+ All Categories
Home > Technology > Principals of IoT security

Principals of IoT security

Date post: 08-Jan-2017
Category:
Upload: iot613
View: 77 times
Download: 0 times
Share this document with a friend
15
Principals of IoT Security Stephanie Sabatini, Cyber Security Professional
Transcript
Page 1: Principals of IoT security

Principals of IoT SecurityStephanie Sabatini, Cyber Security Professional

Page 2: Principals of IoT security

Principals of IoT Security AgendaOver the next 20 minutes we’ll discuss the following:The Fear• Be afraid (very afraid)The Challenge• IoT Security isn’t easyThe Solution• Don’t be a statistic

Page 3: Principals of IoT security

The FearPrincipals of IoT Security

Page 4: Principals of IoT security

IoT Security – The Fear• Baby monitors• Thermostats• Cars• Medical devices• Children’s toys• Toasters• Locks• ETC…

Page 5: Principals of IoT security

IoT Security – The Fear

Gartner predicts 26 billion by 2020• Revenue exceeding $300 billion in 2020• $1.9 Trillion in global economic impact

The financially motivated attacker has 26 billion targets and 300 billion reasons.

Page 6: Principals of IoT security

The ChallengePrincipals of IoT Security

Page 7: Principals of IoT security

IoT Security – The ChallengeThe top 10 security challenges with IoT:1. Insecure Web Interface2. Insufficient Authentication / Authorization3. Insecure Network Services4. Encryption5. Privacy Concerns 6. Insecure Cloud Interface7. Insecure Mobile Interface8. Insufficient Security Configurability9. Insecure Software / Firmware10. Poor Physical Security

Page 8: Principals of IoT security

IoT Security – The ChallengeMany IoT producers aren’t committed to security like a major tech company would be. Toy companies, for example – Toys made by Mattel Inc. (Fisher Price brand) with internet connectivity have been hacked revealing names, ages and geographical location of children. They specialize in making toys – not security.

These ‘things’ live differently than the traditional internet connected devices. Many attacks that we have seen so far take advantage of these differences. They exploit the differences.

The challenge is applying security controls on non-traditional devices. The principal is the same, but the control itself needs to be adapted (or innovated) to fit the security gap.

Network + Application + Mobile + Cloud = IoT

Page 9: Principals of IoT security

The SolutionPrincipals of IoT Security

Page 10: Principals of IoT security

Perimeter

Network

Host

Application

Data

IoT Security – The Solution

Security by design and a defense in depth approach will consider security from the design phase to the end-of-life and destruction of information phase.

Page 11: Principals of IoT security

IoT Security – The Solution

A holistic approach needs to be built in – not bolted on• The device (end point security)• The cloud• The mobile application• The network interfaces• Encryption• Authentication• Patching• Physical security• Data Destruction

Page 12: Principals of IoT security

IoT Security – The Solution

Developers – build components securely using secure development methodologies and perform static code analysis.Infrastructure Support – build infrastructure with secure end points, detective and preventative controls.Testers – include all attack vectors in testing methodologies.Manufacturers – Due diligence! Check, test, audit – make sure that you are manufacturing a secure product by bringing experts to the table. Plan for sufficient budgets.Consumers – change passwords regularly, use encryption – use the technology safely.

Page 13: Principals of IoT security

The ConclusionPrincipals of IoT Security

Page 14: Principals of IoT security

IoT Security – The Conclusion• DO NOT TRY THIS AT HOME!

• Experts! Call the experts! • Expert solutions can’t be matched by homegrown solutions.

• DON’T PANIC• Defense in depth• Innovate!

Page 15: Principals of IoT security

Stephanie SabatiniCyber Security Professional & [email protected]


Recommended