+ All Categories
Home > Documents > A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT...

A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT...

Date post: 25-Jun-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
21
IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky Lab A Bottom-Up Approach for IIoT Security 1
Transcript
Page 1: A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky

IoT Week 2018 Bilbao

Andrey Nikishin

Special Projects Director, Future Technologies,

Kaspersky Lab

A Bottom-UpApproach for IIoTSecurity

1

Page 2: A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky

IoT Week 2018 Bilbao

What is IoT?

2

«The interconnection via the

Internet of computing devices

embedded in everyday objects,

enabling them to send and receive

data».

– Google

Internet of Things (IoT) is a system of interrelated

computing devices, mechanical and digital

machines, objects, animals or people that are

provided with unique identifiers and the ability to

transfer data over a network without requiring

human-to-human or human-to-computer

interaction.

http://internetofthingsagenda.techtarget.com/definition/

Internet-of-Things-IoT

The Internet of Things (IoT) is the inter-

networking of physical devices, vehicles,

buildings, and other items embedded with

electronics, software, sensors, actuators, and

network connectivity which enable these

objects to collect and exchange data. The IoT

allows objects to be sensed or controlled

remotely across existing network

infrastructure, creating opportunities for more

direct integration of the physical world into

computer-based systems, and resulting in

improved efficiency, accuracy and economic

benefit in addition to reduced human

intervention.

https://en.wikipedia.org/wiki/Internet_of_things

Page 3: A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky

IoT Week 2018 Bilbao

What is smart IoT?

3

Internet of Things (IoT)

– is a system of embedded connected cyber-physical

devices that have ability to transfer data over a network

without requiring human-to-human or human-to-

computer interaction and more importantly can have

an ability to make a decision without such

interaction

– Google

Page 4: A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky

IoT Week 2018 Bilbao

How we see IoT

Microwave ovenSmart socketSmart camera Smart light

Washing machine Smart TVSmartphone

4

Page 5: A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky

IoT Week 2018 Bilbao

IoT is more complex then we think

Internet Provider (ISP)

Smartphone

APP

Server Database

Database

Microwave oven

Washing machine

Smartphone

Router/Gateway

Smart TV

Smart camera Smart light

Smart socket

Laptop

5

Page 6: A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky

IoT Week 2018 Bilbao6

Page 7: A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky

IoT Week 2018 Bilbao

Router/Gateway

IoT is more complex then we think

7

Internet Provider (ISP)

Smartphone

APP

Server Database

Database

Microwave oven

Washing machine

Smartphone

Smart TV

Smart camera Smart light

Smart socket

Laptop

Sniffing of

User Data

DDoS Attack

Exploiting

Software

Vulnerabilities

Malware

Man-in-the-Middle

Attack

Malicious

Firmware

Update

Malware Delivery Thru

Data Storage Device

Exploiting

Software

Vulnerabilities

Attack on Key /

Certificate

Stores

Attack from

Downloaded Apps

Attack from Mobile

Device

Password

dictionary attack

Page 8: A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky

IoT Week 2018 Bilbao

The manufacturer of "smart" locks Lockstate

has managed to block the entrance doors to

hundreds of its customers, releasing an

unsuccessful firmware update.

After installing the problem update, the built-in

keyboard did not work, so it was not possible to

open the door.

Vulnerabilities in the "smart" security system of

iSmartAlarm production. There are problems

with SSL certificate authentication and access

control, authentication errors, and a vulnerability

that can cause a denial of service.

Attackers can exploit vulnerabilities in order to

disable signaling and, for example, rob a house.

The Food and Drug Administration announced

the recall of some models of pacemakers

produced by Abbott.

The reason for the recall was the vulnerabilities

discovered in the devices that allow attackers

to gain control over the device. In particular, a

hacker can reduce the battery power of the

device or accelerate the heartbeat.

Attacks on safety

https://www.securitylab.ru/news/487795.php8

Page 9: A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky

IoT Week 2018 Bilbao

Page 10: A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky

IoT Week 2018 Bilbao

Page 11: A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky

IoT Week 2018 Bilbao

What to do?

11

Page 12: A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky

Kaspersky Lab. Security Capabilities

APP

Laptop

Cloud

Mobile

Server Database

DatabaseGateway

Controls

Sensors

• Strict policies: apps,

communications, devices,

users

• Secure OS

• Vulnerability detection

• Patch management

• State monitoring

• Communication anomalies

and violations detection

(DPI, Machine Learning)

• Intrusion detection

• Network filtering

• Whitelisting: apps,

communications,

devices

• Antivirus

• Reputation

assessment

• Vulnerabilities (?)

• Firewall

• Whitelisting: apps, communications,

devices, users

• Firewall

• Vulnerability detection

• Patch management

• File and disk encryption

• Antivirus

• Active disinfection

• Secure execution

environment

• Security domain

separation

• Strict policies: apps,

communications,

devices, users

• Vulnerability

detection

• Patch management

• Intelligence services

• Extensive cloud

database of known

signatures,

vulnerabilities, file, url

reputations, etc

For Linux Windows

Embedded Kaspersky OSFor iOS, Android,

Windows Phone

For MAC OS,

MS Windows,

Linux

• DDOS protection

• Advanced persistent threat

protection

• Various servers protection:

Web, Mail, File...

• Virtual machines and

hypervisors protection

• Secure Hypervisor

• Security Orchestration

• Perimeter protection

Security Center: orchestration and

management

12

Page 13: A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky

IoT Week 2018 Bilbao

True

IoT Security

Page 14: A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky

IoT Week 2018 Bilbao

True IoT Security. Main principles

14

End to End Security

Root of Trust

Security for Safety

Device Hardening

Page 15: A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky

IoT Week 2018 Bilbao

Smartphone

Router/Gateway

True IoT Security. End to End Security

Internet Provider (ISP)

APP

Server Database

Database

Microwave oven

Washing machine

Smartphone

Smart TV

Smart camera

Laptop

15

Smart socket

Smart light

Page 16: A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky

IoT Week 2018 Bilbao

True IoT Security. Root of Trust

Trusted hardware kernel

Trusted memory space

Keys/certificate storage

Trusted boot, firmware update

Software virtualisation

Trusted system environment

Administration, Security domains

System security, Hardware

Virtualisation

Trusted user environment

Overlay security applications

Application security

Trusted

Application Environment

Trusted OS

Trusted

Execution Environment

Trusted Boot

Root

Of Trust

16

Page 17: A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky

IoT Week 2018 Bilbao

True IoT Security. Device Hardening

From Security

Gateway

To Secure

Gateway

Man-in-the-Middle

Attack

Exploiting Software

Vulnerabilities

Attack on Key /

Certificate Stores

Malware Delivery Thru

Data Storage Device

Attack from

Mobile Device

Attack from

Downloaded Apps

Sniffing of User

Data

Malicious

Firmware Update

Password dictionary

attack

17

Page 18: A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky

IoT Week 2018 Bilbao

True IoT Security. Security for Safety

• IoT is cyber-physical system.

• IoT cyber threats are not only for data anymore

but also for health, physical objects, environment.

It is a safety issue.

• Successful cyber attacks on IoT mean physical

damage.

• Providing Cyber security for IoT means

maintaining of safety.

18

Page 19: A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky

IoT Week 2018 Bilbao

We believe that Internet of Things will bring a

lot of benefits for all of us.

19

With True IoT Security we can help

to create safe and secure IoT

Page 20: A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky

IoT Week 2018 Bilbao

Page 21: A Bottom-Up Approach for IIoT Security - Microsoft › slides2018 › 07.06...2018/07/06  · IoT Week 2018 Bilbao Andrey Nikishin Special Projects Director, Future Technologies, Kaspersky

21

Questions?

21

Andrey Nikishin

Special Projects Director, Future Technologies,


Recommended