SlideShare a Scribd company logo
1 of 29
O MAIOR EVENTO DE HACKING, SEGURANÇA
E TECNOLOGIA DO BRASIL DO CONTINENTE
É possível existir
Segurança para IoT?
Anchises Moraes
@anchisesbr
@garoahc @BSidesSP @CSAbr
@RSAFraud
Internet dos Trecos
"Internet das Coisas (IoT) envolve
a conexão de entidades físicas
("coisas") com sistemas de TI
através de redes". Fonte: ISO / IEC
05/02/16 3
4
Fonte: CSA
Computação Vestível
Automação residencial
Carros conectados
Brinquedos
The Internet
of Things
Fontes: http://www.businessinsider.com/how-the-internet-of-things-market-will-grow-2014-10
http://www.worldometers.info/world-population/
Dispositivos conetados na Internet em 2020
bi
7,7 bilhões de pessoas em 2020
05/02/16 6
Atualização
infeliz faz
centenas de
fechaduras
conectadas
pararem de
funcionar
https://olhardigital.com.br/noticia/atualizaca
o-infeliz-faz-centenas-de-fechaduras-
conectadas-pararem-de-funcionar/70403
465 mil pacientes
orientados a
visitar o médico
para corrigir
vulnerabilidade
crítica no marca-
passo
https://arstechnica.com/information-
technology/2017/08/465k-patients-need-a-
firmware-update-to-prevent-serious-pacemaker-
hacks/
05/02/16 7
Internet of Threats
8
Internet of Threats
05/02/16 9
http://www.joyoftech.com/joyoftech/joyarchives/2340.html
• Privacidade
• Uso malicioso
• Ransomwares
• Realizar
ciber ataques
• Danos físicos
“Fazemos segurança em IoT
como fazíamos segurança na
Web nos anos 90”
Julio Cesar Fort
@juliocesarfort
05/02/16 10
Desafios de segurança
• Segurança é nova
para os fabricantes
• Segurança não é foco
• Desenvolvedores IoT
sem conhecimento de
segurança
• Falta de padrões de
segurança para IoT
05/02/16 11
Picture source: Giphy
Fonte: Ponemon Institute, IBM, and Arxan
http://www.techrepublic.com/article/80-of-iot-apps-not-tested-for-vulnerabilities-report-says/
dos apps IoT não são testados
contra vulnerabilidades
Como proteger seu IoT?
05/02/16 13
Iniciativas da ISO/IEC
ISO/IEC CD 20924,
Internet of Things —
Definition and
Vocabulary
ISO/IEC CD 30141,
Internet of Things
Reference Architecture
(IoT RA)
05/02/16 14
Cloud Security Alliance
“Future-proofing the
Connected World:
13 Steps to Developing
Secure IoT Products”
Out. 2016
https://cloudsecurityalliance.org/download/
future-proofing-the-connected-world/
05/02/16 15
13 passos para segurança
em IoT
1. Metodologia de desenvolvimento seguro
2. Ambiente seguro de desenvolvimento
3. Recursos de segurança da plataforma
4. Definir proteções de Privacidade
5. Controles de segurança em hardware
6. Proteger dados
7. Proteger aplicativos e serviços associados
05/02/16 16
13 passos para segurança
em IoT
8. Proteger interfaces e APIs
9. Atualização segura
10.Autenticação, Autorização e Controle de
Acesso
11.Gerenciamento seguro de chaves
12.Fornecer mecanismos de Log
13.Revisões de segurança
05/02/16 17
Cloud Security Alliance
“Security Guidance
for Early Adopters of
the IoT”
Abr. 2015
https://cloudsecurityalliance.org/download
/new-security-guidance-for-early-adopters-
of-the-iot/
05/02/16 18
The OWASP Internet of
Things Project
IoT Attack Surface Areas
IoT Vulnerabilities
Firmware Analysis
ICS/SCADA Software
Weaknesses
Community Information
IoT Testing Guides
05/02/16 19
https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project
IoT Security Guidance
Principles of IoT
Security
IoT Framework Assessment
Developer, Consumer and
Manufacturer Guidance
Design Principles
The OWASP Internet of
Things Top 10 Project
1. Insecure Web Interface
2. Insufficient
Authentication/Authorization
3. Insecure Network Services
4. Lack of Transport Encryption
5. Privacy Concerns
05/02/16 20
The OWASP Internet of
Things Top 10 Project
6. Insecure Cloud Interface
7. Insecure Mobile Interface
8. Insufficient Security Configurability
9. Insecure Software/Firmware
10.Poor Physical Security
05/02/16 21
Iniciativas governamentais
“The key principles of vehicle
cyber security for connected and
automated vehicles”
UK, Ago. 2017
https://www.gov.uk/government/publications/principles-of-cyber-security-
for-connected-and-automated-vehicles/the-key-principles-of-vehicle-
cyber-security-for-connected-and-automated-vehicles
05/02/16 22
The key principles of
vehicle cyber security …
1 - organisational security is owned, governed
and promoted at board level
2 - security risks are assessed and managed
appropriately and proportionately, including
those specific to the supply chain
3 - organisations need product aftercare and
incident response to ensure systems are secure
over their lifetime
23
The key principles of
vehicle cyber security …
4 - all organisations, including sub-
contractors, suppliers and potential 3rd
parties, work together to enhance the security
of the system
5 - systems are designed using a defence-in-
depth approach
6 - the security of all software is managed
throughout its lifetime
24
The key principles of
vehicle cyber security …
7 - the storage and transmission of data is
secure and can be controlled
8 - the system is designed to be resilient to
attacks and respond appropriately when its
defences or sensors fail
25
Iniciativas governamentais
05/02/16 26
Para saber mais
Internet of Things Working Group
https://cloudsecurityalliance.org/group/internet-of-things/
Getting to Know Mirai
https://community.rsa.com/community/products/netwitness/blog/201
7/08/30/getting-to-know-mirai
05/02/16 27
Dúvidas?
28
Obrigado!
#dontstophacking

More Related Content

What's hot

IOT Platform as a Service
IOT Platform as a ServiceIOT Platform as a Service
IOT Platform as a Servicekidozen
 
IOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerIOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerData Con LA
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...gogo6
 
Defining the IoT Stack
Defining the IoT StackDefining the IoT Stack
Defining the IoT StackPubNub
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything Cisco Canada
 
Gartner: Top 10 Strategic Technology Trends 2016
Gartner: Top 10 Strategic Technology Trends 2016Gartner: Top 10 Strategic Technology Trends 2016
Gartner: Top 10 Strategic Technology Trends 2016Den Reymer
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017Ahmed Banafa
 
IoT Analytics From Data to Decision Making - Trends & Challenges
IoT Analytics From Data to Decision Making- Trends & ChallengesIoT Analytics From Data to Decision Making- Trends & Challenges
IoT Analytics From Data to Decision Making - Trends & ChallengesDr. Mazlan Abbas
 
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1usman sarwar
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015Hildebrand Technology
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Den Reymer
 
Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...
Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...
Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...Solution Analysts
 
Scaling IoT Security
Scaling IoT SecurityScaling IoT Security
Scaling IoT SecurityBill Harpley
 
Internet of Things(IoT) Applications | IoT Tutorial for Beginners | IoT Train...
Internet of Things(IoT) Applications | IoT Tutorial for Beginners | IoT Train...Internet of Things(IoT) Applications | IoT Tutorial for Beginners | IoT Train...
Internet of Things(IoT) Applications | IoT Tutorial for Beginners | IoT Train...Edureka!
 
IoT Update | Hoe implementeer je IoT Schaalbaar in je IT landschap
IoT Update | Hoe implementeer je IoT Schaalbaar in je IT landschapIoT Update | Hoe implementeer je IoT Schaalbaar in je IT landschap
IoT Update | Hoe implementeer je IoT Schaalbaar in je IT landschapIoT Academy
 
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...sandhibhide
 
IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018Mario Drobics
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldBrad Nicholas
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?360mnbsu
 

What's hot (20)

IOT Platform as a Service
IOT Platform as a ServiceIOT Platform as a Service
IOT Platform as a Service
 
IOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerIOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry Power
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
 
Defining the IoT Stack
Defining the IoT StackDefining the IoT Stack
Defining the IoT Stack
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoT
 
Gartner: Top 10 Strategic Technology Trends 2016
Gartner: Top 10 Strategic Technology Trends 2016Gartner: Top 10 Strategic Technology Trends 2016
Gartner: Top 10 Strategic Technology Trends 2016
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017
 
IoT Analytics From Data to Decision Making - Trends & Challenges
IoT Analytics From Data to Decision Making- Trends & ChallengesIoT Analytics From Data to Decision Making- Trends & Challenges
IoT Analytics From Data to Decision Making - Trends & Challenges
 
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017
 
Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...
Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...
Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...
 
Scaling IoT Security
Scaling IoT SecurityScaling IoT Security
Scaling IoT Security
 
Internet of Things(IoT) Applications | IoT Tutorial for Beginners | IoT Train...
Internet of Things(IoT) Applications | IoT Tutorial for Beginners | IoT Train...Internet of Things(IoT) Applications | IoT Tutorial for Beginners | IoT Train...
Internet of Things(IoT) Applications | IoT Tutorial for Beginners | IoT Train...
 
IoT Update | Hoe implementeer je IoT Schaalbaar in je IT landschap
IoT Update | Hoe implementeer je IoT Schaalbaar in je IT landschapIoT Update | Hoe implementeer je IoT Schaalbaar in je IT landschap
IoT Update | Hoe implementeer je IoT Schaalbaar in je IT landschap
 
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
 
IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
 

Similar to É possível existir segurança para IoT?

8 Internet of Things Figures Everyone Should Know
8 Internet of Things Figures Everyone Should Know8 Internet of Things Figures Everyone Should Know
8 Internet of Things Figures Everyone Should KnowMegan Thudium
 
IoT_Evolution_or_Revolution_20160130
IoT_Evolution_or_Revolution_20160130IoT_Evolution_or_Revolution_20160130
IoT_Evolution_or_Revolution_20160130Francisco Maroto
 
TechIPm IoT (Internet of Things) Intellectual Property (Patent) Strategy Cons...
TechIPm IoT (Internet of Things) Intellectual Property (Patent) Strategy Cons...TechIPm IoT (Internet of Things) Intellectual Property (Patent) Strategy Cons...
TechIPm IoT (Internet of Things) Intellectual Property (Patent) Strategy Cons...Alex G. Lee, Ph.D. Esq. CLP
 
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCOEl IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCODomotys
 
Web das coisas
Web das coisasWeb das coisas
Web das coisasCentro Web
 
National seminar on emergence of internet of things (io t) trends and challe...
National seminar on emergence of internet of things (io t)  trends and challe...National seminar on emergence of internet of things (io t)  trends and challe...
National seminar on emergence of internet of things (io t) trends and challe...Ajay Ohri
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptxssuserc5ee4c
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptxJanasudhan1
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptxSourajitMaity1
 
Web das coisas
Web das coisasWeb das coisas
Web das coisasCentro Web
 
Internet Of things
Internet Of thingsInternet Of things
Internet Of thingsDeva Johnson
 
Presentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise ArchitecturePresentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise ArchitectureFrancisco Maroto
 
5G What it means for IoT
5G What it means for IoT5G What it means for IoT
5G What it means for IoTMr Risman
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxvoversbyobersby
 
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)Jackson Shaw
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxmariuse18nolet
 
jose rizal univeristy internet of things
jose rizal univeristy internet of thingsjose rizal univeristy internet of things
jose rizal univeristy internet of thingsJesseDelaCruz11
 
Internet of Things Cebu meetup : 1st meetup
Internet of Things Cebu meetup : 1st meetup Internet of Things Cebu meetup : 1st meetup
Internet of Things Cebu meetup : 1st meetup Francisco Liwa
 
Industry-wide research on open source Internet of Things platforms - San Fran...
Industry-wide research on open source Internet of Things platforms - San Fran...Industry-wide research on open source Internet of Things platforms - San Fran...
Industry-wide research on open source Internet of Things platforms - San Fran...changeableradiu23
 
Internet of Things Workshop
Internet of Things WorkshopInternet of Things Workshop
Internet of Things WorkshopDr. Mazlan Abbas
 

Similar to É possível existir segurança para IoT? (20)

8 Internet of Things Figures Everyone Should Know
8 Internet of Things Figures Everyone Should Know8 Internet of Things Figures Everyone Should Know
8 Internet of Things Figures Everyone Should Know
 
IoT_Evolution_or_Revolution_20160130
IoT_Evolution_or_Revolution_20160130IoT_Evolution_or_Revolution_20160130
IoT_Evolution_or_Revolution_20160130
 
TechIPm IoT (Internet of Things) Intellectual Property (Patent) Strategy Cons...
TechIPm IoT (Internet of Things) Intellectual Property (Patent) Strategy Cons...TechIPm IoT (Internet of Things) Intellectual Property (Patent) Strategy Cons...
TechIPm IoT (Internet of Things) Intellectual Property (Patent) Strategy Cons...
 
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCOEl IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
 
Web das coisas
Web das coisasWeb das coisas
Web das coisas
 
National seminar on emergence of internet of things (io t) trends and challe...
National seminar on emergence of internet of things (io t)  trends and challe...National seminar on emergence of internet of things (io t)  trends and challe...
National seminar on emergence of internet of things (io t) trends and challe...
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
Web das coisas
Web das coisasWeb das coisas
Web das coisas
 
Internet Of things
Internet Of thingsInternet Of things
Internet Of things
 
Presentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise ArchitecturePresentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise Architecture
 
5G What it means for IoT
5G What it means for IoT5G What it means for IoT
5G What it means for IoT
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
jose rizal univeristy internet of things
jose rizal univeristy internet of thingsjose rizal univeristy internet of things
jose rizal univeristy internet of things
 
Internet of Things Cebu meetup : 1st meetup
Internet of Things Cebu meetup : 1st meetup Internet of Things Cebu meetup : 1st meetup
Internet of Things Cebu meetup : 1st meetup
 
Industry-wide research on open source Internet of Things platforms - San Fran...
Industry-wide research on open source Internet of Things platforms - San Fran...Industry-wide research on open source Internet of Things platforms - San Fran...
Industry-wide research on open source Internet of Things platforms - San Fran...
 
Internet of Things Workshop
Internet of Things WorkshopInternet of Things Workshop
Internet of Things Workshop
 

More from Anchises Moraes

Post pandemics threat scenario
Post pandemics threat scenarioPost pandemics threat scenario
Post pandemics threat scenarioAnchises Moraes
 
Como se proteger na internet
Como se proteger na internetComo se proteger na internet
Como se proteger na internetAnchises Moraes
 
Fatos, mitos e palpites do cenário de segurança pós-pandemia
Fatos, mitos e palpites do cenário de segurança pós-pandemiaFatos, mitos e palpites do cenário de segurança pós-pandemia
Fatos, mitos e palpites do cenário de segurança pós-pandemiaAnchises Moraes
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachAnchises Moraes
 
Praticas de gestão de segurança
Praticas de gestão de segurançaPraticas de gestão de segurança
Praticas de gestão de segurançaAnchises Moraes
 
Ciber crime e desafios de segurança durante uma pandemia e home office
Ciber crime e desafios de segurança durante uma pandemia e home officeCiber crime e desafios de segurança durante uma pandemia e home office
Ciber crime e desafios de segurança durante uma pandemia e home officeAnchises Moraes
 
Cyber Cultura em tempos de Coronavírus
Cyber Cultura em tempos de CoronavírusCyber Cultura em tempos de Coronavírus
Cyber Cultura em tempos de CoronavírusAnchises Moraes
 
Hunting bugs - C0r0n4con
Hunting bugs - C0r0n4conHunting bugs - C0r0n4con
Hunting bugs - C0r0n4conAnchises Moraes
 
Fintechs e os desafios de segurança
Fintechs e os desafios de segurançaFintechs e os desafios de segurança
Fintechs e os desafios de segurançaAnchises Moraes
 
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 20195 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019Anchises Moraes
 
Segurança além do Pentest
Segurança além do PentestSegurança além do Pentest
Segurança além do PentestAnchises Moraes
 
Só o Pentest não resolve!
Só o Pentest não resolve!Só o Pentest não resolve!
Só o Pentest não resolve!Anchises Moraes
 
Carreira em Segurança da Informação
Carreira em Segurança da InformaçãoCarreira em Segurança da Informação
Carreira em Segurança da InformaçãoAnchises Moraes
 
Carta de oposição ao Sindpd 2018
Carta de oposição ao Sindpd 2018Carta de oposição ao Sindpd 2018
Carta de oposição ao Sindpd 2018Anchises Moraes
 
Como se tornar um Jedi na área de Segurança
Como se tornar um Jedi na área de SegurançaComo se tornar um Jedi na área de Segurança
Como se tornar um Jedi na área de SegurançaAnchises Moraes
 

More from Anchises Moraes (20)

Post pandemics threat scenario
Post pandemics threat scenarioPost pandemics threat scenario
Post pandemics threat scenario
 
Como se proteger na internet
Como se proteger na internetComo se proteger na internet
Como se proteger na internet
 
Fatos, mitos e palpites do cenário de segurança pós-pandemia
Fatos, mitos e palpites do cenário de segurança pós-pandemiaFatos, mitos e palpites do cenário de segurança pós-pandemia
Fatos, mitos e palpites do cenário de segurança pós-pandemia
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
 
Vamos caçar bugs!?
Vamos caçar bugs!?Vamos caçar bugs!?
Vamos caçar bugs!?
 
Praticas de gestão de segurança
Praticas de gestão de segurançaPraticas de gestão de segurança
Praticas de gestão de segurança
 
Ciber crime e desafios de segurança durante uma pandemia e home office
Ciber crime e desafios de segurança durante uma pandemia e home officeCiber crime e desafios de segurança durante uma pandemia e home office
Ciber crime e desafios de segurança durante uma pandemia e home office
 
Cyber Cultura em tempos de Coronavírus
Cyber Cultura em tempos de CoronavírusCyber Cultura em tempos de Coronavírus
Cyber Cultura em tempos de Coronavírus
 
Hunting bugs - C0r0n4con
Hunting bugs - C0r0n4conHunting bugs - C0r0n4con
Hunting bugs - C0r0n4con
 
Fintechs e os desafios de segurança
Fintechs e os desafios de segurançaFintechs e os desafios de segurança
Fintechs e os desafios de segurança
 
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 20195 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
 
Segurança além do Pentest
Segurança além do PentestSegurança além do Pentest
Segurança além do Pentest
 
Só o Pentest não resolve!
Só o Pentest não resolve!Só o Pentest não resolve!
Só o Pentest não resolve!
 
Carreira em Segurança da Informação
Carreira em Segurança da InformaçãoCarreira em Segurança da Informação
Carreira em Segurança da Informação
 
IoT Fofoqueiro
IoT FofoqueiroIoT Fofoqueiro
IoT Fofoqueiro
 
Carta de oposição ao Sindpd 2018
Carta de oposição ao Sindpd 2018Carta de oposição ao Sindpd 2018
Carta de oposição ao Sindpd 2018
 
Segurança na Internet
Segurança na InternetSegurança na Internet
Segurança na Internet
 
Como se tornar um Jedi na área de Segurança
Como se tornar um Jedi na área de SegurançaComo se tornar um Jedi na área de Segurança
Como se tornar um Jedi na área de Segurança
 
Deep Web e Ciber Crime
Deep Web e Ciber CrimeDeep Web e Ciber Crime
Deep Web e Ciber Crime
 
Hacker Passport Brazil
Hacker Passport BrazilHacker Passport Brazil
Hacker Passport Brazil
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

É possível existir segurança para IoT?

  • 1. O MAIOR EVENTO DE HACKING, SEGURANÇA E TECNOLOGIA DO BRASIL DO CONTINENTE
  • 2. É possível existir Segurança para IoT? Anchises Moraes @anchisesbr @garoahc @BSidesSP @CSAbr @RSAFraud
  • 3. Internet dos Trecos "Internet das Coisas (IoT) envolve a conexão de entidades físicas ("coisas") com sistemas de TI através de redes". Fonte: ISO / IEC 05/02/16 3
  • 4. 4 Fonte: CSA Computação Vestível Automação residencial Carros conectados Brinquedos The Internet of Things
  • 6. 05/02/16 6 Atualização infeliz faz centenas de fechaduras conectadas pararem de funcionar https://olhardigital.com.br/noticia/atualizaca o-infeliz-faz-centenas-de-fechaduras- conectadas-pararem-de-funcionar/70403
  • 7. 465 mil pacientes orientados a visitar o médico para corrigir vulnerabilidade crítica no marca- passo https://arstechnica.com/information- technology/2017/08/465k-patients-need-a- firmware-update-to-prevent-serious-pacemaker- hacks/ 05/02/16 7
  • 9. Internet of Threats 05/02/16 9 http://www.joyoftech.com/joyoftech/joyarchives/2340.html • Privacidade • Uso malicioso • Ransomwares • Realizar ciber ataques • Danos físicos
  • 10. “Fazemos segurança em IoT como fazíamos segurança na Web nos anos 90” Julio Cesar Fort @juliocesarfort 05/02/16 10
  • 11. Desafios de segurança • Segurança é nova para os fabricantes • Segurança não é foco • Desenvolvedores IoT sem conhecimento de segurança • Falta de padrões de segurança para IoT 05/02/16 11 Picture source: Giphy
  • 12. Fonte: Ponemon Institute, IBM, and Arxan http://www.techrepublic.com/article/80-of-iot-apps-not-tested-for-vulnerabilities-report-says/ dos apps IoT não são testados contra vulnerabilidades
  • 13. Como proteger seu IoT? 05/02/16 13
  • 14. Iniciativas da ISO/IEC ISO/IEC CD 20924, Internet of Things — Definition and Vocabulary ISO/IEC CD 30141, Internet of Things Reference Architecture (IoT RA) 05/02/16 14
  • 15. Cloud Security Alliance “Future-proofing the Connected World: 13 Steps to Developing Secure IoT Products” Out. 2016 https://cloudsecurityalliance.org/download/ future-proofing-the-connected-world/ 05/02/16 15
  • 16. 13 passos para segurança em IoT 1. Metodologia de desenvolvimento seguro 2. Ambiente seguro de desenvolvimento 3. Recursos de segurança da plataforma 4. Definir proteções de Privacidade 5. Controles de segurança em hardware 6. Proteger dados 7. Proteger aplicativos e serviços associados 05/02/16 16
  • 17. 13 passos para segurança em IoT 8. Proteger interfaces e APIs 9. Atualização segura 10.Autenticação, Autorização e Controle de Acesso 11.Gerenciamento seguro de chaves 12.Fornecer mecanismos de Log 13.Revisões de segurança 05/02/16 17
  • 18. Cloud Security Alliance “Security Guidance for Early Adopters of the IoT” Abr. 2015 https://cloudsecurityalliance.org/download /new-security-guidance-for-early-adopters- of-the-iot/ 05/02/16 18
  • 19. The OWASP Internet of Things Project IoT Attack Surface Areas IoT Vulnerabilities Firmware Analysis ICS/SCADA Software Weaknesses Community Information IoT Testing Guides 05/02/16 19 https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project IoT Security Guidance Principles of IoT Security IoT Framework Assessment Developer, Consumer and Manufacturer Guidance Design Principles
  • 20. The OWASP Internet of Things Top 10 Project 1. Insecure Web Interface 2. Insufficient Authentication/Authorization 3. Insecure Network Services 4. Lack of Transport Encryption 5. Privacy Concerns 05/02/16 20
  • 21. The OWASP Internet of Things Top 10 Project 6. Insecure Cloud Interface 7. Insecure Mobile Interface 8. Insufficient Security Configurability 9. Insecure Software/Firmware 10.Poor Physical Security 05/02/16 21
  • 22. Iniciativas governamentais “The key principles of vehicle cyber security for connected and automated vehicles” UK, Ago. 2017 https://www.gov.uk/government/publications/principles-of-cyber-security- for-connected-and-automated-vehicles/the-key-principles-of-vehicle- cyber-security-for-connected-and-automated-vehicles 05/02/16 22
  • 23. The key principles of vehicle cyber security … 1 - organisational security is owned, governed and promoted at board level 2 - security risks are assessed and managed appropriately and proportionately, including those specific to the supply chain 3 - organisations need product aftercare and incident response to ensure systems are secure over their lifetime 23
  • 24. The key principles of vehicle cyber security … 4 - all organisations, including sub- contractors, suppliers and potential 3rd parties, work together to enhance the security of the system 5 - systems are designed using a defence-in- depth approach 6 - the security of all software is managed throughout its lifetime 24
  • 25. The key principles of vehicle cyber security … 7 - the storage and transmission of data is secure and can be controlled 8 - the system is designed to be resilient to attacks and respond appropriately when its defences or sensors fail 25
  • 27. Para saber mais Internet of Things Working Group https://cloudsecurityalliance.org/group/internet-of-things/ Getting to Know Mirai https://community.rsa.com/community/products/netwitness/blog/201 7/08/30/getting-to-know-mirai 05/02/16 27