SlideShare a Scribd company logo
IOT Security
An Introduction
By Priyabrata Dash
(@twitmyrevew)
Agenda
• IoT Overview
• IOT – Current Situation
• IOT & Security
• IOT Security Vulnerabilities
• IOT Security Focus Points
• Right Tools
• IOT Security Best Practices
IOT Overview
• Physical objects + Controllers, Sensors, Actuators + Internet = IoT.
• The IoT (sometimes also referred to as the Internet of Everything) is a network of physical
objects (or “things”) embedded with electronics, software, sensors, and connectivity which
enable those objects to exchange data with the operator, manufacturer, service provider,
and/or other connected devices.
• The IoT is based on the infrastructure of the International Telecommunication Union’s (ITU)
Global Standards Initiative (IoT‐GSI).
• The IoT‐GSI covers devices and objects connected over multiple communications protocols —
such as personal computing devices, laptop or desktop computers, tablets, and smartphones
— as well as devices that are connected to each other through other protocols, such as
Bluetooth, ZigBee (an open, global wireless standard), Long Range Wide Area Network
(LoRaWAN), and SIGFOX.
• IoT devices (or nodes) often operate without a screen or any user interface at all, may rely on
battery power for operation, and are usually dedicated to a single task.
• IoT devices are typically described as “smart objects, edge devices, or connected devices”.
IOT Drivers
• What makes an IoT device smart typically falls into one or more
of the following functional areas:
• Monitoring
• Control
• Optimization
• Automation
• The IoT is enabled by numerous technology trends:
• Devices are cost effective
• Infrastructure is in place and new infrastructure is being
built to support future technology needs.
• The evolution of functions is in line with user
expectations (for example, smart watches that provide
multiple services and applications).
IOT Present & Future
Future
• 75% of companies are
already exploring the IoT.
• 15 % of companies already
have an IoT solution in place
• (21 % of transportation &
logistics companies)
• 53 % plan to implement one
within the next 24 months,
and another 14 % in the next
two to five years.
IOT Smart
Application
Healthcare & Wellbeing, e.g. Angel Sensor, Fitbit, Hexoskin, Intraway,
Jawbone, Nymi, InKol Health Hub, Pebble, Philips Lifeline, Withings,
Zebra MotionWorks,
Home & Building, e.g. Belkin, Nest, Neurio, Quirky, Sensorflare, SMA,
SmartThings, Vivint, WallyHome, Withings, ZEN Thermostat,
City & Community, e.g. Bigbelly, Bitlock¸ FUKUSHIMA Wheel, Kiunsys,
Placemeter, Silver Spring Networks, Waspmote,
Utilities, e.g. Enevo, Mayflower CMS, MeterNet, Osprey Informatics,
Paradox, Trilliant,
Environment, Agriculture & Livestock, e.g. FilesThruTheAir, Fruition
Sciences, OnFarm, Semios, Topcon Precision Agriculture,
Car & Transportation, e.g. Audi, CarKnow, Connected Rail, Dash drive
smart, Delphi Connect, Ericsson, Libelium, Logitrac, PowerFleet,
Industry & Services, e.g. Argon Underground Mining Safety, Condeco
Sense, DAQRI’s Smart Helmet, Numerex, Perch.
IOT Technology Stack
IOT Risks
IOT Risks
IOT Risks
IOT Challenges
• The economy promotes weak security
• Security is difficult, especially for new businesses;
• IoT systems are complex and each part must be secure
• The security support is not always maintained
• The consumer's knowledge of IoT security is weak
• Security incidents can be difficult to detect or resolve for
users
• Existing legal liability mechanisms may not be clear.
Problems of IoT Security
• Insecure Web Interface
• Insufficient Authentication/Authorization
• Insecure Network Services
• Lack of Transport Encryption
• Privacy Concerns
• Insecure Clould Interface
• Insecure Mobile Interface
• Insufficient Security Configurability
• Insecure Software/Firmware
• Poor Physical Security
Foundation for IoT
Security
• Device has a validated identity
• IoT platform has a validated identity
• Mutual authentication for
communication
• Encrypted and signed messages
• Secure execution environment (devices
& IoT platform)
• Secure software management /
distribution
• State-of-the art network & system
security (firewall, hardening)
• Role based access control
• Secure management access
IOT Security – Key Areas Of Consideration
• The Internet of Things Device
• The Cloud
• The Mobile Application
• The Network Interfaces
• The Software
• Use of Encryption
• Use of Authentication
• Physical Security
• USB ports
IOT - Liability
• The security flaws of IoT and its ability to perform certain tasks open the door
to any associated liability.
• The three main areas of concern are device malfunction, attacks, and data
theft.
• These issues can result in a wide variety of damages.
• Cyber Attacks
• IoT devices expose an entire network and anything directly impacted to the
risk of attacks.
• Some of the most effective measures against attacks prove simple:
• Built-in Security − Individuals and organizations should seek hardened
devices, meaning those with security integrated in the hardware and
firmware.
• Encryption − This must be implemented by the manufacturer and through
user systems.
• Risk Analysis − Organizations and individuals must analyze possible threats in
designing their systems or choosing them.
• Authorization − Devices, whenever possible, must be subject to privilege
policies and access methods.
IOT Security
Tools
• The common security tools that
are in use are:
• Encryption
• Password Protection
• Hardware Security Modules
• Two-factor authentication
• Secure elements
• Data erasure
• PKI Certifications
• Biometrics
• Hardware Crypto processor
• Blockchain
IOT Security & Blockchain
IOT Security
Overview
IoT Security Market
IOT Security – Key Players
Some of the important players in IoTSecurity market are:
• Cisco Systems, Inc.
• IBM Corporation
• Infineon Technologies
• Intel Corporation
• Symantec Corporation
• ARM Holdings
• NXP Semiconductor
• INSIDE Secure
• Gemalto NV
• Trend Micro, Inc.
IOT Security Best Practices
IOT Security Best Practices
IOT Security Best Practices
IOT Security Best Practices
IOT Security Best Practices
IOT Security Best Practices
Thank You & QA

More Related Content

What's hot

Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxMohanPandey31
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of ThingsBryan Len
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
IoT 2019 overview
IoT 2019 overviewIoT 2019 overview
IoT 2019 overviewengIT
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Securitynoornabi16
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTgr9293
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and ChallengesOWASP Delhi
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsAbdullah Alfadhly
 

What's hot (20)

Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
Iot Security
Iot SecurityIot Security
Iot Security
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
IoT 2019 overview
IoT 2019 overviewIoT 2019 overview
IoT 2019 overview
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 

Similar to Introduction to IOT security

IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfezzAyman1
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
IoT Device Management
IoT Device ManagementIoT Device Management
IoT Device ManagementFriendlyTech1
 
IoT-Introduction.pptx
IoT-Introduction.pptxIoT-Introduction.pptx
IoT-Introduction.pptxImpanaR2
 
Basic IoT and its Security
Basic IoT and its SecurityBasic IoT and its Security
Basic IoT and its Securityshubh chougule
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintSurfWatch Labs
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT SystemsSecurity Innovation
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxSelva914004
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)HITCON GIRLS
 
Homeland of Things Framework BSides Augusta 2017
Homeland of Things Framework BSides Augusta 2017Homeland of Things Framework BSides Augusta 2017
Homeland of Things Framework BSides Augusta 2017Daniel West
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesAhmed Banafa
 
IOT TOTAL POWER POINT PRESENTATION UNITS
IOT TOTAL POWER POINT PRESENTATION UNITSIOT TOTAL POWER POINT PRESENTATION UNITS
IOT TOTAL POWER POINT PRESENTATION UNITSDineshV95
 
IOT presentation.pptx
IOT presentation.pptxIOT presentation.pptx
IOT presentation.pptxchWaqasZahid
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoTAhmed Banafa
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemCA Technologies
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
 

Similar to Introduction to IOT security (20)

IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
IoT Device Management
IoT Device ManagementIoT Device Management
IoT Device Management
 
IoT-Introduction.pptx
IoT-Introduction.pptxIoT-Introduction.pptx
IoT-Introduction.pptx
 
Basic IoT and its Security
Basic IoT and its SecurityBasic IoT and its Security
Basic IoT and its Security
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital Footprint
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
 
Homeland of Things Framework BSides Augusta 2017
Homeland of Things Framework BSides Augusta 2017Homeland of Things Framework BSides Augusta 2017
Homeland of Things Framework BSides Augusta 2017
 
IoT_Unit-1.pptx
IoT_Unit-1.pptxIoT_Unit-1.pptx
IoT_Unit-1.pptx
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
IOT.pptx
IOT.pptxIOT.pptx
IOT.pptx
 
IOT TOTAL POWER POINT PRESENTATION UNITS
IOT TOTAL POWER POINT PRESENTATION UNITSIOT TOTAL POWER POINT PRESENTATION UNITS
IOT TOTAL POWER POINT PRESENTATION UNITS
 
IOT presentation.pptx
IOT presentation.pptxIOT presentation.pptx
IOT presentation.pptx
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
 
CHA_001_IOT.pptx
CHA_001_IOT.pptxCHA_001_IOT.pptx
CHA_001_IOT.pptx
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 

More from Priyab Satoshi

Introduction to Chatbots
Introduction to ChatbotsIntroduction to Chatbots
Introduction to ChatbotsPriyab Satoshi
 
Introduction to State Channels & Payment Channels
Introduction to State Channels & Payment ChannelsIntroduction to State Channels & Payment Channels
Introduction to State Channels & Payment ChannelsPriyab Satoshi
 
Cryptocurrency & ICO Regulations in US
Cryptocurrency & ICO Regulations in USCryptocurrency & ICO Regulations in US
Cryptocurrency & ICO Regulations in USPriyab Satoshi
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
Introduction to Cognitive Automation
Introduction to Cognitive AutomationIntroduction to Cognitive Automation
Introduction to Cognitive AutomationPriyab Satoshi
 
Robotic process automation Introduction
Robotic process automation IntroductionRobotic process automation Introduction
Robotic process automation IntroductionPriyab Satoshi
 
Decentralised Exchanges - An Introduction
Decentralised Exchanges - An IntroductionDecentralised Exchanges - An Introduction
Decentralised Exchanges - An IntroductionPriyab Satoshi
 
Introduction to Segwit
Introduction to SegwitIntroduction to Segwit
Introduction to SegwitPriyab Satoshi
 
On-chain Crowdfunding & Asset Token
On-chain Crowdfunding & Asset Token On-chain Crowdfunding & Asset Token
On-chain Crowdfunding & Asset Token Priyab Satoshi
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchainPriyab Satoshi
 
Blockchain and Decentralization
Blockchain and DecentralizationBlockchain and Decentralization
Blockchain and DecentralizationPriyab Satoshi
 
Cryptocurrency & Regulatory Environment
Cryptocurrency & Regulatory EnvironmentCryptocurrency & Regulatory Environment
Cryptocurrency & Regulatory EnvironmentPriyab Satoshi
 
Understanding blockchain
Understanding blockchainUnderstanding blockchain
Understanding blockchainPriyab Satoshi
 

More from Priyab Satoshi (16)

Introduction to Chatbots
Introduction to ChatbotsIntroduction to Chatbots
Introduction to Chatbots
 
Introduction to State Channels & Payment Channels
Introduction to State Channels & Payment ChannelsIntroduction to State Channels & Payment Channels
Introduction to State Channels & Payment Channels
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Cryptocurrency & ICO Regulations in US
Cryptocurrency & ICO Regulations in USCryptocurrency & ICO Regulations in US
Cryptocurrency & ICO Regulations in US
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Introduction to Cognitive Automation
Introduction to Cognitive AutomationIntroduction to Cognitive Automation
Introduction to Cognitive Automation
 
Robotic process automation Introduction
Robotic process automation IntroductionRobotic process automation Introduction
Robotic process automation Introduction
 
Kademlia introduction
Kademlia introductionKademlia introduction
Kademlia introduction
 
Decentralised Exchanges - An Introduction
Decentralised Exchanges - An IntroductionDecentralised Exchanges - An Introduction
Decentralised Exchanges - An Introduction
 
Introduction to Segwit
Introduction to SegwitIntroduction to Segwit
Introduction to Segwit
 
On-chain Crowdfunding & Asset Token
On-chain Crowdfunding & Asset Token On-chain Crowdfunding & Asset Token
On-chain Crowdfunding & Asset Token
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchain
 
Blockchain and Decentralization
Blockchain and DecentralizationBlockchain and Decentralization
Blockchain and Decentralization
 
Erc 721 tokens
Erc 721 tokensErc 721 tokens
Erc 721 tokens
 
Cryptocurrency & Regulatory Environment
Cryptocurrency & Regulatory EnvironmentCryptocurrency & Regulatory Environment
Cryptocurrency & Regulatory Environment
 
Understanding blockchain
Understanding blockchainUnderstanding blockchain
Understanding blockchain
 

Recently uploaded

一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理kywwoyk
 
Memory compiler tutorial – TSMC 40nm technology
Memory compiler tutorial – TSMC 40nm technologyMemory compiler tutorial – TSMC 40nm technology
Memory compiler tutorial – TSMC 40nm technologyAhmed Abdelazeem
 
NO1 Pandit Black magic/kala jadu,manpasand shadi in lahore,karachi rawalpindi...
NO1 Pandit Black magic/kala jadu,manpasand shadi in lahore,karachi rawalpindi...NO1 Pandit Black magic/kala jadu,manpasand shadi in lahore,karachi rawalpindi...
NO1 Pandit Black magic/kala jadu,manpasand shadi in lahore,karachi rawalpindi...Amil Baba Dawood bangali
 
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...Amil baba
 
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理kywwoyk
 
China Die Casting Manufacturer & Supplier - Bian Diecast
China Die Casting Manufacturer & Supplier - Bian DiecastChina Die Casting Manufacturer & Supplier - Bian Diecast
China Die Casting Manufacturer & Supplier - Bian DiecastAMshares
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理eemet
 
Matrix Methods.pptxbbbbbbbbbbbbbbbbbbbbb
Matrix Methods.pptxbbbbbbbbbbbbbbbbbbbbbMatrix Methods.pptxbbbbbbbbbbbbbbbbbbbbb
Matrix Methods.pptxbbbbbbbbbbbbbbbbbbbbbjoshuaclack73
 
1. WIX 2 PowerPoint for Work Experience.pptx
1. WIX 2 PowerPoint for Work Experience.pptx1. WIX 2 PowerPoint for Work Experience.pptx
1. WIX 2 PowerPoint for Work Experience.pptxlouise569794
 
一比一原版AIS毕业证成绩单如何办理
一比一原版AIS毕业证成绩单如何办理一比一原版AIS毕业证成绩单如何办理
一比一原版AIS毕业证成绩单如何办理cnzepoz
 
Aluminum Die Casting Manufacturers in China - BIAN Diecast
Aluminum Die Casting Manufacturers in China - BIAN DiecastAluminum Die Casting Manufacturers in China - BIAN Diecast
Aluminum Die Casting Manufacturers in China - BIAN DiecastAMshares
 
一比一原版UBC毕业证成绩单如何办理
一比一原版UBC毕业证成绩单如何办理一比一原版UBC毕业证成绩单如何办理
一比一原版UBC毕业证成绩单如何办理cnzepoz
 
F5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptxF5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptxArjunJain44
 
一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理cnzepoz
 

Recently uploaded (14)

一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
 
Memory compiler tutorial – TSMC 40nm technology
Memory compiler tutorial – TSMC 40nm technologyMemory compiler tutorial – TSMC 40nm technology
Memory compiler tutorial – TSMC 40nm technology
 
NO1 Pandit Black magic/kala jadu,manpasand shadi in lahore,karachi rawalpindi...
NO1 Pandit Black magic/kala jadu,manpasand shadi in lahore,karachi rawalpindi...NO1 Pandit Black magic/kala jadu,manpasand shadi in lahore,karachi rawalpindi...
NO1 Pandit Black magic/kala jadu,manpasand shadi in lahore,karachi rawalpindi...
 
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
 
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
 
China Die Casting Manufacturer & Supplier - Bian Diecast
China Die Casting Manufacturer & Supplier - Bian DiecastChina Die Casting Manufacturer & Supplier - Bian Diecast
China Die Casting Manufacturer & Supplier - Bian Diecast
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
 
Matrix Methods.pptxbbbbbbbbbbbbbbbbbbbbb
Matrix Methods.pptxbbbbbbbbbbbbbbbbbbbbbMatrix Methods.pptxbbbbbbbbbbbbbbbbbbbbb
Matrix Methods.pptxbbbbbbbbbbbbbbbbbbbbb
 
1. WIX 2 PowerPoint for Work Experience.pptx
1. WIX 2 PowerPoint for Work Experience.pptx1. WIX 2 PowerPoint for Work Experience.pptx
1. WIX 2 PowerPoint for Work Experience.pptx
 
一比一原版AIS毕业证成绩单如何办理
一比一原版AIS毕业证成绩单如何办理一比一原版AIS毕业证成绩单如何办理
一比一原版AIS毕业证成绩单如何办理
 
Aluminum Die Casting Manufacturers in China - BIAN Diecast
Aluminum Die Casting Manufacturers in China - BIAN DiecastAluminum Die Casting Manufacturers in China - BIAN Diecast
Aluminum Die Casting Manufacturers in China - BIAN Diecast
 
一比一原版UBC毕业证成绩单如何办理
一比一原版UBC毕业证成绩单如何办理一比一原版UBC毕业证成绩单如何办理
一比一原版UBC毕业证成绩单如何办理
 
F5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptxF5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptx
 
一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理
 

Introduction to IOT security

  • 1. IOT Security An Introduction By Priyabrata Dash (@twitmyrevew)
  • 2. Agenda • IoT Overview • IOT – Current Situation • IOT & Security • IOT Security Vulnerabilities • IOT Security Focus Points • Right Tools • IOT Security Best Practices
  • 3. IOT Overview • Physical objects + Controllers, Sensors, Actuators + Internet = IoT. • The IoT (sometimes also referred to as the Internet of Everything) is a network of physical objects (or “things”) embedded with electronics, software, sensors, and connectivity which enable those objects to exchange data with the operator, manufacturer, service provider, and/or other connected devices. • The IoT is based on the infrastructure of the International Telecommunication Union’s (ITU) Global Standards Initiative (IoT‐GSI). • The IoT‐GSI covers devices and objects connected over multiple communications protocols — such as personal computing devices, laptop or desktop computers, tablets, and smartphones — as well as devices that are connected to each other through other protocols, such as Bluetooth, ZigBee (an open, global wireless standard), Long Range Wide Area Network (LoRaWAN), and SIGFOX. • IoT devices (or nodes) often operate without a screen or any user interface at all, may rely on battery power for operation, and are usually dedicated to a single task. • IoT devices are typically described as “smart objects, edge devices, or connected devices”.
  • 4. IOT Drivers • What makes an IoT device smart typically falls into one or more of the following functional areas: • Monitoring • Control • Optimization • Automation • The IoT is enabled by numerous technology trends: • Devices are cost effective • Infrastructure is in place and new infrastructure is being built to support future technology needs. • The evolution of functions is in line with user expectations (for example, smart watches that provide multiple services and applications).
  • 5. IOT Present & Future Future • 75% of companies are already exploring the IoT. • 15 % of companies already have an IoT solution in place • (21 % of transportation & logistics companies) • 53 % plan to implement one within the next 24 months, and another 14 % in the next two to five years.
  • 6. IOT Smart Application Healthcare & Wellbeing, e.g. Angel Sensor, Fitbit, Hexoskin, Intraway, Jawbone, Nymi, InKol Health Hub, Pebble, Philips Lifeline, Withings, Zebra MotionWorks, Home & Building, e.g. Belkin, Nest, Neurio, Quirky, Sensorflare, SMA, SmartThings, Vivint, WallyHome, Withings, ZEN Thermostat, City & Community, e.g. Bigbelly, Bitlock¸ FUKUSHIMA Wheel, Kiunsys, Placemeter, Silver Spring Networks, Waspmote, Utilities, e.g. Enevo, Mayflower CMS, MeterNet, Osprey Informatics, Paradox, Trilliant, Environment, Agriculture & Livestock, e.g. FilesThruTheAir, Fruition Sciences, OnFarm, Semios, Topcon Precision Agriculture, Car & Transportation, e.g. Audi, CarKnow, Connected Rail, Dash drive smart, Delphi Connect, Ericsson, Libelium, Logitrac, PowerFleet, Industry & Services, e.g. Argon Underground Mining Safety, Condeco Sense, DAQRI’s Smart Helmet, Numerex, Perch.
  • 11. IOT Challenges • The economy promotes weak security • Security is difficult, especially for new businesses; • IoT systems are complex and each part must be secure • The security support is not always maintained • The consumer's knowledge of IoT security is weak • Security incidents can be difficult to detect or resolve for users • Existing legal liability mechanisms may not be clear.
  • 12. Problems of IoT Security • Insecure Web Interface • Insufficient Authentication/Authorization • Insecure Network Services • Lack of Transport Encryption • Privacy Concerns • Insecure Clould Interface • Insecure Mobile Interface • Insufficient Security Configurability • Insecure Software/Firmware • Poor Physical Security
  • 13. Foundation for IoT Security • Device has a validated identity • IoT platform has a validated identity • Mutual authentication for communication • Encrypted and signed messages • Secure execution environment (devices & IoT platform) • Secure software management / distribution • State-of-the art network & system security (firewall, hardening) • Role based access control • Secure management access
  • 14. IOT Security – Key Areas Of Consideration • The Internet of Things Device • The Cloud • The Mobile Application • The Network Interfaces • The Software • Use of Encryption • Use of Authentication • Physical Security • USB ports
  • 15. IOT - Liability • The security flaws of IoT and its ability to perform certain tasks open the door to any associated liability. • The three main areas of concern are device malfunction, attacks, and data theft. • These issues can result in a wide variety of damages. • Cyber Attacks • IoT devices expose an entire network and anything directly impacted to the risk of attacks. • Some of the most effective measures against attacks prove simple: • Built-in Security − Individuals and organizations should seek hardened devices, meaning those with security integrated in the hardware and firmware. • Encryption − This must be implemented by the manufacturer and through user systems. • Risk Analysis − Organizations and individuals must analyze possible threats in designing their systems or choosing them. • Authorization − Devices, whenever possible, must be subject to privilege policies and access methods.
  • 16. IOT Security Tools • The common security tools that are in use are: • Encryption • Password Protection • Hardware Security Modules • Two-factor authentication • Secure elements • Data erasure • PKI Certifications • Biometrics • Hardware Crypto processor • Blockchain
  • 17. IOT Security & Blockchain
  • 20. IOT Security – Key Players Some of the important players in IoTSecurity market are: • Cisco Systems, Inc. • IBM Corporation • Infineon Technologies • Intel Corporation • Symantec Corporation • ARM Holdings • NXP Semiconductor • INSIDE Secure • Gemalto NV • Trend Micro, Inc.
  • 21. IOT Security Best Practices
  • 22. IOT Security Best Practices
  • 23. IOT Security Best Practices
  • 24. IOT Security Best Practices
  • 25. IOT Security Best Practices
  • 26. IOT Security Best Practices