SlideShare a Scribd company logo
1 of 4
Download to read offline
IKE ALL MAJOR TECHNOLOGICAL REVOLUTIONS, DIGI-
TAL TRANSFORMATION IS SPREADING OVER MANY
AREAS: HOME AUTOMATION, PHYSICAL SECURITY,
MOBILITY, HEALTHCARE, ETC.
THE INTERNET OF THINGS (IOT) PLAYS AN IMPORTANT ROLE IN THIS
TREND, THROUGH THE EMERGENCE OF NUMEROUS CONNECTED
DEVICES. THE FIGURES ARE INDEED TREMENDOUS: MANY ANALYSTS
CONSIDER THERE WILL BE BETWEEN 20 AND 200 BILLION CONNECTED
DEVICES IN THE WORLD BY 2020.
AT THE HEART OF DIGITAL TRANSFORMATION
No industry can ignore this trend today, and enterprises are seizing the opportunity. While new
companies designing smart devices appear every day, partnerships are emerging between vendors
and traditional industries – like insurance, automotive, utilities or banking – in order to offer
additional services to customers through various connected items.
L
AUTHOR
SOLUCOM FOCUS
CHADI HANTOUCHE
ManagerofRiskManagementandSecurity
He is specialized in protection of IT infras-
tructures, mobile devices and applications.
He has worked with many large accounts,
notably to define their security mas-
ter plan and on innovative security for
mobility, Cloud computing and Big data.
chadi.hantouche@solucom.fr
THE INTERNET OF THINGS: THE 4 SECURITY
DIMENSIONS OF SMART DEVICES
@ChadiHantouche
A BROADER ATTACK SURFACE FOR
CYBERCRIMINALS
Concurrently with the growing number of
devices, security has regrettably not always
beentakenintoaccount.
Oneofthemoststrikingstudiesistheoneledby
HP Fortify1
: while testing the top 10 IoT devices
being used today, they found an average of
25 vulnerabilities per device. Most of them are
relatedtocommonsecurityissues:dataprivacy,
insufficientauthorisation,noencryption,insecure
webinterface,overallinadequateprotection,etc.
That lack of hardening increases vulnerabilities
disclosuresaffectingallkindsofdevices:fridges,
cars, light bulbs, baby monitors, and even
toilets.
CARA: IN WHICH RISK SETTING ARE YOU?
As far as companies are concerned, the risks
depend on the setting. These settings can be
gathered under the acronym“CARA”, as shown
in the table above. Companies can either
Create, Acquire, Recommend or Accommodate
connected devices, and the associated risks
are specific to each case. Once the setting is
identified, the generic risks and mitigation
measures have to be specified.
AN EFFECTIVE ASSESSMENT TOOL: THE
HEAT MAP
In order to assess the risk, the Solucom
methodology consists of using a heat map that
classifies risks depending on their seriousness,
but also on the setting.
The next page shows a heat map example in
a banking setting that covers a diverse range
of services. In this context, triggering money
transactions is obviously more risky than just
checking an account balance. But customising
the security features on a device employees or
customers come up with can be much more
difficult than hardening a product you chose,
acquired from a provider, or even designed from
scratch.
Thisheatmapwilleventuallyallowapinpointing
of the risks that require greater attention.
INTERNET OF THINGS
Fromscience-fictiontoreality
In 2013, a remote attack on a
politician’s pacemaker was
depicted in the hit series
“Homeland”. The same year,
former U.S. vice president
Dick Cheney declared that
the wireless capabilities of
his own heartbeat regulation
device were disabled by
doctors, in order to prevent
any tempering attempt.
In July 2015, two hackers
demonstrated a complete
remote control of a Jeep
Cherokee SUV, including
the ability to kill the engine,
engage or disable the
brakes, or track the car’s
GPS position. This case led
Fiat-Chrysler to recall more
than a million vehicles,
several regulators to start
in-depth investigations,
and American senators to
plan the introduction of an
automotive security bill.
Create Acquire Recommend Accommodate
Scope
Companies that
manufacture connected
devices must take
security into account
from the design phase,
since they have a
responsibility towards
their customers.
Companies that buy
connected devices and
deploy them internally
share responsibilities on
technologies choices and
integration phases.
Companies that
recommend connected
devices to their
customers have a
diffused responsibility
that extends over time
regarding the customers.
Companies that allow the
use of employees’
connected devices (as a
BYOD service), have to
protect professional data.
Generic Risks
Discovering security
flaws in connected
devices could endanger
users or their data, and
therefore the reputation
and liability of the
manufacturer.
Integration of these new
technologies within the
business process without
proper security, which
could increase the IT
systems’ attack surface.
Leakage of (possibly
personal) data or
physical damages that
could lead to a company
liability, or reputation
damage.
Loss or theft of corporate
data to which connected
devices have access, or
intrusion facilitation.
Major Security
Guidance
Integrate security in the
early design phases.
In particular, ensure
security update
capabilities throughout
the (possibly long) device
lifecycle.
Ensure that device
identities are properly
managed.
Request custom
hardening from the
manufacturers.
Clearly define liabilities
(and data ownership).
Ensure regulatory
compliance.
Ensure the
recommended devices
have a proper security
level.
Make users aware of
their responsibilities.
Enforce a user charter.
Reuse previous BYOD
projects.
1
Source : http://go.saas.hp.com/fod/internet-of-things
THE CARA METHOD PROVIDES GUIDANCE FOR EACH SETTING
USUAL SECURITY FEATURES, NEW WAYS
OF IMPLEMENTATION
Once the setting and the use cases are clear,
security questions have to be addressed.
In this regard, one relevant reference is the
“IoT Project” launched by the non-profit
organization OWASP (Open Web Application
Security Project). It includes an interesting
and comprehensive – although precise – list
of security recommendations2
.
The first thing to notice is that this guide
is divided into 3 categories for specific
audiences: manufacturers, developers, and
consumers. This structure makes sense, to
the extent that security is shared between
the ones who design the devices (hardware
or software), and the ones who use them.
One other important fact about the security
features is that they have to be holistic –
hardening the IoT is not only about the devices,
but about the whole attack surface: physical,
hardware, software, database, local or remote,
etc. In this regard, the recommendations are
mainly built upon the security industry’s best
practices.
The real change with the Internet of Things is
the way you actually have to implement these
features. Several aspects of these connected
devices must be taken into account:
•	 User-friendliness: the size and form-factor
of the devices will influence the security
features that are acceptable for users –
typing a password on a 1.5”screen is not.
•	 Processing power: as of today, small
embedded systems still have limited
calculation capabilities. Some operations
cannot all be processed on them within
a reasonable delay. For instance, Apple
advises the developers not to code features
that perform long-running tasks on the
Apple Watch.
•	 Connectivity: the Internet ofThings devices
typically use Bluetooth or NFC protocols,
with limited bitrates and ranges, and don’t
always offer proper embedded security.
•	 Battery life: complex algorithms (like real-
time asymmetric encryption/decryption)
can be hard on battery consumption, even
if they offer a better protection level. This
has to be taken into account in the design
phase.
•	 Update capability: security update has to
be deployed without interfering with the
object usage.This is particularly striking in
the case of cars that you cannot drive while
they are being updated, and this could take
more than 45 minutes!
In addition to security, privacy is also a must
have for the customers and a requirement
from the authority. Implementation could
be tricky but several initiatives for IoT privacy
have emerged in the last years.
One of the most interesting is the European
PRESERVE project3
, which offers the
automotive industry a new way of using PKI
and digital certificates for smart connected
cars and roads. They use the principle of
using a frequently changing “pseudonym” to
ensure that the car drivers stay anonymous
while ensuring that communication between
the vehicles and the road infrastructure is
authenticated and secured.
We have entered a time where security and
data privacy have become criteria in the
customers’choices.This fact cannot be denied
by providers: they have to integrate it, whether
they design, build, recommend or sell smart
devices.
HEAT MAP INSTANCE IN A B2C BANKING CONTEXT
NOTIFICATION CONSULTATION MODIFICATION TRANSACTION
CREATE
ACQUIRE
RECOMMEND
ACCOMMODATE
Contactless payment with
a connected wristband
Customer identification
with Google Glass
Digital signature with
a smartwatch
Stock portfolio 3D visualisation
with Oculus Rift
Accounts notification and checking on a smartwatch Account data change or transaction with a smartphone
Complexity to
customise security
2
Source : https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project
3
Source : https://www.preserve-project.eu/
Tour Franklin, 100-101Terrasse Boieldieu
92042 Paris La Défense Cedex
Tél. : +33 (0)1 49 03 20 00
www.solucom.net
INTERNET OF THINGS
1
How to SECURE
Clarify the use cases
The risks of connected devices may differ depending on the usages and
the setting (CARA). Furthermore, depending on your industry, the devices
will not be used the same way.
Analyze the market and the platforms
Two relatively similar devices may not be equally secured.
It becomes necessary to identify the specifics of the platforms and the
associated limits.
Talk with the business stakeholders
It is important to understand the business stakes during
the whole device lifecycle, in order to clarify and
anticipate possible risks.
Think outside the box to implement security
Take into account the context in which connected devices evolve,
as well as their characteristics: autonomy, range, user
experience…



The INTERNET of THINGS?


More Related Content

What's hot

Strategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationStrategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationBooz Allen Hamilton
 
Csop 2011 Al Raymond
Csop 2011 Al RaymondCsop 2011 Al Raymond
Csop 2011 Al Raymondspencerharry
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture Symantec
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYODJim Sutter
 
Augmate connect deck
Augmate connect deckAugmate connect deck
Augmate connect deckEtheralabs
 
Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...Quarles & Brady
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Eventcalebbarlow
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"NEORIS
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: YamanaSoftweb Solutions
 
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Chuck Brooks
 
Cybersmart_buildings_securing your investment in connectivity and automation
Cybersmart_buildings_securing your investment in connectivity and automationCybersmart_buildings_securing your investment in connectivity and automation
Cybersmart_buildings_securing your investment in connectivity and automationIron Mountain
 

What's hot (18)

Strategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationStrategic Information Management Through Data Classification
Strategic Information Management Through Data Classification
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
IBM Xforce Q4 2014
IBM Xforce Q4 2014IBM Xforce Q4 2014
IBM Xforce Q4 2014
 
Csop 2011 Al Raymond
Csop 2011 Al RaymondCsop 2011 Al Raymond
Csop 2011 Al Raymond
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
 
CIO Mobility Playbook
CIO Mobility PlaybookCIO Mobility Playbook
CIO Mobility Playbook
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 
Augmate connect deck
Augmate connect deckAugmate connect deck
Augmate connect deck
 
Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
 
Cybersmart_buildings_securing your investment in connectivity and automation
Cybersmart_buildings_securing your investment in connectivity and automationCybersmart_buildings_securing your investment in connectivity and automation
Cybersmart_buildings_securing your investment in connectivity and automation
 

Similar to The Internet of Things: the 4 security dimensions of smart devices

Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report SummaryAccenture Technology
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16The Internet of Things - IoT and EHS - Alex Lima - 3 15 16
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16Alex Lima
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docxjeffevans62972
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docxodiliagilby
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
Mobile Application Security by Design
Mobile Application Security by DesignMobile Application Security by Design
Mobile Application Security by DesignDMI
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Bernard Kufluk
 
BCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationBCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationGareth Niblett
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsFrederic Roy-Gobeil, CPA, CGA, M.Tax.
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseSelectedPresentations
 
Sandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDr. Raghavendra GS
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
 
Cloud based security threats with present challenges and opportunities for ma...
Cloud based security threats with present challenges and opportunities for ma...Cloud based security threats with present challenges and opportunities for ma...
Cloud based security threats with present challenges and opportunities for ma...eSAT Publishing House
 
IoT - RTD WHITE PAPER SquaredOnline
IoT - RTD WHITE PAPER SquaredOnlineIoT - RTD WHITE PAPER SquaredOnline
IoT - RTD WHITE PAPER SquaredOnlineFranceschiniLaura
 

Similar to The Internet of Things: the 4 security dimensions of smart devices (20)

Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16The Internet of Things - IoT and EHS - Alex Lima - 3 15 16
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Mobile Application Security by Design
Mobile Application Security by DesignMobile Application Security by Design
Mobile Application Security by Design
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
BCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationBCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber Innovation
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
Sandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco Portfolio
Sandy DiFranco Portfolio
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of things
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
Cloud based security threats with present challenges and opportunities for ma...
Cloud based security threats with present challenges and opportunities for ma...Cloud based security threats with present challenges and opportunities for ma...
Cloud based security threats with present challenges and opportunities for ma...
 
IoT - RTD WHITE PAPER SquaredOnline
IoT - RTD WHITE PAPER SquaredOnlineIoT - RTD WHITE PAPER SquaredOnline
IoT - RTD WHITE PAPER SquaredOnline
 

More from Wavestone

Le double défi de la gestion de crise en 2016 : (ré)émergence de nouveaux ris...
Le double défi de la gestion de crise en 2016 : (ré)émergence de nouveaux ris...Le double défi de la gestion de crise en 2016 : (ré)émergence de nouveaux ris...
Le double défi de la gestion de crise en 2016 : (ré)émergence de nouveaux ris...Wavestone
 
Bank insight n°7 - La valorisation de la donnée
Bank insight n°7 - La valorisation de la donnéeBank insight n°7 - La valorisation de la donnée
Bank insight n°7 - La valorisation de la donnéeWavestone
 
Digitalisation des parcours client : client first !
Digitalisation des parcours client : client first !Digitalisation des parcours client : client first !
Digitalisation des parcours client : client first !Wavestone
 
Bank insight n°3 - Agilité : changement de paradigme
Bank insight n°3 - Agilité : changement de paradigmeBank insight n°3 - Agilité : changement de paradigme
Bank insight n°3 - Agilité : changement de paradigmeWavestone
 
Solucom offices receive a breath of fresh “Air”
Solucom offices receive a breath of fresh “Air”Solucom offices receive a breath of fresh “Air”
Solucom offices receive a breath of fresh “Air”Wavestone
 
Solucom réinvente ses locaux avec "Air" - Dossier de presse
Solucom réinvente ses locaux avec "Air" - Dossier de presseSolucom réinvente ses locaux avec "Air" - Dossier de presse
Solucom réinvente ses locaux avec "Air" - Dossier de presseWavestone
 
Bank Insight n°2 - MIF2 : contrainte ou opportunité ?
Bank Insight n°2 - MIF2 : contrainte ou opportunité ?Bank Insight n°2 - MIF2 : contrainte ou opportunité ?
Bank Insight n°2 - MIF2 : contrainte ou opportunité ?Wavestone
 
Physical sales networks in the digital era : change or die
Physical sales networks in the digital era : change or diePhysical sales networks in the digital era : change or die
Physical sales networks in the digital era : change or dieWavestone
 
Bank Insight - Piloter la relation client
Bank Insight - Piloter la relation clientBank Insight - Piloter la relation client
Bank Insight - Piloter la relation clientWavestone
 
BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101Wavestone
 
Synthèse Solucom - Big data : une mine d'or pour l'Assurance
Synthèse Solucom - Big data : une mine d'or pour l'AssuranceSynthèse Solucom - Big data : une mine d'or pour l'Assurance
Synthèse Solucom - Big data : une mine d'or pour l'AssuranceWavestone
 
Résultats annuels 2014/15 et plan stratégique Up 2020 – Diaporama (SFAF du 03...
Résultats annuels 2014/15 et plan stratégique Up 2020 – Diaporama (SFAF du 03...Résultats annuels 2014/15 et plan stratégique Up 2020 – Diaporama (SFAF du 03...
Résultats annuels 2014/15 et plan stratégique Up 2020 – Diaporama (SFAF du 03...Wavestone
 
Réseaux physiques à l'ère du digital : se transformer ou mourir
Réseaux physiques à l'ère du digital : se transformer ou mourirRéseaux physiques à l'ère du digital : se transformer ou mourir
Réseaux physiques à l'ère du digital : se transformer ou mourirWavestone
 
Solucom - Présentation GS DAYS 2015 - CARA, les 4 dimensions de la sécurité d...
Solucom - Présentation GS DAYS 2015 - CARA, les 4 dimensions de la sécurité d...Solucom - Présentation GS DAYS 2015 - CARA, les 4 dimensions de la sécurité d...
Solucom - Présentation GS DAYS 2015 - CARA, les 4 dimensions de la sécurité d...Wavestone
 
Carrefour des organisations n°77
Carrefour des organisations n°77Carrefour des organisations n°77
Carrefour des organisations n°77Wavestone
 
Synthèse n°52 : Et si les DSI tiraient enfin parti de leur capital humain ?
Synthèse n°52 : Et si les DSI tiraient enfin parti de leur capital humain ?Synthèse n°52 : Et si les DSI tiraient enfin parti de leur capital humain ?
Synthèse n°52 : Et si les DSI tiraient enfin parti de leur capital humain ?Wavestone
 
Synthèse Solucom - Energéticiens et monde digital : une relation en mode combat?
Synthèse Solucom - Energéticiens et monde digital : une relation en mode combat?Synthèse Solucom - Energéticiens et monde digital : une relation en mode combat?
Synthèse Solucom - Energéticiens et monde digital : une relation en mode combat?Wavestone
 
Solucom - Les Cahiers d'Insurance Speaker
Solucom - Les Cahiers d'Insurance SpeakerSolucom - Les Cahiers d'Insurance Speaker
Solucom - Les Cahiers d'Insurance SpeakerWavestone
 
Solucom lettre sécurité 36 janvier 2015 1201web
Solucom lettre sécurité 36 janvier 2015 1201webSolucom lettre sécurité 36 janvier 2015 1201web
Solucom lettre sécurité 36 janvier 2015 1201webWavestone
 
Les Français et la banque : bouleversements en vue !
Les Français et la banque : bouleversements en vue !Les Français et la banque : bouleversements en vue !
Les Français et la banque : bouleversements en vue !Wavestone
 

More from Wavestone (20)

Le double défi de la gestion de crise en 2016 : (ré)émergence de nouveaux ris...
Le double défi de la gestion de crise en 2016 : (ré)émergence de nouveaux ris...Le double défi de la gestion de crise en 2016 : (ré)émergence de nouveaux ris...
Le double défi de la gestion de crise en 2016 : (ré)émergence de nouveaux ris...
 
Bank insight n°7 - La valorisation de la donnée
Bank insight n°7 - La valorisation de la donnéeBank insight n°7 - La valorisation de la donnée
Bank insight n°7 - La valorisation de la donnée
 
Digitalisation des parcours client : client first !
Digitalisation des parcours client : client first !Digitalisation des parcours client : client first !
Digitalisation des parcours client : client first !
 
Bank insight n°3 - Agilité : changement de paradigme
Bank insight n°3 - Agilité : changement de paradigmeBank insight n°3 - Agilité : changement de paradigme
Bank insight n°3 - Agilité : changement de paradigme
 
Solucom offices receive a breath of fresh “Air”
Solucom offices receive a breath of fresh “Air”Solucom offices receive a breath of fresh “Air”
Solucom offices receive a breath of fresh “Air”
 
Solucom réinvente ses locaux avec "Air" - Dossier de presse
Solucom réinvente ses locaux avec "Air" - Dossier de presseSolucom réinvente ses locaux avec "Air" - Dossier de presse
Solucom réinvente ses locaux avec "Air" - Dossier de presse
 
Bank Insight n°2 - MIF2 : contrainte ou opportunité ?
Bank Insight n°2 - MIF2 : contrainte ou opportunité ?Bank Insight n°2 - MIF2 : contrainte ou opportunité ?
Bank Insight n°2 - MIF2 : contrainte ou opportunité ?
 
Physical sales networks in the digital era : change or die
Physical sales networks in the digital era : change or diePhysical sales networks in the digital era : change or die
Physical sales networks in the digital era : change or die
 
Bank Insight - Piloter la relation client
Bank Insight - Piloter la relation clientBank Insight - Piloter la relation client
Bank Insight - Piloter la relation client
 
BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101
 
Synthèse Solucom - Big data : une mine d'or pour l'Assurance
Synthèse Solucom - Big data : une mine d'or pour l'AssuranceSynthèse Solucom - Big data : une mine d'or pour l'Assurance
Synthèse Solucom - Big data : une mine d'or pour l'Assurance
 
Résultats annuels 2014/15 et plan stratégique Up 2020 – Diaporama (SFAF du 03...
Résultats annuels 2014/15 et plan stratégique Up 2020 – Diaporama (SFAF du 03...Résultats annuels 2014/15 et plan stratégique Up 2020 – Diaporama (SFAF du 03...
Résultats annuels 2014/15 et plan stratégique Up 2020 – Diaporama (SFAF du 03...
 
Réseaux physiques à l'ère du digital : se transformer ou mourir
Réseaux physiques à l'ère du digital : se transformer ou mourirRéseaux physiques à l'ère du digital : se transformer ou mourir
Réseaux physiques à l'ère du digital : se transformer ou mourir
 
Solucom - Présentation GS DAYS 2015 - CARA, les 4 dimensions de la sécurité d...
Solucom - Présentation GS DAYS 2015 - CARA, les 4 dimensions de la sécurité d...Solucom - Présentation GS DAYS 2015 - CARA, les 4 dimensions de la sécurité d...
Solucom - Présentation GS DAYS 2015 - CARA, les 4 dimensions de la sécurité d...
 
Carrefour des organisations n°77
Carrefour des organisations n°77Carrefour des organisations n°77
Carrefour des organisations n°77
 
Synthèse n°52 : Et si les DSI tiraient enfin parti de leur capital humain ?
Synthèse n°52 : Et si les DSI tiraient enfin parti de leur capital humain ?Synthèse n°52 : Et si les DSI tiraient enfin parti de leur capital humain ?
Synthèse n°52 : Et si les DSI tiraient enfin parti de leur capital humain ?
 
Synthèse Solucom - Energéticiens et monde digital : une relation en mode combat?
Synthèse Solucom - Energéticiens et monde digital : une relation en mode combat?Synthèse Solucom - Energéticiens et monde digital : une relation en mode combat?
Synthèse Solucom - Energéticiens et monde digital : une relation en mode combat?
 
Solucom - Les Cahiers d'Insurance Speaker
Solucom - Les Cahiers d'Insurance SpeakerSolucom - Les Cahiers d'Insurance Speaker
Solucom - Les Cahiers d'Insurance Speaker
 
Solucom lettre sécurité 36 janvier 2015 1201web
Solucom lettre sécurité 36 janvier 2015 1201webSolucom lettre sécurité 36 janvier 2015 1201web
Solucom lettre sécurité 36 janvier 2015 1201web
 
Les Français et la banque : bouleversements en vue !
Les Français et la banque : bouleversements en vue !Les Français et la banque : bouleversements en vue !
Les Français et la banque : bouleversements en vue !
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

The Internet of Things: the 4 security dimensions of smart devices

  • 1. IKE ALL MAJOR TECHNOLOGICAL REVOLUTIONS, DIGI- TAL TRANSFORMATION IS SPREADING OVER MANY AREAS: HOME AUTOMATION, PHYSICAL SECURITY, MOBILITY, HEALTHCARE, ETC. THE INTERNET OF THINGS (IOT) PLAYS AN IMPORTANT ROLE IN THIS TREND, THROUGH THE EMERGENCE OF NUMEROUS CONNECTED DEVICES. THE FIGURES ARE INDEED TREMENDOUS: MANY ANALYSTS CONSIDER THERE WILL BE BETWEEN 20 AND 200 BILLION CONNECTED DEVICES IN THE WORLD BY 2020. AT THE HEART OF DIGITAL TRANSFORMATION No industry can ignore this trend today, and enterprises are seizing the opportunity. While new companies designing smart devices appear every day, partnerships are emerging between vendors and traditional industries – like insurance, automotive, utilities or banking – in order to offer additional services to customers through various connected items. L AUTHOR SOLUCOM FOCUS CHADI HANTOUCHE ManagerofRiskManagementandSecurity He is specialized in protection of IT infras- tructures, mobile devices and applications. He has worked with many large accounts, notably to define their security mas- ter plan and on innovative security for mobility, Cloud computing and Big data. chadi.hantouche@solucom.fr THE INTERNET OF THINGS: THE 4 SECURITY DIMENSIONS OF SMART DEVICES @ChadiHantouche
  • 2. A BROADER ATTACK SURFACE FOR CYBERCRIMINALS Concurrently with the growing number of devices, security has regrettably not always beentakenintoaccount. Oneofthemoststrikingstudiesistheoneledby HP Fortify1 : while testing the top 10 IoT devices being used today, they found an average of 25 vulnerabilities per device. Most of them are relatedtocommonsecurityissues:dataprivacy, insufficientauthorisation,noencryption,insecure webinterface,overallinadequateprotection,etc. That lack of hardening increases vulnerabilities disclosuresaffectingallkindsofdevices:fridges, cars, light bulbs, baby monitors, and even toilets. CARA: IN WHICH RISK SETTING ARE YOU? As far as companies are concerned, the risks depend on the setting. These settings can be gathered under the acronym“CARA”, as shown in the table above. Companies can either Create, Acquire, Recommend or Accommodate connected devices, and the associated risks are specific to each case. Once the setting is identified, the generic risks and mitigation measures have to be specified. AN EFFECTIVE ASSESSMENT TOOL: THE HEAT MAP In order to assess the risk, the Solucom methodology consists of using a heat map that classifies risks depending on their seriousness, but also on the setting. The next page shows a heat map example in a banking setting that covers a diverse range of services. In this context, triggering money transactions is obviously more risky than just checking an account balance. But customising the security features on a device employees or customers come up with can be much more difficult than hardening a product you chose, acquired from a provider, or even designed from scratch. Thisheatmapwilleventuallyallowapinpointing of the risks that require greater attention. INTERNET OF THINGS Fromscience-fictiontoreality In 2013, a remote attack on a politician’s pacemaker was depicted in the hit series “Homeland”. The same year, former U.S. vice president Dick Cheney declared that the wireless capabilities of his own heartbeat regulation device were disabled by doctors, in order to prevent any tempering attempt. In July 2015, two hackers demonstrated a complete remote control of a Jeep Cherokee SUV, including the ability to kill the engine, engage or disable the brakes, or track the car’s GPS position. This case led Fiat-Chrysler to recall more than a million vehicles, several regulators to start in-depth investigations, and American senators to plan the introduction of an automotive security bill. Create Acquire Recommend Accommodate Scope Companies that manufacture connected devices must take security into account from the design phase, since they have a responsibility towards their customers. Companies that buy connected devices and deploy them internally share responsibilities on technologies choices and integration phases. Companies that recommend connected devices to their customers have a diffused responsibility that extends over time regarding the customers. Companies that allow the use of employees’ connected devices (as a BYOD service), have to protect professional data. Generic Risks Discovering security flaws in connected devices could endanger users or their data, and therefore the reputation and liability of the manufacturer. Integration of these new technologies within the business process without proper security, which could increase the IT systems’ attack surface. Leakage of (possibly personal) data or physical damages that could lead to a company liability, or reputation damage. Loss or theft of corporate data to which connected devices have access, or intrusion facilitation. Major Security Guidance Integrate security in the early design phases. In particular, ensure security update capabilities throughout the (possibly long) device lifecycle. Ensure that device identities are properly managed. Request custom hardening from the manufacturers. Clearly define liabilities (and data ownership). Ensure regulatory compliance. Ensure the recommended devices have a proper security level. Make users aware of their responsibilities. Enforce a user charter. Reuse previous BYOD projects. 1 Source : http://go.saas.hp.com/fod/internet-of-things THE CARA METHOD PROVIDES GUIDANCE FOR EACH SETTING
  • 3. USUAL SECURITY FEATURES, NEW WAYS OF IMPLEMENTATION Once the setting and the use cases are clear, security questions have to be addressed. In this regard, one relevant reference is the “IoT Project” launched by the non-profit organization OWASP (Open Web Application Security Project). It includes an interesting and comprehensive – although precise – list of security recommendations2 . The first thing to notice is that this guide is divided into 3 categories for specific audiences: manufacturers, developers, and consumers. This structure makes sense, to the extent that security is shared between the ones who design the devices (hardware or software), and the ones who use them. One other important fact about the security features is that they have to be holistic – hardening the IoT is not only about the devices, but about the whole attack surface: physical, hardware, software, database, local or remote, etc. In this regard, the recommendations are mainly built upon the security industry’s best practices. The real change with the Internet of Things is the way you actually have to implement these features. Several aspects of these connected devices must be taken into account: • User-friendliness: the size and form-factor of the devices will influence the security features that are acceptable for users – typing a password on a 1.5”screen is not. • Processing power: as of today, small embedded systems still have limited calculation capabilities. Some operations cannot all be processed on them within a reasonable delay. For instance, Apple advises the developers not to code features that perform long-running tasks on the Apple Watch. • Connectivity: the Internet ofThings devices typically use Bluetooth or NFC protocols, with limited bitrates and ranges, and don’t always offer proper embedded security. • Battery life: complex algorithms (like real- time asymmetric encryption/decryption) can be hard on battery consumption, even if they offer a better protection level. This has to be taken into account in the design phase. • Update capability: security update has to be deployed without interfering with the object usage.This is particularly striking in the case of cars that you cannot drive while they are being updated, and this could take more than 45 minutes! In addition to security, privacy is also a must have for the customers and a requirement from the authority. Implementation could be tricky but several initiatives for IoT privacy have emerged in the last years. One of the most interesting is the European PRESERVE project3 , which offers the automotive industry a new way of using PKI and digital certificates for smart connected cars and roads. They use the principle of using a frequently changing “pseudonym” to ensure that the car drivers stay anonymous while ensuring that communication between the vehicles and the road infrastructure is authenticated and secured. We have entered a time where security and data privacy have become criteria in the customers’choices.This fact cannot be denied by providers: they have to integrate it, whether they design, build, recommend or sell smart devices. HEAT MAP INSTANCE IN A B2C BANKING CONTEXT NOTIFICATION CONSULTATION MODIFICATION TRANSACTION CREATE ACQUIRE RECOMMEND ACCOMMODATE Contactless payment with a connected wristband Customer identification with Google Glass Digital signature with a smartwatch Stock portfolio 3D visualisation with Oculus Rift Accounts notification and checking on a smartwatch Account data change or transaction with a smartphone Complexity to customise security 2 Source : https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project 3 Source : https://www.preserve-project.eu/
  • 4. Tour Franklin, 100-101Terrasse Boieldieu 92042 Paris La Défense Cedex Tél. : +33 (0)1 49 03 20 00 www.solucom.net INTERNET OF THINGS 1 How to SECURE Clarify the use cases The risks of connected devices may differ depending on the usages and the setting (CARA). Furthermore, depending on your industry, the devices will not be used the same way. Analyze the market and the platforms Two relatively similar devices may not be equally secured. It becomes necessary to identify the specifics of the platforms and the associated limits. Talk with the business stakeholders It is important to understand the business stakes during the whole device lifecycle, in order to clarify and anticipate possible risks. Think outside the box to implement security Take into account the context in which connected devices evolve, as well as their characteristics: autonomy, range, user experience…    The INTERNET of THINGS? 