
10
IoT: Many
opportunities
and some
challenges
The open nature of the Internet
creates the opportunity to connect
devices on a scale that is transforming
the way we interact with our
environment and transforming our
society.
The Internet of Things (IoT) has
enormous potential to change our
world in a positive way.
But ...
11
Insufficient IoT security whose impact
is already being felt:
Attacks on devices, applications and
services, as well as the compromise of
sensitive data, not only threaten the
security of users of connected devices, but
also all other users.
IoT: Many
opportunities
and some
challenges
12
Compromised IoT devices can be used
to form botnets and attack other
networks, other users, and the
Internet infrastructure.
In 2016, a compromised IoT device
network performed a distributed
denial of service attack against Dyn, a
DNS service provider, causing many
websites and online services to be
unavailable in some parts of the
world.
Example:
DDoSAttack
on Dyn
13
Source :
https://www.internetsociety.org/blog/2016/10/trust-isnt-easy-drawing-an-agenda-from-fridays-ddos-attack-and-the-internet-of-things/7/
14
Source:
2017 GlobalThreat
Intelligence Report
15
What are the
challenges?
1. The economy promotes weak security;
2. Security is difficult, especially for new
businesses;
3. IoT systems are complex and each part must
be secure;
4. The security support is not always
maintained;
5. The consumer's knowledge of IoT security is
weak;
6. Security incidents can be difficult to detect or
resolve for users;
7. Existing legal liability mechanisms may not
be clear.
16
1.
The economy
promotes
weak security
Competitive pressures for shorter time
to market and cheaper products are
driving many IoT system designers
and manufacturers to spend less time
and resources on security;
Strong security is expensive and
lengthens the time to bring a product
to market.
17
1.
The economy
promotes
weak security
 There is no credible way for
suppliers to report their level of
security to consumers, for example:
trusted labels, certifications, ...
 Difficult for consumers to easily compare the
security of different IoT systems;
 Reduction of consumer pressure on suppliers
 Security can not be a competitive
differentiator.
18
19
20
2.
Security is
difficult,
especially for
new
businesses
 Implementing enhanced security in IoT
systems requires expertise;
 New players in the IoT ecosystem may
have little or no experience with
Internet security.
 Example: A manufacturer may know how to
make a refrigerator safe for its initial use
(electrical wiring, chemicals), but may not
understand Internet security.
21
3.
The IoT
systems are
complex and
each part
must be
secure
 The security of a system depends on
the weakest link;
 In IoT systems, different parts may
be under the control of different
actors, which makes cooperation
difficult to solve IoT security
problems:
 Complex supply chains make security
assessments difficult;
 Often, IoT systems are managed and / or
controlled by cloud services.
22
4.
The security
support is not
always
maintained
 IoT devices, applications, and services
require security patches and updates
to protect against known
vulnerabilities;
 Support for IoT systems is an
expensive task for IoT service
providers.
23
5.
Consumer
awareness of
IoT security is
low
Typically, consumers have limited
knowledge of IoT security, which
impacts their ability to effectively
integrate security into their
purchasing habits or to configure and
maintain the security of their IoT
systems.
24
6.
Security
incidents can
be difficult to
detect or
resolve for
users
 In many cases, the effects of a poorly
secured product or service will not be
obvious to the user.
 Example : a refrigerator can continue to do a
good job, even if it has been compromised and
is part of a botnet performing DDoS attacks).
 Consumers generally do not have the
technical ability or user interfaces to
implement patches.
 Users are contractually prevented from
updating or repairing the systems
themselves or having them repaired by
independent specialists.
25
7.
Existing legal
liability
mechanisms
may not be
clear
 Liability for damage caused by
inadequate safety of IoT can be
difficult to determine.
 Uncertainty among victims when seeking
to assign liability or to obtain
compensation for harm.
 Clear accountability encourages
suppliers to enhance security, but in
the absence of strict liability regimes, it
is ultimately users who pay the price
for security breaches.
26
With the development of connected
objects, users entrust de facto part of their
privacy to improve their environment and
make their living environment more
efficient or safer.
Personal data?
27
Risks to the
person and his
personal data
-
Examples
Hacked surveillance camera lets you
know if owners are away or not from
their home;
Smart electricity meter: the meter can
quickly become a "spy" if you are not
careful.
 A load curve (consumption hour by hour) allows to
know if someone is in the house?
28
29
30
Founded in 2007 as a trade and
industry organization
More than 65 members (DigiCert,
Symantec, Verisign, Microsoft,
Twitter, Coles, …)
Internet Society and OTA merged in
April 2017 and OTA members became
members of ISOC
31
What to do knowing that there are
more than 40 different organizations
working in the IoT industry?
OTA has decided to adopt a broad
multi-stakeholder approach to assess
IoT risks and address the security,
privacy and sustainability of the IoT
products and services lifecycle.
32
Creation in January 2015 of a working
group called "IoT Trustworthy
Working Group (ITWG)" whose
mission was to develop "IoT Security
& Privacy Trust Framework"
First version: March 2016
33
IoT Security & Privacy Trust
Framework v2.5
Updated October 14, 2017
34
IoTSecurity &
PrivacyTrust
Framework
v2.5
It includes a set of strategic principles
necessary to secure IoT devices and their
data throughout their life cycle.
Through a multi-stakeholder process
driven by consensus, criteria have been
identified for the connected home, office
and wearables.
The trust framework emphasizes the
need to provide product information
prior to purchase.
35
IoTSecurity &
PrivacyTrust
Framework
v2.5
It articulates policies regarding the
collection, use and sharing of data, as
well as the terms and conditions of the
security patches - including and
especially after the end of warranty
support.
Finally, the framework provides guidance
to manufacturers to improve the
transparency and communication of the
ability of devices to be updated as well as
issues related to data privacy.
36
IoTSecurity &
PrivacyTrust
Framework
v2.5
40 principles in 4 key areas to secure
IoT devices and their data:
1. Security Principles (1-12)
2. User Access and Credentials (13-17)
3. Confidentiality, Disclosure and
Transparency (18-33)
4. Notices and Recommended Practices
(34-40)
37
IoTSecurity &
PrivacyTrust
Framework
v2.5
Security Principles (1-12) -
Applicable to any device or sensor and
all cloud applications and services.
This ensures that devices use default
cryptographic protocols, and only open
physical and virtual ports and services
are required.
This includes penetration testing and
vulnerability reporting programs.
Other principles emphasize the need
for security patches throughout the life
cycle.
38
IoTSecurity &
PrivacyTrust
Framework
v2.5
User Access and Credentials (13-
17) –
Requires encryption of all passwords
and usernames, password reset process
implementation, strong authentication,
integration of mechanisms to prevent
login attempts.
39
IoTSecurity &
PrivacyTrust
Framework
v2.5
Confidentiality, Disclosure and
Transparency (18-33) –
Requirements in accordance with generally
accepted principles of confidentiality,
including significant disclosures about
packaging, point of sale and / or uploads,
ability for users to reset devices to factory
settings and compliance with applicable
regulatory requirements, including EU
GDPR and child privacy regulations.
Also deals with disclosures about the impact
on product functionality if connectivity is
disabled.
40
IoTSecurity &
PrivacyTrust
Framework
v2.5
Notifications and Recommended
Practices (34-40) –
It includes mechanisms and processes
to quickly inform a user of the threats
and actions required in the event of
security concerns.
The principles include email
authentication for security notifications
and that messages must be clearly
communicated to users regardless of
their grade level.
41
42
43
44
45
Released
April 17, 2018
46
47
Moroccan
Law 09-08 on
the protection
of individuals
with regard to
the processing
of personal
data
Article 3: Data quality:
Personal data must be:
a) treated fairly and lawfully;
b) collected for specified and legitimate
purposes, and not to be further processed in a
manner incompatible with the purposes;
c) adequate, relevant and not excessive in
relation to the purposes for which they are
collected and for which they are further
processed;
48
Moroccan
Law 09-08 on
the protection
of individuals
with regard to
the processing
of personal
data
Article 3: Data quality:
Personal data must be:
d) exact and, if necessary, updated. All reasonable
measures must be taken to ensure that
inaccurate or incomplete data, with regard to
the purposes for which they are collected and
for which they are subsequently processed, are
erased or rectified;
e) preserved in, a form permitting the
identification of the persons concerned for a
period not exceeding that necessary to achieve
the purposes for which they are collected and
for which they are subsequently processed.
49
Moroccan
Law 09-08 on
the protection
of individuals
with regard to
the processing
of personal
data
Person’s rights:
 Expressing consent (Article 4)
 Be informed when collecting data (Article 5)
 Exercise your right of access (Article 7)
 Exercise the right of rectification (Article 8)
 Exercising the right of opposition (Article 9)
50
Moroccan
Law 09-08 on
the protection
of individuals
with regard to
the processing
of personal
data
Obligation of the treatment
responsible:
 Respect the purpose of the treatment
 Respect the principle of proportionality
 Ensuring the quality of the data
 Ensure that the data retention period is
maintained
 Ensure the exercise of the rights of the data
subject
 Ensuring the safety and confidentiality of
treatments (Articles 23 to 26)
51
Conclusion
IoT security is a global challenge
requiring global collaboration. The
Governments, industry and civil society
need to work collectively and take
actions to secure consumer IoT products
and associated services at every stage of
their lifecycle.
Radouane Mrabet
Emeritus Professor at Mohammed V University of Rabat
President of the Internet Society Morocco Chapter - MISOC
The 6th International Conference on Multimedia Computing and
Systems Rabat, 10-12 May 2018
Thank you
ⵜⴰⵏⵎⵎⵉⵜ

More Related Content

What's hot

IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITYThe Avi Sharma
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoTVasco Veloso
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTgr9293
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT SecuritySHAAMILIVARSAGV
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)Amarjeetsingh Thakur
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsDr. Mazlan Abbas
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 

What's hot (20)

IOT Security
IOT SecurityIOT Security
IOT Security
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT Security
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Iot
IotIot
Iot
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Simple Internet Of Things (IoT) PPT 2020
Simple Internet Of Things (IoT) PPT 2020 Simple Internet Of Things (IoT) PPT 2020
Simple Internet Of Things (IoT) PPT 2020
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Internet Of Things
 Internet Of Things Internet Of Things
Internet Of Things
 

Similar to IoT security and privacy: main challenges and how ISOC-OTA address them

Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts#essaywriting
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyEricsson
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsIRJET Journal
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsIRJET Journal
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfSeasiaInfotech2
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of ThingsCognizant
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsBob Marcus
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOThe Economist Media Businesses
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...cyberprosocial
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTvishal dineshkumar soni
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDr. Raghavendra GS
 

Similar to IoT security and privacy: main challenges and how ISOC-OTA address them (20)

Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked Society
 
sample assignment
sample assignmentsample assignment
sample assignment
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdf
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical Systems
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of things
 

More from Radouane Mrabet

Internet des objets : quels défis pour la protection des données personnelles ?
Internet des objets : quels défis pour la protection des données personnelles ?Internet des objets : quels défis pour la protection des données personnelles ?
Internet des objets : quels défis pour la protection des données personnelles ?Radouane Mrabet
 
CV longue version Radouane Mrabet
CV longue version Radouane MrabetCV longue version Radouane Mrabet
CV longue version Radouane MrabetRadouane Mrabet
 
CV courte version Radouane Mrabet
CV courte version Radouane MrabetCV courte version Radouane Mrabet
CV courte version Radouane MrabetRadouane Mrabet
 
CV Radouane Mrabet in English
CV Radouane Mrabet in EnglishCV Radouane Mrabet in English
CV Radouane Mrabet in EnglishRadouane Mrabet
 
CV Radouane Mrabet en Arabe السيرة الذاتية رضوان مرابط
CV Radouane Mrabet en Arabe السيرة الذاتية رضوان مرابط CV Radouane Mrabet en Arabe السيرة الذاتية رضوان مرابط
CV Radouane Mrabet en Arabe السيرة الذاتية رضوان مرابط Radouane Mrabet
 
Research issues in IoT for education
Research issues in IoT for educationResearch issues in IoT for education
Research issues in IoT for educationRadouane Mrabet
 
Références bibliographiques
Références bibliographiquesRéférences bibliographiques
Références bibliographiquesRadouane Mrabet
 
Ch4 4 privacy_doctrine_cndp
Ch4 4 privacy_doctrine_cndpCh4 4 privacy_doctrine_cndp
Ch4 4 privacy_doctrine_cndpRadouane Mrabet
 
Ch4 3 privacy_legislation_maroc
Ch4 3 privacy_legislation_marocCh4 3 privacy_legislation_maroc
Ch4 3 privacy_legislation_marocRadouane Mrabet
 
Ch3 4 cybercriminalite_gci
Ch3 4 cybercriminalite_gciCh3 4 cybercriminalite_gci
Ch3 4 cybercriminalite_gciRadouane Mrabet
 
Ch3 3 cybercriminalite_droit_maroc
Ch3 3 cybercriminalite_droit_marocCh3 3 cybercriminalite_droit_maroc
Ch3 3 cybercriminalite_droit_marocRadouane Mrabet
 
Ch3 2 cybercriminalite_conv_budapest
Ch3 2 cybercriminalite_conv_budapestCh3 2 cybercriminalite_conv_budapest
Ch3 2 cybercriminalite_conv_budapestRadouane Mrabet
 
Ch3 1 cybercriminalite_intro
Ch3 1 cybercriminalite_introCh3 1 cybercriminalite_intro
Ch3 1 cybercriminalite_introRadouane Mrabet
 
Ch2 reglementation cryptographie
Ch2 reglementation cryptographieCh2 reglementation cryptographie
Ch2 reglementation cryptographieRadouane Mrabet
 

More from Radouane Mrabet (17)

Internet des objets : quels défis pour la protection des données personnelles ?
Internet des objets : quels défis pour la protection des données personnelles ?Internet des objets : quels défis pour la protection des données personnelles ?
Internet des objets : quels défis pour la protection des données personnelles ?
 
CV longue version Radouane Mrabet
CV longue version Radouane MrabetCV longue version Radouane Mrabet
CV longue version Radouane Mrabet
 
CV courte version Radouane Mrabet
CV courte version Radouane MrabetCV courte version Radouane Mrabet
CV courte version Radouane Mrabet
 
CV Radouane Mrabet in English
CV Radouane Mrabet in EnglishCV Radouane Mrabet in English
CV Radouane Mrabet in English
 
CV Radouane Mrabet en Arabe السيرة الذاتية رضوان مرابط
CV Radouane Mrabet en Arabe السيرة الذاتية رضوان مرابط CV Radouane Mrabet en Arabe السيرة الذاتية رضوان مرابط
CV Radouane Mrabet en Arabe السيرة الذاتية رضوان مرابط
 
Research issues in IoT for education
Research issues in IoT for educationResearch issues in IoT for education
Research issues in IoT for education
 
Références bibliographiques
Références bibliographiquesRéférences bibliographiques
Références bibliographiques
 
Ch4 4 privacy_doctrine_cndp
Ch4 4 privacy_doctrine_cndpCh4 4 privacy_doctrine_cndp
Ch4 4 privacy_doctrine_cndp
 
Ch4 3 privacy_legislation_maroc
Ch4 3 privacy_legislation_marocCh4 3 privacy_legislation_maroc
Ch4 3 privacy_legislation_maroc
 
Ch4 2 privacy_traite108
Ch4 2 privacy_traite108Ch4 2 privacy_traite108
Ch4 2 privacy_traite108
 
Ch4 1 privacy_intro
Ch4 1 privacy_introCh4 1 privacy_intro
Ch4 1 privacy_intro
 
Ch3 4 cybercriminalite_gci
Ch3 4 cybercriminalite_gciCh3 4 cybercriminalite_gci
Ch3 4 cybercriminalite_gci
 
Ch3 3 cybercriminalite_droit_maroc
Ch3 3 cybercriminalite_droit_marocCh3 3 cybercriminalite_droit_maroc
Ch3 3 cybercriminalite_droit_maroc
 
Ch3 2 cybercriminalite_conv_budapest
Ch3 2 cybercriminalite_conv_budapestCh3 2 cybercriminalite_conv_budapest
Ch3 2 cybercriminalite_conv_budapest
 
Ch3 1 cybercriminalite_intro
Ch3 1 cybercriminalite_introCh3 1 cybercriminalite_intro
Ch3 1 cybercriminalite_intro
 
Ch2 reglementation cryptographie
Ch2 reglementation cryptographieCh2 reglementation cryptographie
Ch2 reglementation cryptographie
 
Ch1 droit marocain
Ch1 droit marocainCh1 droit marocain
Ch1 droit marocain
 

Recently uploaded

定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfMilind Agarwal
 

Recently uploaded (20)

定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
 

IoT security and privacy: main challenges and how ISOC-OTA address them

  • 1. IoT securityand privacy: main challenges and how ISOC-OTA address them Radouane Mrabet Emeritus Professor - Mohammed V University - Rabat President of the Internet Society Morocco Chapter The 6th International Conference on Multimedia Computing and Systems Rabat, 10-12 May 2018
  • 2. 2 4 priorities of the Internet Society (ISOC) 2018 action plan A. Securing the Internet of Things B. Strengthening the Global Routing System (MANRS: Mutually Agreed Norms for Routing Security) C. Innovate to connect the world (community networks) D. Promoting concerted governance (multiparty consultation model)
  • 3. 3 Securing the Internet of Things Internet Society (ISOC) aims are:  make security an integrated function of connected objects and encourages IoT device and service providers for consumers to adopt the Online Trust Alliance (OTA) security and privacy principles ;  increase the consumer demand for security and privacy in the IoT devices they purchase;  create government policies and regulations that promote better security and privacy features in IoT devices.
  • 4. 4 Online Trust Alliance is an initiative of the Internet Society; Online Trust Alliance's mission is to:  improve online trust, user empowerment and innovation by organizing multi- stakeholder initiatives,  develop and advance best practices and tools to enhance security protection, confidentiality and the identity of the users.
  • 5. 5
  • 6. 6 IoT Security & Privacy Trust Framework v2.5 Updated October 14, 2017
  • 7. 7 Smart Alarm Clock Wi-Fi VideoCamera Smart plug that tracks air quality Wireless blood pressure monitor Toys for kids Fitness tracker Connected coffee machine Sensing cooker Source : http://iotlist.co/
  • 9. 9 The term "Internet of Things" refers to scenarios in which network connectivity and computing capacity extend to objects, sensors, and everyday objects that are not normally considered computers, allowing these devices to generate, exchange, and consume data with minimal human intervention.
  • 10. 10 IoT: Many opportunities and some challenges The open nature of the Internet creates the opportunity to connect devices on a scale that is transforming the way we interact with our environment and transforming our society. The Internet of Things (IoT) has enormous potential to change our world in a positive way. But ...
  • 11. 11 Insufficient IoT security whose impact is already being felt: Attacks on devices, applications and services, as well as the compromise of sensitive data, not only threaten the security of users of connected devices, but also all other users. IoT: Many opportunities and some challenges
  • 12. 12 Compromised IoT devices can be used to form botnets and attack other networks, other users, and the Internet infrastructure. In 2016, a compromised IoT device network performed a distributed denial of service attack against Dyn, a DNS service provider, causing many websites and online services to be unavailable in some parts of the world. Example: DDoSAttack on Dyn
  • 15. 15 What are the challenges? 1. The economy promotes weak security; 2. Security is difficult, especially for new businesses; 3. IoT systems are complex and each part must be secure; 4. The security support is not always maintained; 5. The consumer's knowledge of IoT security is weak; 6. Security incidents can be difficult to detect or resolve for users; 7. Existing legal liability mechanisms may not be clear.
  • 16. 16 1. The economy promotes weak security Competitive pressures for shorter time to market and cheaper products are driving many IoT system designers and manufacturers to spend less time and resources on security; Strong security is expensive and lengthens the time to bring a product to market.
  • 17. 17 1. The economy promotes weak security  There is no credible way for suppliers to report their level of security to consumers, for example: trusted labels, certifications, ...  Difficult for consumers to easily compare the security of different IoT systems;  Reduction of consumer pressure on suppliers  Security can not be a competitive differentiator.
  • 18. 18
  • 19. 19
  • 20. 20 2. Security is difficult, especially for new businesses  Implementing enhanced security in IoT systems requires expertise;  New players in the IoT ecosystem may have little or no experience with Internet security.  Example: A manufacturer may know how to make a refrigerator safe for its initial use (electrical wiring, chemicals), but may not understand Internet security.
  • 21. 21 3. The IoT systems are complex and each part must be secure  The security of a system depends on the weakest link;  In IoT systems, different parts may be under the control of different actors, which makes cooperation difficult to solve IoT security problems:  Complex supply chains make security assessments difficult;  Often, IoT systems are managed and / or controlled by cloud services.
  • 22. 22 4. The security support is not always maintained  IoT devices, applications, and services require security patches and updates to protect against known vulnerabilities;  Support for IoT systems is an expensive task for IoT service providers.
  • 23. 23 5. Consumer awareness of IoT security is low Typically, consumers have limited knowledge of IoT security, which impacts their ability to effectively integrate security into their purchasing habits or to configure and maintain the security of their IoT systems.
  • 24. 24 6. Security incidents can be difficult to detect or resolve for users  In many cases, the effects of a poorly secured product or service will not be obvious to the user.  Example : a refrigerator can continue to do a good job, even if it has been compromised and is part of a botnet performing DDoS attacks).  Consumers generally do not have the technical ability or user interfaces to implement patches.  Users are contractually prevented from updating or repairing the systems themselves or having them repaired by independent specialists.
  • 25. 25 7. Existing legal liability mechanisms may not be clear  Liability for damage caused by inadequate safety of IoT can be difficult to determine.  Uncertainty among victims when seeking to assign liability or to obtain compensation for harm.  Clear accountability encourages suppliers to enhance security, but in the absence of strict liability regimes, it is ultimately users who pay the price for security breaches.
  • 26. 26 With the development of connected objects, users entrust de facto part of their privacy to improve their environment and make their living environment more efficient or safer. Personal data?
  • 27. 27 Risks to the person and his personal data - Examples Hacked surveillance camera lets you know if owners are away or not from their home; Smart electricity meter: the meter can quickly become a "spy" if you are not careful.  A load curve (consumption hour by hour) allows to know if someone is in the house?
  • 28. 28
  • 29. 29
  • 30. 30 Founded in 2007 as a trade and industry organization More than 65 members (DigiCert, Symantec, Verisign, Microsoft, Twitter, Coles, …) Internet Society and OTA merged in April 2017 and OTA members became members of ISOC
  • 31. 31 What to do knowing that there are more than 40 different organizations working in the IoT industry? OTA has decided to adopt a broad multi-stakeholder approach to assess IoT risks and address the security, privacy and sustainability of the IoT products and services lifecycle.
  • 32. 32 Creation in January 2015 of a working group called "IoT Trustworthy Working Group (ITWG)" whose mission was to develop "IoT Security & Privacy Trust Framework" First version: March 2016
  • 33. 33 IoT Security & Privacy Trust Framework v2.5 Updated October 14, 2017
  • 34. 34 IoTSecurity & PrivacyTrust Framework v2.5 It includes a set of strategic principles necessary to secure IoT devices and their data throughout their life cycle. Through a multi-stakeholder process driven by consensus, criteria have been identified for the connected home, office and wearables. The trust framework emphasizes the need to provide product information prior to purchase.
  • 35. 35 IoTSecurity & PrivacyTrust Framework v2.5 It articulates policies regarding the collection, use and sharing of data, as well as the terms and conditions of the security patches - including and especially after the end of warranty support. Finally, the framework provides guidance to manufacturers to improve the transparency and communication of the ability of devices to be updated as well as issues related to data privacy.
  • 36. 36 IoTSecurity & PrivacyTrust Framework v2.5 40 principles in 4 key areas to secure IoT devices and their data: 1. Security Principles (1-12) 2. User Access and Credentials (13-17) 3. Confidentiality, Disclosure and Transparency (18-33) 4. Notices and Recommended Practices (34-40)
  • 37. 37 IoTSecurity & PrivacyTrust Framework v2.5 Security Principles (1-12) - Applicable to any device or sensor and all cloud applications and services. This ensures that devices use default cryptographic protocols, and only open physical and virtual ports and services are required. This includes penetration testing and vulnerability reporting programs. Other principles emphasize the need for security patches throughout the life cycle.
  • 38. 38 IoTSecurity & PrivacyTrust Framework v2.5 User Access and Credentials (13- 17) – Requires encryption of all passwords and usernames, password reset process implementation, strong authentication, integration of mechanisms to prevent login attempts.
  • 39. 39 IoTSecurity & PrivacyTrust Framework v2.5 Confidentiality, Disclosure and Transparency (18-33) – Requirements in accordance with generally accepted principles of confidentiality, including significant disclosures about packaging, point of sale and / or uploads, ability for users to reset devices to factory settings and compliance with applicable regulatory requirements, including EU GDPR and child privacy regulations. Also deals with disclosures about the impact on product functionality if connectivity is disabled.
  • 40. 40 IoTSecurity & PrivacyTrust Framework v2.5 Notifications and Recommended Practices (34-40) – It includes mechanisms and processes to quickly inform a user of the threats and actions required in the event of security concerns. The principles include email authentication for security notifications and that messages must be clearly communicated to users regardless of their grade level.
  • 41. 41
  • 42. 42
  • 43. 43
  • 44. 44
  • 46. 46
  • 47. 47 Moroccan Law 09-08 on the protection of individuals with regard to the processing of personal data Article 3: Data quality: Personal data must be: a) treated fairly and lawfully; b) collected for specified and legitimate purposes, and not to be further processed in a manner incompatible with the purposes; c) adequate, relevant and not excessive in relation to the purposes for which they are collected and for which they are further processed;
  • 48. 48 Moroccan Law 09-08 on the protection of individuals with regard to the processing of personal data Article 3: Data quality: Personal data must be: d) exact and, if necessary, updated. All reasonable measures must be taken to ensure that inaccurate or incomplete data, with regard to the purposes for which they are collected and for which they are subsequently processed, are erased or rectified; e) preserved in, a form permitting the identification of the persons concerned for a period not exceeding that necessary to achieve the purposes for which they are collected and for which they are subsequently processed.
  • 49. 49 Moroccan Law 09-08 on the protection of individuals with regard to the processing of personal data Person’s rights:  Expressing consent (Article 4)  Be informed when collecting data (Article 5)  Exercise your right of access (Article 7)  Exercise the right of rectification (Article 8)  Exercising the right of opposition (Article 9)
  • 50. 50 Moroccan Law 09-08 on the protection of individuals with regard to the processing of personal data Obligation of the treatment responsible:  Respect the purpose of the treatment  Respect the principle of proportionality  Ensuring the quality of the data  Ensure that the data retention period is maintained  Ensure the exercise of the rights of the data subject  Ensuring the safety and confidentiality of treatments (Articles 23 to 26)
  • 51. 51 Conclusion IoT security is a global challenge requiring global collaboration. The Governments, industry and civil society need to work collectively and take actions to secure consumer IoT products and associated services at every stage of their lifecycle.
  • 52. Radouane Mrabet Emeritus Professor at Mohammed V University of Rabat President of the Internet Society Morocco Chapter - MISOC The 6th International Conference on Multimedia Computing and Systems Rabat, 10-12 May 2018 Thank you ⵜⴰⵏⵎⵎⵉⵜ