SlideShare a Scribd company logo
1 of 43
Instructor: Junior Williams
Instructor: Junior Williams
Class 9- XIoT Botnets and Related Technologies
Madhusha (Maddy) Nanayakkara
Instructor: Junior Williams
Instructor: Junior Williams
Introduction to IoT, OT, and XIoT
IoT refers to Internet of Things, a network of physical objects embedded with
sensors and software to connect and exchange data over the internet
OT refers to Operational Technology, hardware and software used to monitor
and control physical processes and devices
XIoT refers to Extended Internet of Things, encompassing IoT, OT, and other
cyber-physical systems like medical devices
Instructor: Junior Williams
Instructor: Junior Williams
Overview of IoT
• Connects everyday objects like appliances,
vehicles, lights, etc. to the internet via
embedded sensors and software
• Enables objects to collect and exchange data,
becoming "smart" devices
• Provides automation, analysis, integration of
physical world into computer systems
• Applications across many industries like
manufacturing, transportation, healthcare, etc.
Instructor: Junior Williams
Instructor: Junior Williams
IoT Components
• Sensors collect data
• Connectivity via
networks
• Software for analytics
Instructor: Junior Williams
Instructor: Junior Williams
IoT Communication
Protocols
IoT Communication Protocols
• MQTT - lightweight publish-subscribe protocol
• CoAP - web transfer protocol for constrained
nodes
• AMQP - asynchronous messaging protocol
• DDS - data-centric publish-subscribe protocol
• XMPP - extensible messaging and presence
protocol
Instructor: Junior Williams
Instructor: Junior Williams
Overview of OT
Hardware and software
systems used to monitor and
control physical processes
Found in industries like
manufacturing, power
generation, oil and gas, etc.
Includes components like
sensors, SCADA, DCS, PLCs,
HMIs, actuators
Focuses on reliability, safety,
real-time control vs IT focus
on data/info
OT (Operational Technology): OT specifically refers to the
technology used to monitor and control physical processes,
devices, and infrastructure in industrial operations. It includes
systems like SCADA (Supervisory Control and Data Acquisition),
PLCs (Programmable Logic Controllers), and other control
systems.
Instructor: Junior Williams
Instructor: Junior Williams
OT Components
• Sensors measure processes
• PLCs control processes
• SCADA monitors systems
• DCS - distributed control system
• HMIs - human-machine
• Actuators - mechanical devices
SCADA, which stands for Supervisory Control and
Data Acquisition, is a system of hardware and
software elements used to control and monitor
industrial processes, infrastructure, and facilities.
Instructor: Junior Williams
Instructor: Junior Williams
Overview of
XIoT
Instructor: Junior Williams
Instructor: Junior Williams
XIoT
Cybersecurity
Challenges
• Legacy devices
vulnerable
• Lack of visibility
• Increasing threats
Instructor: Junior Williams
Instructor: Junior Williams
XIoT
Cybersecurity
Best Practices
• Asset inventory
• Access control
• Encryption
• Security frameworks
(e.g. NIST, CIS, ISO, etc.)
Instructor: Junior Williams
Instructor: Junior Williams
Group Activity – Assessment 3 / PART 2
• Groups are supposed to discuss the following topics and prepare a short
presentation.
• What is IoT?
• How IoT is applied in the Industry assigned to your group.
• Group A: Smart Home
• Group B: Healthcare
• Group C: Retail
• Group D: Agriculture
• Group E: Transportation
• What Cybersecurity concerns does IoT raise in that industry?
Instructor: Junior Williams
Instructor: Junior Williams
XIoT Security Standards/Frameworks
IEC 62443 - Industrial
automation and control
systems security
NIST SP 800-82 - Guide
to industrial control
systems security
ISO/IEC 27001 -
Information security
management
NIST Cybersecurity
Framework
CIS Critical Security
Controls
Instructor: Junior Williams
Instructor: Junior Williams
XIoT Security
Solutions
• Splunk(https://www.splunk.com)
• Tenable (https://www.tenable.com)
• Armis (https://www.armis.com)
• Claroty (https://claroty.com)
Instructor: Junior Williams
Instructor: Junior Williams
XIoT Governance
• Define roles and
responsibilities
• Policies and procedures
• Risk assessments
Instructor: Junior Williams
Instructor: Junior Williams
XIoT Governance -
Define roles and
responsibilities
• IoT Governance Board: Establish a dedicated
governance board responsible for overseeing and
guiding XIoT initiatives. This board may include
representatives from various departments, such as
IT, security, legal, compliance, and business units.
• Chief IoT Officer (CIoTO): Designate an executive
or leader responsible for coordinating and driving
the organization's XIoT strategy. This role ensures
alignment with business goals and compliance
with regulatory requirements.
• IoT Project Teams: Define roles and
responsibilities for teams involved in
implementing and managing specific IoT projects.
This may include individuals responsible for
device deployment, data management, security,
and maintenance.
Instructor: Junior Williams
Instructor: Junior Williams
XIoT Governance -
Policies and procedures
• Data Governance Policies: Establish clear policies
governing the collection, storage, processing, and sharing
of IoT-generated data. Ensure compliance with data
protection regulations and industry standards.
• Security Policies: Develop comprehensive security
policies that address the unique challenges of IoT devices,
including authentication, encryption, and secure device
lifecycle management.
• Privacy Policies: Define policies that protect the privacy
of individuals whose data is collected by IoT devices. This
includes obtaining consent, anonymizing data when
necessary, and providing transparency about data usage.
• Device Lifecycle Management: Implement procedures
for the entire lifecycle of IoT devices, from procurement
and deployment to maintenance, updates, and eventual
decommissioning.
Instructor: Junior Williams
Instructor: Junior Williams
XIoT Governance - Risk
assessments
• Security Risk Assessment: Conduct regular assessments
to identify and mitigate security risks associated with XIoT
deployments. This includes evaluating vulnerabilities in
devices, networks, and communication protocols.
• Compliance Risk Assessment: Assess the organization's
compliance with relevant laws, regulations, and industry
standards governing IoT implementations, such as data
protection and cybersecurity regulations.
• Operational Risk Assessment: Evaluate the operational
risks associated with XIoT, including potential disruptions
to business processes, system failures, and the impact on
customer experiences.
• Supply Chain Risk Assessment: Assess and manage risks
related to the IoT device supply chain, ensuring the
integrity and security of devices from production to
deployment.
Instructor: Junior Williams
Instructor: Junior Williams
XIoT Governance -
Enforcement
Monitoring and Enforcement:
• Continuous Monitoring: Implement mechanisms for
continuous monitoring of IoT devices and the associated
infrastructure to detect anomalies, security breaches, or
performance issues.
• Enforcement Mechanisms: Define processes for enforcing
policies and procedures, including consequences for non-
compliance. This may involve using technology solutions,
conducting audits, and providing ongoing training to
personnel.
Regular Audits and Reviews:
• Regular Audits: Conduct periodic audits of XIoT
implementations to ensure alignment with governance
policies, regulatory requirements, and best practices.
• Performance Reviews: Assess the performance of XIoT
initiatives against defined objectives, making adjustments
as needed to improve efficiency, security, and compliance.
Instructor: Junior Williams
Instructor: Junior Williams
Securing IoT
Devices
• Change default
credentials
• Encrypt
traffic/data
• Patch and update
devices
Instructor: Junior Williams
Instructor: Junior Williams
Securing OT
Environments
• Test patches and changes
• Deploy OT security tools
• Monitor behaviour
Instructor: Junior Williams
Instructor: Junior Williams
Medical Device Security
Inventory assets Work with
manufacturers
Segment networks
Instructor: Junior Williams
Instructor: Junior Williams
XIoT – Final Thoughts
IoT, OT, and XIoT enable
automation and data exchange
between cyber-physical systems
and internet-connected devices
Presents new security
challenges with diverse,
interconnected assets and
environments
Holistic approach required
combining IT and OT security
tools, policies, and procedures
Asset management, network
segmentation, monitoring, and
encryption key for risk
reduction
Instructor: Junior Williams
Instructor: Junior Williams
Hacking IoT
devices with
Python
Instructor: Junior Williams
Instructor: Junior Williams
Common IoT
Cyber
Attacks
Explained
Instructor: Junior Williams
Instructor: Junior Williams
Botnets
• A botnet comprises specific internet-connected computers
• Each computer infected by specialized malware
• Malware enables remote attacker to control individual computer
• All computers collectively managed by attacker through designated
server
• Server used to issue commands to all malware-infected computers
Instructor: Junior Williams
Overview
Instructor: Junior Williams
Botnets usually have the structure of a centralized network
Which means – each Bot is controlled by the server
This server is also called a C&C Server
Add a footer
The Structure of Botnets
Instructor: Junior Williams
The C&C Server
C&C server is for Command & Control
Attacker stores commands for botnet on server
Bots pull commands from server
Bots return operation results to server
Add a footer
Instructor: Junior Williams
How Bots Are Made
• A computer can be infected by
visiting a malicious website
• An Infected mails, or software's
are also an option which
cybercriminals use to infect
computers and turns them into
bots
Add a footer
Instructor: Junior Williams
How Bots Are Made
Once a computer is infected, it tries to connect to the C&C Server
If successful, the malware generate a Unique ID for this computer and send it along with
other valuable info (locations, usernames, password hashes, etc.) to the C&C Server
Add a footer
Instructor: Junior Williams
Bot Routine
Bot routine initiated based on attacker's configuration
 Bot connects to C&C at set intervals, such as once a day, to fetch
commands
 Bot carries out fetched commands
 Results of executed commands sent back to C&C
Add a footer
Instructor: Junior Williams
What Kind of Commands can the
Bots Execute ?
There 2 types of commands usually executed by the
bots:
Local commands – which usually will retrieve
information from the Bot’s computer
Remote commands – which usually will used to
attack other computers using the Bot
Add a footer
Instructor: Junior Williams
Local Commands –
Screenshots
Download files
Execute Files
View webcam
Obtain credentials
Add a footer
What Kind of Commands the Bots
Can Execute ?
Instructor: Junior Williams
What Kind of Commands the
Bots Can Execute ?
Remote Commands –
DoS attack
Try to infect a remote computer
Send a malicious email
Add a footer
Instructor: Junior Williams
DoS & DDoS
 DoS – Denial Of Service – is an attack which aims to make a service
unavailable to legitimate users for example preventing YouTube from
being able to serve users.
 DDoS – Distributed Denial Of Service – is the same attack but its
executing from a number of computers for example Bots
Add a footer
Instructor: Junior Williams
DoS & DDoS – How it Works ?
The attack preformed by sending many request as possible to a
server until it crashes (from running out of compute or storage
capacity)
Modern servers are too resilient to be crashed by a single
computer
DDoS – Attackers now uses Botnets in order to perform a
successful DoS attack
Add a footer
Instructor: Junior Williams
DoS & DDoS
 And this is how it looks like:
Add a footer
https://norse-
corp.com/map/
Instructor: Junior Williams
How Attackers Construct a
New Botnet Network ?
• An Exploit Kit
• Scanning
• Buying an existing botnet network
Add a footer
Instructor: Junior Williams
Exploit Kit
• An Exploit Kit is a special kit designed and built in
order to execute an authorized code on a remote
computer
• It can be bought(for example on the dark net) or
be devolved by an attacker
• If an Exploit Kit offers a unique ability to infect
remote computers it can become a really
expensive business
Add a footer
Instructor: Junior Williams
Scanning
• An attacker can
scan the internet
for unpatched
computers
Add a footer
Instructor: Junior Williams
Buying an Existing
Botnet Network
• Cybercriminals offer pre-
constructed networks online
• Activity ongoing for extended
period on Dark Net
• Botnet network cost
influenced by geographical
location of compromised
computers
• Computers in United States
often command highest prices
Add a footer
Instructor: Junior Williams
Instructor: Junior Williams
What is
botnet and
how does it
spread?
Instructor: Junior Williams
Instructor: Junior Williams
Break
Questions?
Drop a message on the chat or
send an email to
junior.williams@torontosom.ca

More Related Content

Similar to Class 7- XIoT and Botnets.pptx

Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityPrecisely
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches Jim Kaplan CIA CFE
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsShah Sheikh
 
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
Chapter 1 Best Practices, Standards, and a Plan of Action.pptxChapter 1 Best Practices, Standards, and a Plan of Action.pptx
Chapter 1 Best Practices, Standards, and a Plan of Action.pptxkevlekalakala
 
Cybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide DeckCybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide DeckCimetrics Inc
 
Dncybersecurity
DncybersecurityDncybersecurity
DncybersecurityAnne Starr
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessInfopulse
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsJohn Gilligan
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2Lisa Niles
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3Lisa Niles
 
More practical insights on the 20 critical controls
More practical insights on the 20 critical controlsMore practical insights on the 20 critical controls
More practical insights on the 20 critical controlsEnclaveSecurity
 
Security Monitoring Course - Ali Ahangari
Security Monitoring Course - Ali AhangariSecurity Monitoring Course - Ali Ahangari
Security Monitoring Course - Ali AhangariAli Ahangari
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)TI Safe
 
Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Nathan Wallace, PhD, PE
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Decisions
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala LumpurAlan Yau Ti Dun
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?IT Governance Ltd
 

Similar to Class 7- XIoT and Botnets.pptx (20)

Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and Security
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
Chapter 1 Best Practices, Standards, and a Plan of Action.pptxChapter 1 Best Practices, Standards, and a Plan of Action.pptx
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
 
Security and Control.ppt
Security and Control.pptSecurity and Control.ppt
Security and Control.ppt
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
Cybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide DeckCybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide Deck
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed Actions
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
 
More practical insights on the 20 critical controls
More practical insights on the 20 critical controlsMore practical insights on the 20 critical controls
More practical insights on the 20 critical controls
 
Security Monitoring Course - Ali Ahangari
Security Monitoring Course - Ali AhangariSecurity Monitoring Course - Ali Ahangari
Security Monitoring Course - Ali Ahangari
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?
 

More from Madhusha15

Chapter 3A (2).pptx
Chapter 3A (2).pptxChapter 3A (2).pptx
Chapter 3A (2).pptxMadhusha15
 
Chapter 1A.pptx
Chapter 1A.pptxChapter 1A.pptx
Chapter 1A.pptxMadhusha15
 
SQL Lesson 6 - Select.pdf
SQL Lesson 6 - Select.pdfSQL Lesson 6 - Select.pdf
SQL Lesson 6 - Select.pdfMadhusha15
 
Class 8 -Authentication Controls.pptx
Class 8 -Authentication Controls.pptxClass 8 -Authentication Controls.pptx
Class 8 -Authentication Controls.pptxMadhusha15
 
Day 7 Project Cost Management .pdf
Day 7 Project Cost Management .pdfDay 7 Project Cost Management .pdf
Day 7 Project Cost Management .pdfMadhusha15
 
Management and Team Building.pptx
Management and Team Building.pptxManagement and Team Building.pptx
Management and Team Building.pptxMadhusha15
 
time mamangement.ppt
time mamangement.ppttime mamangement.ppt
time mamangement.pptMadhusha15
 

More from Madhusha15 (7)

Chapter 3A (2).pptx
Chapter 3A (2).pptxChapter 3A (2).pptx
Chapter 3A (2).pptx
 
Chapter 1A.pptx
Chapter 1A.pptxChapter 1A.pptx
Chapter 1A.pptx
 
SQL Lesson 6 - Select.pdf
SQL Lesson 6 - Select.pdfSQL Lesson 6 - Select.pdf
SQL Lesson 6 - Select.pdf
 
Class 8 -Authentication Controls.pptx
Class 8 -Authentication Controls.pptxClass 8 -Authentication Controls.pptx
Class 8 -Authentication Controls.pptx
 
Day 7 Project Cost Management .pdf
Day 7 Project Cost Management .pdfDay 7 Project Cost Management .pdf
Day 7 Project Cost Management .pdf
 
Management and Team Building.pptx
Management and Team Building.pptxManagement and Team Building.pptx
Management and Team Building.pptx
 
time mamangement.ppt
time mamangement.ppttime mamangement.ppt
time mamangement.ppt
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Class 7- XIoT and Botnets.pptx

  • 1. Instructor: Junior Williams Instructor: Junior Williams Class 9- XIoT Botnets and Related Technologies Madhusha (Maddy) Nanayakkara
  • 2. Instructor: Junior Williams Instructor: Junior Williams Introduction to IoT, OT, and XIoT IoT refers to Internet of Things, a network of physical objects embedded with sensors and software to connect and exchange data over the internet OT refers to Operational Technology, hardware and software used to monitor and control physical processes and devices XIoT refers to Extended Internet of Things, encompassing IoT, OT, and other cyber-physical systems like medical devices
  • 3. Instructor: Junior Williams Instructor: Junior Williams Overview of IoT • Connects everyday objects like appliances, vehicles, lights, etc. to the internet via embedded sensors and software • Enables objects to collect and exchange data, becoming "smart" devices • Provides automation, analysis, integration of physical world into computer systems • Applications across many industries like manufacturing, transportation, healthcare, etc.
  • 4. Instructor: Junior Williams Instructor: Junior Williams IoT Components • Sensors collect data • Connectivity via networks • Software for analytics
  • 5. Instructor: Junior Williams Instructor: Junior Williams IoT Communication Protocols IoT Communication Protocols • MQTT - lightweight publish-subscribe protocol • CoAP - web transfer protocol for constrained nodes • AMQP - asynchronous messaging protocol • DDS - data-centric publish-subscribe protocol • XMPP - extensible messaging and presence protocol
  • 6. Instructor: Junior Williams Instructor: Junior Williams Overview of OT Hardware and software systems used to monitor and control physical processes Found in industries like manufacturing, power generation, oil and gas, etc. Includes components like sensors, SCADA, DCS, PLCs, HMIs, actuators Focuses on reliability, safety, real-time control vs IT focus on data/info OT (Operational Technology): OT specifically refers to the technology used to monitor and control physical processes, devices, and infrastructure in industrial operations. It includes systems like SCADA (Supervisory Control and Data Acquisition), PLCs (Programmable Logic Controllers), and other control systems.
  • 7. Instructor: Junior Williams Instructor: Junior Williams OT Components • Sensors measure processes • PLCs control processes • SCADA monitors systems • DCS - distributed control system • HMIs - human-machine • Actuators - mechanical devices SCADA, which stands for Supervisory Control and Data Acquisition, is a system of hardware and software elements used to control and monitor industrial processes, infrastructure, and facilities.
  • 8. Instructor: Junior Williams Instructor: Junior Williams Overview of XIoT
  • 9. Instructor: Junior Williams Instructor: Junior Williams XIoT Cybersecurity Challenges • Legacy devices vulnerable • Lack of visibility • Increasing threats
  • 10. Instructor: Junior Williams Instructor: Junior Williams XIoT Cybersecurity Best Practices • Asset inventory • Access control • Encryption • Security frameworks (e.g. NIST, CIS, ISO, etc.)
  • 11. Instructor: Junior Williams Instructor: Junior Williams Group Activity – Assessment 3 / PART 2 • Groups are supposed to discuss the following topics and prepare a short presentation. • What is IoT? • How IoT is applied in the Industry assigned to your group. • Group A: Smart Home • Group B: Healthcare • Group C: Retail • Group D: Agriculture • Group E: Transportation • What Cybersecurity concerns does IoT raise in that industry?
  • 12. Instructor: Junior Williams Instructor: Junior Williams XIoT Security Standards/Frameworks IEC 62443 - Industrial automation and control systems security NIST SP 800-82 - Guide to industrial control systems security ISO/IEC 27001 - Information security management NIST Cybersecurity Framework CIS Critical Security Controls
  • 13. Instructor: Junior Williams Instructor: Junior Williams XIoT Security Solutions • Splunk(https://www.splunk.com) • Tenable (https://www.tenable.com) • Armis (https://www.armis.com) • Claroty (https://claroty.com)
  • 14. Instructor: Junior Williams Instructor: Junior Williams XIoT Governance • Define roles and responsibilities • Policies and procedures • Risk assessments
  • 15. Instructor: Junior Williams Instructor: Junior Williams XIoT Governance - Define roles and responsibilities • IoT Governance Board: Establish a dedicated governance board responsible for overseeing and guiding XIoT initiatives. This board may include representatives from various departments, such as IT, security, legal, compliance, and business units. • Chief IoT Officer (CIoTO): Designate an executive or leader responsible for coordinating and driving the organization's XIoT strategy. This role ensures alignment with business goals and compliance with regulatory requirements. • IoT Project Teams: Define roles and responsibilities for teams involved in implementing and managing specific IoT projects. This may include individuals responsible for device deployment, data management, security, and maintenance.
  • 16. Instructor: Junior Williams Instructor: Junior Williams XIoT Governance - Policies and procedures • Data Governance Policies: Establish clear policies governing the collection, storage, processing, and sharing of IoT-generated data. Ensure compliance with data protection regulations and industry standards. • Security Policies: Develop comprehensive security policies that address the unique challenges of IoT devices, including authentication, encryption, and secure device lifecycle management. • Privacy Policies: Define policies that protect the privacy of individuals whose data is collected by IoT devices. This includes obtaining consent, anonymizing data when necessary, and providing transparency about data usage. • Device Lifecycle Management: Implement procedures for the entire lifecycle of IoT devices, from procurement and deployment to maintenance, updates, and eventual decommissioning.
  • 17. Instructor: Junior Williams Instructor: Junior Williams XIoT Governance - Risk assessments • Security Risk Assessment: Conduct regular assessments to identify and mitigate security risks associated with XIoT deployments. This includes evaluating vulnerabilities in devices, networks, and communication protocols. • Compliance Risk Assessment: Assess the organization's compliance with relevant laws, regulations, and industry standards governing IoT implementations, such as data protection and cybersecurity regulations. • Operational Risk Assessment: Evaluate the operational risks associated with XIoT, including potential disruptions to business processes, system failures, and the impact on customer experiences. • Supply Chain Risk Assessment: Assess and manage risks related to the IoT device supply chain, ensuring the integrity and security of devices from production to deployment.
  • 18. Instructor: Junior Williams Instructor: Junior Williams XIoT Governance - Enforcement Monitoring and Enforcement: • Continuous Monitoring: Implement mechanisms for continuous monitoring of IoT devices and the associated infrastructure to detect anomalies, security breaches, or performance issues. • Enforcement Mechanisms: Define processes for enforcing policies and procedures, including consequences for non- compliance. This may involve using technology solutions, conducting audits, and providing ongoing training to personnel. Regular Audits and Reviews: • Regular Audits: Conduct periodic audits of XIoT implementations to ensure alignment with governance policies, regulatory requirements, and best practices. • Performance Reviews: Assess the performance of XIoT initiatives against defined objectives, making adjustments as needed to improve efficiency, security, and compliance.
  • 19. Instructor: Junior Williams Instructor: Junior Williams Securing IoT Devices • Change default credentials • Encrypt traffic/data • Patch and update devices
  • 20. Instructor: Junior Williams Instructor: Junior Williams Securing OT Environments • Test patches and changes • Deploy OT security tools • Monitor behaviour
  • 21. Instructor: Junior Williams Instructor: Junior Williams Medical Device Security Inventory assets Work with manufacturers Segment networks
  • 22. Instructor: Junior Williams Instructor: Junior Williams XIoT – Final Thoughts IoT, OT, and XIoT enable automation and data exchange between cyber-physical systems and internet-connected devices Presents new security challenges with diverse, interconnected assets and environments Holistic approach required combining IT and OT security tools, policies, and procedures Asset management, network segmentation, monitoring, and encryption key for risk reduction
  • 23. Instructor: Junior Williams Instructor: Junior Williams Hacking IoT devices with Python
  • 24. Instructor: Junior Williams Instructor: Junior Williams Common IoT Cyber Attacks Explained
  • 25. Instructor: Junior Williams Instructor: Junior Williams Botnets • A botnet comprises specific internet-connected computers • Each computer infected by specialized malware • Malware enables remote attacker to control individual computer • All computers collectively managed by attacker through designated server • Server used to issue commands to all malware-infected computers
  • 27. Instructor: Junior Williams Botnets usually have the structure of a centralized network Which means – each Bot is controlled by the server This server is also called a C&C Server Add a footer The Structure of Botnets
  • 28. Instructor: Junior Williams The C&C Server C&C server is for Command & Control Attacker stores commands for botnet on server Bots pull commands from server Bots return operation results to server Add a footer
  • 29. Instructor: Junior Williams How Bots Are Made • A computer can be infected by visiting a malicious website • An Infected mails, or software's are also an option which cybercriminals use to infect computers and turns them into bots Add a footer
  • 30. Instructor: Junior Williams How Bots Are Made Once a computer is infected, it tries to connect to the C&C Server If successful, the malware generate a Unique ID for this computer and send it along with other valuable info (locations, usernames, password hashes, etc.) to the C&C Server Add a footer
  • 31. Instructor: Junior Williams Bot Routine Bot routine initiated based on attacker's configuration  Bot connects to C&C at set intervals, such as once a day, to fetch commands  Bot carries out fetched commands  Results of executed commands sent back to C&C Add a footer
  • 32. Instructor: Junior Williams What Kind of Commands can the Bots Execute ? There 2 types of commands usually executed by the bots: Local commands – which usually will retrieve information from the Bot’s computer Remote commands – which usually will used to attack other computers using the Bot Add a footer
  • 33. Instructor: Junior Williams Local Commands – Screenshots Download files Execute Files View webcam Obtain credentials Add a footer What Kind of Commands the Bots Can Execute ?
  • 34. Instructor: Junior Williams What Kind of Commands the Bots Can Execute ? Remote Commands – DoS attack Try to infect a remote computer Send a malicious email Add a footer
  • 35. Instructor: Junior Williams DoS & DDoS  DoS – Denial Of Service – is an attack which aims to make a service unavailable to legitimate users for example preventing YouTube from being able to serve users.  DDoS – Distributed Denial Of Service – is the same attack but its executing from a number of computers for example Bots Add a footer
  • 36. Instructor: Junior Williams DoS & DDoS – How it Works ? The attack preformed by sending many request as possible to a server until it crashes (from running out of compute or storage capacity) Modern servers are too resilient to be crashed by a single computer DDoS – Attackers now uses Botnets in order to perform a successful DoS attack Add a footer
  • 37. Instructor: Junior Williams DoS & DDoS  And this is how it looks like: Add a footer https://norse- corp.com/map/
  • 38. Instructor: Junior Williams How Attackers Construct a New Botnet Network ? • An Exploit Kit • Scanning • Buying an existing botnet network Add a footer
  • 39. Instructor: Junior Williams Exploit Kit • An Exploit Kit is a special kit designed and built in order to execute an authorized code on a remote computer • It can be bought(for example on the dark net) or be devolved by an attacker • If an Exploit Kit offers a unique ability to infect remote computers it can become a really expensive business Add a footer
  • 40. Instructor: Junior Williams Scanning • An attacker can scan the internet for unpatched computers Add a footer
  • 41. Instructor: Junior Williams Buying an Existing Botnet Network • Cybercriminals offer pre- constructed networks online • Activity ongoing for extended period on Dark Net • Botnet network cost influenced by geographical location of compromised computers • Computers in United States often command highest prices Add a footer
  • 42. Instructor: Junior Williams Instructor: Junior Williams What is botnet and how does it spread?
  • 43. Instructor: Junior Williams Instructor: Junior Williams Break Questions? Drop a message on the chat or send an email to junior.williams@torontosom.ca

Editor's Notes

  1. IoT Communication Protocols MQTT - lightweight publish-subscribe protocol CoAP - web transfer protocol for constrained nodes AMQP - asynchronous messaging protocol DDS - data-centric publish-subscribe protocol XMPP - extensible messaging and presence protocol
  2. IT, OT, IoT IIoT (Industrial Internet of Things) and IoMT (Internet of Medical Things) Building systems Medical devices Interconnected systems