SlideShare a Scribd company logo
1 of 30
Abhinav BiswasIEW EFYCON 2018
http://AbhinavBiswas.github.io@Abhinav_BIswas
Electronics Corporation of India Limited
A Govt. of India (Dept. of Atomic Energy) Enterprise
Security Leader of the Year Award - 2016
by DSCI, NASSCOM
Playing with Dark-Side of IOT
NCSS Summit, 2017
IBM Blue Scholar, 2012CISCO Certified CyberOps,
EHCE by US-Council
& more…
Cybernetic modeling of ICS
IEEE Journal, 2015
Top 100 InfoSec Maestros 2016,
DynamicCISO Security Excellence
Awards etc.
The Sensors
The Cloud
M2M
PHYSICAL
DIGITAL
1. Tiny
Computers
2. Massive
Computers
3. Physical is becoming Digital
4. Digital is becoming Physical
Chrysler Recalled
1.4M Vehicles for Bug Fix
“Hey Siri, What is Ransomeware?”
A type of malware designed to block access to a computer system until a
sum of money is paid.
Smart PacemakersSmart Thermostats
It’s time to
‘WannaCry’
with your Smart TV….
• Inconvenience
“What is the time now sir?”
-- Sorry my Watch is Dead….
#1 Resource Constraints
#2 The STRIDE Threat Vectors
SECURITY PRIVACY ANONYMITY
SECURITY PRIVACY ANONYMITY
SECURITY PRIVACY ANONYMITY
Obscurity
by
Security
Design
Planning Design Implement..n Verification Validation Deployment Operations
Design
by
Security
Decentralization
Trustworthy
Distributed
Immutable
Publically
Verifiable
Pick Atleast Two
We tend to Over-estimate the effect of a technology in the short run
and Under-estimate the effect in the long run.
- Amara’s Law
“It ain't what you don't know that gets you into trouble.
It's what you know for sure that just ain't so.”
AbhinavBiswas@ecil.gov.in
@Abhinav_BIswas

More Related Content

What's hot

IoT Security Middleware: evaluating the threats and protecting against them
 IoT Security Middleware: evaluating the threats and protecting against them IoT Security Middleware: evaluating the threats and protecting against them
IoT Security Middleware: evaluating the threats and protecting against themNick Allott
 
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTAuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTTransUnion
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsGeorge Fletcher
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyBlock Armour
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaAvinash Sinha
 
Presentation on IoT by tushar
Presentation on IoT by tusharPresentation on IoT by tushar
Presentation on IoT by tushartushar4609
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay KumarOWASP Delhi
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeBlock Armour
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...Block Armour
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSanjayKumarYadav58
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issuesrjain51
 
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuitySecuring Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuityBlock Armour
 
Solution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHSolution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHBlock Armour
 
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT SecurityCableLabs
 
Block Armour Digital Vault
Block Armour Digital VaultBlock Armour Digital Vault
Block Armour Digital VaultBlock Armour
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
RAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan BansalRAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan BansalOWASP Delhi
 
Insider (Network Tool)
Insider (Network Tool)Insider (Network Tool)
Insider (Network Tool)akki_hearts
 

What's hot (20)

IoT Security Middleware: evaluating the threats and protecting against them
 IoT Security Middleware: evaluating the threats and protecting against them IoT Security Middleware: evaluating the threats and protecting against them
IoT Security Middleware: evaluating the threats and protecting against them
 
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTAuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open Standards
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
 
Simon Ford - ARM and the Open Internet of Things
Simon Ford - ARM and the Open Internet of ThingsSimon Ford - ARM and the Open Internet of Things
Simon Ford - ARM and the Open Internet of Things
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
 
Presentation on IoT by tushar
Presentation on IoT by tusharPresentation on IoT by tushar
Presentation on IoT by tushar
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay Kumar
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) Devices
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuitySecuring Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
 
Solution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHSolution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFH
 
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
 
Block Armour Digital Vault
Block Armour Digital VaultBlock Armour Digital Vault
Block Armour Digital Vault
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
RAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan BansalRAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan Bansal
 
Insider (Network Tool)
Insider (Network Tool)Insider (Network Tool)
Insider (Network Tool)
 

Similar to Abhinav BiswasIEW EFYCON 2018 Electronics Corporation of India Limited

The Insecurity of Industrial Things
The Insecurity of Industrial ThingsThe Insecurity of Industrial Things
The Insecurity of Industrial ThingsSenrio
 
Cybersecurity by the numbers
Cybersecurity by the numbersCybersecurity by the numbers
Cybersecurity by the numbersEoin Keary
 
Cyber warfare update 2016
Cyber warfare update 2016 Cyber warfare update 2016
Cyber warfare update 2016 Kevin Murphy
 
Hacker Proof: Building Secure Software
Hacker Proof: Building Secure SoftwareHacker Proof: Building Secure Software
Hacker Proof: Building Secure SoftwareCesar Cerrudo
 
OIT Technology, Communications, Japan
OIT Technology, Communications, JapanOIT Technology, Communications, Japan
OIT Technology, Communications, JapanChristos Makiyama
 
Machine Learning and IOT on the AWS Cloud
Machine Learning and IOT on the AWS CloudMachine Learning and IOT on the AWS Cloud
Machine Learning and IOT on the AWS CloudAmazon Web Services
 
Cybersecurity in the Age of the Everynet
Cybersecurity in the Age of the Everynet   Cybersecurity in the Age of the Everynet
Cybersecurity in the Age of the Everynet Bill Harpley
 
Dark - Side of Internet of Things (IOT)
Dark - Side of Internet of Things (IOT)Dark - Side of Internet of Things (IOT)
Dark - Side of Internet of Things (IOT)Abhinav Biswas
 
How to Avoid IoTageddon
How to Avoid IoTageddon How to Avoid IoTageddon
How to Avoid IoTageddon Bob Snyder
 
We cant hack ourselves secure
We cant hack ourselves secureWe cant hack ourselves secure
We cant hack ourselves secureEoin Keary
 
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術ハイシンク創研 / Laboratory of Hi-Think Corporation
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017Saumil Shah
 
AI, Blockchain and Quantum - Moonshoot for the Enterprise !?
AI, Blockchain and Quantum - Moonshoot for the Enterprise !?AI, Blockchain and Quantum - Moonshoot for the Enterprise !?
AI, Blockchain and Quantum - Moonshoot for the Enterprise !?Thorsten Schroeer
 
Spellpoint - Securing Access for Microservices
Spellpoint - Securing Access for MicroservicesSpellpoint - Securing Access for Microservices
Spellpoint - Securing Access for MicroservicesUbisecure
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019John D. Johnson
 
Get in Touch with Internet of Things
Get in Touch with Internet of ThingsGet in Touch with Internet of Things
Get in Touch with Internet of ThingsCodePolitan
 

Similar to Abhinav BiswasIEW EFYCON 2018 Electronics Corporation of India Limited (20)

The Insecurity of Industrial Things
The Insecurity of Industrial ThingsThe Insecurity of Industrial Things
The Insecurity of Industrial Things
 
Cybersecurity by the numbers
Cybersecurity by the numbersCybersecurity by the numbers
Cybersecurity by the numbers
 
Cyber warfare update 2016
Cyber warfare update 2016 Cyber warfare update 2016
Cyber warfare update 2016
 
Hacker Proof: Building Secure Software
Hacker Proof: Building Secure SoftwareHacker Proof: Building Secure Software
Hacker Proof: Building Secure Software
 
OIT Technology, Communications, Japan
OIT Technology, Communications, JapanOIT Technology, Communications, Japan
OIT Technology, Communications, Japan
 
Presentation -A
Presentation  -APresentation  -A
Presentation -A
 
Machine Learning and IOT on the AWS Cloud
Machine Learning and IOT on the AWS CloudMachine Learning and IOT on the AWS Cloud
Machine Learning and IOT on the AWS Cloud
 
Cybersecurity in the Age of the Everynet
Cybersecurity in the Age of the Everynet   Cybersecurity in the Age of the Everynet
Cybersecurity in the Age of the Everynet
 
Dark - Side of Internet of Things (IOT)
Dark - Side of Internet of Things (IOT)Dark - Side of Internet of Things (IOT)
Dark - Side of Internet of Things (IOT)
 
How to Avoid IoTageddon
How to Avoid IoTageddon How to Avoid IoTageddon
How to Avoid IoTageddon
 
We cant hack ourselves secure
We cant hack ourselves secureWe cant hack ourselves secure
We cant hack ourselves secure
 
IoT: State of the Union
IoT: State of the Union IoT: State of the Union
IoT: State of the Union
 
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017
 
AI, Blockchain and Quantum - Moonshoot for the Enterprise !?
AI, Blockchain and Quantum - Moonshoot for the Enterprise !?AI, Blockchain and Quantum - Moonshoot for the Enterprise !?
AI, Blockchain and Quantum - Moonshoot for the Enterprise !?
 
Spellpoint - Securing Access for Microservices
Spellpoint - Securing Access for MicroservicesSpellpoint - Securing Access for Microservices
Spellpoint - Securing Access for Microservices
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
Get in Touch with Internet of Things
Get in Touch with Internet of ThingsGet in Touch with Internet of Things
Get in Touch with Internet of Things
 
A chip to protect IOT
A chip to protect IOTA chip to protect IOT
A chip to protect IOT
 

More from Abhinav Biswas

Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance...
Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance...Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance...
Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance...Abhinav Biswas
 
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...Abhinav Biswas
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesAbhinav Biswas
 
Insights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionInsights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionAbhinav Biswas
 
Ion Mobility Spectrometry (IMS) based Explosive Detector
Ion Mobility Spectrometry (IMS) based Explosive DetectorIon Mobility Spectrometry (IMS) based Explosive Detector
Ion Mobility Spectrometry (IMS) based Explosive DetectorAbhinav Biswas
 
Virtual Trial Room - Abhinav Biswas
Virtual Trial Room - Abhinav BiswasVirtual Trial Room - Abhinav Biswas
Virtual Trial Room - Abhinav BiswasAbhinav Biswas
 

More from Abhinav Biswas (7)

Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance...
Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance...Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance...
Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance...
 
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for Enterprises
 
Insights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionInsights Into Modern Day Threat Protection
Insights Into Modern Day Threat Protection
 
Ion Mobility Spectrometry (IMS) based Explosive Detector
Ion Mobility Spectrometry (IMS) based Explosive DetectorIon Mobility Spectrometry (IMS) based Explosive Detector
Ion Mobility Spectrometry (IMS) based Explosive Detector
 
Virtual Trial Room - Abhinav Biswas
Virtual Trial Room - Abhinav BiswasVirtual Trial Room - Abhinav Biswas
Virtual Trial Room - Abhinav Biswas
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Abhinav BiswasIEW EFYCON 2018 Electronics Corporation of India Limited

Editor's Notes

  1. A very good morning to all of you Gentlemen. It’s a great pleasure and delight to be here at EFY Conference this morning. There’s a lot of energy, lot of vibrance and a lot of dynamism here. First of all I would like to thank the whole EFY team for inviting me here & giving me this platform to share my views on the Dark-Side of IOT with a specific focus on Security & Privacy Challenges. So, Before I begin…
  2. I am Abhinav Biswas, Currently, working in a Public Sector Enterprise, called the Electronics Corporation of India limited (ECIL), under Department of Atomic Energy (DAE), Government of India. Talking about ECIL we make strategic electronic products for the Indian Defense & Nuclear establishments. We have our own indigenously made routers, mass encryptors, missile fuzes, the famous EVMs etc. Recently we celebrated our Golden Jubilee year.   I myself have been specialising in diverse security areas like private TOR networks, Security of Industrial Control Systems (ICS) & IOT, Virtualization & Hardware security, Cloud & Enterprise Network Security etc.    I have been a recipient of the prestigious ‘Security Leader of the Year Award - 2016’ by Data Security Council of India (DSCI), and have won other national accolades like Top 100 InfoSec Maestros, Dynamic CISO Security Excellence Awards etc. I also posses a couple of Certifications. I can be reached on this Twitter handle.   So, without further adieu, lets begin.. 
  3. With the advent of IOT, we are drifting into an era of smart things. We started with smart phones, smart watches…then moving on to smart TVs, smart refrigerators, smart bulbs, smart electric meters, and combining them all together we have smart home. We are also talking about smart traffic management, smart car parking, smart retail, smart healthcare, smart energy, smart industries and finally we are building a smart planet I suppose....
  4. But why is every ‘thing’ getting smarter? Is it just a marketing gimmick for publicity of existing products. Or the things are really getting smarter. If yes, what is making things smart… Is it because of some small things which are getting smaller and smaller.
  5. The sensors We now have accelerometers, gyroscopes, proximity sensors, humidity sensors, gps location sensors in the size range of millimeters. Your typical smartphone itself has about 10 sensors on an average. So, Is this proliferation of small small sensors is what making things smart.
  6. Or is it because of these big things, the servers, the cloud.. Computing is becoming incredibly powerful day by day….and its growing exponentially - Moore’s law. With more capacity, more performance, more capability and more change in the next 10 years than the last 50. Big Data Analytics, Machine Learning, Deep Learning, Artificial Intelligence (AI), Predictive & Prescriptive Intelligence all are possible because of these big machines. So can we say The Cloud is making everything smart.
  7. Or it is because of the rise of M2M IOT devices are getting ubiquitously connected…50 billion devices connected by 2020 as per Gartner. Devices can talk to each other without human intervention even. And can take decision themselves. Gone are the days when you would use an app on ur phone to order milk from a grocery store. Smart refrigerators have automatd this. It can sense the unavailability of milk n order by itself. So is M2M & Connectivity making things smart.
  8. I believe it’s the combination of all three. These are the 3 things which is making every thing smart. When we combine these 3 we get the power of innovating interesting IOT systems, applications and services. Let it be the wearables, the implantables, the injectables…every smart thing is leveraging these 3 technologies. And if we give a closer look, all smart things are doing this.
  9. They are enabling us to bridge the gap btwn the physical world where we all live in and the digital world where we get the power of data-driven decisions. The tiny computers of physical world, the sensors are getting connected to these massive computers that exist in the digital world, call it the cloud, hpc watever. Where we can optimise at the pace of moore’s law. They are connected in ways that allows the physical to become digital. To sample the world, to turn it into something that those massive big computers can ingest And then in return we are able to take the digital and make it physical And when digital things become physical, digital threats also become physical threats. And that’s where smart things can go bad n reveal the dark side.
  10. Consider this car by Chrysler…The Jeep Cherokee An awesome SUV with smart features like hands-free voice command control for dashboard funtions, smart infotainment system with capabilities of integration with your icloud & google drive. You can easily create a wifi hotspot using 4G LTE module embedded into the car. So a pretty nice car with cool smart features…bt it was hacked. It was demonstated in Blackhat Conf a couple of years back. These guys Reverse Engineered Car Firmware & Communications Protocol, And took over Dashboard functions, Steering, Transmission and Brakes They Remotely controlled the car & showed how they can crash the car without the knowledge of the driver.
  11. This is World’s First Interactive Doll by a company called Mattel. It uses Uses Voice Recognition technology & Progressive Machine Learning to Play interactive games & tells jokes to your kid, read a book & do language translations. It can also tailor conversations based on history. Note intelligence is not put into the doll….it’s connected to those massive computers of digital world. This seems a very interesting proposition in terms of IOT. But, this was hacked. The doll failed to validate SSL Certificates and hence the hacker quite cunningly crafted a MITM Attack to get control over the doll. He got access to the all audio files recorded by the doll. He could penetrate into the home wifi network and was able to sniff user credentials for regular internet traffic. But is this the only threat. Just imagine, what can happen if this doll teaches offensive things to your kid. What if someone is eavesdropping on our children without our knowledge. Now, Eavesdropping can also happen through other smart devices.. Like smart TVs..
  12. Smart TVs are coming with intuitive voice command & control these days.. We are becoming lazy enough to even use the wireless remote. What if that same microphone in the TV can be used to listen to the private communications in your bed room. Smart TVs have also been reported to be hacked & infected by malware for automated Ad Clicks and cryptocurrency mining.
  13. About 10% of the World’s Population suffer from Diabetes and India being the Diabetic capital of the world around 70 million people suffer from diabetes in India itself. This device is a wonder for them. There’s a small glucose sensor, which detects the blood sugar level in near real-time and sends the data to the pump which decides the right dose of insulin to be injected. The sensor communicates with the electronic pump using infrared waves. Also it can connect to home Wi-Fi netwok and send you updates on the mobile app. But even these were reported to be hacked.
  14. Milli Meter Square MM2 from university of Michigan Fully autonomous computing system… Smaller than the size of a grain of rice. Less than a half a centimeter Small computers have sensors, a processor and a radio in it to transmit data. Solar cells power the battery with ambient light Sensing temperature, pressure, and taking images. Collective Swarm…Fog Computing – Micro Cloud....Putting it into soil for smart Agricultures.. Lot of interesting prposition in terems of IOT at essentialy zero cost. But dark side.. These device have no security built-in. All collected sensor data is published in open air using radio waves. Don’t even think of WPA2 encryption at milimetere level. Now, We are not able to secure one Iot device...Imagine how difficult it would be to secure a cluster of these small small devices.
  15. Ransomeware have been quite popular in the Cyber Security Space since past few years where the hacker will put a malware in your system that will encrypt you hard disk and will prevent u to access ur data until u pay a ransom... Ransomeware has also started penetrating into the IOT sector. Take the case of Nest Thermostats, the home owner went for a vacation and got a message that his room temperature has been increased to 100^C. His room is going to burn soon. To unlock the thermostat please pay xyz bitcoins. Now, just predict…How much do you think someone would pay to remove ransomware from a pacemaker? The scenario is not too far-fetched; in fact, it is much more deadly. Of course, anyone launching an IoT ransomware attack will need to consider just *how* they will inform the device’s owner of their financial demands. That’s obvious on a laptop, but presents more of a challenge on a pacemaker unless the attacker has also managed to determine, say, their victim’s email address.
  16. And, I believe the days have come where one would not come out of surprise if he sees this on his iPhone… And also, it’s time to WannaCry with our Smart TVs… If you remember WannaCry was the largest Ransomware attack last year to hit Windows Operating Systems.
  17. DOS is one more problem in IOT. Imagine one fine morning you are ready to go to office, you start your car & you see this. There’s a critical firmware update for your Tesla Dashboard system, plz don’t drive up to 45 minutes.
  18. May be nothing. May be the hacker gets to know how many eggs u have, or how much milk u drink. Or simply gets to know that are not home. But think it like this, what if one day the Police comes knocking at ur door telling that ur fridge is being used for sending threatening emails to the Prime Minister’s Office. We all know about bots & botnets…what if the attacker turns ur fridge into a bot to do DDOS Attacks on other networks. So, A compromised fridge is not just the problem, the use of these devices for carrying out a massive DDOS attack is a much bigger problem. Companies like Twitter, Netflix have already been attacked with these. Remember the famous Mirai Botnet of 2016, which took down millions of Security cameras to DDOS the DNS Servers of these big companies. Now why is all this happening….can’t we make these smart devices smart enough to be secure. What is stopping us to make IOT Secure. It’s the Resource Constraints.
  19. Any typical IOT deployment would look like this. Sensors in field, Aggregators & gateways in premise Then IoT data platform which can be both in-premise or in cloud. & finally the Analytics platform in cloud… But as we move from the cloud to the fog to the field...the first iot security challenge we face is the resource contraint problem... And by resources i mean, limited CPU, limited memory in KBs, limited power, etc. And because of that, Implementing Crytographic encryption..Impmenting AV on field devices is a big challenge. Like implementing a light encryption scheme on a pacemaker could decrease its battery life from about a decade to as little as a few years because the device is not designed to sustain those operations. The more resource intensive the encryption, the more dire the situation.
  20. The 2nd IOT Security Challenge the rapidly expanding IOT Attack Surface, The STRIDE Threat Vectors Attacks are getting innovatve day by day, bt they can be classified amon these 6 buckets. S - Hoc can we kno we are talking to the right device. PKI, In EVMs. T – Data is not tampered before it is sent to the aggregator or the cloud. Re calibrated by replacing with firmware. R - No logs are stored. How can we verify later if something malicious is done from some device. Cyber forensics on IoT I – Data Sent through radio waves without encryption..who know’s whos collecting this data. D – IOT is all about The right data at the right time. E – Target Hack - Forward facing from internet only
  21. Security is not the only challenge in IOT. Privacy & Anonymity concerns are much more scary. There’s a very subtle difference between Privacy & Anonymity. The sensors of the digital world are fuelled with our data…personal data..PII..Personally identifiable information. Data being the new Oil of 21st century. Our purchasing patterns, browsing patterns, driving habits, eating habits, health indicators like heartbeat, blood pressure, places we visit, social data, friends, contacts, every data is being collected by these Smart devices
  22. And they are sent here. To these huge server farms of the digital world right. But have you ever asked yourself what is it we are farming in these server farms. Because if you do you will quickly reach to conclusion that it’s us. That we are the product that the data crunching companies like Google, Facebook etc. sell to their customers. And there’s a lack of transparency between data being collected n what it is being used for. You want the smart refrigerator to sense you are out of butter n hence remind you to pick more up when u r in a grocery store but you don’t want it to tell this to our health insurance company…you want your house to sense when you are home so it can turn on/of the lights n play our favourite music but you don’t want it to tell other people when you come n when you go. So We are drifting into an era ubiquitous surveillance where anonymity may help resolve some of the privacy challenges. You may think what about TOR in embedded IOT.
  23. But is TOR network trustworthy. After the revealations of Edward Snowden can we trust on anything. Even Hacking Team the Italian startup got hacked. Lot of their zero day exploits were targeted on field devices of Industrial Control Systems…The famous Apple vs FBI case…whom can we trust. We can’t even trust hardware.. You see apple devices.. Designed in California, Made in China & sold in india…who knows hardware trojans are not embedded at fpga level. For instance, at ECIL while testing one of the defence routers at our Hardware Sanitization Lab, we found that the router was emitting the root password through the LED bulbs of the Ethernet ports. You can simply take a Photo-Opto reader and capture the blinking pattern to get the root password. Such Side-Channel Attacks & Hardware trojans are amazing and very difficult to detect. At ECIL, we really believe that this is the next big challenge to solve.
  24. Can’t we make smart devices smart enough to be secure. We need to understand, that there’s no silver bullet that can effectively mitigate all IOT threats. We can’t apply Security by Obscurity principles in IOT. We can’t say our IOT product is secure because it uses propreitary protocols, indigenous hardware or air-gapped networks. We need to think security by design. And security can not be an afterthought. It has to considered & implemented in all of theses stages. Lot of research is going on in various parts of the world regarding. How to bootstrap trust and security, from the very basic Design stage. Powerful Systems on a Chip (SOC) with embedding hardware security support l Elliptic Curve Cryptography with reduced computational demands Also, We need to implement new design topologies to adrress the privacy challenges...Decentralisation...
  25. We need to implement technologies like Blockchain so that we can have IOT systems which are Distributed, Immutable, Trust-worthy & Publically verifiable. In this era of Idustry 4.0, we are unknowingly & inherently getting attached to a Hyperconnected Global SensorNet. And this amazing disruptive change is very different from any other technological megatrendz. Coz in this era an active adversary is always trying to change and create value out of what we do. So, if we want to make IOT a success we need to be smarter than our smart devices. And awareness is the key to this.
  26. Next, We need to understand the delicate balance of speed to market and the appropriate level of security. We should atleast pick two. One more thing I would like to highlight here is: To Address IOT threats, IOT Business Model has to change…Earlier we used to build product, ship them and forget about them until we had to service them, but now in the world of IOT we have to ship and remember. Remember where are our devices and wat they doing that they shouldn’t. Regular firmware updates like in laptops n smart phones. OTA vs Recall back to factory for patching
  27. I believe in Amara’s law, We tend to Overstimate technology in the short run and Understimate the impact of it on the long run. We never estimated that Facebook can show these lights on the global map. We have entered into an era of assumption which is starting to drive n change what we see. The assumption is that we are all quiet, unprepared and actually with absolutely due respect internally extrernally the reason we are all here is we don't have the answers n we don't understand all of the implications of this amazing world that is about to take place. And before I conclude, One last thing...
  28. I want to show you a video of where we are heading. Stay tuned..
  29. With that I would like to conclude my presentation…Thank you all. And if I’m not running out of time…I can take some questions from the audience.