SlideShare a Scribd company logo
1 of 11
IoTThe big buzzword
April 19th 2016
Information everywhere
Protecting the connected world, beyond the network perimeter
Security for the Internet of Things
Why?
What?
How?
Why do we need to protect the IoT?
Confidential data
Control systems
What is there to be protected in the IoT?
Defining the scope
What is there to be protected in the IoT?
Defining the scope
What is there to be protected in the IoT?
Grouping the elements
What is there to be protected in the IoT?
Grouping the elements
Interaction
What is there to be protected in the IoT?
A visual definition
Virtual World
End-Point
Network Interface
Object
Collector
Controller
Virtual Physical
Physical world – physical controls
Protect the data (risk analysis)
Protect control interfaces
Perimeter is not dead
How can we protect the IoT?
General considerations
Standardization
Large scale access to security solutions
Secure Design and Implementation
How can we protect the IoT?
A look into the future
Governance
Intelligence
Secure Development
Secure Implementation in Production
How can we protect the IoT?
Secure Design and Implementation

More Related Content

What's hot

Intro to data science - Webinar
Intro to data science - WebinarIntro to data science - Webinar
Intro to data science - WebinarAniruddha Kalbande
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT securityIoT613
 
ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10Pooja Soni
 
Lessons Learned for Internet of Things for Students
Lessons Learned for Internet of Things for StudentsLessons Learned for Internet of Things for Students
Lessons Learned for Internet of Things for StudentsTegar Imansyah
 
Privacy in Wireless Networks
Privacy in Wireless NetworksPrivacy in Wireless Networks
Privacy in Wireless NetworksMichael Boman
 
Internet of things: dispelling common myths
Internet of things: dispelling common myths Internet of things: dispelling common myths
Internet of things: dispelling common myths Vish Nandlall
 
Bio cv ulf mattsson
Bio cv ulf mattssonBio cv ulf mattsson
Bio cv ulf mattssonUlf Mattsson
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of ThingsIsmail Al Kamal
 
Winferno: Protecting Personal Information
Winferno: Protecting Personal InformationWinferno: Protecting Personal Information
Winferno: Protecting Personal InformationWinferno
 
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionCyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionIsaiah Edem
 
How to handle multilayered IT security today
How to handle multilayered IT security todayHow to handle multilayered IT security today
How to handle multilayered IT security todayMarc Vael
 
State of bitcoin security
State of bitcoin securityState of bitcoin security
State of bitcoin securityMediabistro
 
[Fortifier] Reliable software engineering
[Fortifier] Reliable software engineering [Fortifier] Reliable software engineering
[Fortifier] Reliable software engineering Fortifier. IT Company
 
Research Topics in IOT
Research Topics in IOTResearch Topics in IOT
Research Topics in IOTTechsparks
 
Marketing Tools for the Enterprise with Rene Bonvanie, Palo Alto Networks
Marketing Tools for the Enterprise with Rene Bonvanie, Palo Alto NetworksMarketing Tools for the Enterprise with Rene Bonvanie, Palo Alto Networks
Marketing Tools for the Enterprise with Rene Bonvanie, Palo Alto NetworksMenlo Ventures
 
The WISER Project at a glance
The WISER Project at a glanceThe WISER Project at a glance
The WISER Project at a glanceCYBERWISER .eu
 
CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)Michael DeLaGarza
 
Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...IJNSA Journal
 
Wintellisys - IT security & compliance
Wintellisys - IT security & complianceWintellisys - IT security & compliance
Wintellisys - IT security & complianceBrandie Wess
 

What's hot (20)

Intro to data science - Webinar
Intro to data science - WebinarIntro to data science - Webinar
Intro to data science - Webinar
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
 
ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10
 
Lessons Learned for Internet of Things for Students
Lessons Learned for Internet of Things for StudentsLessons Learned for Internet of Things for Students
Lessons Learned for Internet of Things for Students
 
Privacy in Wireless Networks
Privacy in Wireless NetworksPrivacy in Wireless Networks
Privacy in Wireless Networks
 
Internet of things: dispelling common myths
Internet of things: dispelling common myths Internet of things: dispelling common myths
Internet of things: dispelling common myths
 
Bio cv ulf mattsson
Bio cv ulf mattssonBio cv ulf mattsson
Bio cv ulf mattsson
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of Things
 
Winferno: Protecting Personal Information
Winferno: Protecting Personal InformationWinferno: Protecting Personal Information
Winferno: Protecting Personal Information
 
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionCyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
 
How to handle multilayered IT security today
How to handle multilayered IT security todayHow to handle multilayered IT security today
How to handle multilayered IT security today
 
State of bitcoin security
State of bitcoin securityState of bitcoin security
State of bitcoin security
 
[Fortifier] Reliable software engineering
[Fortifier] Reliable software engineering [Fortifier] Reliable software engineering
[Fortifier] Reliable software engineering
 
Get the best hackers convention in india
Get the best hackers convention in indiaGet the best hackers convention in india
Get the best hackers convention in india
 
Research Topics in IOT
Research Topics in IOTResearch Topics in IOT
Research Topics in IOT
 
Marketing Tools for the Enterprise with Rene Bonvanie, Palo Alto Networks
Marketing Tools for the Enterprise with Rene Bonvanie, Palo Alto NetworksMarketing Tools for the Enterprise with Rene Bonvanie, Palo Alto Networks
Marketing Tools for the Enterprise with Rene Bonvanie, Palo Alto Networks
 
The WISER Project at a glance
The WISER Project at a glanceThe WISER Project at a glance
The WISER Project at a glance
 
CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)
 
Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...Call for Papers - 8th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...
 
Wintellisys - IT security & compliance
Wintellisys - IT security & complianceWintellisys - IT security & compliance
Wintellisys - IT security & compliance
 

Similar to SC Congress Amsterdam 2016 - IoT Security

Smau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSmau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSMAU
 
The future of IoT paper
The future of IoT paperThe future of IoT paper
The future of IoT paperJayanth Vinay
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB
 
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...Anil
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
Ultimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUES
Ultimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUESUltimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUES
Ultimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUESEMERSON EDUARDO RODRIGUES
 
Review on Vulnerabilities of IoT Security
Review on Vulnerabilities of IoT SecurityReview on Vulnerabilities of IoT Security
Review on Vulnerabilities of IoT Securityijtsrd
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
 
Internet Of Things What You Need To Know - TechFuse
Internet Of Things What You Need To Know - TechFuseInternet Of Things What You Need To Know - TechFuse
Internet Of Things What You Need To Know - TechFuseRichard Harbridge
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdf1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdfdrputtanr
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxvrickens
 
IOT- information Technology
IOT- information Technology IOT- information Technology
IOT- information Technology khushi pokharna
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts#essaywriting
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemCA Technologies
 

Similar to SC Congress Amsterdam 2016 - IoT Security (20)

Smau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSmau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano Zanero
 
The future of IoT paper
The future of IoT paperThe future of IoT paper
The future of IoT paper
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of Things
 
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Ultimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUES
Ultimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUESUltimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUES
Ultimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUES
 
Review on Vulnerabilities of IoT Security
Review on Vulnerabilities of IoT SecurityReview on Vulnerabilities of IoT Security
Review on Vulnerabilities of IoT Security
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
 
IoT Security.pdf
IoT Security.pdfIoT Security.pdf
IoT Security.pdf
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
Internet Of Things What You Need To Know - TechFuse
Internet Of Things What You Need To Know - TechFuseInternet Of Things What You Need To Know - TechFuse
Internet Of Things What You Need To Know - TechFuse
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Davitt Potter - CSA Arrow
Davitt Potter - CSA ArrowDavitt Potter - CSA Arrow
Davitt Potter - CSA Arrow
 
1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdf1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdf
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
sample assignment
sample assignmentsample assignment
sample assignment
 
IOT- information Technology
IOT- information Technology IOT- information Technology
IOT- information Technology
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
 

More from Dan Vasile

Dan Vasile - Risk Calculation and Visualization
Dan Vasile - Risk Calculation and VisualizationDan Vasile - Risk Calculation and Visualization
Dan Vasile - Risk Calculation and VisualizationDan Vasile
 
WordPress Security Implementation Guideline - Presentation for OWASP Romania ...
WordPress Security Implementation Guideline - Presentation for OWASP Romania ...WordPress Security Implementation Guideline - Presentation for OWASP Romania ...
WordPress Security Implementation Guideline - Presentation for OWASP Romania ...Dan Vasile
 
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Vasile
 
Dan Catalin Vasile - Hacking the Wordpress Ecosystem
Dan Catalin Vasile - Hacking the Wordpress EcosystemDan Catalin Vasile - Hacking the Wordpress Ecosystem
Dan Catalin Vasile - Hacking the Wordpress EcosystemDan Vasile
 
Bug bounty programs
Bug bounty programsBug bounty programs
Bug bounty programsDan Vasile
 
Building an InfoSec RedTeam
Building an InfoSec RedTeamBuilding an InfoSec RedTeam
Building an InfoSec RedTeamDan Vasile
 

More from Dan Vasile (6)

Dan Vasile - Risk Calculation and Visualization
Dan Vasile - Risk Calculation and VisualizationDan Vasile - Risk Calculation and Visualization
Dan Vasile - Risk Calculation and Visualization
 
WordPress Security Implementation Guideline - Presentation for OWASP Romania ...
WordPress Security Implementation Guideline - Presentation for OWASP Romania ...WordPress Security Implementation Guideline - Presentation for OWASP Romania ...
WordPress Security Implementation Guideline - Presentation for OWASP Romania ...
 
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
 
Dan Catalin Vasile - Hacking the Wordpress Ecosystem
Dan Catalin Vasile - Hacking the Wordpress EcosystemDan Catalin Vasile - Hacking the Wordpress Ecosystem
Dan Catalin Vasile - Hacking the Wordpress Ecosystem
 
Bug bounty programs
Bug bounty programsBug bounty programs
Bug bounty programs
 
Building an InfoSec RedTeam
Building an InfoSec RedTeamBuilding an InfoSec RedTeam
Building an InfoSec RedTeam
 

SC Congress Amsterdam 2016 - IoT Security

Editor's Notes

  1. I would like to speak a little bit about the big buzzword of the network connected devices. I love buzzwords, they don’t mean anything, it’s just a huge umbrella trying to cover everything and then the general public is trying use the term and apply in a way that suits their needs. In the end, the median of people’s perception will generate the definition.
  2. Because we’re at a security conference I’ll try to stay within this field and address the security aspects related to the buzzword. The 3 main questions we need to ask ourselves and the industry are why, what and how can we build security for the IoT.
  3. I’m not going to insist on this much because Max already made the case for securing the IoT. I would like to point out the 2 major aspects in my opinion of the interconnected world. Confidential data is sent between devices and the second one is that the IoT’s end goal is to provide automation but also remote access to control systems. If we lose the grip on security we endanger both aspects.
  4. What are we trying to protect? In order to be efficient we need to align with the security controls and define the scope. So what exactly is this IoT? I turned my face towards the infinite wisdom of the Internet to find out what it is. What you see on the slide is not random, it is actually a visual interpretation of a dozen definitions that I collected. The bigger the word, the more times it appeared in the definitions, you get the idea. Looking at this I realized that the major terms can be grouped.
  5. Removing the irrelevant.
  6. I ended up with 3 main categories. There you have it, that’s the scope for securing the IoT.
  7. I ended up with 3 main categories. There you have it, that’s the scope for securing the IoT.
  8. I resisted the temptation to come up with my own (yet another) definition and because an image is worth 1000 words, here’s my visual definition of the IoT. It is simplistic view that gives us an image of what we have to protect. It’s funny how in this IoT paradigm, the things aren’t the ones that are in scope. Your water kettle is secure by default in the virtual world until you attach sensors, remote control options and a network interface. So the scope of the virtual world is everything else but the objects. The objects have security implications and needs in the physical world. According to this visual definition, SCADA is yet another object or thing. I would like to emphasize the differentiation between collectors and controllers. A collector is a sensor, it reads data. Data ca be anywhere between highly confidential and public domain. The thermostat example / The heart belt example / Risk analysis of the data. Now the controller can have very damaging implications if breached in almost any situation as it impacts the physical world directly. The risk profile of the controller is, generally speaking much higher than the collector. Think about SCADA, critical infrastructure, transportation, etc.
  9. We have the elements, how do we protect them? The physical world requires physical controls. You don’t normally keep your water kettle outside your house, do you? And you usually lock your door when you leave the house. Anti-tampering solutions must be designed for the grey area between the object and the network. Data must be protected according to it’s value. Control interfaces have a higher potential impact, thus must receive the proper attention given the increased risk profile. The perimeter must be protected. It’s according to a fundamental security principle, security in depth. Collectors and controllers can communicate between them without sending data outside the local network, if that communication channel is not protected, then any attacker with access or proximity to the local network can manipulate and intrude.
  10. Standardization – proprietary protocols usually fail, especially from a security perspective. TLS. Consumer access to business or military grade solutions, like IPS and Intelligence. Last but not least, my favorite – proper secure design and implementation
  11. These are the 4 towers of secure design and implementation. Governance all around, have a strategy, measure it, be pro-active. Intelligence – understand the threats and prepare to tackle them in advance Development – analyze, review and test, end-to-end from the early stages until ready to ship Implementation – be sure that whoever implements the solution will do it in a secure way, you most likely don’t control the implementation. Prepare the design in such a way that you can protect against new threats, consider how will the update process will go, collect threat intelligence from deployed items.