SlideShare a Scribd company logo
1 of 34
Download to read offline
COUNTERING CYBERSECURITY RISK
in today’s IoT world
Brad Nicholas
Anajali Gurnani
Brett Heliker
THE RIGHT SECURITY FRAMEWORK
We cannot solve our problems with the same
thinking we used when we created them.
—Albert Einstein
Security controls
are shifting away
from the traditional
perimeter
Adoption of cloud
platforms and security
as a service will
continue
Where and how
data is stored is
key to evaluating
risks
ACCELERATING PROGRAM MATURITY
STARTS WITH A COMMON LANGUAGE
FOR THE PRODUCTS AND SERVICES A
COMPANY CAN BUY
ASSESS RISKS IN A STRUCTURED WAY
AND DEVELOP A ROADMAP
DEVICES
APPS
NETWORK
DATA
PEOPLE
IDENTIFY PROTECT DETECT RESPOND RECOVER
(NIST FRAMEWORK)
Pre-compromise
Post-compromise
A CULTURE OF SECURITY FACILITATES
RESPONSIBLE BUSINESS
German steel mill suffers
“massive damages” after
hackers accessed a
blast furnace that
workers could not
properly shut down
1
2
Recipient of targeted
email is tricked into
downloading malware
to their computer Attackers make their
way from corporate
network into production
networks to access
systems controlling
plant equipment
3
MAKE SECURITY A SHARED
RESPONSIBILITY
COMMUNICATE Spearhead security as a product.
Make it bold and important internally.
INNOVATE Be strategic about security
architecture and standardization.
ACCELERATE
Leverage agile practices to iterate and
improve controls implementation.
INTEGRATE Move security testing as close to the
developer as possible.
THE NEW
IOT VULNERABILITIES
a few examples
IOT ADDS THE “PHYSICAL WEB”
IoT is about the physical web of
everything around you
A whole slew of smart connected
products + services are coming
Multiple networks, all interacting
with you or on your behalf
MORE COMPLEXITY
NEW ATTACK SURFACES
COMPOUND EFFECTS
SMART PRODUCTS NEED BROADER,
NON-TRADITIONAL EXPERTISE
• Krebs & Cisco: IoT Reality: Smart Devices, Dumb Defaults
“Consider whether you can realistically care for and feed the security needs of yet another IoT thing that is:
-chewing holes in your network defenses;
-gnawing open new critical security weaknesses;
-bred by a vendor that seldom and belatedly patches;
-tough to wrangle down and patch”
• NW World: 500K WeMo users could be hacked; CERT issues advisory
“when CERT tried to contact Belkin, Belkin chose not to respond at all”
• IBM: Smart Building Security Risks
“Connected building systems fly under the Cybersecurity radar, creating a Shadow IoT”
http://www.networkworld.com/article/2226371/microsoft-subnet/500-000-belkin-wemo-users-could-be-hacked--cert-issues-advisory.html
http://krebsonsecurity.com/2016/02/iot-reality-smart-devices-dumb-defaults/
http://www.techrepublic.com/article/ibm-x-force-finds-multiple-iot-security-risks-in-smart-buildings/
WE HAVE A LONG WAY TO GO
• Hidden, hardcoded
credentials and passwords
• Credentials stored as static
text within files
• Insecure default
configurations
• Insufficient network
segmentation enabling
attacks from within
• Weak support and
nonexistent updates,
exacerbated by economics
• Some/all of the above
present in combination
IBM smart building infographic
THE CHRYSLER JEEP HACK
Lessons to be Learned
WITH MUCH THANKS TO:
Charlie Miller & Chris Valasek
White-hat Superheroes
thecavalry.org
“Modern [vehicles] are computers
on wheels and are increasingly
connected and controlled by
software.
Dependence on technology in
vehicles has grown faster than
effective means to secure it.”
MICRO-CONTROLLERS, EMBEDDED SOFTWARE AND
NETWORKING EVERYWHERE
Federally mandated “OBD” vehicle
diagnostics since 1996
Dozens of networked control
systems and millions of lines of code
“Black boxes” silently record vehicle
dynamics
“OnStar” telematics since 1996
Fleet management, and usage based
insurance are now widespread
Remote access adds MAJOR
security implications, mandating
disciplined design Graphic: Quora
CONNECTED VEHICLES
A MASSIVE OPPORTUNITY
An executive order from the White House in March 2015 called for
federal agencies with fleets of more than 20 vehicles to use
telematics systems whenever possible to improve vehicle efficiencies
E.O. section 3(g)(iii):
Collecting and utilizing as a fleet efficiency management tool, as soon
as practicable but not later than two years after the date of this order,
agency fleet operational data through deployment of vehicle
telematics at a vehicle asset level for all new passenger and light duty
vehicle acquisitions and for medium duty vehicles where appropriate
https://www.whitehouse.gov/sites/default/files/docs/eo_13693_implementing_instructions_june_10_2015.pdf
VULNERABILITIES *
* circa first half 2015
How hackable
is your car?
Most Hackable: Jeep Cherokee,
Escalade, Infiniti Q50, 2010 Prius
The Q50’s radio & adaptive controls
(adaptive cruise control and adaptive
steering) were directly connected to
engine and braking systems.
Older cars are least hackable.
Not a confidence inspiring trend..
http://illmatics.com/remote%20attack%20surfaces.pdf
RollJam
$32
Hacks keyless entry systems,
alarm systems and garage
door openers
Proven on Nissan, Cadillac, Ford,
Toyota, Lotus, Volkswagen,and
Chrysler vehicles; Cobra and
Viper alarm systems; and Genie
and Liftmaster garage door
openers.
http://www.wired.com/2015/08/hackers-tiny-device-unlocks-cars-opens-garages/
OwnStar
Any On-Star equipped GM car
could be located, unlocked
and started via the phone app
uses SSL encryption,
Kamkar says it doesn’t
properly check the certificate
http://arstechnica.com/security/2015/07/ownstar-researcher-hijacks-remote-access-to-onstar/
Progressive
‘Snapshot’
“The firmware running on the
dongle is minimal and insecure.
It does no validation or signing of
firmware updates,no secure boot, no
cellular authentication,no secure
communicationsor encryption,no data
execution prevention or attack
mitigation technologies… basically it
uses no security technologies
whatsoever.”
http://www.forbes.com/sites/thomasbrewster/2015/01/15/researcher-says-progressive-insurance-dongle-totally-insecure/
TomTom
OBDII dongle
Used to reduced insurance
rates for customers.
Hacked by UCSD by
sending SMS messages to
control the CAN bus to
control brakes, steering,
etc. Confirmed in Corvette,
Prius, Escape.
http://www.wired.com/2015/08/hackers-cut-corvettes-brakes-via-common-car-gadget/
DEALERS AND MECHANICS
• Infections of equipment used by
mechanics and dealerships to
update car software and run
vehicle diagnostics.
• An infected vehicle can spread
an infection to a dealership’s
testing equipment, which in turn
would spread the malware to
every vehicle the dealership
services.
THE INDUSTRY HAS TO DO BETTER.
WE CAN ALL HELP.
DON’T HIDE BEHIND THE DMCA
• Auto Alliance and General Motors actively make legal threats against anyone who
tinkers with the code in their own vehicles, and actively fight proposed auto
exemptions in the Digital Millennium Copyright Act.
• “The proposed exemption could introduce safety and security issues as well as
facilitate violation of various laws designed specifically to regulate the modern car,
including emissions, fuel economy, and vehicle safety regulations” - GM
http://copyright.gov/1201/2015/comments-032715/class%2021/General_Motors_Class21_1201_2014.pdf
• “a vehicle owner does not own a copy of the relevant computer programs in the
vehicle.” - GM
• John Deere argues that “bypassing of cars’ protection mechanisms could allow
drivers to listen to pirated music, audio books or films, adding that this might
encourage others to partake in the enjoyment of illegal material.”
IAMTHECAVALRY.ORG
5 STAR AUTOMOTIVESAFETYPROGRAM
1. Safety by Design via standards compliance and secure software
development lifecycle
2. Third Party Collaboration between the automotive industry and
security researchers
3. Evidence Capture: tamper evident, forensically-sound logging
and evidence capture
4. Security Updates in a prompt and agile manner (not a mailed
USB drive)
5. Segmentation and Isolation: internet-connected infotainment
systems shouldn’t be able to talk to brakes or transmission.
https://www.iamthecavalry.org/domains/automotive/5star/
A FEW ATTACK VECTORS
• Bluetooth, WiFi, keyless entry
• Cellular gateways (e.g., modems, Femtocells)
• OnStar or OnStar-like cellular radio
• Insecure OS configuration, update media, interprocess comms
• Static, clear text/hex strings in executable files
• Android app on the driver’s phone synched to the car’s network
• Malicious audio file burned onto a CD in the car’s stereo.
• Radio-readable tire pressure monitoring systems
BLAH BLAH BLAH
WHAT DOES IT ALL MEAN?
http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
BUT IT WASN’T DESIGNED THAT WAY!
HOW DID THEY DO THAT?
A CASCADE OF VULNERABILITIES
• You can reach a cell network from the Internet
• You can port scan the car from the cell network!
• The car is listening to the cell network in an un-protected
manner
• The head unit (radio/nav) runs an OS that isn’t configured
properly
• The head unit’s application software is not secured properly
• The head unit is connected to both vehicle CAN networks
(infotainment and powertrain)
• Head unit nav upgrade software delivery includes flashing
tools and lots of commented script files
• The CAN interface firmware in the head unit isn’t code signed
http://illmatics.com/Remote%20Car%20Hacking.pdf
http://www.computerworld.com/article/2952186/mobile-security/chrysler-recalls-14m-vehicles-after-jeep-hack.html
SO HOW DID CHRYSLER HELP CUSTOMERS
FIX THEIR VEHICLES?
• Plug in a USB flash drive you receive in the mail,
then update the firmware in the head unit
or
• Go to a dealer and they’ll take care of it
• No remote software updates
DOES THAT SEEM RIGHT TO YOU?
ATTACK MITIGATION - BEST PRACTICES
• Hardware based cryptography that supports
attestation, authentication and encryption
services
• Secure boot and code signing
• Restricted processes
• Multi-stage communications
• Secure software updates

More Related Content

What's hot

Next Dimension + Cisco Smart Manufacturing
Next Dimension + Cisco Smart ManufacturingNext Dimension + Cisco Smart Manufacturing
Next Dimension + Cisco Smart ManufacturingNext Dimension Inc.
 
AI is the Catalyst of IoT
AI is the Catalyst of IoTAI is the Catalyst of IoT
AI is the Catalyst of IoTAhmed Banafa
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?360mnbsu
 
Next Dimension IIoT Presentation
Next Dimension IIoT PresentationNext Dimension IIoT Presentation
Next Dimension IIoT PresentationNext Dimension Inc.
 
Defining the IoT Stack
Defining the IoT StackDefining the IoT Stack
Defining the IoT StackPubNub
 
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)Jackson Shaw
 
10 myths about cloud computing
10 myths about cloud computing10 myths about cloud computing
10 myths about cloud computingAhmed Banafa
 
Industry week webinar on IIot and data visualzation
    Industry week webinar on IIot and data visualzation    Industry week webinar on IIot and data visualzation
Industry week webinar on IIot and data visualzationW. David Stephenson
 
Internet of everything #IoE
Internet of everything #IoEInternet of everything #IoE
Internet of everything #IoEMatteo Masi
 
Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...
Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...
Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...Enerco Energy Solutions LLP
 
The Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the ManufacturerThe Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the ManufacturerUSA Firmware, LLC
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksYokogawa1
 
Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing GlobalSign
 
Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...
Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...
Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...Solution Analysts
 

What's hot (20)

Next Dimension + Cisco Smart Manufacturing
Next Dimension + Cisco Smart ManufacturingNext Dimension + Cisco Smart Manufacturing
Next Dimension + Cisco Smart Manufacturing
 
AI is the Catalyst of IoT
AI is the Catalyst of IoTAI is the Catalyst of IoT
AI is the Catalyst of IoT
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
 
Next Dimension IIoT Presentation
Next Dimension IIoT PresentationNext Dimension IIoT Presentation
Next Dimension IIoT Presentation
 
Defining the IoT Stack
Defining the IoT StackDefining the IoT Stack
Defining the IoT Stack
 
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
 
How to Lead in IIoT
How to Lead in IIoTHow to Lead in IIoT
How to Lead in IIoT
 
IBM Internet of Things Offerings
IBM Internet of Things OfferingsIBM Internet of Things Offerings
IBM Internet of Things Offerings
 
CMMC - IoT
CMMC - IoTCMMC - IoT
CMMC - IoT
 
10 myths about cloud computing
10 myths about cloud computing10 myths about cloud computing
10 myths about cloud computing
 
Industry week webinar on IIot and data visualzation
    Industry week webinar on IIot and data visualzation    Industry week webinar on IIot and data visualzation
Industry week webinar on IIot and data visualzation
 
Internet of everything #IoE
Internet of everything #IoEInternet of everything #IoE
Internet of everything #IoE
 
Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...
Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...
Industry 4.0 PPT PDF for Smart Manufacturing using IIoT (Industrial IoT i.e. ...
 
The Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the ManufacturerThe Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the Manufacturer
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
 
World of Watson IoT Journey Map
World of Watson IoT Journey MapWorld of Watson IoT Journey Map
World of Watson IoT Journey Map
 
Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing
 
eBook-IoTPractice
eBook-IoTPracticeeBook-IoTPractice
eBook-IoTPractice
 
Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...
Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...
Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...
 

Viewers also liked

How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheLeslie Samuel
 
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from MarsSpace Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from MarsReal-Time Innovations (RTI)
 
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...Real-Time Innovations (RTI)
 
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...Real-Time Innovations (RTI)
 
How to Design Distributed Robotic Control Systems
How to Design Distributed Robotic Control SystemsHow to Design Distributed Robotic Control Systems
How to Design Distributed Robotic Control SystemsReal-Time Innovations (RTI)
 
Fog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of ThingsFog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of ThingsReal-Time Innovations (RTI)
 
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial SystemsThe Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial SystemsReal-Time Innovations (RTI)
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkReal-Time Innovations (RTI)
 
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...Real-Time Innovations (RTI)
 
How the fusion of time sensitive networking, time-triggered ethernet and data...
How the fusion of time sensitive networking, time-triggered ethernet and data...How the fusion of time sensitive networking, time-triggered ethernet and data...
How the fusion of time sensitive networking, time-triggered ethernet and data...Real-Time Innovations (RTI)
 
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...Real-Time Innovations (RTI)
 
Global C4IR Masterclass Cambridge Hayward - CIR 2017
Global C4IR Masterclass Cambridge Hayward - CIR 2017Global C4IR Masterclass Cambridge Hayward - CIR 2017
Global C4IR Masterclass Cambridge Hayward - CIR 2017Justin Hayward
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsReal-Time Innovations (RTI)
 
Cyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationCyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationBrad Deflin
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksTripwire
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering BasicsLuke Rusten
 

Viewers also liked (20)

How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from MarsSpace Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
 
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
 
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
 
Experiencing the Live IIoT
Experiencing the Live IIoTExperiencing the Live IIoT
Experiencing the Live IIoT
 
How to Design Distributed Robotic Control Systems
How to Design Distributed Robotic Control SystemsHow to Design Distributed Robotic Control Systems
How to Design Distributed Robotic Control Systems
 
Fog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of ThingsFog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of Things
 
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial SystemsThe Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
 
Advancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen AutomotiveAdvancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen Automotive
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
 
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
 
How the fusion of time sensitive networking, time-triggered ethernet and data...
How the fusion of time sensitive networking, time-triggered ethernet and data...How the fusion of time sensitive networking, time-triggered ethernet and data...
How the fusion of time sensitive networking, time-triggered ethernet and data...
 
Introduction to RTI DDS
Introduction to RTI DDSIntroduction to RTI DDS
Introduction to RTI DDS
 
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
 
Global C4IR Masterclass Cambridge Hayward - CIR 2017
Global C4IR Masterclass Cambridge Hayward - CIR 2017Global C4IR Masterclass Cambridge Hayward - CIR 2017
Global C4IR Masterclass Cambridge Hayward - CIR 2017
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software Components
 
Cyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationCyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop Presentation
 
Secrets of Autonomous Car Design
Secrets of Autonomous Car DesignSecrets of Autonomous Car Design
Secrets of Autonomous Car Design
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security Attacks
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 

Similar to Countering Cybersecurity Risk in Today's IoT World

Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWKapil Kanugo
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsSymantec
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsTonex
 
Hackers are the new highway threat
Hackers are the new highway threatHackers are the new highway threat
Hackers are the new highway threatHarman Innovation
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_finalPacSecJP
 
ConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPGreg Harms
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain
 
Internet of Things and IBM
Internet of Things and IBMInternet of Things and IBM
Internet of Things and IBMArrow ECS UK
 
Brochure skidweigh Defender
Brochure skidweigh DefenderBrochure skidweigh Defender
Brochure skidweigh DefenderTed Jurca
 
Hydraulische Wiegesysteme
Hydraulische WiegesystemeHydraulische Wiegesysteme
Hydraulische WiegesystemeZeljkoJurca
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the CrimeIBM Security
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsAlan Tatourian
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfDorleControls
 
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...Black Duck by Synopsys
 

Similar to Countering Cybersecurity Risk in Today's IoT World (20)

Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOW
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into Cars
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded Systems
 
Hackers are the new highway threat
Hackers are the new highway threatHackers are the new highway threat
Hackers are the new highway threat
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_final
 
ConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WP
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
IAM for mobile and BYOD
IAM for mobile and BYODIAM for mobile and BYOD
IAM for mobile and BYOD
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watch
 
Internet of Things and IBM
Internet of Things and IBMInternet of Things and IBM
Internet of Things and IBM
 
Brochure skidweigh Defender
Brochure skidweigh DefenderBrochure skidweigh Defender
Brochure skidweigh Defender
 
Hydraulische Wiegesysteme
Hydraulische WiegesystemeHydraulische Wiegesysteme
Hydraulische Wiegesysteme
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the Crime
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdf
 
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...
 

Recently uploaded

2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...SUHANI PANDEY
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...nilamkumrai
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Datingkojalkojal131
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 

Recently uploaded (20)

2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 

Countering Cybersecurity Risk in Today's IoT World

  • 1. COUNTERING CYBERSECURITY RISK in today’s IoT world Brad Nicholas Anajali Gurnani Brett Heliker
  • 2. THE RIGHT SECURITY FRAMEWORK We cannot solve our problems with the same thinking we used when we created them. —Albert Einstein Security controls are shifting away from the traditional perimeter Adoption of cloud platforms and security as a service will continue Where and how data is stored is key to evaluating risks
  • 3. ACCELERATING PROGRAM MATURITY STARTS WITH A COMMON LANGUAGE FOR THE PRODUCTS AND SERVICES A COMPANY CAN BUY
  • 4. ASSESS RISKS IN A STRUCTURED WAY AND DEVELOP A ROADMAP DEVICES APPS NETWORK DATA PEOPLE IDENTIFY PROTECT DETECT RESPOND RECOVER (NIST FRAMEWORK) Pre-compromise Post-compromise
  • 5. A CULTURE OF SECURITY FACILITATES RESPONSIBLE BUSINESS German steel mill suffers “massive damages” after hackers accessed a blast furnace that workers could not properly shut down 1 2 Recipient of targeted email is tricked into downloading malware to their computer Attackers make their way from corporate network into production networks to access systems controlling plant equipment 3
  • 6. MAKE SECURITY A SHARED RESPONSIBILITY COMMUNICATE Spearhead security as a product. Make it bold and important internally. INNOVATE Be strategic about security architecture and standardization. ACCELERATE Leverage agile practices to iterate and improve controls implementation. INTEGRATE Move security testing as close to the developer as possible.
  • 8. IOT ADDS THE “PHYSICAL WEB” IoT is about the physical web of everything around you A whole slew of smart connected products + services are coming Multiple networks, all interacting with you or on your behalf MORE COMPLEXITY NEW ATTACK SURFACES COMPOUND EFFECTS
  • 9. SMART PRODUCTS NEED BROADER, NON-TRADITIONAL EXPERTISE • Krebs & Cisco: IoT Reality: Smart Devices, Dumb Defaults “Consider whether you can realistically care for and feed the security needs of yet another IoT thing that is: -chewing holes in your network defenses; -gnawing open new critical security weaknesses; -bred by a vendor that seldom and belatedly patches; -tough to wrangle down and patch” • NW World: 500K WeMo users could be hacked; CERT issues advisory “when CERT tried to contact Belkin, Belkin chose not to respond at all” • IBM: Smart Building Security Risks “Connected building systems fly under the Cybersecurity radar, creating a Shadow IoT” http://www.networkworld.com/article/2226371/microsoft-subnet/500-000-belkin-wemo-users-could-be-hacked--cert-issues-advisory.html http://krebsonsecurity.com/2016/02/iot-reality-smart-devices-dumb-defaults/ http://www.techrepublic.com/article/ibm-x-force-finds-multiple-iot-security-risks-in-smart-buildings/
  • 10. WE HAVE A LONG WAY TO GO • Hidden, hardcoded credentials and passwords • Credentials stored as static text within files • Insecure default configurations • Insufficient network segmentation enabling attacks from within • Weak support and nonexistent updates, exacerbated by economics • Some/all of the above present in combination IBM smart building infographic
  • 11. THE CHRYSLER JEEP HACK Lessons to be Learned WITH MUCH THANKS TO: Charlie Miller & Chris Valasek White-hat Superheroes
  • 12. thecavalry.org “Modern [vehicles] are computers on wheels and are increasingly connected and controlled by software. Dependence on technology in vehicles has grown faster than effective means to secure it.”
  • 13. MICRO-CONTROLLERS, EMBEDDED SOFTWARE AND NETWORKING EVERYWHERE Federally mandated “OBD” vehicle diagnostics since 1996 Dozens of networked control systems and millions of lines of code “Black boxes” silently record vehicle dynamics “OnStar” telematics since 1996 Fleet management, and usage based insurance are now widespread Remote access adds MAJOR security implications, mandating disciplined design Graphic: Quora
  • 14. CONNECTED VEHICLES A MASSIVE OPPORTUNITY An executive order from the White House in March 2015 called for federal agencies with fleets of more than 20 vehicles to use telematics systems whenever possible to improve vehicle efficiencies E.O. section 3(g)(iii): Collecting and utilizing as a fleet efficiency management tool, as soon as practicable but not later than two years after the date of this order, agency fleet operational data through deployment of vehicle telematics at a vehicle asset level for all new passenger and light duty vehicle acquisitions and for medium duty vehicles where appropriate https://www.whitehouse.gov/sites/default/files/docs/eo_13693_implementing_instructions_june_10_2015.pdf
  • 15. VULNERABILITIES * * circa first half 2015
  • 16. How hackable is your car? Most Hackable: Jeep Cherokee, Escalade, Infiniti Q50, 2010 Prius The Q50’s radio & adaptive controls (adaptive cruise control and adaptive steering) were directly connected to engine and braking systems. Older cars are least hackable. Not a confidence inspiring trend.. http://illmatics.com/remote%20attack%20surfaces.pdf
  • 17. RollJam $32 Hacks keyless entry systems, alarm systems and garage door openers Proven on Nissan, Cadillac, Ford, Toyota, Lotus, Volkswagen,and Chrysler vehicles; Cobra and Viper alarm systems; and Genie and Liftmaster garage door openers. http://www.wired.com/2015/08/hackers-tiny-device-unlocks-cars-opens-garages/
  • 18. OwnStar Any On-Star equipped GM car could be located, unlocked and started via the phone app uses SSL encryption, Kamkar says it doesn’t properly check the certificate http://arstechnica.com/security/2015/07/ownstar-researcher-hijacks-remote-access-to-onstar/
  • 19. Progressive ‘Snapshot’ “The firmware running on the dongle is minimal and insecure. It does no validation or signing of firmware updates,no secure boot, no cellular authentication,no secure communicationsor encryption,no data execution prevention or attack mitigation technologies… basically it uses no security technologies whatsoever.” http://www.forbes.com/sites/thomasbrewster/2015/01/15/researcher-says-progressive-insurance-dongle-totally-insecure/
  • 20. TomTom OBDII dongle Used to reduced insurance rates for customers. Hacked by UCSD by sending SMS messages to control the CAN bus to control brakes, steering, etc. Confirmed in Corvette, Prius, Escape. http://www.wired.com/2015/08/hackers-cut-corvettes-brakes-via-common-car-gadget/
  • 21. DEALERS AND MECHANICS • Infections of equipment used by mechanics and dealerships to update car software and run vehicle diagnostics. • An infected vehicle can spread an infection to a dealership’s testing equipment, which in turn would spread the malware to every vehicle the dealership services.
  • 22. THE INDUSTRY HAS TO DO BETTER. WE CAN ALL HELP.
  • 23. DON’T HIDE BEHIND THE DMCA • Auto Alliance and General Motors actively make legal threats against anyone who tinkers with the code in their own vehicles, and actively fight proposed auto exemptions in the Digital Millennium Copyright Act. • “The proposed exemption could introduce safety and security issues as well as facilitate violation of various laws designed specifically to regulate the modern car, including emissions, fuel economy, and vehicle safety regulations” - GM http://copyright.gov/1201/2015/comments-032715/class%2021/General_Motors_Class21_1201_2014.pdf • “a vehicle owner does not own a copy of the relevant computer programs in the vehicle.” - GM • John Deere argues that “bypassing of cars’ protection mechanisms could allow drivers to listen to pirated music, audio books or films, adding that this might encourage others to partake in the enjoyment of illegal material.”
  • 24. IAMTHECAVALRY.ORG 5 STAR AUTOMOTIVESAFETYPROGRAM 1. Safety by Design via standards compliance and secure software development lifecycle 2. Third Party Collaboration between the automotive industry and security researchers 3. Evidence Capture: tamper evident, forensically-sound logging and evidence capture 4. Security Updates in a prompt and agile manner (not a mailed USB drive) 5. Segmentation and Isolation: internet-connected infotainment systems shouldn’t be able to talk to brakes or transmission. https://www.iamthecavalry.org/domains/automotive/5star/
  • 25. A FEW ATTACK VECTORS • Bluetooth, WiFi, keyless entry • Cellular gateways (e.g., modems, Femtocells) • OnStar or OnStar-like cellular radio • Insecure OS configuration, update media, interprocess comms • Static, clear text/hex strings in executable files • Android app on the driver’s phone synched to the car’s network • Malicious audio file burned onto a CD in the car’s stereo. • Radio-readable tire pressure monitoring systems
  • 26. BLAH BLAH BLAH WHAT DOES IT ALL MEAN?
  • 28. BUT IT WASN’T DESIGNED THAT WAY! HOW DID THEY DO THAT?
  • 29. A CASCADE OF VULNERABILITIES • You can reach a cell network from the Internet • You can port scan the car from the cell network! • The car is listening to the cell network in an un-protected manner • The head unit (radio/nav) runs an OS that isn’t configured properly • The head unit’s application software is not secured properly • The head unit is connected to both vehicle CAN networks (infotainment and powertrain) • Head unit nav upgrade software delivery includes flashing tools and lots of commented script files • The CAN interface firmware in the head unit isn’t code signed http://illmatics.com/Remote%20Car%20Hacking.pdf
  • 30.
  • 32. SO HOW DID CHRYSLER HELP CUSTOMERS FIX THEIR VEHICLES? • Plug in a USB flash drive you receive in the mail, then update the firmware in the head unit or • Go to a dealer and they’ll take care of it • No remote software updates
  • 33. DOES THAT SEEM RIGHT TO YOU?
  • 34. ATTACK MITIGATION - BEST PRACTICES • Hardware based cryptography that supports attestation, authentication and encryption services • Secure boot and code signing • Restricted processes • Multi-stage communications • Secure software updates