SlideShare a Scribd company logo
Security Challenges
in Emerging
Technologies
Praveen Joseph Vackayil
CISSP, PCI QSA cert., CCNA, ISO 27001 LA, MS - Warwick, BE
DISCLAIMER
Ground Rules
• Questions are welcome
• Share your knowledge
• Mobile phones – you know
what to do
Session Objectives
• Exploratory look at emergent technologies
• Identification of associated security
challenges
• Bottom-line:
Incite the thought process on upcoming
challenges and opportunities in information
security.
Session Plan
•The Evolution of Information
Security
•4 Emerging Areas of Technology
and Associated Security
Challenges
So Let’s Go
The Evolution of Information
Security
C
I
A
Quick Reminder
• The fundamental objective of information security is to
protect the C, I and A of data.
However, it wasn’t always this way.
The Shifting Focus of
Information Security
• The early days of data security focused primarily on
Confidentiality of Data
• Cryptography dates back to around 2000 B.C. in Egypt when
encrypted hieroglyphic messages were etched on tombs
The Shifting Focus of
Information Security
• Military applications of cryptography were developed in the
1800s.
• Cryptography was extensively used to encrypt tactical
communications during World Wars I and II.
Can you Identify This Machine?
The Shifting Focus of
Information Security
• With the computing era, the way people use information in
their daily lives evolved.
And with it, so did information security.
1944 Today
Today’s InfoSec Focals – How is
Data Transmitted
Accessed
Shared
Retained
Used
Stored
Processed
What Does The Future Hold?
Wearables
Self Driving Cars 3D Printing
What This All Means
• The same trend from the 60s and 70s is repeating itself.
• Just like how computers spread out from a few offices to the
common man, advanced technology is becoming cheaper and
easily available.
From Greater Pervasiveness to
Greater Power
• Technology’s control over a common man’s life is increasing.
• Today we use mobile phones to keep us connected, and
process information.
• Tomorrow, we will use technology to drive our cars to work.
Shift in the Goal of Information
Security
• Today, the end objective of information security is mainly to
protect assets like
• money
• trade secrets
• business productivity
• organizations’ reputations, etc.
In future, the end objective will shift towards the protection
of
• Human Life
Example Scenario
I’ve hacked into your Core
Banking Database. Pay me
$500,000 or I will crash it.
I’ve hacked into your self-driven
car. All I ask is $10 million. I’ve
texted you my Account Number.
Choose not to comply and I WILL
crash your car.
Cyber extortion TODAY Cyber extortion of the FUTURE
4 Emergent Technologies and
Their Security Challenges
Discussion Plan
• Review of 4 Emergent Technologies
Robotics
3D Printing
The Internet of Things
Wearables
Robotics
Robots Have Been Around A
Very Long Time
First Robot Ever Made:
Archytas’ Bird
• Steam powered wooden bird
• Dates back to 360 BC
• First known attempt at
automation
First Industrial Robot
• 1961 – General Motors developed
a robot to move hot car parts into a
cooling liquid
Robotics: Applications Today
• Industrial Applications:
• Factories – manufacture of cars,
packaging material, processed
foods, etc.
• Automation of repetitive tasks
with high precision
• Medical Applications:
• Robotic surgery allows doctors
to control and automate
complex procedures with high
precision, sometimes even
remotely.
Military Applications of
Robotics • TALON
• Built by a company called Foster-
Miller
• Most common military robot in use
• Can travel through sand, water, and
snow.
• Has Audio-visual listening devices and
a mechanical arm
• Primarily used in search and rescue
operations. Was used in 911.
• Controlled remotely by a human.
Upcoming versions of TALON will include a weapons system
holding guns and grenade launchers.
What Are The Security
Implications?
• End-Points – ie the
equipment at the
doctor’s end or at the
patient’s end is
compromised. This is
less common since the
end-points are usually
physically guarded.
• Network Attacks – the
channel of
communication
between the doctor and
patient is compromised.
This is more common.
Ref: http://arxiv.org/pdf/1504.04339v2.pdf
Consider a Tele-Robotic Surgery. How can it be attacked?
Types of Network Attack
Intention Modification
Intention Manipulation
Hijacking Attack
How Bad Can It Get?
• The above was just one example, but it
can be extrapolated to other scenarios
where robots are used.
• Most robots today are not entirely
autonomous – ie. they must be instructed
by a human entity over a communication
channel.
• If this process is compromised, the impact
can be death and/or serious physical
damage.
Recent Events
Ref: http://time.com/3944181/robot-kills-man-volkswagen-
plant/
Security Approach
• Go Back to the Basics
• Strong encryption of the network link between
the Operator and the Operated Device.
• Use secure communication protocols like TLS
v1.3 and above, SSH, WPA2, etc.
• Strong authentication of source and
destination IPs
• Harden the end-point devices
• Perform network and app level pen-testing
3D Printing
What Is It?
Technology that allows you to fabricate three
dimensional objects using plastic, metal, ceramics,
powders, liquids, or even living cells provided you
have a blueprint of the object created with CAD
software.
3D Printing has been around
since the late 80s. Since 2006,
the technology has started to
become cheaper and more
accessible.
You Will Need A 3D Printer and
a “.stl” Template
http://www.thingiverse.com
3D printing is also called Stereolithography and the CAD templates are created in the
.stl format.
Applications
• Automobile Manufacture
Manufacture and testing of
prototypes and auto
parts/components
• Medical Sector
Manufacture of low cost prosthetic
limbs, dental implants and even living
tissue.
• Defence, Education, etc.
3D Printed Weapons?
• Defense Distributed is an open source company that provides .stl designs for
3D printed firearms – for FREE.
3D Printed Weapons?
• Plastic 3D printed guns can actually be used to fire rounds.
• Liberator 3D is a functioning 3D printed gun developed by Defense
Distributed.
• Plastic guns – don’t show up under a metal detector scan. So this means
everyone with a 3D Printer can create and own an invisible weapon.
Ref:
https://www.youtube.com/watch?feature=player_embedded&v=drPz6n6UXQY
3D Printed ATM Skimmers
• An ATM skimmer fits into an ATM card
slot and can capture Track data from a
swiped credit/debit card.
• A pinhole camera/ keypad overlay
captures the PIN as it is keyed in by the
cardholder
• This is transmitted wirelessly to criminals
located within a 100m range of the ATM.
• Unless cardholders are alert, the
skimmer will pass off as a genuine part of
the ATM itself.
• 3D printing allows ATM skimmer devices
to be made faster, more accurately and
efficiently by crooks.
How About Your Car Keys?
• All it takes is a few photographs of a key to
create the .stl design and 3D print a
duplicate set.
• Burglars, car thieves, etc. are jumping at
the opportunities.
What’s Next?
•There are 6 million parts that go
into a Boeing 747. What if
tomorrow one of those is a 3D
printed fake?
•Counterfeit coins
•Fake ID Cards ???
And By The Way…
• The world’s first fully 3D printed car is on its way out in 2016.
• LocalMotors is working on a road-ready model.
Solutions?
•The technology is still evolving
•Regulation and Legislation is yet
to catch up with ethical, legal,
privacy and security challenges.
•It is going to be difficult to predict,
let alone prevent the mis-use of
this technology.
Wearables
Recognize This?
Casio CFX-400 Calculator Watch. 1995.
How Do We Understand
Wearables?
What’s Common to All Wearables
,
which are carried either of
a user’s body.
What’s Different
Primary Function of the device
• Smart Glasses- Augmented
Reality Device
• Smart Watch - Makes calls,
plays music, etc.
• Smart Pills – monitor health
stats
Device Capability
• Does it have a camera?
• Can it make calls?
• Is it online?
• Does it keep you alive?
Most Popular Wearables Today
• Smart Watches
• Samsung Gear, Apple Watch, Pebble, etc.
• They account for 40% of the wearables market
• Fitness Bands
• FitBit, Garmin, etc.
• Smart Glasses
• Vuzix, Google Glass
Ref: http://www.gartner.com/document/2847117
The Security Challenge with
Wearables
I. For a Personal User – Data
Privacy is the primary concern
with Wearables
II. At an Organizational Level –
Data Security is the key concern
I. Personal Users: The Privacy
Challenge
• Wearable technology is still evolving.
• The primary design focus is more on
functionality and less on privacy.
• Imagine the data available to a stalker who
has hacked into your fitness band:
• Location of your house
• Places you frequent the most
• Your sleep patterns
• Your food habits
• Your exercise habits
• Your health data: heart rate, BP, etc.
Security vs Functionality
• We all know the Google Glass story. A host of great new
features… but privacy??
Eye Tracking Feature Recording Feature
What you see – Glass sees. People that you see – Glass
sees (and can record).
Ref: https://www.youtube.com/watch?t=85&v=9c6W4CCU9M4
Come Jan 2015, Google eventually had to pull the plug on Glass
II. Organizational Context –
Security Challenge
The primary challenge with allowing wearables within an
office workspace is Data Security
Mobile phones have already changed the
security landscape within organizations. How
hard is it to take pictures of your screen using a
mobile camera?
The main issue with wearables is they make it
difficult to find out when they are used to steal
data - taking pictures at the blink of an eye, for
instance.
The Next Level of Wearables
•Implantables
•Ingestibles
Implantables
Jiya Bavishi's auditory brainstem implant is helping her hear
sounds for the first time.
Auditory Brain-Stem
Implant consists of a
i. mic attached to the
ear and
ii. a sensor implanted in
the brain
to process sound signals
in hearing impaired
patients.
Ref: http://www.npr.org/sections/health-shots/2015/06/01/410065053/new-hearing-technology-brings-sound-to-a-litte-
girl
Ingestibles
• The Pill communicates with a
wearable sensor on the skin
called a Patch.
• The technology will track the
patient’s physiological stats
about medication ingestion,
heart rate, activity, rest, and skin
temperature
• The digital health information
can be viewed on a synced
Mobile/Tablet.
Ref: proteus.com
Proteus, a company specializing in Digital Medicine, has received FDA
approval for its Digital Pills – sensors which can be swallowed by a patient.
What are the Security Threats?
• Can someone hack into your internet connected pacemaker
and speed your heart up till you die? According to the former
US Vice President’s advisors…
Ref:
https://www.washingtonpost.com/news/the-
switch/wp/2013/10/21/yes-terrorists-could-
have-hacked-dick-cheneys-heart/
Securing Wearable Technology
Manufacturers of Wearable Technology
• Manufacturers are being pushed by security researchers to look at
security and privacy at the design stage of their devices.
• Devices must anticipate and inform users of privacy compromises they
will make at every stage of using a device
Organizations/Work Places
• Organizations must understand the risks introduced by allowing
wearables within their premises.
• A risk assessment must be done to identify controls ranging from
restricted permission to use these devices to fully denying access
End-Users:
• Users must be aware that privacy will be compromised when they use a
wearable device.
• Children and senior citizens are more vulnerable.
The Internet of Things
What Is It?
Technology today consists of a number of devices
of different kinds, each with a certain level of
computing power and memory.
The IoT is a
ecosystem of
hardware and embedded
within which data can be
and
How Do We Define the IoT?
Interesting Statistic
• The IoT s is projected to consist of 30 billion connected
“things” by 2020.
Ref: IDC
The world’s human population is projected to be almost 8
billion by 2020.
Ref: United Nations Population Fund
What This Means
The Big Challenge – Securing
the IoT
• BMW patches security flaw on their ConnectedDrive software,
that would have allowed a hacker to unlock car doors
Ref: http://www.bmw.com/com/en/insights/technology/connecteddrive/2013/
The Big Challenge – Securing
the IoT
Jul 22, 2015: Hack moving Jeep. Switch off engine.
Ref: http://www.cbc.ca/news/technology/hackers-kill-engine-of-moving-jeep-on-highway-in-security-demo-
1.3162944
The Challenges are Many
• Complexity
A heterogeneous network means devices on the IoT are
different, with unique designs, software, operating
protocols, etc. Where does a security attempt even begin?
• Uniform Standards
On the IoT, we will need to develop a uniform standard for
devices to communicate. A uniform standard/protocol
makes the IoT that much easier to hack into.
• Monitoring
Currently, organizations have SOCs with IPS/DLP, etc. Who
will monitor the IoT network?
IBM Model for the IoT
Each Layer Is Susceptible to a
Variety of Attacks
• Recommends a holistic approach
• Focus not only on securing the Device, but also,
• The IoT Environment it operates in
• It looks at:
• The Device
• The Cloud
• The Mobile Application
• Network Interfaces
• Software
• Use of Encryption
• Use of Authentication
• Physical Security
• USB Ports
Ref: OWASP Internet of Things Top Ten
OWASP – Internet of Things
Top Ten
THANK YOU
&
STAY IN TOUCH
Linkedin.com/in/vackayil
Praveen.jvc@gmail.com

More Related Content

What's hot

Lesson 3
Lesson 3Lesson 3
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
SAHANAHK
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
Ramiro Cid
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
Natraj G
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
Kumawat Dharmpal
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
Andrew McNicol
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
Dhani Ahmad
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
pranjal dutta
 
Ethics and information security 2
Ethics and information security 2Ethics and information security 2
Ethics and information security 2
PT Bank Syariah Mandiri
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
Zefren Edior
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
Gamentortc
 
Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and Challenge
Ikhtiar Khan Sohan
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use case
Shujun Li
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Dr. Loganathan R
 
Program security
Program securityProgram security
Program security
G Prachi
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security RequirementsSteven Cahill
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
Olivier Busolini
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
AbimbolaFisher1
 

What's hot (20)

Lesson 3
Lesson 3Lesson 3
Lesson 3
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Ethics and information security 2
Ethics and information security 2Ethics and information security 2
Ethics and information security 2
 
Mian
MianMian
Mian
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
 
Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and Challenge
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use case
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Program security
Program securityProgram security
Program security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security Requirements
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
 

Viewers also liked

DNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS ProtectionDNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS Protection
Imperva Incapsula
 
WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]
Jeremiah Grossman
 
Top Free Valentine's Day App
Top Free Valentine's Day AppTop Free Valentine's Day App
Top Free Valentine's Day App
Software Developers India
 
Plant Manager Resume
Plant Manager ResumePlant Manager Resume
Plant Manager ResumeCurtis Turner
 
Wearables in data centers
Wearables in data centers Wearables in data centers
Wearables in data centers
sflaig
 
Resume of Joydeep Das,Working as General_manager.
Resume of Joydeep Das,Working as General_manager.Resume of Joydeep Das,Working as General_manager.
Resume of Joydeep Das,Working as General_manager.JOYDEEP DAS
 
The Power of Photography in Digital Marketing
The Power of Photography in Digital MarketingThe Power of Photography in Digital Marketing
The Power of Photography in Digital Marketing
Saffire
 
หนังสือรับรองคุณวุฒิระดับปริญญาตรี
หนังสือรับรองคุณวุฒิระดับปริญญาตรีหนังสือรับรองคุณวุฒิระดับปริญญาตรี
หนังสือรับรองคุณวุฒิระดับปริญญาตรีAkekrin Kerdsoong
 
S7234046I_CI-CLR-302E-1_150000000679284
S7234046I_CI-CLR-302E-1_150000000679284S7234046I_CI-CLR-302E-1_150000000679284
S7234046I_CI-CLR-302E-1_150000000679284Robin Stienberg
 
Dan Cuellar
Dan CuellarDan Cuellar
Dan Cuellar
CodeFest
 
GlobalCollect Data Breach Factsheet
GlobalCollect Data Breach FactsheetGlobalCollect Data Breach Factsheet
GlobalCollect Data Breach Factsheet
Ingenico ePayments
 
Categorías y subcategorías gramaticales
Categorías y subcategorías gramaticalesCategorías y subcategorías gramaticales
Categorías y subcategorías gramaticales
Karina Moreno Verpeide
 
121438404 dicvinitatea-mantuitorului-dupa-evanghelia-a
121438404 dicvinitatea-mantuitorului-dupa-evanghelia-a121438404 dicvinitatea-mantuitorului-dupa-evanghelia-a
121438404 dicvinitatea-mantuitorului-dupa-evanghelia-a
Ene Elena
 
Gramática
GramáticaGramática
Gramática
margatrix
 
The Importance of Proper Windshield Replacement
The Importance of Proper Windshield ReplacementThe Importance of Proper Windshield Replacement
The Importance of Proper Windshield Replacement
Eason Chan
 
GRAVITY THINKING @SXSW 2016 - THINK, FEEL, DO
GRAVITY THINKING @SXSW 2016 - THINK, FEEL, DO GRAVITY THINKING @SXSW 2016 - THINK, FEEL, DO
GRAVITY THINKING @SXSW 2016 - THINK, FEEL, DO
Andrew Roberts
 
PR for CEO's: strategy and tips
PR for CEO's: strategy and tipsPR for CEO's: strategy and tips
PR for CEO's: strategy and tips
FINN
 
Zelula amak-zuzenketak.ppt-1
Zelula amak-zuzenketak.ppt-1Zelula amak-zuzenketak.ppt-1
Zelula amak-zuzenketak.ppt-1
burlau voy
 

Viewers also liked (20)

DNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS ProtectionDNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS Protection
 
WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]
 
Top Free Valentine's Day App
Top Free Valentine's Day AppTop Free Valentine's Day App
Top Free Valentine's Day App
 
Plant Manager Resume
Plant Manager ResumePlant Manager Resume
Plant Manager Resume
 
Fall 2015 catalog Web
Fall 2015 catalog WebFall 2015 catalog Web
Fall 2015 catalog Web
 
Wearables in data centers
Wearables in data centers Wearables in data centers
Wearables in data centers
 
Resume of Joydeep Das,Working as General_manager.
Resume of Joydeep Das,Working as General_manager.Resume of Joydeep Das,Working as General_manager.
Resume of Joydeep Das,Working as General_manager.
 
The Power of Photography in Digital Marketing
The Power of Photography in Digital MarketingThe Power of Photography in Digital Marketing
The Power of Photography in Digital Marketing
 
หนังสือรับรองคุณวุฒิระดับปริญญาตรี
หนังสือรับรองคุณวุฒิระดับปริญญาตรีหนังสือรับรองคุณวุฒิระดับปริญญาตรี
หนังสือรับรองคุณวุฒิระดับปริญญาตรี
 
S7234046I_CI-CLR-302E-1_150000000679284
S7234046I_CI-CLR-302E-1_150000000679284S7234046I_CI-CLR-302E-1_150000000679284
S7234046I_CI-CLR-302E-1_150000000679284
 
Dan Cuellar
Dan CuellarDan Cuellar
Dan Cuellar
 
GlobalCollect Data Breach Factsheet
GlobalCollect Data Breach FactsheetGlobalCollect Data Breach Factsheet
GlobalCollect Data Breach Factsheet
 
Karan_Lakhmani_Resume_
Karan_Lakhmani_Resume_Karan_Lakhmani_Resume_
Karan_Lakhmani_Resume_
 
Categorías y subcategorías gramaticales
Categorías y subcategorías gramaticalesCategorías y subcategorías gramaticales
Categorías y subcategorías gramaticales
 
121438404 dicvinitatea-mantuitorului-dupa-evanghelia-a
121438404 dicvinitatea-mantuitorului-dupa-evanghelia-a121438404 dicvinitatea-mantuitorului-dupa-evanghelia-a
121438404 dicvinitatea-mantuitorului-dupa-evanghelia-a
 
Gramática
GramáticaGramática
Gramática
 
The Importance of Proper Windshield Replacement
The Importance of Proper Windshield ReplacementThe Importance of Proper Windshield Replacement
The Importance of Proper Windshield Replacement
 
GRAVITY THINKING @SXSW 2016 - THINK, FEEL, DO
GRAVITY THINKING @SXSW 2016 - THINK, FEEL, DO GRAVITY THINKING @SXSW 2016 - THINK, FEEL, DO
GRAVITY THINKING @SXSW 2016 - THINK, FEEL, DO
 
PR for CEO's: strategy and tips
PR for CEO's: strategy and tipsPR for CEO's: strategy and tips
PR for CEO's: strategy and tips
 
Zelula amak-zuzenketak.ppt-1
Zelula amak-zuzenketak.ppt-1Zelula amak-zuzenketak.ppt-1
Zelula amak-zuzenketak.ppt-1
 

Similar to Security Challenges in Emerging Technologies

CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
Nune SrinivasRao
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Katedra Informatologii. Wydział Dziennikarstwa, Informacji i Bibliologii, Uniwersytet Warszawski
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
APNIC
 
Digital revolution with Cloud computing
Digital revolution with Cloud computingDigital revolution with Cloud computing
Digital revolution with Cloud computing
Tarry Singh
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
John D. Johnson
 
BYOD: Be your own device?
BYOD: Be your own device?BYOD: Be your own device?
BYOD: Be your own device?
Michel de Goede
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
Claus Cramon Houmann
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_final
PacSecJP
 
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
Security Weekly
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
Claus Cramon Houmann
 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...
Andrew Hammond
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
Atifa Aqueel
 
IoT -Internet of Things
IoT -Internet of ThingsIoT -Internet of Things
IoT -Internet of Things
Joshua Johnston
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design
360mnbsu
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
NOUREDDINEOUNINISSE
 
Trendcasting for 2018 what will the future of tech hold
Trendcasting for 2018   what will the future of tech holdTrendcasting for 2018   what will the future of tech hold
Trendcasting for 2018 what will the future of tech hold
Brian Pichman
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Dinesh O Bareja
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
IAM for mobile and BYOD
IAM for mobile and BYODIAM for mobile and BYOD
IAM for mobile and BYOD
Michel de Goede
 

Similar to Security Challenges in Emerging Technologies (20)

CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
Digital revolution with Cloud computing
Digital revolution with Cloud computingDigital revolution with Cloud computing
Digital revolution with Cloud computing
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
BYOD: Be your own device?
BYOD: Be your own device?BYOD: Be your own device?
BYOD: Be your own device?
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_final
 
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...
 
Quant & Crypto Gold
Quant & Crypto GoldQuant & Crypto Gold
Quant & Crypto Gold
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
 
IoT -Internet of Things
IoT -Internet of ThingsIoT -Internet of Things
IoT -Internet of Things
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Trendcasting for 2018 what will the future of tech hold
Trendcasting for 2018   what will the future of tech holdTrendcasting for 2018   what will the future of tech hold
Trendcasting for 2018 what will the future of tech hold
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
IAM for mobile and BYOD
IAM for mobile and BYODIAM for mobile and BYOD
IAM for mobile and BYOD
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Security Challenges in Emerging Technologies

  • 1. Security Challenges in Emerging Technologies Praveen Joseph Vackayil CISSP, PCI QSA cert., CCNA, ISO 27001 LA, MS - Warwick, BE
  • 3. Ground Rules • Questions are welcome • Share your knowledge • Mobile phones – you know what to do
  • 4. Session Objectives • Exploratory look at emergent technologies • Identification of associated security challenges • Bottom-line: Incite the thought process on upcoming challenges and opportunities in information security.
  • 5. Session Plan •The Evolution of Information Security •4 Emerging Areas of Technology and Associated Security Challenges
  • 7. The Evolution of Information Security
  • 8. C I A Quick Reminder • The fundamental objective of information security is to protect the C, I and A of data. However, it wasn’t always this way.
  • 9. The Shifting Focus of Information Security • The early days of data security focused primarily on Confidentiality of Data • Cryptography dates back to around 2000 B.C. in Egypt when encrypted hieroglyphic messages were etched on tombs
  • 10. The Shifting Focus of Information Security • Military applications of cryptography were developed in the 1800s. • Cryptography was extensively used to encrypt tactical communications during World Wars I and II. Can you Identify This Machine?
  • 11. The Shifting Focus of Information Security • With the computing era, the way people use information in their daily lives evolved. And with it, so did information security. 1944 Today
  • 12. Today’s InfoSec Focals – How is Data Transmitted Accessed Shared Retained Used Stored Processed
  • 13. What Does The Future Hold? Wearables Self Driving Cars 3D Printing
  • 14. What This All Means • The same trend from the 60s and 70s is repeating itself. • Just like how computers spread out from a few offices to the common man, advanced technology is becoming cheaper and easily available.
  • 15. From Greater Pervasiveness to Greater Power • Technology’s control over a common man’s life is increasing. • Today we use mobile phones to keep us connected, and process information. • Tomorrow, we will use technology to drive our cars to work.
  • 16. Shift in the Goal of Information Security • Today, the end objective of information security is mainly to protect assets like • money • trade secrets • business productivity • organizations’ reputations, etc. In future, the end objective will shift towards the protection of • Human Life
  • 17. Example Scenario I’ve hacked into your Core Banking Database. Pay me $500,000 or I will crash it. I’ve hacked into your self-driven car. All I ask is $10 million. I’ve texted you my Account Number. Choose not to comply and I WILL crash your car. Cyber extortion TODAY Cyber extortion of the FUTURE
  • 18. 4 Emergent Technologies and Their Security Challenges
  • 19. Discussion Plan • Review of 4 Emergent Technologies Robotics 3D Printing The Internet of Things Wearables
  • 21. Robots Have Been Around A Very Long Time First Robot Ever Made: Archytas’ Bird • Steam powered wooden bird • Dates back to 360 BC • First known attempt at automation First Industrial Robot • 1961 – General Motors developed a robot to move hot car parts into a cooling liquid
  • 22. Robotics: Applications Today • Industrial Applications: • Factories – manufacture of cars, packaging material, processed foods, etc. • Automation of repetitive tasks with high precision • Medical Applications: • Robotic surgery allows doctors to control and automate complex procedures with high precision, sometimes even remotely.
  • 23. Military Applications of Robotics • TALON • Built by a company called Foster- Miller • Most common military robot in use • Can travel through sand, water, and snow. • Has Audio-visual listening devices and a mechanical arm • Primarily used in search and rescue operations. Was used in 911. • Controlled remotely by a human. Upcoming versions of TALON will include a weapons system holding guns and grenade launchers.
  • 24. What Are The Security Implications? • End-Points – ie the equipment at the doctor’s end or at the patient’s end is compromised. This is less common since the end-points are usually physically guarded. • Network Attacks – the channel of communication between the doctor and patient is compromised. This is more common. Ref: http://arxiv.org/pdf/1504.04339v2.pdf Consider a Tele-Robotic Surgery. How can it be attacked?
  • 25. Types of Network Attack Intention Modification Intention Manipulation Hijacking Attack
  • 26. How Bad Can It Get? • The above was just one example, but it can be extrapolated to other scenarios where robots are used. • Most robots today are not entirely autonomous – ie. they must be instructed by a human entity over a communication channel. • If this process is compromised, the impact can be death and/or serious physical damage.
  • 28. Security Approach • Go Back to the Basics • Strong encryption of the network link between the Operator and the Operated Device. • Use secure communication protocols like TLS v1.3 and above, SSH, WPA2, etc. • Strong authentication of source and destination IPs • Harden the end-point devices • Perform network and app level pen-testing
  • 30. What Is It? Technology that allows you to fabricate three dimensional objects using plastic, metal, ceramics, powders, liquids, or even living cells provided you have a blueprint of the object created with CAD software. 3D Printing has been around since the late 80s. Since 2006, the technology has started to become cheaper and more accessible.
  • 31. You Will Need A 3D Printer and a “.stl” Template http://www.thingiverse.com 3D printing is also called Stereolithography and the CAD templates are created in the .stl format.
  • 32. Applications • Automobile Manufacture Manufacture and testing of prototypes and auto parts/components • Medical Sector Manufacture of low cost prosthetic limbs, dental implants and even living tissue. • Defence, Education, etc.
  • 33. 3D Printed Weapons? • Defense Distributed is an open source company that provides .stl designs for 3D printed firearms – for FREE.
  • 34. 3D Printed Weapons? • Plastic 3D printed guns can actually be used to fire rounds. • Liberator 3D is a functioning 3D printed gun developed by Defense Distributed. • Plastic guns – don’t show up under a metal detector scan. So this means everyone with a 3D Printer can create and own an invisible weapon. Ref: https://www.youtube.com/watch?feature=player_embedded&v=drPz6n6UXQY
  • 35. 3D Printed ATM Skimmers • An ATM skimmer fits into an ATM card slot and can capture Track data from a swiped credit/debit card. • A pinhole camera/ keypad overlay captures the PIN as it is keyed in by the cardholder • This is transmitted wirelessly to criminals located within a 100m range of the ATM. • Unless cardholders are alert, the skimmer will pass off as a genuine part of the ATM itself. • 3D printing allows ATM skimmer devices to be made faster, more accurately and efficiently by crooks.
  • 36. How About Your Car Keys? • All it takes is a few photographs of a key to create the .stl design and 3D print a duplicate set. • Burglars, car thieves, etc. are jumping at the opportunities.
  • 37. What’s Next? •There are 6 million parts that go into a Boeing 747. What if tomorrow one of those is a 3D printed fake? •Counterfeit coins •Fake ID Cards ???
  • 38. And By The Way… • The world’s first fully 3D printed car is on its way out in 2016. • LocalMotors is working on a road-ready model.
  • 39. Solutions? •The technology is still evolving •Regulation and Legislation is yet to catch up with ethical, legal, privacy and security challenges. •It is going to be difficult to predict, let alone prevent the mis-use of this technology.
  • 41. Recognize This? Casio CFX-400 Calculator Watch. 1995.
  • 42. How Do We Understand Wearables? What’s Common to All Wearables , which are carried either of a user’s body. What’s Different Primary Function of the device • Smart Glasses- Augmented Reality Device • Smart Watch - Makes calls, plays music, etc. • Smart Pills – monitor health stats Device Capability • Does it have a camera? • Can it make calls? • Is it online? • Does it keep you alive?
  • 43. Most Popular Wearables Today • Smart Watches • Samsung Gear, Apple Watch, Pebble, etc. • They account for 40% of the wearables market • Fitness Bands • FitBit, Garmin, etc. • Smart Glasses • Vuzix, Google Glass Ref: http://www.gartner.com/document/2847117
  • 44. The Security Challenge with Wearables I. For a Personal User – Data Privacy is the primary concern with Wearables II. At an Organizational Level – Data Security is the key concern
  • 45. I. Personal Users: The Privacy Challenge • Wearable technology is still evolving. • The primary design focus is more on functionality and less on privacy. • Imagine the data available to a stalker who has hacked into your fitness band: • Location of your house • Places you frequent the most • Your sleep patterns • Your food habits • Your exercise habits • Your health data: heart rate, BP, etc.
  • 46. Security vs Functionality • We all know the Google Glass story. A host of great new features… but privacy?? Eye Tracking Feature Recording Feature What you see – Glass sees. People that you see – Glass sees (and can record). Ref: https://www.youtube.com/watch?t=85&v=9c6W4CCU9M4 Come Jan 2015, Google eventually had to pull the plug on Glass
  • 47. II. Organizational Context – Security Challenge The primary challenge with allowing wearables within an office workspace is Data Security Mobile phones have already changed the security landscape within organizations. How hard is it to take pictures of your screen using a mobile camera? The main issue with wearables is they make it difficult to find out when they are used to steal data - taking pictures at the blink of an eye, for instance.
  • 48. The Next Level of Wearables •Implantables •Ingestibles
  • 49. Implantables Jiya Bavishi's auditory brainstem implant is helping her hear sounds for the first time. Auditory Brain-Stem Implant consists of a i. mic attached to the ear and ii. a sensor implanted in the brain to process sound signals in hearing impaired patients. Ref: http://www.npr.org/sections/health-shots/2015/06/01/410065053/new-hearing-technology-brings-sound-to-a-litte- girl
  • 50. Ingestibles • The Pill communicates with a wearable sensor on the skin called a Patch. • The technology will track the patient’s physiological stats about medication ingestion, heart rate, activity, rest, and skin temperature • The digital health information can be viewed on a synced Mobile/Tablet. Ref: proteus.com Proteus, a company specializing in Digital Medicine, has received FDA approval for its Digital Pills – sensors which can be swallowed by a patient.
  • 51. What are the Security Threats? • Can someone hack into your internet connected pacemaker and speed your heart up till you die? According to the former US Vice President’s advisors… Ref: https://www.washingtonpost.com/news/the- switch/wp/2013/10/21/yes-terrorists-could- have-hacked-dick-cheneys-heart/
  • 52. Securing Wearable Technology Manufacturers of Wearable Technology • Manufacturers are being pushed by security researchers to look at security and privacy at the design stage of their devices. • Devices must anticipate and inform users of privacy compromises they will make at every stage of using a device Organizations/Work Places • Organizations must understand the risks introduced by allowing wearables within their premises. • A risk assessment must be done to identify controls ranging from restricted permission to use these devices to fully denying access End-Users: • Users must be aware that privacy will be compromised when they use a wearable device. • Children and senior citizens are more vulnerable.
  • 53. The Internet of Things
  • 54. What Is It? Technology today consists of a number of devices of different kinds, each with a certain level of computing power and memory.
  • 55. The IoT is a ecosystem of hardware and embedded within which data can be and How Do We Define the IoT?
  • 56. Interesting Statistic • The IoT s is projected to consist of 30 billion connected “things” by 2020. Ref: IDC The world’s human population is projected to be almost 8 billion by 2020. Ref: United Nations Population Fund
  • 58. The Big Challenge – Securing the IoT • BMW patches security flaw on their ConnectedDrive software, that would have allowed a hacker to unlock car doors Ref: http://www.bmw.com/com/en/insights/technology/connecteddrive/2013/
  • 59. The Big Challenge – Securing the IoT Jul 22, 2015: Hack moving Jeep. Switch off engine. Ref: http://www.cbc.ca/news/technology/hackers-kill-engine-of-moving-jeep-on-highway-in-security-demo- 1.3162944
  • 60. The Challenges are Many • Complexity A heterogeneous network means devices on the IoT are different, with unique designs, software, operating protocols, etc. Where does a security attempt even begin? • Uniform Standards On the IoT, we will need to develop a uniform standard for devices to communicate. A uniform standard/protocol makes the IoT that much easier to hack into. • Monitoring Currently, organizations have SOCs with IPS/DLP, etc. Who will monitor the IoT network?
  • 61. IBM Model for the IoT
  • 62. Each Layer Is Susceptible to a Variety of Attacks
  • 63. • Recommends a holistic approach • Focus not only on securing the Device, but also, • The IoT Environment it operates in • It looks at: • The Device • The Cloud • The Mobile Application • Network Interfaces • Software • Use of Encryption • Use of Authentication • Physical Security • USB Ports Ref: OWASP Internet of Things Top Ten OWASP – Internet of Things Top Ten
  • 64. THANK YOU & STAY IN TOUCH Linkedin.com/in/vackayil Praveen.jvc@gmail.com

Editor's Notes

  1. Early 60s The core asset was the computer and not so much the data it processed. Information protection was achieved mainly through the control of physical access to computers. Skilled users of the computers were few Computers were not networked. Two parallel developments from the 80s onwards: Increasing dependence on computers – which means an organization CANNOT operate efficiently without some reliance (extensive in most cases) on a technology platform. Increasing simplicity of computing. Today, people don’t need any specific skills to learn to use a mobile phone, for instance. Computing is becoming intuition driven, so as to enable greater adoption. With more and more sensitive data being put on a computer, the primary asset has become the information, and with cheaper availability of computers, the computer has become a secondary asset – more like a primary asset container.
  2. Give explanation of each case – stored, processed, transmitted, work from home, Google Right to be Forgotten, Misuse of data for identity thefts, sharing of data with third parties (Main reason why Myntra is going mobile, Facebook acquired WhatsApp for 19 billion USD) - It is undoubtedly true that a mobile is a far more personal device than a desktop and ergo, it knows a lot more about you than your desktop. Everything from your location to your social circle to your waking and other habits & preferences. PII, SPI available on a smartphone: - Mobile Number - Email ID - Location - Travel updates - Contacts (Phone nos) - Text messages (SMS and WhatsApp) - Photos taken with mobile camera - Call Data (most called persons, average time spent per day on calls, etc.) - Browsing habits (most frequented websites)
  3. Types of Network Attack: Intention Modification A man-in-the-middle attacker modifies the surgeon’s messages to the robot. Intention Manipulation A man in the middle modifies feedback messages originating from a robot. A surgeon’s messages (and his/her intent) are not modified Hijacking Attack A man in the middle takes control of the robot, causing it to ignore the intentions of a surgeon, and to instead perform other, potentially harmful actions. These attacks can also be done discreetly to avoid detection.
  4. You are involved in a car crash. Sensors in your car detect the collision and deploy your air bags. Using your car’s navigation system, the nearest hospital is identified The emergency helpline number is found on Google and a call is triggered from your phone (which of course is linked to your car via Bluetooth) to this emergency number. A shrill alarm is sounded off from your car, to alert passers-by. Meantime, your car’s sensors have already sent warning messages to the nearest set of traffic lights, alerting incoming vehicles to slow down.
  5. Simple iPhone game app - 10,000 lines of code Average Car software – 100 million lines of code