SlideShare a Scribd company logo
1 of 19
Download to read offline
SECURING THE INTERNET
OF THINGS
Christopher Frenz
THE NEED FOR IOT SECURITY???
MIRAI BOTNET AND DDOS
ATTACK ON DYN
• 1.2 Tbps DDoS Attack
from 100K malicious
endpoints
• Brought down Twitter,
Netflix, Reddit, CNN,
Paypal, and others
• 145K domains affected
• Dyn lost 14.5 domains
as customers
Image –
downdetector.com
LOCALIZED TARGETS
IOT IN HEALTHCARE
PRIVACY ISSUES AS WELL
MIRAI
• What makes these attacks so scary is not the
level of sophistication of the malware itself, but
actually its lack of sophistication in how it gains
control of IoT devices.
• The source code or Mirai is available:
• https://github.com/jgamblin/Mirai-Source-Code
• Mirai and the related Bashlight malware make
use of default usernames and passwords
SCANNER.C
• This Mirai source code file scanner.c
lists a combination of 62 default user
names and passwords
• Sophos estimates that this simple list
of passwords is enough to
compromise hundreds of thousands
IoT devices
User Name Password User Name Password User Name Password
root xc3511 admin 1111 root zlxx.
root vizxv root 666666 root 7ujMko0vizxv
root admin root password root 7ujMko0admin
admin admin root 1234 root system
root 888888 root klv123 root ikwb
root xmhdipc Administrator admin root dreambox
root default service service root user
root juantech supervisor supervisor root realtek
root 123456 guest guest root 0
root 54321 guest 12345 admin 1111111
support support guest 12345 admin 1234
root (none) admin1 password admin 12345
admin password administrator 1234 admin 54321
root root 666666 666666 admin 123456
root 12345 888888 888888 admin 7ujMko0admin
user user ubnt ubnt admin 1234
admin (none) root klv1234 admin pass
root pass root Zte521 admin meinsm
admin admin1234 root hi3518 tech tech
root 1111 root jvbzd mother fucker
admin smcadmin root anko
OWASP IOT TOP 10
Vulnerability Rank Vulnerability Name
1 Insecure Web Interface
2 Insufficient Authentication/Authorization
3 Insecure Network Services
4 Lack of Transport Encryption/Integrity Verification
5 Privacy Concerns
6 Insecure Cloud Interface
7 Insecure Mobile Interface
8 Insufficient Security Configurability
9 Insecure Software/Firmware
10 Poor Physical Security
IOT CRUSHER
WHERE IS ALL MY DATA?
• Organizations should have a map of where all of their data assets are
and where their data flows to
• This effort needs involve more than just IT. A surprising amount of
sensitive data may not be under the control of IT (HR, Finance, etc)
• Finance sending data to an external vendor for revenue cycle
management or collections
• Paper based records such as a morgue logbook may still have PII
• Shadow IT, BYOD, etc
• This map should include data collected and distributed by IoT
devices like security cameras, medical devices, etc.
INTERNAL FIREWALLS, NETWORK
SEGMENTATION, INTERNAL IDS
• Traffic to and from IoT devices should be isolated as much as possible from the rest of
your network – VLANs, ACLs, etc.
• In healthcare it is becoming common to place a firewall in front of network enabled
medical equipment to restrict traffic flows
• IDS and threat detection is not just a good idea at the perimeter – it should be used to
examine internal traffic as well
ZERO TRUST
• With increasing virtualization of
servers and desktops security at
the virtual machine level should
not be ignored
• Software Defined Networking
and security products like NSX
and Hyper-V network
virtualization make approaching
zero trust networks more feasible
TOP 10 IOT SECURITY CONTROLS
FOR IOT DEVELOPERS
• No default passwords or hardcoded passwords post initial setup
• Account Lockouts after 3-5 failed logins
• Password complexity filters
• No unsecured connections
• No administrative access on internet facing interfaces
• Network level access controls
• Update Mechanisms
• Encryption at rest
• Differing account access levels
• Privacy by Design Principles
http://www.codeguru.com/IoT/
understanding-iot-security-for-
iot-developers.html
HOW DO WE GET
MANUFACTURERS TO CARE
• Consumers need to put economic pressure on manufacturers to produce
secure devices
• Customers need to vote with their wallet and not purchase products that
cannot be properly secured
• The average consumer does not know enough about security to make good
decisions as to which products are secure and which are not
IOT NUTRITION LABEL
Makes it easy for non-
savvy consumers to
compare the security of
IoT devices
If enough industry
backing can be gained
where the use of such
labelling becomes
commonplace vendors
will strive to eliminate red
Xs from their label
ENOUGH MOMENTUM?
QUESTIONS
• https://www.linkedin.com/in/christopherfrenz/

More Related Content

What's hot

Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
WSO2
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
Tonex
 

What's hot (20)

Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsPrivacy & Security for the Internet of Things
Privacy & Security for the Internet of Things
 
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURESON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
 
IoT Security Middleware: evaluating the threats and protecting against them
 IoT Security Middleware: evaluating the threats and protecting against them IoT Security Middleware: evaluating the threats and protecting against them
IoT Security Middleware: evaluating the threats and protecting against them
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you Spam
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Security
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
IoT security
IoT securityIoT security
IoT security
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 

Viewers also liked

Viewers also liked (18)

Pengetahuan Bahan Makanan
Pengetahuan Bahan MakananPengetahuan Bahan Makanan
Pengetahuan Bahan Makanan
 
місто Суми
місто Сумимісто Суми
місто Суми
 
Trichomonas
TrichomonasTrichomonas
Trichomonas
 
clasificacion de las empresas
clasificacion de las empresasclasificacion de las empresas
clasificacion de las empresas
 
2 eso
2 eso2 eso
2 eso
 
Green Man Gaming Overview - March 2017
Green Man Gaming Overview - March 2017Green Man Gaming Overview - March 2017
Green Man Gaming Overview - March 2017
 
Ejerciciosderefuerzodematematicas
EjerciciosderefuerzodematematicasEjerciciosderefuerzodematematicas
Ejerciciosderefuerzodematematicas
 
Σχολικός Εκφοβισμός από την Ε' τάξη
Σχολικός Εκφοβισμός από την Ε' τάξηΣχολικός Εκφοβισμός από την Ε' τάξη
Σχολικός Εκφοβισμός από την Ε' τάξη
 
Bhel( Bharat Heavy Electricals Limited )
Bhel( Bharat Heavy Electricals Limited  )Bhel( Bharat Heavy Electricals Limited  )
Bhel( Bharat Heavy Electricals Limited )
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Era cenozoica o terciaria
Era cenozoica o terciariaEra cenozoica o terciaria
Era cenozoica o terciaria
 
Leadership, Management & Innovation
Leadership, Management & InnovationLeadership, Management & Innovation
Leadership, Management & Innovation
 
Question 1
Question 1Question 1
Question 1
 
Inquiry training model [compatible]
Inquiry training model [compatible]Inquiry training model [compatible]
Inquiry training model [compatible]
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
 
Newsletter n. 3
Newsletter n. 3Newsletter n. 3
Newsletter n. 3
 

Similar to Securing the Internet of Things

逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
HITCON GIRLS
 

Similar to Securing the Internet of Things (20)

Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
 
U nit 4
U nit 4U nit 4
U nit 4
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.
 
Cyber Security.pdf
Cyber Security.pdfCyber Security.pdf
Cyber Security.pdf
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
 
The Internet of Everything is Here
The Internet of Everything is HereThe Internet of Everything is Here
The Internet of Everything is Here
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Chapter 5 MIS
Chapter 5 MISChapter 5 MIS
Chapter 5 MIS
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
 
Embracing iot in the enterprise
Embracing iot in the enterpriseEmbracing iot in the enterprise
Embracing iot in the enterprise
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Securing the Internet of Things

  • 1. SECURING THE INTERNET OF THINGS Christopher Frenz
  • 2. THE NEED FOR IOT SECURITY???
  • 4. ATTACK ON DYN • 1.2 Tbps DDoS Attack from 100K malicious endpoints • Brought down Twitter, Netflix, Reddit, CNN, Paypal, and others • 145K domains affected • Dyn lost 14.5 domains as customers Image – downdetector.com
  • 8. MIRAI • What makes these attacks so scary is not the level of sophistication of the malware itself, but actually its lack of sophistication in how it gains control of IoT devices. • The source code or Mirai is available: • https://github.com/jgamblin/Mirai-Source-Code • Mirai and the related Bashlight malware make use of default usernames and passwords
  • 9. SCANNER.C • This Mirai source code file scanner.c lists a combination of 62 default user names and passwords • Sophos estimates that this simple list of passwords is enough to compromise hundreds of thousands IoT devices User Name Password User Name Password User Name Password root xc3511 admin 1111 root zlxx. root vizxv root 666666 root 7ujMko0vizxv root admin root password root 7ujMko0admin admin admin root 1234 root system root 888888 root klv123 root ikwb root xmhdipc Administrator admin root dreambox root default service service root user root juantech supervisor supervisor root realtek root 123456 guest guest root 0 root 54321 guest 12345 admin 1111111 support support guest 12345 admin 1234 root (none) admin1 password admin 12345 admin password administrator 1234 admin 54321 root root 666666 666666 admin 123456 root 12345 888888 888888 admin 7ujMko0admin user user ubnt ubnt admin 1234 admin (none) root klv1234 admin pass root pass root Zte521 admin meinsm admin admin1234 root hi3518 tech tech root 1111 root jvbzd mother fucker admin smcadmin root anko
  • 10. OWASP IOT TOP 10 Vulnerability Rank Vulnerability Name 1 Insecure Web Interface 2 Insufficient Authentication/Authorization 3 Insecure Network Services 4 Lack of Transport Encryption/Integrity Verification 5 Privacy Concerns 6 Insecure Cloud Interface 7 Insecure Mobile Interface 8 Insufficient Security Configurability 9 Insecure Software/Firmware 10 Poor Physical Security
  • 12. WHERE IS ALL MY DATA? • Organizations should have a map of where all of their data assets are and where their data flows to • This effort needs involve more than just IT. A surprising amount of sensitive data may not be under the control of IT (HR, Finance, etc) • Finance sending data to an external vendor for revenue cycle management or collections • Paper based records such as a morgue logbook may still have PII • Shadow IT, BYOD, etc • This map should include data collected and distributed by IoT devices like security cameras, medical devices, etc.
  • 13. INTERNAL FIREWALLS, NETWORK SEGMENTATION, INTERNAL IDS • Traffic to and from IoT devices should be isolated as much as possible from the rest of your network – VLANs, ACLs, etc. • In healthcare it is becoming common to place a firewall in front of network enabled medical equipment to restrict traffic flows • IDS and threat detection is not just a good idea at the perimeter – it should be used to examine internal traffic as well
  • 14. ZERO TRUST • With increasing virtualization of servers and desktops security at the virtual machine level should not be ignored • Software Defined Networking and security products like NSX and Hyper-V network virtualization make approaching zero trust networks more feasible
  • 15. TOP 10 IOT SECURITY CONTROLS FOR IOT DEVELOPERS • No default passwords or hardcoded passwords post initial setup • Account Lockouts after 3-5 failed logins • Password complexity filters • No unsecured connections • No administrative access on internet facing interfaces • Network level access controls • Update Mechanisms • Encryption at rest • Differing account access levels • Privacy by Design Principles http://www.codeguru.com/IoT/ understanding-iot-security-for- iot-developers.html
  • 16. HOW DO WE GET MANUFACTURERS TO CARE • Consumers need to put economic pressure on manufacturers to produce secure devices • Customers need to vote with their wallet and not purchase products that cannot be properly secured • The average consumer does not know enough about security to make good decisions as to which products are secure and which are not
  • 17. IOT NUTRITION LABEL Makes it easy for non- savvy consumers to compare the security of IoT devices If enough industry backing can be gained where the use of such labelling becomes commonplace vendors will strive to eliminate red Xs from their label