SlideShare a Scribd company logo
Physical Security, IoT & The Role of
Open Standards
Q&A with Per Björkdahl, ONVIF Chairman
Any Questions? Please type them in…
2
ONVIF is committed to providing and promoting open
interfaces to the security industry for effective
interoperability of IP-based physical security products.
The cornerstones of ONVIF are:
Standardization of communication between IP-based physical security
products
Interoperability regardless of brand
Openness to all companies and organizations
Liaison with International standardization IEC & ISO
IEC TC79 WG12 Video (IEC 62676-2-3:2013
IEC TC/) WG11 Access Control (IEC 60839-11-1)
IEC TC9 WG46 CCTV in trains (IEC62580-2)
ISO JTC1 HEVC (H.265)
About ONVIF
3
MISSION
To provide and promote open Interfaces to the
security industry for effective Interoperability.
VISION
All Security Systems share one Interface.
ONVIF Mission & Vision
4
ONVIF Development: 2008 to present
2008/10
ONVIF founded
by Axis, Sony &
Bosch, Core
Specification 1.0
2009/05
Release of
test tool and
conformance
procedure
2009/07
First
conformant
product
launched
2009/10
100 members
200 products
2010/03
Scope extended to
Access control
2010/12
Core specification
2.0 & Device Test
Tool 1.02
2011/09
300 members
1000 products
2011/12
Device Test Tool 11.1
Profile S released
2012/08
400 members
2000 products
2013/04
1200 Profile S
products
2013/12
Profile C
released
2014/04
500 members
2700 Profile S
products
2014/07
Profile G released
2014/12
Profile Q
release
candidate
2015/03
Client test tool
released
2015/10
500+ members
5009 products
2015/07
Profile A release
candidate
2016/05
≈ 490 members
6´500 products
2011/12
EN 50132-5-2
IP Video Transmission Protocols
Based on Webservices
2013/11
IEC 62676-2-3
IP Video Transmission Protocols
Based on Webservices
2011/02
IEC60839-11-31
EACS IP Transmission Protocols
Based on Webservices
2016/07
Profile Q
released
2016/12
Profile A
planned
release
5
- Availability vs. protection
- Different threatscape than a PC
- Unmanaged devices
- Customers are not cyber mature
- IoT vendors are not cyber mature
Internet of Things – Cyber challenges
6
Security is vital to IoT
“It is a process, not a product”
“Bruce Schneier”
7
­ IoT are easier to hardened
compared PC
­ Out­of­the­box hardening
­ Independent researchers
­ Cyber awareness is increasing
IoT– Cyber challenges going forward
8
The message is loud and clear
security products that can’t connect to an IP network
disappear from the market sooner than later!
Two possible developments
Limited utilization of standards
•Isolated system silos from one manufacturer
•Proprietary systems
•Manufacturer lock in
•Limited interoperability
Full utilization of standards
•True IoT
•Openness,
•Unlimited interoperability
the Role of Standards
9
True IoT is not possible without standards
Standards are not only technical
Standards are also Procedures
Together they can achieve security
Let’s not take a leap backwards
Security by obscurity is not preferred
the Role of Standards
10
Security is a Permanent working group in ONVIF
Certificate-based Client Authentication
Keystore
TLS server
General design goals
What is ONVIF doing about security
New Website! http://www.memoori.com/
Next Webinar: 12th
Sept - “Demystifying the IoT in Smart Buildings”

More Related Content

What's hot

Neotel
Neotel Neotel
Industries On Transformation
Industries On TransformationIndustries On Transformation
Industries On Transformation
Telefónica IoT
 
Bridgera enterprise IoT security
Bridgera enterprise IoT securityBridgera enterprise IoT security
Bridgera enterprise IoT security
Ron Pascuzzi
 
The cellular network: a vital link in the world of drones
The cellular network: a vital link in the world of dronesThe cellular network: a vital link in the world of drones
The cellular network: a vital link in the world of drones
AGILE IoT
 
Delivering the IoT ecosystem
Delivering the IoT ecosystemDelivering the IoT ecosystem
Delivering the IoT ecosystem
Telefónica IoT
 
ARM mbed connect
ARM mbed connectARM mbed connect
ARM mbed connect
Jinbuhm Kim
 
Internet of Everything: The CIO's Point of View
Internet of Everything:  The CIO's Point of ViewInternet of Everything:  The CIO's Point of View
Internet of Everything: The CIO's Point of View
Cisco Canada
 
“IoT and Vision: Why It’s a Security Minefield and How to Navigate It,” a Pre...
“IoT and Vision: Why It’s a Security Minefield and How to Navigate It,” a Pre...“IoT and Vision: Why It’s a Security Minefield and How to Navigate It,” a Pre...
“IoT and Vision: Why It’s a Security Minefield and How to Navigate It,” a Pre...
Edge AI and Vision Alliance
 
Bridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software SolutionsBridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software Solutions
Ron Pascuzzi
 
ARM Bryan Lawrence at Smart Homes 2013 Cambridge
ARM Bryan Lawrence at Smart Homes 2013 CambridgeARM Bryan Lawrence at Smart Homes 2013 Cambridge
ARM Bryan Lawrence at Smart Homes 2013 CambridgeJustin Hayward
 
IoT Platform Meetup - Sigfox
IoT Platform Meetup - SigfoxIoT Platform Meetup - Sigfox
IoT Platform Meetup - Sigfox
Filip Kolář
 
Talk To Your Things
Talk To Your ThingsTalk To Your Things
Talk To Your Things
Jordan Eller
 
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
Nabil Bouzerna
 
WIZnet OSHW Global Business
WIZnet OSHW Global BusinessWIZnet OSHW Global Business
WIZnet OSHW Global Business
Jinbuhm Kim
 
Track 2 session 8 - st dev con 2016 - lora (mydevices)
Track 2   session 8 - st dev con 2016 - lora (mydevices)Track 2   session 8 - st dev con 2016 - lora (mydevices)
Track 2 session 8 - st dev con 2016 - lora (mydevices)
ST_World
 
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
Nabil Bouzerna
 
CDE Marketplace: 2iC
CDE Marketplace: 2iCCDE Marketplace: 2iC
CDE Marketplace: 2iC
Defence and Security Accelerator
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013
AirTight Networks
 
LG Security
LG SecurityLG Security
LG Securityjfjpvo
 
NG EXPERTS Services and Solutions
NG EXPERTS Services and SolutionsNG EXPERTS Services and Solutions
NG EXPERTS Services and Solutions
Toufik Zemri
 

What's hot (20)

Neotel
Neotel Neotel
Neotel
 
Industries On Transformation
Industries On TransformationIndustries On Transformation
Industries On Transformation
 
Bridgera enterprise IoT security
Bridgera enterprise IoT securityBridgera enterprise IoT security
Bridgera enterprise IoT security
 
The cellular network: a vital link in the world of drones
The cellular network: a vital link in the world of dronesThe cellular network: a vital link in the world of drones
The cellular network: a vital link in the world of drones
 
Delivering the IoT ecosystem
Delivering the IoT ecosystemDelivering the IoT ecosystem
Delivering the IoT ecosystem
 
ARM mbed connect
ARM mbed connectARM mbed connect
ARM mbed connect
 
Internet of Everything: The CIO's Point of View
Internet of Everything:  The CIO's Point of ViewInternet of Everything:  The CIO's Point of View
Internet of Everything: The CIO's Point of View
 
“IoT and Vision: Why It’s a Security Minefield and How to Navigate It,” a Pre...
“IoT and Vision: Why It’s a Security Minefield and How to Navigate It,” a Pre...“IoT and Vision: Why It’s a Security Minefield and How to Navigate It,” a Pre...
“IoT and Vision: Why It’s a Security Minefield and How to Navigate It,” a Pre...
 
Bridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software SolutionsBridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software Solutions
 
ARM Bryan Lawrence at Smart Homes 2013 Cambridge
ARM Bryan Lawrence at Smart Homes 2013 CambridgeARM Bryan Lawrence at Smart Homes 2013 Cambridge
ARM Bryan Lawrence at Smart Homes 2013 Cambridge
 
IoT Platform Meetup - Sigfox
IoT Platform Meetup - SigfoxIoT Platform Meetup - Sigfox
IoT Platform Meetup - Sigfox
 
Talk To Your Things
Talk To Your ThingsTalk To Your Things
Talk To Your Things
 
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
 
WIZnet OSHW Global Business
WIZnet OSHW Global BusinessWIZnet OSHW Global Business
WIZnet OSHW Global Business
 
Track 2 session 8 - st dev con 2016 - lora (mydevices)
Track 2   session 8 - st dev con 2016 - lora (mydevices)Track 2   session 8 - st dev con 2016 - lora (mydevices)
Track 2 session 8 - st dev con 2016 - lora (mydevices)
 
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
 
CDE Marketplace: 2iC
CDE Marketplace: 2iCCDE Marketplace: 2iC
CDE Marketplace: 2iC
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013
 
LG Security
LG SecurityLG Security
LG Security
 
NG EXPERTS Services and Solutions
NG EXPERTS Services and SolutionsNG EXPERTS Services and Solutions
NG EXPERTS Services and Solutions
 

Viewers also liked

Highly customizable video surveillance platform for manufactures and system ...
Highly customizable  video surveillance platform for manufactures and system ...Highly customizable  video surveillance platform for manufactures and system ...
Highly customizable video surveillance platform for manufactures and system ...
Nikolai Ptitsyn
 
Video Analytics Encoder Overview
Video Analytics Encoder OverviewVideo Analytics Encoder Overview
Video Analytics Encoder Overview
Nikolai Ptitsyn
 
Global Security and Russia Outlook 2016
Global Security and Russia Outlook 2016Global Security and Russia Outlook 2016
Global Security and Russia Outlook 2016
Ivideon
 
Measuring the Benefits of a Smart Building Solution
Measuring the Benefits of a Smart Building SolutionMeasuring the Benefits of a Smart Building Solution
Measuring the Benefits of a Smart Building Solution
Memoori
 
Buildings Need to be Operated with More Precision!
Buildings Need to be Operated with More Precision!Buildings Need to be Operated with More Precision!
Buildings Need to be Operated with More Precision!
Memoori
 
LEDs Lighting the Way towards Smart Cities
LEDs Lighting the Way towards Smart CitiesLEDs Lighting the Way towards Smart Cities
LEDs Lighting the Way towards Smart Cities
Memoori
 
Making Big Data a Reality in Smart Buildings!
Making Big Data a Reality in Smart Buildings!Making Big Data a Reality in Smart Buildings!
Making Big Data a Reality in Smart Buildings!
Memoori
 
Why don't we have REAL IP to the Edge in Buildings?
Why don't we have REAL IP to the Edge in Buildings?Why don't we have REAL IP to the Edge in Buildings?
Why don't we have REAL IP to the Edge in Buildings?
Memoori
 
ReInventing Green Building!
ReInventing Green Building!ReInventing Green Building!
ReInventing Green Building!
Memoori
 
Brochure-Agenda - Smart Building Automation Summit 2016
Brochure-Agenda - Smart Building Automation Summit 2016Brochure-Agenda - Smart Building Automation Summit 2016
Brochure-Agenda - Smart Building Automation Summit 2016Tharun Sholarajan
 
Arduino Yun 物聯網 Lesson 1
Arduino Yun 物聯網 Lesson 1Arduino Yun 物聯網 Lesson 1
Arduino Yun 物聯網 Lesson 1
CAVEDU Education
 
Smart Buildings Need Smart Thinking!
Smart Buildings Need Smart Thinking!Smart Buildings Need Smart Thinking!
Smart Buildings Need Smart Thinking!
Memoori
 
What's Better in a Smart Building World?
What's Better in a Smart Building World?What's Better in a Smart Building World?
What's Better in a Smart Building World?
Memoori
 
PCTY 2012, IBM Smarter Buildings v. Claire Penny
PCTY 2012, IBM Smarter Buildings v. Claire PennyPCTY 2012, IBM Smarter Buildings v. Claire Penny
PCTY 2012, IBM Smarter Buildings v. Claire Penny
IBM Danmark
 
MIRAI: What is It, How Does it Work and Why Should I Care?
MIRAI: What is It, How Does it Work and Why Should I Care?MIRAI: What is It, How Does it Work and Why Should I Care?
MIRAI: What is It, How Does it Work and Why Should I Care?
Memoori
 
Demystifying the IoT in Smart Buildings
Demystifying the IoT in Smart BuildingsDemystifying the IoT in Smart Buildings
Demystifying the IoT in Smart Buildings
Memoori
 
Smart Buildings + Intelligent Solutions
Smart Buildings + Intelligent SolutionsSmart Buildings + Intelligent Solutions
Smart Buildings + Intelligent Solutions
Bob Sawhill, CFM
 

Viewers also liked (17)

Highly customizable video surveillance platform for manufactures and system ...
Highly customizable  video surveillance platform for manufactures and system ...Highly customizable  video surveillance platform for manufactures and system ...
Highly customizable video surveillance platform for manufactures and system ...
 
Video Analytics Encoder Overview
Video Analytics Encoder OverviewVideo Analytics Encoder Overview
Video Analytics Encoder Overview
 
Global Security and Russia Outlook 2016
Global Security and Russia Outlook 2016Global Security and Russia Outlook 2016
Global Security and Russia Outlook 2016
 
Measuring the Benefits of a Smart Building Solution
Measuring the Benefits of a Smart Building SolutionMeasuring the Benefits of a Smart Building Solution
Measuring the Benefits of a Smart Building Solution
 
Buildings Need to be Operated with More Precision!
Buildings Need to be Operated with More Precision!Buildings Need to be Operated with More Precision!
Buildings Need to be Operated with More Precision!
 
LEDs Lighting the Way towards Smart Cities
LEDs Lighting the Way towards Smart CitiesLEDs Lighting the Way towards Smart Cities
LEDs Lighting the Way towards Smart Cities
 
Making Big Data a Reality in Smart Buildings!
Making Big Data a Reality in Smart Buildings!Making Big Data a Reality in Smart Buildings!
Making Big Data a Reality in Smart Buildings!
 
Why don't we have REAL IP to the Edge in Buildings?
Why don't we have REAL IP to the Edge in Buildings?Why don't we have REAL IP to the Edge in Buildings?
Why don't we have REAL IP to the Edge in Buildings?
 
ReInventing Green Building!
ReInventing Green Building!ReInventing Green Building!
ReInventing Green Building!
 
Brochure-Agenda - Smart Building Automation Summit 2016
Brochure-Agenda - Smart Building Automation Summit 2016Brochure-Agenda - Smart Building Automation Summit 2016
Brochure-Agenda - Smart Building Automation Summit 2016
 
Arduino Yun 物聯網 Lesson 1
Arduino Yun 物聯網 Lesson 1Arduino Yun 物聯網 Lesson 1
Arduino Yun 物聯網 Lesson 1
 
Smart Buildings Need Smart Thinking!
Smart Buildings Need Smart Thinking!Smart Buildings Need Smart Thinking!
Smart Buildings Need Smart Thinking!
 
What's Better in a Smart Building World?
What's Better in a Smart Building World?What's Better in a Smart Building World?
What's Better in a Smart Building World?
 
PCTY 2012, IBM Smarter Buildings v. Claire Penny
PCTY 2012, IBM Smarter Buildings v. Claire PennyPCTY 2012, IBM Smarter Buildings v. Claire Penny
PCTY 2012, IBM Smarter Buildings v. Claire Penny
 
MIRAI: What is It, How Does it Work and Why Should I Care?
MIRAI: What is It, How Does it Work and Why Should I Care?MIRAI: What is It, How Does it Work and Why Should I Care?
MIRAI: What is It, How Does it Work and Why Should I Care?
 
Demystifying the IoT in Smart Buildings
Demystifying the IoT in Smart BuildingsDemystifying the IoT in Smart Buildings
Demystifying the IoT in Smart Buildings
 
Smart Buildings + Intelligent Solutions
Smart Buildings + Intelligent SolutionsSmart Buildings + Intelligent Solutions
Smart Buildings + Intelligent Solutions
 

Similar to Physical Security, IoT & The Role of Open Standards

IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR Proposal
Syam Madanapalli
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
Kenny Huang Ph.D.
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
Industrial Internet Consortium
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
team-WIBU
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
Electric Imp
 
Resin.io overview (2016 July)
Resin.io overview (2016 July)Resin.io overview (2016 July)
Resin.io overview (2016 July)
Balena
 
IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel
Bessie Wang
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
Source Code Control Limited
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
LabSharegroup
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
FIDO Alliance
 
[Fortifier] Reliable Software Engineering (Daria)
[Fortifier] Reliable Software Engineering (Daria)[Fortifier] Reliable Software Engineering (Daria)
[Fortifier] Reliable Software Engineering (Daria)
Fortifier. IT Company
 
OCF/IoTivity for Healthcare/Fitness/Wearable
OCF/IoTivity for Healthcare/Fitness/WearableOCF/IoTivity for Healthcare/Fitness/Wearable
OCF/IoTivity for Healthcare/Fitness/Wearable
Jonathan Jeon
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation
Shein Myint Aung
 
IoTSummit: Design and architect always disconnected iot system
IoTSummit: Design and architect always disconnected iot systemIoTSummit: Design and architect always disconnected iot system
IoTSummit: Design and architect always disconnected iot system
Marco Dal Pino
 
RA TechED 2019 - NT03 - Building Converged Plantwide Ethernet Architectures
RA TechED 2019 - NT03 - Building Converged Plantwide Ethernet ArchitecturesRA TechED 2019 - NT03 - Building Converged Plantwide Ethernet Architectures
RA TechED 2019 - NT03 - Building Converged Plantwide Ethernet Architectures
Rockwell Automation
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
Liwei Ren任力偉
 
Solving the IoT Challenge
Solving the IoT ChallengeSolving the IoT Challenge
Solving the IoT Challenge
FIDO Alliance
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
Kellton Tech Solutions Ltd
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
CableLabs
 

Similar to Physical Security, IoT & The Role of Open Standards (20)

IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR Proposal
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
Resin.io overview (2016 July)
Resin.io overview (2016 July)Resin.io overview (2016 July)
Resin.io overview (2016 July)
 
IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
[Fortifier] Reliable Software Engineering (Daria)
[Fortifier] Reliable Software Engineering (Daria)[Fortifier] Reliable Software Engineering (Daria)
[Fortifier] Reliable Software Engineering (Daria)
 
OCF/IoTivity for Healthcare/Fitness/Wearable
OCF/IoTivity for Healthcare/Fitness/WearableOCF/IoTivity for Healthcare/Fitness/Wearable
OCF/IoTivity for Healthcare/Fitness/Wearable
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation
 
IoTSummit: Design and architect always disconnected iot system
IoTSummit: Design and architect always disconnected iot systemIoTSummit: Design and architect always disconnected iot system
IoTSummit: Design and architect always disconnected iot system
 
RA TechED 2019 - NT03 - Building Converged Plantwide Ethernet Architectures
RA TechED 2019 - NT03 - Building Converged Plantwide Ethernet ArchitecturesRA TechED 2019 - NT03 - Building Converged Plantwide Ethernet Architectures
RA TechED 2019 - NT03 - Building Converged Plantwide Ethernet Architectures
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Solving the IoT Challenge
Solving the IoT ChallengeSolving the IoT Challenge
Solving the IoT Challenge
 
Intel_IoT_gateway.pdf
Intel_IoT_gateway.pdfIntel_IoT_gateway.pdf
Intel_IoT_gateway.pdf
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 

More from Memoori

State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
Memoori
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
 
Laying the Data Foundations for Artificial Intelligence!
Laying the Data Foundations for Artificial Intelligence!Laying the Data Foundations for Artificial Intelligence!
Laying the Data Foundations for Artificial Intelligence!
Memoori
 
The Market for AI in Commercial Buildings 2024.pdf
The Market for AI in Commercial Buildings 2024.pdfThe Market for AI in Commercial Buildings 2024.pdf
The Market for AI in Commercial Buildings 2024.pdf
Memoori
 
A BluePrint for the Future of Smart Building Retrofits
A BluePrint for the Future of Smart Building RetrofitsA BluePrint for the Future of Smart Building Retrofits
A BluePrint for the Future of Smart Building Retrofits
Memoori
 
AI + Memoori = AIM
AI + Memoori = AIMAI + Memoori = AIM
AI + Memoori = AIM
Memoori
 
How Tenants & Landlords Can Work Together to Reduce Energy Consumption!
How Tenants & Landlords Can Work Together to Reduce Energy Consumption!How Tenants & Landlords Can Work Together to Reduce Energy Consumption!
How Tenants & Landlords Can Work Together to Reduce Energy Consumption!
Memoori
 
How Can Smart Building Technology Become Mainstream?
How Can Smart Building Technology Become Mainstream?How Can Smart Building Technology Become Mainstream?
How Can Smart Building Technology Become Mainstream?
Memoori
 
The Carbon Lifestyle - Not a Fad
The Carbon Lifestyle - Not a FadThe Carbon Lifestyle - Not a Fad
The Carbon Lifestyle - Not a Fad
Memoori
 
Hybrid Work: Driving the Workplace Tech Market!
Hybrid Work: Driving the Workplace Tech Market!Hybrid Work: Driving the Workplace Tech Market!
Hybrid Work: Driving the Workplace Tech Market!
Memoori
 
AI IoT Edge Applications Insights and Trends
AI IoT Edge Applications Insights and TrendsAI IoT Edge Applications Insights and Trends
AI IoT Edge Applications Insights and Trends
Memoori
 
What Building Owners Need to Know About Cyber Security Insurance!
What Building Owners Need to Know About Cyber Security Insurance!What Building Owners Need to Know About Cyber Security Insurance!
What Building Owners Need to Know About Cyber Security Insurance!
Memoori
 
3 Step Guide to Your Holistic Building Experience Journey
3 Step Guide to Your Holistic Building Experience Journey3 Step Guide to Your Holistic Building Experience Journey
3 Step Guide to Your Holistic Building Experience Journey
Memoori
 
The Developers Smart Building Project Canvas
The Developers Smart Building Project CanvasThe Developers Smart Building Project Canvas
The Developers Smart Building Project Canvas
Memoori
 
Smart, Connected Restrooms. A Cornerstone of Today's Smart Healthy Buildings
Smart, Connected Restrooms. A Cornerstone of Today's Smart Healthy BuildingsSmart, Connected Restrooms. A Cornerstone of Today's Smart Healthy Buildings
Smart, Connected Restrooms. A Cornerstone of Today's Smart Healthy Buildings
Memoori
 
Using Software Robots to Unlock Energy Efficiency in Aging Buildings
Using Software Robots to Unlock Energy Efficiency in Aging BuildingsUsing Software Robots to Unlock Energy Efficiency in Aging Buildings
Using Software Robots to Unlock Energy Efficiency in Aging Buildings
Memoori
 
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings IntegrationThe Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
Memoori
 
Why Should I Adopt a Digital Twin?
Why Should I Adopt a Digital Twin?Why Should I Adopt a Digital Twin?
Why Should I Adopt a Digital Twin?
Memoori
 
Tagging with AI to Enable Data-Driven Smart Building Applications at Scale!
Tagging with AI to Enable Data-Driven Smart Building Applications at Scale!Tagging with AI to Enable Data-Driven Smart Building Applications at Scale!
Tagging with AI to Enable Data-Driven Smart Building Applications at Scale!
Memoori
 
Project Haystack - 10 Years of Bringing Data Semantics to the Built Environment!
Project Haystack - 10 Years of Bringing Data Semantics to the Built Environment!Project Haystack - 10 Years of Bringing Data Semantics to the Built Environment!
Project Haystack - 10 Years of Bringing Data Semantics to the Built Environment!
Memoori
 

More from Memoori (20)

State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Laying the Data Foundations for Artificial Intelligence!
Laying the Data Foundations for Artificial Intelligence!Laying the Data Foundations for Artificial Intelligence!
Laying the Data Foundations for Artificial Intelligence!
 
The Market for AI in Commercial Buildings 2024.pdf
The Market for AI in Commercial Buildings 2024.pdfThe Market for AI in Commercial Buildings 2024.pdf
The Market for AI in Commercial Buildings 2024.pdf
 
A BluePrint for the Future of Smart Building Retrofits
A BluePrint for the Future of Smart Building RetrofitsA BluePrint for the Future of Smart Building Retrofits
A BluePrint for the Future of Smart Building Retrofits
 
AI + Memoori = AIM
AI + Memoori = AIMAI + Memoori = AIM
AI + Memoori = AIM
 
How Tenants & Landlords Can Work Together to Reduce Energy Consumption!
How Tenants & Landlords Can Work Together to Reduce Energy Consumption!How Tenants & Landlords Can Work Together to Reduce Energy Consumption!
How Tenants & Landlords Can Work Together to Reduce Energy Consumption!
 
How Can Smart Building Technology Become Mainstream?
How Can Smart Building Technology Become Mainstream?How Can Smart Building Technology Become Mainstream?
How Can Smart Building Technology Become Mainstream?
 
The Carbon Lifestyle - Not a Fad
The Carbon Lifestyle - Not a FadThe Carbon Lifestyle - Not a Fad
The Carbon Lifestyle - Not a Fad
 
Hybrid Work: Driving the Workplace Tech Market!
Hybrid Work: Driving the Workplace Tech Market!Hybrid Work: Driving the Workplace Tech Market!
Hybrid Work: Driving the Workplace Tech Market!
 
AI IoT Edge Applications Insights and Trends
AI IoT Edge Applications Insights and TrendsAI IoT Edge Applications Insights and Trends
AI IoT Edge Applications Insights and Trends
 
What Building Owners Need to Know About Cyber Security Insurance!
What Building Owners Need to Know About Cyber Security Insurance!What Building Owners Need to Know About Cyber Security Insurance!
What Building Owners Need to Know About Cyber Security Insurance!
 
3 Step Guide to Your Holistic Building Experience Journey
3 Step Guide to Your Holistic Building Experience Journey3 Step Guide to Your Holistic Building Experience Journey
3 Step Guide to Your Holistic Building Experience Journey
 
The Developers Smart Building Project Canvas
The Developers Smart Building Project CanvasThe Developers Smart Building Project Canvas
The Developers Smart Building Project Canvas
 
Smart, Connected Restrooms. A Cornerstone of Today's Smart Healthy Buildings
Smart, Connected Restrooms. A Cornerstone of Today's Smart Healthy BuildingsSmart, Connected Restrooms. A Cornerstone of Today's Smart Healthy Buildings
Smart, Connected Restrooms. A Cornerstone of Today's Smart Healthy Buildings
 
Using Software Robots to Unlock Energy Efficiency in Aging Buildings
Using Software Robots to Unlock Energy Efficiency in Aging BuildingsUsing Software Robots to Unlock Energy Efficiency in Aging Buildings
Using Software Robots to Unlock Energy Efficiency in Aging Buildings
 
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings IntegrationThe Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
 
Why Should I Adopt a Digital Twin?
Why Should I Adopt a Digital Twin?Why Should I Adopt a Digital Twin?
Why Should I Adopt a Digital Twin?
 
Tagging with AI to Enable Data-Driven Smart Building Applications at Scale!
Tagging with AI to Enable Data-Driven Smart Building Applications at Scale!Tagging with AI to Enable Data-Driven Smart Building Applications at Scale!
Tagging with AI to Enable Data-Driven Smart Building Applications at Scale!
 
Project Haystack - 10 Years of Bringing Data Semantics to the Built Environment!
Project Haystack - 10 Years of Bringing Data Semantics to the Built Environment!Project Haystack - 10 Years of Bringing Data Semantics to the Built Environment!
Project Haystack - 10 Years of Bringing Data Semantics to the Built Environment!
 

Recently uploaded

Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
DerekIwanaka1
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Boris Ziegler
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Auditing study material for b.com final year students
Auditing study material for b.com final year  studentsAuditing study material for b.com final year  students
Auditing study material for b.com final year students
narasimhamurthyh4
 
buy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accountsbuy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accounts
Susan Laney
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
Top Forex Brokers Review
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 

Recently uploaded (20)

Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Auditing study material for b.com final year students
Auditing study material for b.com final year  studentsAuditing study material for b.com final year  students
Auditing study material for b.com final year students
 
buy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accountsbuy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accounts
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 

Physical Security, IoT & The Role of Open Standards

  • 1. Physical Security, IoT & The Role of Open Standards Q&A with Per Björkdahl, ONVIF Chairman Any Questions? Please type them in…
  • 2. 2 ONVIF is committed to providing and promoting open interfaces to the security industry for effective interoperability of IP-based physical security products. The cornerstones of ONVIF are: Standardization of communication between IP-based physical security products Interoperability regardless of brand Openness to all companies and organizations Liaison with International standardization IEC & ISO IEC TC79 WG12 Video (IEC 62676-2-3:2013 IEC TC/) WG11 Access Control (IEC 60839-11-1) IEC TC9 WG46 CCTV in trains (IEC62580-2) ISO JTC1 HEVC (H.265) About ONVIF
  • 3. 3 MISSION To provide and promote open Interfaces to the security industry for effective Interoperability. VISION All Security Systems share one Interface. ONVIF Mission & Vision
  • 4. 4 ONVIF Development: 2008 to present 2008/10 ONVIF founded by Axis, Sony & Bosch, Core Specification 1.0 2009/05 Release of test tool and conformance procedure 2009/07 First conformant product launched 2009/10 100 members 200 products 2010/03 Scope extended to Access control 2010/12 Core specification 2.0 & Device Test Tool 1.02 2011/09 300 members 1000 products 2011/12 Device Test Tool 11.1 Profile S released 2012/08 400 members 2000 products 2013/04 1200 Profile S products 2013/12 Profile C released 2014/04 500 members 2700 Profile S products 2014/07 Profile G released 2014/12 Profile Q release candidate 2015/03 Client test tool released 2015/10 500+ members 5009 products 2015/07 Profile A release candidate 2016/05 ≈ 490 members 6´500 products 2011/12 EN 50132-5-2 IP Video Transmission Protocols Based on Webservices 2013/11 IEC 62676-2-3 IP Video Transmission Protocols Based on Webservices 2011/02 IEC60839-11-31 EACS IP Transmission Protocols Based on Webservices 2016/07 Profile Q released 2016/12 Profile A planned release
  • 5. 5 - Availability vs. protection - Different threatscape than a PC - Unmanaged devices - Customers are not cyber mature - IoT vendors are not cyber mature Internet of Things – Cyber challenges
  • 6. 6 Security is vital to IoT “It is a process, not a product” “Bruce Schneier”
  • 7. 7 ­ IoT are easier to hardened compared PC ­ Out­of­the­box hardening ­ Independent researchers ­ Cyber awareness is increasing IoT– Cyber challenges going forward
  • 8. 8 The message is loud and clear security products that can’t connect to an IP network disappear from the market sooner than later! Two possible developments Limited utilization of standards •Isolated system silos from one manufacturer •Proprietary systems •Manufacturer lock in •Limited interoperability Full utilization of standards •True IoT •Openness, •Unlimited interoperability the Role of Standards
  • 9. 9 True IoT is not possible without standards Standards are not only technical Standards are also Procedures Together they can achieve security Let’s not take a leap backwards Security by obscurity is not preferred the Role of Standards
  • 10. 10 Security is a Permanent working group in ONVIF Certificate-based Client Authentication Keystore TLS server General design goals What is ONVIF doing about security
  • 11. New Website! http://www.memoori.com/ Next Webinar: 12th Sept - “Demystifying the IoT in Smart Buildings”

Editor's Notes

  1. First, let me briefly introduce ONVIF, what we are and what we do.
  2. This is our Mission and Vison. I think we can all agree that we are beyond the point of no return when it comes to expected interoperability. In this scenario Cyber security and IT security are extremely important but perhaps not so often talked about!
  3. During 2015 ONVIF has increased its efforts to be recognized as a thought leader and establish itself as an industry organization for manufacturers in the physical security industry. ONVIF is frequently quoted in security media and articles are re-published ONVIF specifications for both Video and Access control have been included in the newest IEC standards for Video Security Systems and Electronic Access Control
  4. Availability vs Protection An IoT device is a single service device, a.k.a. micro service. The service it provides adds value to a system but does not have enough value to make it the primary attack target. It does not hold the customer database nor is it the primary corporate web server. In order to maximize the service value you may need to increase availability. Availability increases the attack exposure area the thus the risks. Protection on the other hand may add deployment cost and system limitations, possibly reducing the service value. Customers and solution providers needs to make a calculated risk analysis to find the appropriate balance between the two. Different type of threat Due to the nature of an IoT device it does not expose the same types of threats/risks as clients and servers. - The service may expose risks for privacy and data integrity. - The vast amount of devices, inadequate hardening combined with easy physical access makes the devices a valuable attack platform. A malicious agent in the device may be a preparation for a larger targeted attack. Understanding the risks and threatscape around IoT helps focus the protection measures on the important stuff. Unmanaged devices Once deployed it is easy to forget an IoT device compared to a PC, tablet or server. This increases the risk of an IoT device not being monitored or patched. During deployment the device may have limited amount of known vulnerabilities, but a later discovered vulnerability can quickly be exploited if the device is exposed to direct Internet access. Also, IoT devices may have a short life-cycle and the vendor stops supplying patches and updates. These things needs to be taken into considerations. Customers are not cyber mature Many customers are neglecting or underestimating cyber threats. Majority of IoT devices do have some standard hardening capabilities such as password protection. A strong password will protect from more than 95% of attacks becoming a successful breach. Nevertheless, there are many examples where customers do not bother with basic hardening such as setting the password. Poor password management is the single most common reason behind a successful breach. IoT Vendors are not cyber mature Cyber immature vendors does not have to mean that the devices are insecure. But it increases the risk of products being shipped with unsecure interfaces and poor pre-configurations, exposing unnecessary risks for the owner. One driving factor behind this is that even though customers are concerned over cyber threats - they do seldom explicitly request or discuss cyber risks. Cyber immature customers drive vendors to focus on the device feature value.
  5. You can spend thousands of dollars securing your infratsructure! All it takes is that a password gets out and you are toast! It is hard to protect the system from intended breach from insider (social hacking) Bruce Schneier is an American cryptographer, computer security and privacy specialist, and writer. Another quote is If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology. It is the combination of technology and procedures that creates the process that protects you! Products provide some protection, but the only way to effectively do business in an insecure world is to put processes in place that recognize the inherent insecurity in the products. The trick is to reduce your risk of exposure regardless of the products or patches.
  6. IoT are easier to cyber hardened compared to clients and servers IoT device have less internal services and interface to protect Majority of devices are protected by infrastructure only accessible through cloud/server services IoT devices do not have users installing insecure applications, opening email attachments or surf suspicious sites Some manufacturers provides a Hardening Guide for their products where they recommend different settings depending on environment and end customer infrastructure and policies. Out-of-the-box hardening Almost all successful breaches are due to people mistakes and misconfiguration. By addressing out-of-the-box hardened, pre-shipped configurations, enhanced user interfaces and hardening guides, vendors can help customer archive sufficient standard protection. Additional tools and services will help management, configuration and monitoring. We see an increasing growth of encryption infrastructure and simplified certificate management that will make it easier to deploy communication protection. Independent researchers As the volume of IoT devices and services increases it will attract more independent researcher, consultants and white-hat hackers. They will help expose (unknown) device vulnerabilities before they may be exploited. We will also see more media coverage that will highlighting threats, risks and best practices. Cyber awareness Both customers and vendors are becoming more aware of cyber threats. This will push vendors to put more effort on cyber threat issues. Not only to device vulnerabilities but to configuration, management and maintenance.