Abhinav Biswas Alapati Sarath


• APTs (Advanced Persistent Threats)

• Virtualization & Cloud Security
• Security vs Privacy vs Anonymity

• People - Process - Product (Era of ‘Smart’ Things)
• Cloud - M2M - Sensors

• From Virtualization to Containerization
• Shift in DevOps – Demo of Web hosting through containers

• TOR – Being Anonymous on Internet
• Demo of TOR hidden service

100 TB Data Stolen & Exposed, Twitter Profiles Defaced, State-Sponsored
 Personal Info of Employees,
 Corporate E-mails & Source Codes
 VPN security tokens & private keys
 Box Office Projections
 Copies of Unreleased Films
 GBs of Data Destroyed & Deleted
Initial Allegations on China & disgruntled Ex-employees of Sony.
US claims it’s by Hacktivists of North Korea
Privacy fears over 'smart' Barbie that can listen to your kids
 World’s First Interactive Doll
 Uses Voice Recognition technology
 Plays interactive games, tells jokes
 Tailors conversations based on history
– November 2015
 Users' account information,
 Home Wi-Fi networks, and
 Audio MP3 files recorded by the doll
Identity Theft – The Next Big Issue, Almost 157,000 People affected
3 employees of Wipro Call Centre, Kolkata got Arrested
 Personal Info of Employees & Families,
 Thousands of Bank account details, Credit Card numbers
 Telecom Usage Data & Statistics
Demonstrated at Black Hat USA 2015,
Chrysler Recalled 1.4M Vehicles for Bug Fix
Reverse Engineered Car Firmware & Communications Protocol,
taking over Dashboard functions, Steering, Transmission and Brakes
Yeah even it happened….
 An Italian Startup,
founded in 2003
 Offensive Intrusion &
Surveillance Technologies
 Clients across a dozen of countries
in 6 different continents
 Spy as a Service
A Torrent file with 400GB of
internal documents, source code & email communications Leaked…
Advanced Persistent Threats (APT)
Lure Redirect Exploit
Kit
Dropper
File
Call
Home
Data
Theft
Recon
To protect our Systems, Networks & Data Centers
Policies & Procedures
Physical Security
Perimeter
Internal Network
Host
Application
Data
Let’s reconsider the technology behind security products
3 FORWARD FACING ONLY,
LACK OUTBOUND PROTECTION
No contextual analysis of Internal Threats.
2 LACK OF REAL-TIME
INLINE CONTENT ANALYSIS
No Byte-Range Data Packet Analysis for
Data Loss/ Theft Detection
Lame Firewall Policies
4 LACK OF ADVANCED ANALYTICS
& ANOMALY DETECTION
No Analytics in existing UTMs, NGFWs.
No SSL packet inspection.
1 PRIMARILY BASED ON
SIGNATURE & REPUTATION
Signature history cannot keep up with the
dynamic future of threats, No Sandboxing
What security researchers & companies are doing?

• Concept of the network perimeter evaporates (Co-located VMs)
- No Physical Segregation across VMs
• Lack of Persistence, Tougher Forensics

• Multi-Tenant Instances in SDDCs, Poor Visibility
• Accelerated Provisioning, Mixed-Trust Workloads
• Randomized Memory mapping in Cloud Instances
• Homo-Morphic Encryption
SECURITY PRIVACY ANONYMITY
With the Era of ‘Smart’ Things.…
What is IOT Exactly?
 Refers to the ever-growing network of physical objects with
connectivity, communication and cognizance.
 What is “Things” in IoT ?
 By things it’s Smart Tablets Phones PC, Smart Fridge, Medical
devices, POS Terminals, ATM, Handheld Scanners, blah blah
blah….
 But it’s much more
 Cloud & Network Enabled Infrastructure, Supply Chain Things,
Transactional Data, ERP Data, CRM Data, PLC Data, Public Data,
Social Data
IoT automates life, allows to connect with
people, machines and bots.
Things are getting Smart’er….
 Cheap Hardware costs
 Highly Available Data centers and Cloud Services
 Improved Data Analytics
 Manufacturing of Smart Devices
 Improved protocols and easy communication
 Sensors
• Proximity , accelerometer, Gyroscope, Moisture ,
Ambient Light, heartbeat sensor, pedometer
• You are under continuous surveillance
 Connectivity
• WiFi, Bluetooth LE, ZigBee, Z-Wave
• 6LowPAN, Thread, Sigfox, LoRaWAN
 People & Process
• Cloud services, Micro services
• One-tap Remote management
I wanna follow follow follow follow you…
Let’s see a Video to understand this better…
Introduction to…
“A person employed in a port
to load and unload ships.”
Open platform to Build, Ship, Run distributed applications
for developers and sysadmins.
 You can separate your applications from your infrastructure &
treat your infrastructure like a managed application.
 Helps you ship code faster, test faster, deploy faster, and shorten
the cycle between writing code and running code.
 To run different applications on a
single machine, we installed virtual
machines.
 Virtualization allowed us to
• Run multiple operating systems on one
physical machine
• Move and copy virtual machines by saving
the entire state of a virtual machine to files
 An application along with
necessary binaries and libraries
and an entire guest operating
system installed all of which may
be tens of GBs in size.
 Containers have similar resource
isolation and allocation benefits
as VMs but a different
architectural approach allows
them to be much more portable
and efficient.
 Docker allows us to
i. Run applications without installing
entire guest operating systems.
ii. Deploy ready-to-run, portable
software, easier migration, and
faster restarts.
 Containers wrap up a piece of
software in a complete filesystem
that contains everything it needs
to run: code, runtime, system
tools, system libraries.
 But share the kernel with other
containers.
 They run as an isolated process in
UserSpace on the host operating
system.
 They’re also not tied to any
specific infrastructure – Docker
containers run on any computer,
on any infrastructure and in any
cloud.
 Docker Engine handles virtualization parameters
such as allocation of the file system when
launched. whereas the hypervisor needs to first
import the virtual machine, then power it up.
 Accelerate Developer Onboarding, dynamically
change your application from adding new
capabilities to quickly changing problem areas.
 Eliminate Environment Inconsistencies
(“it works on my system”)
 Microsoft Azure
 Amazon web services
 Google Cloud platform
 Oracle Cloud
 RedHat Enterprise Linux
 IBM Bluemix
 Docker uses a client-server architecture.
 Docker client: The primary user interface to Docker.
- It accepts commands from the user and communicates
back & forth with a Docker daemon.
 Docker daemon: Runs on a host machine & does building,
running, and distributing Docker containers.
 Other Docker Resources
• Docker images: read-only templates from which Docker containers
are launched.(e.g. Ubuntu operating system with Apache server)
• Docker registries: public or private stores from which you upload or
download images
• Docker containers: everything that is needed for an application to
run.
 Installation of Docker
 Web Hosting through Containers
PHYSICAL
DIGITAL
1. Tiny
Computers
2. Massive
Computers
3. Physical is becoming Digital
4. Digital is becoming Physical
Bridging the gap…
I I
Deep Web & Dark Web
WikiLeaks
The Onion Router – Gateway to Anonymity
A free software and an open network that
simply makes you anonymous online.
 Conceals its users’ identity and their online activity from
surveillance and traffic analysis.
 Used by Activists, Whistle Blowers, Journalists, Sensitive
Businesses, Bloggers, Military
 Illicit Uses: Selling Drugs and Weapons, Silk Route, Child
Pornography
So to hide your privacy, hide behind a Onion
The Onion Router
 Layers of Encryption,
Peeled of at every subsequent node
 Each relay node knows only which
node gave it data & which node it is
giving data to
 Separate set of encryption keys for
each node along the complete circuit
No observer at any single point can tell
where the data came from or where it's going
The .onion domain
 Tor Browser
 Orbot
 Using Tor Browser to Connect to Internet
 Hosting Tor Hidden Service in 3 minutes
(https://xxxxyyyyzzzz.onion)
We tend to Over-estimate the effect of a technology in the short run
and Under-estimate the effect in the long run.
- Amara’s Law
“It ain't what you don't know that gets you into trouble.
It's what you know for sure that just ain't so.”
AbhinavBiswas@ecil.gov.in
@Abhinav_BIswas

Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker

  • 1.
  • 2.
      • APTs (AdvancedPersistent Threats)  • Virtualization & Cloud Security • Security vs Privacy vs Anonymity  • People - Process - Product (Era of ‘Smart’ Things) • Cloud - M2M - Sensors  • From Virtualization to Containerization • Shift in DevOps – Demo of Web hosting through containers  • TOR – Being Anonymous on Internet • Demo of TOR hidden service 
  • 4.
    100 TB DataStolen & Exposed, Twitter Profiles Defaced, State-Sponsored  Personal Info of Employees,  Corporate E-mails & Source Codes  VPN security tokens & private keys  Box Office Projections  Copies of Unreleased Films  GBs of Data Destroyed & Deleted Initial Allegations on China & disgruntled Ex-employees of Sony. US claims it’s by Hacktivists of North Korea
  • 5.
    Privacy fears over'smart' Barbie that can listen to your kids  World’s First Interactive Doll  Uses Voice Recognition technology  Plays interactive games, tells jokes  Tailors conversations based on history – November 2015  Users' account information,  Home Wi-Fi networks, and  Audio MP3 files recorded by the doll
  • 6.
    Identity Theft –The Next Big Issue, Almost 157,000 People affected 3 employees of Wipro Call Centre, Kolkata got Arrested  Personal Info of Employees & Families,  Thousands of Bank account details, Credit Card numbers  Telecom Usage Data & Statistics
  • 7.
    Demonstrated at BlackHat USA 2015, Chrysler Recalled 1.4M Vehicles for Bug Fix Reverse Engineered Car Firmware & Communications Protocol, taking over Dashboard functions, Steering, Transmission and Brakes
  • 8.
    Yeah even ithappened….  An Italian Startup, founded in 2003  Offensive Intrusion & Surveillance Technologies  Clients across a dozen of countries in 6 different continents  Spy as a Service A Torrent file with 400GB of internal documents, source code & email communications Leaked…
  • 9.
    Advanced Persistent Threats(APT) Lure Redirect Exploit Kit Dropper File Call Home Data Theft Recon
  • 10.
    To protect ourSystems, Networks & Data Centers Policies & Procedures Physical Security Perimeter Internal Network Host Application Data
  • 11.
    Let’s reconsider thetechnology behind security products 3 FORWARD FACING ONLY, LACK OUTBOUND PROTECTION No contextual analysis of Internal Threats. 2 LACK OF REAL-TIME INLINE CONTENT ANALYSIS No Byte-Range Data Packet Analysis for Data Loss/ Theft Detection Lame Firewall Policies 4 LACK OF ADVANCED ANALYTICS & ANOMALY DETECTION No Analytics in existing UTMs, NGFWs. No SSL packet inspection. 1 PRIMARILY BASED ON SIGNATURE & REPUTATION Signature history cannot keep up with the dynamic future of threats, No Sandboxing
  • 12.
    What security researchers& companies are doing?  • Concept of the network perimeter evaporates (Co-located VMs) - No Physical Segregation across VMs • Lack of Persistence, Tougher Forensics  • Multi-Tenant Instances in SDDCs, Poor Visibility • Accelerated Provisioning, Mixed-Trust Workloads • Randomized Memory mapping in Cloud Instances • Homo-Morphic Encryption SECURITY PRIVACY ANONYMITY
  • 13.
    With the Eraof ‘Smart’ Things.…
  • 14.
    What is IOTExactly?
  • 15.
     Refers tothe ever-growing network of physical objects with connectivity, communication and cognizance.  What is “Things” in IoT ?  By things it’s Smart Tablets Phones PC, Smart Fridge, Medical devices, POS Terminals, ATM, Handheld Scanners, blah blah blah….  But it’s much more  Cloud & Network Enabled Infrastructure, Supply Chain Things, Transactional Data, ERP Data, CRM Data, PLC Data, Public Data, Social Data IoT automates life, allows to connect with people, machines and bots.
  • 16.
    Things are gettingSmart’er….  Cheap Hardware costs  Highly Available Data centers and Cloud Services  Improved Data Analytics  Manufacturing of Smart Devices  Improved protocols and easy communication
  • 21.
     Sensors • Proximity, accelerometer, Gyroscope, Moisture , Ambient Light, heartbeat sensor, pedometer • You are under continuous surveillance  Connectivity • WiFi, Bluetooth LE, ZigBee, Z-Wave • 6LowPAN, Thread, Sigfox, LoRaWAN  People & Process • Cloud services, Micro services • One-tap Remote management
  • 25.
    I wanna followfollow follow follow you… Let’s see a Video to understand this better…
  • 28.
  • 29.
    “A person employedin a port to load and unload ships.” Open platform to Build, Ship, Run distributed applications for developers and sysadmins.  You can separate your applications from your infrastructure & treat your infrastructure like a managed application.  Helps you ship code faster, test faster, deploy faster, and shorten the cycle between writing code and running code.
  • 30.
     To rundifferent applications on a single machine, we installed virtual machines.  Virtualization allowed us to • Run multiple operating systems on one physical machine • Move and copy virtual machines by saving the entire state of a virtual machine to files  An application along with necessary binaries and libraries and an entire guest operating system installed all of which may be tens of GBs in size.
  • 31.
     Containers havesimilar resource isolation and allocation benefits as VMs but a different architectural approach allows them to be much more portable and efficient.  Docker allows us to i. Run applications without installing entire guest operating systems. ii. Deploy ready-to-run, portable software, easier migration, and faster restarts.
  • 32.
     Containers wrapup a piece of software in a complete filesystem that contains everything it needs to run: code, runtime, system tools, system libraries.  But share the kernel with other containers.  They run as an isolated process in UserSpace on the host operating system.  They’re also not tied to any specific infrastructure – Docker containers run on any computer, on any infrastructure and in any cloud.
  • 33.
     Docker Enginehandles virtualization parameters such as allocation of the file system when launched. whereas the hypervisor needs to first import the virtual machine, then power it up.  Accelerate Developer Onboarding, dynamically change your application from adding new capabilities to quickly changing problem areas.  Eliminate Environment Inconsistencies (“it works on my system”)
  • 34.
     Microsoft Azure Amazon web services  Google Cloud platform  Oracle Cloud  RedHat Enterprise Linux  IBM Bluemix
  • 35.
     Docker usesa client-server architecture.  Docker client: The primary user interface to Docker. - It accepts commands from the user and communicates back & forth with a Docker daemon.  Docker daemon: Runs on a host machine & does building, running, and distributing Docker containers.  Other Docker Resources • Docker images: read-only templates from which Docker containers are launched.(e.g. Ubuntu operating system with Apache server) • Docker registries: public or private stores from which you upload or download images • Docker containers: everything that is needed for an application to run.
  • 36.
     Installation ofDocker  Web Hosting through Containers
  • 37.
    PHYSICAL DIGITAL 1. Tiny Computers 2. Massive Computers 3.Physical is becoming Digital 4. Digital is becoming Physical Bridging the gap…
  • 39.
    I I Deep Web& Dark Web WikiLeaks
  • 41.
    The Onion Router– Gateway to Anonymity A free software and an open network that simply makes you anonymous online.  Conceals its users’ identity and their online activity from surveillance and traffic analysis.  Used by Activists, Whistle Blowers, Journalists, Sensitive Businesses, Bloggers, Military  Illicit Uses: Selling Drugs and Weapons, Silk Route, Child Pornography So to hide your privacy, hide behind a Onion
  • 42.
    The Onion Router Layers of Encryption, Peeled of at every subsequent node  Each relay node knows only which node gave it data & which node it is giving data to  Separate set of encryption keys for each node along the complete circuit No observer at any single point can tell where the data came from or where it's going
  • 43.
    The .onion domain Tor Browser  Orbot
  • 44.
     Using TorBrowser to Connect to Internet  Hosting Tor Hidden Service in 3 minutes (https://xxxxyyyyzzzz.onion)
  • 45.
    We tend toOver-estimate the effect of a technology in the short run and Under-estimate the effect in the long run. - Amara’s Law
  • 46.
    “It ain't whatyou don't know that gets you into trouble. It's what you know for sure that just ain't so.” AbhinavBiswas@ecil.gov.in @Abhinav_BIswas

Editor's Notes

  • #3 Disclaimer: Not representing the Employer
  • #5 The Skull Splash Page on Japan Office – Guardians of Peace Twitter Account – CEO Go to Hell Administrators shut down its worldwide network and disabled VPN connections and Wi-Fi access to control the intrusion. Malware called Wiper, specifically designed for Sony networks, Ranswomware State-sponsored attacks, Stuxnet 2010 Consider Impact, Loss of Brand Image etc. 7 lawsuits were filed against Sony. Still being hacked…!!!
  • #6 Company Mattel - 2015 Progressive Machine Learning Features Digital Assistants like Apple’s Siri, Google’s Now, Microsoft’s Cortana Failed to validate SSL Certificates. MITM It is connected to AI Engine that allows the doll to have cognitive conversations with your kid This seems a very interesting proposition Note intelligence is not put into the doll….it’s connected to those massive computers of digital world. Progressive Machine Learning Features Digital Assistants like Apple’s Siri, Google’s Now, Microsoft’s Cortana This was hacked. The doll failed to validate SSL Certificates and hence the hacker quite cunningly used MITM Attacks to get control over the doll. He got access to the all audio files recorded by the doll. He could penetrate into the home wifi network and was able to sniff user credentials for regular internet traffic. Bt is this the only threat. Just imagine, what can happen if this doll teaches offensive things to your kid. What if someone is eavesdropping on our children without our knowledge. Now, Eavesdropping can also happen through other smart devices.. Like smart TVs..
  • #7 Broadband & Telecom Company, Ransom asked, but ignored. Classic case of Idetity Theft, which is raising concerns for Privacy Think About Vodafone Fraudsters can easily create a fake bank account in ur name & take loans
  • #8 Consider this car by Chrysler…The Jeep Cherokee An awesome SUV with smart features like hands-free voice command control for dashboard funtions, smart infotainment system with capabilities of integration with your icloud & google drive. You can easily create a wifi hotspot for the fellow passengers using 4G LTE embedded into the car. So a pretty nice car with cool smart features…bt it was hacked. It was demonstated in Blackhat Conf last year. These guys Reverse Engineered Car Firmware & Communications Protocol, And took over Dashboard functions, Steering, Transmission and Brakes They Remotely controlled the car & showed how they can crash the car without the knowledge of the driver.
  • #9 Founders are the developers of Open Source Security Pentesting Tool EtterCap  Small Company of 40 employees Clients are Governments, Law enforcement agencies, Fortune 100 companies across a dozen of countries in 6 different continents. Consultancy to Interpol. from Bahrain to Uzbekistan, Ethiopia to Sudan – to spy on spy on journalists, activists, political opposition etc. Nobody knows how they were hacked. Two types of companies – One who are hacked & they know about it & Others who are hacked & they don’t know it.
  • #10 All 5 attacks were innovative in their own way, state-sponsored, ransomware, Identity theft, Privacy problems. Recon- Social Engineering Lure- Weakest Link Redirect- C&C Servers. Exploit kit- Will scan & move across network. Dropper- Payload. Meterpreter Session, Remote shell. Call Home. - ECIL
  • #11 But Is this enough? Nasscom - 1 million cyber security professionals needed by 2020
  • #13 I can’t imagine a data centre without virtualization these days., BYOD, Blue Pill Attack. Apple vs FBI.. Whatsapp now encrypted. Banking Transaction Example So, there’s a lot of challenges that we are facing in the cyber space…
  • #14 We started with smart phones, smart watches…then moving on to smart TVs, smart refrigerators, smart bulbs, smart electric meters, and Combining them all together we have smart home. We are also talking about smart traffic management, smart retail, smart healthcare, smart energy, smart industries, smart agriculture, and finally we are building a smart planet I suppose.... With the advent of Iot, we are drifting into an era of smart things.
  • #15 But why is every ‘thing’ getting smarter? Is it just a marketing gimmick. Or the things are really getting smarter. If yes, what is making things smart… Call upon Sarath
  • #16 Firstly, what if I have a device that is not connected to internet IS it IOT? So Iot includes devices that can communicate to local network or other machine without human intervention. Things in Iot :: means not just physical devices rather it includes Social Data,Transactional Data,ERP Data,Cloud Infrastructure, communication between them. Iot is formed by network of devices that collect data & automates life.
  • #17  IOT is buzzing just from few years back But it existed from a longer period with name M2M Hardware costs::You can have a device with 1 Ghtz Quad core processor with 1 gb ram, & a memory slot in size of credit card with sweet flavor name known as Raspberry pie for 3000 Rs /35$ Cloud Era:: Every big and Every small company are offering cloud services, We can store and handle data up to petaa bytes Smart Devices::Started with samsund in india Technology side there are many protocols that we will discuss soon
  • #18 Imagine that when u r in office u can monitor whether ur kids are back frm school(motion sensors/camera)..ur pets are feeded ..u get alert when someone is in front of ur door u get their pictures and email them & u let them enter ur home in to visitors place from a tap on ur smart phone When u started home and car is reaching ur home the gate sensors detect ur number plate and open the gates for you and after u park closes the garage door and also By the time u enter your room thermostat sets your room temp,speakers start playing ur fav song in which ever room u r on just voice commands like alexaaa the lights are on and when u switch on the ni8 mode the light automatically goes dim In the morning when ur alarm rings, and morning mode activated ur curtains do up and ur sprinkler start watering the plants and ur pool gets water ready for u, and ur toaster and cofee maker gets ur breakfast ready ……and even read out the news for you And ur wearable device notifies ur heart beat time to meet ur friends fitbit to check ur health Its not just comfort and convieneiance but it reduces your electricity bill also
  • #19 “You’ve been driving for four hours and it’s past 9 p.m. A hotel five miles from here has rooms available. Would you like me to reserve a room and guide you there?” “Your friends Jeff and Kelly are at a restaurant around the corner. Would you like to call them? Would you like me to navigate you to your friends?” “Traffic between here and home is moving slow and your brakes need service. I can get you a service appointment with a highly rated dealer in five minutes. Would you like me to make the service appointment and drive you there?” If the traffic is heavy your car might send a text to the other party notifying them that you will be late. Or would suggest you other route because of traffic that details are real time collected from the other smart cars
  • #20 “smart cities” which can help us reduce waste and improve efficiency for things such as energy use; this helping us understand and improve how we work and live Energy meters –smart meters can control how much each house could drag (control 10 acs) What if the Parking sensors can find parking place for you u could save lot of fuel Waste management::proper disposal of waste (one truck goes to waste basket,without inf. Of how much waste is available)
  • #21 When every car and every home is getting smarter Then have smarter city In which ur buildings if catch fire not just make alarm sound but also call ambulance and fireman Sensors i.e fitbt and wearables detecting ur heart beat can send the reports to the doctor
  • #22 Accelerometer-changes orientation of screen linear acceleration of movement Gyroscope-based on gravity(tilt is determined,an extra access is added)-angular rotational velocity Pedometer-number of steps a person takes Bluetooth LE-Low Energy Zigbee-standard for wireless home comm. Set by IEEE(without license it could be used)(low power comm.) Z-wave-source routing alg. For fast route,new device added then alg. Rerun(Zensys company) uses network id 6LowPan-IPv6 over low power wireless personal area network Used for interoperability with other wirless protocols Thread-based on 6lowpan ipv6 closed documentation upto 250 devices SigFox-French Company for smart watches ,washing machines LoRawan- Long Range wide area network(battery operated sensors)
  • #23 These sensors available in size range of mmm and all of them could fit in ur smart phone and they consume very little power 1)Machine Vision-Helps to detect measuring product quality in industry with a video camera 2)Ambient li8 –Detects li8/brightness and adjust display settings accordingly 3)proximity-used for presence of human ear to remove display & disable touch screen 4)Presence-used to detect human based on body heat/co2 levels 5)Position sensor-To count the number of steps you took from a reference postion.To detect arm position in robotics 6)Displacement –To detect the object movement 7)humidity-To control humid levels in home/manufacturing plant 8)Accoustic-solids flow detection even liquids and gases(prssure,mass,torque,acceleration) especially in telecommunications 9)Vibration- For vibration and acceleration to detect machine condition 10)Chemical-Breathing analyzer,CO2 sensor 11)Gas-oxygen concentration 12)Flow-LPG flow could be taken care 13)Pressure-To detect accidents in car 14)Leak-detect water leaks in ur home and close the walue 15)Magnetic sensor-to detect orientation accdng to earths magnetic north(compass) 16)Acceleration-To find movement and orientation(autorotate)
  • #24 Technology changes These protocols are open source and consume very less power and are efficient And the best part is this communication between iot does not require human intervention Zigbee-standard for wireless home comm. Set by IEEE(without license it could be used)(low power comm.) Z-wave-source routing alg. For fast route,new device added then alg. Rerun(Zensys company) uses network id 6LowPan-IPv6 over low power wireless personal area network Used for interoperability with other wirless protocols Thread-based on 6lowpan ipv6 closed documentation upto 250 devices SigFox-French Company for smart watches ,washing machines LoRawan- Long Range wide area network(battery operated sensors)
  • #25 Iot is Formed not just by devices & communication But the Data and data is all about people and their process
  • #26 By other side I mean that Dark side of IOT Till now we have discussed the sweeter side, that iot provides this valuable services In order to provide services they also collect data lot of Data (But IOT means not just devices but also data right) Not just collecting but also they could transfer data without human intervention By this I mean ur smart li8s not only can switch on/off the li8 but also have knowledge of when u r in home/away And such data from all the iot in ur home is being stored and the most important part is it is never forgotten… It identifys the patterns in the sense ur behavioural patterns ur sleeping patterns when ur active when ur upset SO iot is always behind uuuu Follow follow you’ What if your wife calls ‘honey where are you ’ you sy atnding geeknight pres But what if you are actually enjoying party at paradise Iot can enable her know your location because your phone/car is going to tell her May be you can manage it But in case of one person who is diabetic and so busy, so got this glucose monitor installed which real time montiors glucose and injects insulin to your body with notifications to your mobile, & it gets hacked….. So this IOT though is in a hurry to provide services with millions of lines of code running & constantly collecting ,Remembering Data analyzing about you easily are making double profits …. By not just selling devices but also selling uuuuuuuuuuuu These people sell your data And you are the product….
  • #27 Time for break…
  • #28 Most important part of our presentation…
  • #29 Beforre the Break We und how iot can go bad Lets keep it aside How many of u know about docker
  • #30 Docker-platform to distribute applications If we have an application to be deployed We have dependencies i.e. it needs to be run on o.s with java installed,DB installed,Librarys that are required For this we give the customer one cd each to install each one of the above Now Docker eases this process Docker packages everything that is required to a single cd and does not care about the client operating system And also gives the flexibility to run mulitiple such containers( app. Based on diff os) to run on the same machine
  • #31 I Just forgot , before docker we used to have virtualization
  • #34 Layered Architecture of Docker Images
  • #38 Smart things are enabling us to bridge the gap btwn the physical world where we all live in and the digital world where we get the power of data-driven decisions. The structure what I want to explain here is that the tiny computers which exists with the sensors and actuators of physical world are getting connected to these massive computers that exist in the digital world, call it the cloud, hpc watever. They are connected in ways that allows the physical to become digital. To sample the world, to turn it into something that those massive big computers can ingest And then in return we are able to take the digital and make it physical And when digital things become physical, digital threats also become physical threats
  • #39 Fully autonomous computing system… Smaller than the size of a grain of rice. Less than a half a centimeter Small computers have sensors, a processor and a radio in it to transmit data. Solar cells power the battery with ambient light Sensing temperature, pressure, and taking images. Collective Swarm…Fog Computing – Micro Cloud....Putting it into soil for smart Agricultures..But dark side.. These device have no security built-in. All collected sensor data is published in open air using radio waves. Now, We are not able to secure one Iot device...Imagine how difficult it would be to secure a cluster of these small small devices.
  • #40 Identity Thefts – Cloning of Smart Cards. Don’t care from where the data is coming…Let the data come. Before getting into anonymity, let‘s understand, How much we know about the digital world. How much of online data you think google can retrieve for you.
  • #42 Google is tracking everything Keeping your online activities away from prying eyes of governments, advertisers, stalkers and even your boss. 26/11 Attacks – C&C through TOR.
  • #43 The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you — and then periodically erasing your footprints. Instead of taking a direct route from source to destination.
  • #44 Silk Route
  • #46 I believe in Amara’s law, We tend to Overstimate technology in the short run and Understimate the impact of it on the long run.