SlideShare a Scribd company logo
1 of 28
A systems operator for a power company
considers the threat from his Internet ofThings footprint.
The power company I work for has tight network security.
We do a SOC 1 type 2 audit every year with excellent results.
W E ’ V E N E V E R H A D A S E C U R I T Y B R E A C H .
I T N E V E R O C C U R R E D T O M E T H AT A N Y T H I N G
I C O U L D B E D O I N G W O U L D B E C O N S I D E R E D A T H R E AT.
I saw a video on YouTube about IoT and the threats
to corporate networks that made me think about my IoT footprint.
The video said that there would be 50 billion IoT devices
by 2020, and that many were not secure and could be hacked.
("IoT Connections to Grow 140% to Hit 50 Billion By 2022," n.d.)
I started thinking about my fitbit.
I wonder if there are any threats
associated with wearing it to work.
I did a search on the Internet. If a bad actor wanted to gain physical access
to the power company where I work, any IoT devices like the fitbit that track
the location of power company workers and transmit the data over the Internet
could be a valuable source of information.
According to Deputy Defense Secretary Patrick Shanahan, “These geolocation
capabilities can expose personal information, locations, routines, and numbers
of DoD personnel, and potentially create unintended security consequences
and increased risk…”
("Turn Off Your Fitbit, Garmin, Apple Watch GPS NOW!," 2018)
I also found information about a malware attack from 2015. This vulnerability,
discovered by Fortinet, allowed a hacker to access the fitbit by Bluetooth
and then upload malware to the device. When the device is then connected
to a computer, the computer could be infected with the virus. This was disputed
by fitbit, but it brings up a good point. Any IoT device that an employee
of the power company brings to work that is connected to their work computer
could possibly infect the computer. This is alarming, because I know a lot of people
who connect their smartphones to their computers at work.
(Pauli, 2015)
Reading about the security concerns with the fitbit made me think about
the security of my iPhone.This could potentially be a greater attack vector,
because it is practically a full-blown computer with its own applications.
Not only does the iPhone’s IOS operating system have vulnerabilities
that are constantly being patched, but each application
could potentially be a point of vulnerability.
In 2017, it was discovered that the iTunes and the App Store
both had script injection vulnerabilities that could allow
an attacker to inject malicious code.
(Brook, 2017)
I connect my iPhone to the company’s wireless. I don’t always update it when a
new version of IOS comes out. I’m sure I need to be more vigilant
when it comes to keeping my phone updated. I did some research
on iPhone vulnerabilities, and what I found was quite disturbing.
Mobile remote-accessTrojans can jailbreak a device and install surveillance
andTrojan software that gives the attacker remote access to the device.
There are fake IOS certificates that can allow
a hacker to side-load an application with malware.
A user can be tricked into downloading a malicious profile,
which can divert the traffic from the phone to a rogue server,
install malicious apps, or decrypt encrypted sessions.
An attacker can perform a man-in-the-middle attack
on the phone by installing a rogue wireless access point.
An attacker can exploit a vulnerability in a WebKit
to execute malicious scripts on the phone
with the purpose of infecting the device.
Zero-day attacks can enable a hacker to steal passwords, corporate data,
and emails or capture keyboard activity or screen information from the phone.
(Staff, 2014)
I STARTEDTOTHINK ABOUT MY INTERNET CAMERA AT HOME.
THESE CAMERAS ARE EASILY HACKABLE.THE HACKER CAN ACCESSTHEVIDEO
THE CAMERA RECORDS. I OFTENTALKTO MYWIFE ABOUTWORKWHEN I’M AT HOME.
ITWOULD BEVERY BAD IF A HACKER COULD HEARTHESE PRIVATE CONVERSATIONS.
IP cameras can also be used in DDoS attacks.
There was a famous attack against Dyn in October, 2016.
They are an internet provider for Amazon, Netflix, and Twitter.
The attack froze the internet for hours. The botnet used in the attack
was composed of IoT devices, many of which were IP cameras.
("New Threat Against Corporate Security…Security Cameras," 2018)
I have an app for the camera on my phone.
If the camera is compromised, it’s possible that
the app on my phone could become infected
and spread malware to the corporate network
over the wireless connection.
Looking into the devices I bring to work every day made me
start to think about how many IoT devices there are
when you consider all the users in our company.
One change the power company may want to make
is isolating the wireless so it can’t access the corporate network.
AN IOT SECURITY AWARENESS PROGRAM FOR ALL EMPLOYEES
OF THE POWER COMPANY WOULD BE A GOOD IDEA.
A corporate policy for IoT that mandated that users keep their devices updated
might also be a good idea. An MDM solution that could keep users’ phones
up to date with security updates would be a good control as well.
It would probably make sense to tell users that with devices like fitbit
they shouldn’t connect them to corporate assets. A group policy
that prevents users from installing software would help with this.
IoT security for businesses is becoming more important
as the number of devices grows each year.
This is especially important to a business like a power company,
where an outage could be a public hazard. User awareness is key,
but there are also security controls an organization can put into place
to mitigate the threats to IoT devices that connect to corporate networks.
References
A New Threat Against Corporate Security…Security Cameras. (2018, February 20). Retrieved
from https://www.pandasecurity.com/mediacenter/security/security-cameras-threat-
against-companies/
Fitbit trackers can be hacked in '10 seconds' (update: Fitbit disagrees). (2015, October 21).
Retrieved from https://www.engadget.com/2015/10/21/fitbit-tracker-bluetooth-
vulnerability/
IoT Connections to Grow 140% to Hit 50 Billion By 2022. (n.d.). Retrieved from
https://www.juniperresearch.com/press/press-releases/iot-connections-to-grow-140-
to-hit-50-billion
Turn Off Your Fitbit, Garmin, Apple Watch GPS NOW! (2018, August 6). Retrieved from
https://breakingdefense.com/2018/08/turn-off-your-fitbit-garmin-apple-watch-gps-now/
Brook, C. (2017, January 17). Vulnerabilities Leave iTunes, App Store Open to Script
Injection. Retrieved from https://threatpost.com/vulnerabilities-leave-
iTunes-app-store-open-to-script-injection/123129/
Pauli, D. (2015, October 21). '10-second' theoretical hack could jog Fitbits into
malware-spreading mode. Retrieved from
https://www.theregister.co.uk/2015/10/21/fitbit_hack/
Staff, C. (2014, October 14). Top 6 threats to iOS devices. Retrieved from
https://www.csoonline.com/article/2826038/mobile-security/top-6-threats-to-
ios-devices.html

More Related Content

What's hot

Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesNeil Kemp
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Ekonomikas ministrija
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsSaad Ahmad
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...ijcsit
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionDr Laurent Guiraud
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsSkycure
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overviewFabio Pietrosanti
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 

What's hot (20)

Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a Solution
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 

Similar to Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors

IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxvrickens
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxvoversbyobersby
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxmariuse18nolet
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...AIRCC Publishing Corporation
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...AIRCC Publishing Corporation
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2FitCEO, Inc. (FCI)
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of ThingsCognizant
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdfRakeshPatel583282
 
Personal data breaches and securing IoT devices· By Damon Culber.docx
Personal data breaches and securing IoT devices· By Damon Culber.docxPersonal data breaches and securing IoT devices· By Damon Culber.docx
Personal data breaches and securing IoT devices· By Damon Culber.docxherbertwilson5999
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOThe Economist Media Businesses
 
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)CR Group
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)SecPod Technologies
 

Similar to Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors (20)

IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
 
Security Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – NetmagicSecurity Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – Netmagic
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2
 
iot ppt.pptx
iot ppt.pptxiot ppt.pptx
iot ppt.pptx
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
Personal data breaches and securing IoT devices· By Damon Culber.docx
Personal data breaches and securing IoT devices· By Damon Culber.docxPersonal data breaches and securing IoT devices· By Damon Culber.docx
Personal data breaches and securing IoT devices· By Damon Culber.docx
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
 

Recently uploaded

Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 

Recently uploaded (20)

Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 

Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors

  • 1. A systems operator for a power company considers the threat from his Internet ofThings footprint.
  • 2. The power company I work for has tight network security. We do a SOC 1 type 2 audit every year with excellent results.
  • 3. W E ’ V E N E V E R H A D A S E C U R I T Y B R E A C H . I T N E V E R O C C U R R E D T O M E T H AT A N Y T H I N G I C O U L D B E D O I N G W O U L D B E C O N S I D E R E D A T H R E AT.
  • 4. I saw a video on YouTube about IoT and the threats to corporate networks that made me think about my IoT footprint.
  • 5. The video said that there would be 50 billion IoT devices by 2020, and that many were not secure and could be hacked. ("IoT Connections to Grow 140% to Hit 50 Billion By 2022," n.d.)
  • 6. I started thinking about my fitbit. I wonder if there are any threats associated with wearing it to work.
  • 7. I did a search on the Internet. If a bad actor wanted to gain physical access to the power company where I work, any IoT devices like the fitbit that track the location of power company workers and transmit the data over the Internet could be a valuable source of information. According to Deputy Defense Secretary Patrick Shanahan, “These geolocation capabilities can expose personal information, locations, routines, and numbers of DoD personnel, and potentially create unintended security consequences and increased risk…” ("Turn Off Your Fitbit, Garmin, Apple Watch GPS NOW!," 2018)
  • 8. I also found information about a malware attack from 2015. This vulnerability, discovered by Fortinet, allowed a hacker to access the fitbit by Bluetooth and then upload malware to the device. When the device is then connected to a computer, the computer could be infected with the virus. This was disputed by fitbit, but it brings up a good point. Any IoT device that an employee of the power company brings to work that is connected to their work computer could possibly infect the computer. This is alarming, because I know a lot of people who connect their smartphones to their computers at work. (Pauli, 2015)
  • 9. Reading about the security concerns with the fitbit made me think about the security of my iPhone.This could potentially be a greater attack vector, because it is practically a full-blown computer with its own applications.
  • 10. Not only does the iPhone’s IOS operating system have vulnerabilities that are constantly being patched, but each application could potentially be a point of vulnerability.
  • 11. In 2017, it was discovered that the iTunes and the App Store both had script injection vulnerabilities that could allow an attacker to inject malicious code. (Brook, 2017)
  • 12. I connect my iPhone to the company’s wireless. I don’t always update it when a new version of IOS comes out. I’m sure I need to be more vigilant when it comes to keeping my phone updated. I did some research on iPhone vulnerabilities, and what I found was quite disturbing.
  • 13. Mobile remote-accessTrojans can jailbreak a device and install surveillance andTrojan software that gives the attacker remote access to the device.
  • 14. There are fake IOS certificates that can allow a hacker to side-load an application with malware.
  • 15. A user can be tricked into downloading a malicious profile, which can divert the traffic from the phone to a rogue server, install malicious apps, or decrypt encrypted sessions.
  • 16. An attacker can perform a man-in-the-middle attack on the phone by installing a rogue wireless access point.
  • 17. An attacker can exploit a vulnerability in a WebKit to execute malicious scripts on the phone with the purpose of infecting the device.
  • 18. Zero-day attacks can enable a hacker to steal passwords, corporate data, and emails or capture keyboard activity or screen information from the phone. (Staff, 2014)
  • 19. I STARTEDTOTHINK ABOUT MY INTERNET CAMERA AT HOME. THESE CAMERAS ARE EASILY HACKABLE.THE HACKER CAN ACCESSTHEVIDEO THE CAMERA RECORDS. I OFTENTALKTO MYWIFE ABOUTWORKWHEN I’M AT HOME. ITWOULD BEVERY BAD IF A HACKER COULD HEARTHESE PRIVATE CONVERSATIONS.
  • 20. IP cameras can also be used in DDoS attacks. There was a famous attack against Dyn in October, 2016. They are an internet provider for Amazon, Netflix, and Twitter. The attack froze the internet for hours. The botnet used in the attack was composed of IoT devices, many of which were IP cameras. ("New Threat Against Corporate Security…Security Cameras," 2018)
  • 21. I have an app for the camera on my phone. If the camera is compromised, it’s possible that the app on my phone could become infected and spread malware to the corporate network over the wireless connection.
  • 22. Looking into the devices I bring to work every day made me start to think about how many IoT devices there are when you consider all the users in our company.
  • 23. One change the power company may want to make is isolating the wireless so it can’t access the corporate network.
  • 24. AN IOT SECURITY AWARENESS PROGRAM FOR ALL EMPLOYEES OF THE POWER COMPANY WOULD BE A GOOD IDEA.
  • 25. A corporate policy for IoT that mandated that users keep their devices updated might also be a good idea. An MDM solution that could keep users’ phones up to date with security updates would be a good control as well. It would probably make sense to tell users that with devices like fitbit they shouldn’t connect them to corporate assets. A group policy that prevents users from installing software would help with this.
  • 26. IoT security for businesses is becoming more important as the number of devices grows each year. This is especially important to a business like a power company, where an outage could be a public hazard. User awareness is key, but there are also security controls an organization can put into place to mitigate the threats to IoT devices that connect to corporate networks.
  • 27. References A New Threat Against Corporate Security…Security Cameras. (2018, February 20). Retrieved from https://www.pandasecurity.com/mediacenter/security/security-cameras-threat- against-companies/ Fitbit trackers can be hacked in '10 seconds' (update: Fitbit disagrees). (2015, October 21). Retrieved from https://www.engadget.com/2015/10/21/fitbit-tracker-bluetooth- vulnerability/ IoT Connections to Grow 140% to Hit 50 Billion By 2022. (n.d.). Retrieved from https://www.juniperresearch.com/press/press-releases/iot-connections-to-grow-140- to-hit-50-billion Turn Off Your Fitbit, Garmin, Apple Watch GPS NOW! (2018, August 6). Retrieved from https://breakingdefense.com/2018/08/turn-off-your-fitbit-garmin-apple-watch-gps-now/
  • 28. Brook, C. (2017, January 17). Vulnerabilities Leave iTunes, App Store Open to Script Injection. Retrieved from https://threatpost.com/vulnerabilities-leave- iTunes-app-store-open-to-script-injection/123129/ Pauli, D. (2015, October 21). '10-second' theoretical hack could jog Fitbits into malware-spreading mode. Retrieved from https://www.theregister.co.uk/2015/10/21/fitbit_hack/ Staff, C. (2014, October 14). Top 6 threats to iOS devices. Retrieved from https://www.csoonline.com/article/2826038/mobile-security/top-6-threats-to- ios-devices.html