Date post: | 15-Apr-2017 |
Category: |
Design |
Upload: | jeff-schlauch |
View: | 30 times |
Download: | 3 times |
www.bastille.io
Security for the Mobile World and the Internet of Things
www.bastille.io
The Big Secret about The Internet of Things
It’s not about the “Things”, it’s about the Radios!
It’s not about the “Things”, it’s about the RADIOS
3
Year: 202025B Devices20B have Radios
Hundreds of Protocols
Billions of Devices
4
It’s not about the “Things”, it’s about
the RADIOSYear: 202025B Devices
20B have Radios
5
It’s not about the “Things”, it’s about the RADIOS
Year: 202025B Devices 20B have Radios
The Internet of Things is Now!
6
Vulnerable Wireless
Devices in the Enterprise
Today
• 15 patents in process–Small Device Radio–Radio traffic analysis–Radio Machine Learning–RF persona
7
Bastille Intellectual Property
Case Study: Data Center Vulnerabilities
Unconfigured Zigbee Network
Bluetooth Keyboard
Vulnerability
Examples of things that Bastille looks for:Data exfiltration New members of Mesh NetworksMobile phone “hotspots” Out of policy devices:hotspots, camsBlueTooth Tethering to phones Unconfigure devices looking for pairsRogue Cell Towers Changes in behavior of a device in RFBugs Changes in behavior of RF PersonaRF Personas in the wrong areasKnown radio attack executionNew transmitters
9
Examples of things that Bastille looks for:Data exfiltration New members of Mesh NetworksMobile phone “hotspots” Out of policy devices:hotspots, camsBlueTooth Tethering to phones Unconfigure devices looking for pairsRogue Cell Towers Changes in behavior of a device in RFBugs Changes in behavior of RF PersonaRF Personas in the wrong areasKnown radio attack executionNew transmitters
10
Examples of things that Bastille looks for:Data exfiltration New members of Mesh NetworksMobile phone “hotspots” Out of policy devices:hotspots, camsBlueTooth Tethering to phones Unconfigure devices looking for pairsRogue Cell Towers Changes in behavior of a device in RFBugs Changes in behavior of RF PersonaRF Personas in the wrong areasKnown radio attack executionNew transmitters
11
Questions for your organizationIn addition to WiFi, what other radio connected devices are operating in my facilities?How many of these devices are set to default passwords?Do I have any wireless mice in my facilty today?Do I have MDM on every mobile device connected to my network?What is my long term plan monitoring a Radio Enabled World.
12
? ? ?
Security for the Mobile World and the Internet of Things