The Internet of Things and Security

Similar documents
Qualys Cloud Platform

Securing IoT with the ARM mbed ecosystem

Achieving End-to-End Security in the Internet of Things (IoT)

EMBEDDED ENCRYPTION PLATFORM BENEFIT ANALYSIS

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

Implementing Core Cisco ASA Security (SASAC)

Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions, Leidos

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

The Internet of Things

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

AKAMAI CLOUD SECURITY SOLUTIONS

Security+ SY0-501 Study Guide Table of Contents

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity

IoT security based on the DPK platform

CYBER SECURITY WHITEPAPER

Security

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN

EMERGING TRENDS AROUND AUTHENTICATION

Tips for Passing an Audit or Assessment

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT

Mobile: Purely a Powerful Platform; Or Panacea?

Vidder PrecisionAccess

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

IMPLEMENTING A SOLUTION FOR ASSURING KEYS AND CERTIFICATES

Security Asia The biggest breaches and cyber-attacks of 2017, and what threats to expect in 2018

Introduction to Device Trust Architecture

How to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud

This document describes the configuration of Secure Sockets Layer (SSL) decryption on the FirePOWER Module using ASDM (On-Box Management).

PCI DSS Compliance. White Paper Parallels Remote Application Server

Strong Security Elements for IoT Manufacturing

Firewalls for Secure Unified Communications

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

Business Strategy Theatre

Introduction to the DANE Protocol

Beyond Firewalls: The Future Of Network Security

Encrypted Traffic Security (ETS) White Paper

Run the business. Not the risks.

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

European Union Agency for Network and Information Security

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

Welcome to the Industrial Internet Forum

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

GLOBAL PKI TRENDS STUDY

Internet of Things (IoT) Attacks. The Internet of Things (IoT) is based off a larger concept; the Internet of Things came

Jeff Wilbur VP Marketing Iconix

White Paper February McAfee Network Protection Solutions. Encrypted Threat Protection Network IPS for SSL Encrypted Traffic.

Cisco HyperFlex and the F5 BIG-IP Platform Accelerate Infrastructure and Application Deployments

Overview. SSL Cryptography Overview CHAPTER 1

Internet of Things and M2M

IoT Infrastructure. idevicesinc.com

Security Challenges and

INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS. Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom

Discussion on MS contribution to the WP2018

Living on the Edge. Myla V. Pilao - Director TrendLabs Marketing Trend #CLOUDSEC

OTA & IoT A Shared & Collaborative Responsibility. 24 October 2017

Cybersmart Buildings: Securing Your Investments in Connectivity and Automation

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

The Integrated Smart & Security Platform Powered the Developing of IOT

Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

Storage as an IoT Device Roundtable Walt Hubis, CISSP Tom Coughlin

TAKING THE MODULAR VIEW

Trusted Identities. Foundational to Cloud Services LILA KEE CHIEF PRODUCT OFFICER GLOBALSIGN

The New Net, Edge Computing, and Services. Michael R. Nelson, Ph.D. Tech Strategy, Cloudflare May 2018

Connected Medical Devices

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

Grandstream Networks, Inc. GWN7000 OpenVPN Site-to-Site VPN Guide

Transforming the Network for the Digital Business

Securing V2X communications with Infineon HSM

Today s Lecture. Secure Communication. A Simple Protocol. Remote Authentication. A Simple Protocol. Rules. I m Alice. I m Alice

Security in sensors, an important requirement for embedded systems

NCCoE TRUSTED CLOUD: A SECURE SOLUTION

Trust Infrastructure of SSL

Putting security first for critical online brand assets. cscdigitalbrand.services

5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Cybersecurity: Operating in a Threat Laden World. Christopher Buse, Assistant Commissioner & CISO

Progressively Securing RIOT-OS!

ITU Workshop on 5G Security

IBM Cloud Internet Services: Optimizing security to protect your web applications

DEALING WITH A CYBER FUTURE THAT IS ALREADY HERE. Rob Clyde, CISM, ISACA International VP, Board Member April 2015

Implementing Cisco Network Security (IINS) 3.0

Cybersecurity ecosystem and TDL Antonio F. Skarmeta

Cisco Start. IT solutions designed to propel your business

The following chart provides the breakdown of exam as to the weight of each section of the exam.

SIEM Solutions from McAfee

Enterprise & Cloud Security

Key Management in a System z Enterprise

BOARD DIRECTOR CONCERNS ABOUT CYBER AND TECHNOLOGY RISK

Software-Defined Hardware: Enabling Performance and Agility with the BIG-IP iseries Architecture

October 4, 2000 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this Memo

TLS 1.1 Security fixes and TLS extensions RFC4346

Evaluating the Security Risks of Static vs. Dynamic Websites

National Institute of Standards and Technology

WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM

ilight/gigapop eduroam Discussion Campus Network Engineering

Category: Standards Track January 1999

Transcription:

INTERNAL USE ONLY The Internet of Things and Security Chuck DePalma CISSP CISM Network and Cloud Security Architect

The Internet of Things 1998 Adoption of Mosaic Browsers 0ver 250 Millions of Internet Connected Devices 2007 Introduction of the iphone: 2009 Wide Adoption of Smart Phones, Over a Billion Devices connected to the Internet We believe the number of internet connected devices has reached 8.7 Billion Cisco November, 2012 June, 2015: there are 25 Billion total devices connected to the Internet: 4.9 Billion Internet of Things devices connected ** By 2020, it is estimated that there will be 75 Billion total devices, 25 Billion of which will compromise the Internet of Things (IoT)** 2

Why Does It Matter? The Potential Market of the IoT and generated Big Data will exceed $11 Trillion Dollars by 2020 January 2013: FTC Releases Internet of Things: Privacy and Security in a Connected World March 2015: EU initiated the creation of Alliance for Internet of Things Innovation (AIOTI) DEF CON 23 (August 6 th 9 th, 2015) in Las Vegas, attendees compete to hack IoT devices. 3

The Internet of Today, 2020 and Beyond Here in Michigan, a Smart Freeway, 20 miles of I-96 and I-696, Cameras and Sensors have been deployed to provide Intelligent Communications with Connected Vehicles. Various Pharmaceutical Manufactures have developed Smart Medicine to be deploy as needed. Items such as Insulin Pumps that adapt to real time Blood Sugars and provide Insulin as needed. Both Homes and Cars can be remotely controlled via smart phones or other portable devices We can either become the Connected World of the Future.Or a Horror Writers vision of Chaos 4

What s Important Threat Modeling Threat Intelligence The Security of IoT 5

Threat Modeling Everyone does Threat Modeling everyday Risks to your home Risks to your person Risk to your Business You know your environment, be it personal or Company better than anyone else In both Corporate and Personal instances basic Security Rules apply: Protect what is important Identify threats Mitigate threats 6

Threat Intelligence Basic Business Model Tools: Firewalls, IDS, Log Management, SIEM People: Incident Response; Mitigation Governance: Executive Direction (CISO) and Policy 7 IoT New Tools: Complex, Intelligent Security appliances and devices New Dynamics: Merger of Personal and Corporate Interaction Cooperative Governance of devices deployed by businesses for Consumers use

The Security of IoT Zero Trust Networks* Next Generation Firewalls PKI Certificate Authority SSL / TLS Matrix SSL Matrix SSL Tiny Certificates and Beyond * Forrester Concept November of 2014 8

Zero Trust Networks Basic Premise: Eliminate Trust side of Firewall Utilizes Micro-VLANs: Every Device has it own VLAN Requires Authentication at all points Requires Fast Authentication mechanism Requires High Backplane Speed Firewalls to support fast Authentication 9 Requires native Security Elements: Not Bolt-on Security Solutions

Next Generation Firewalls Much like initial Securely deployed WiFi networks were deployed in Corporate environments and moved to other environments NGF s being deployed in todays Corporate environments will move to other environments as well. NGF s can natively support Certificate Authorities, supporting PKI NGF s have High Speed Backplanes Via CA s NGF s can natively support fast Authentication, such as PKI NGF s support Commercial and Privately signed PKI Certificates PKI can facilitate more secure Authentication 10 PKI can provide secure communications for both Outside and Inside Untrust networks for Internet connected devices

SSL: Secure Socket Layer / TLS: Transport Layer Security SSL / TLS allows for implementation of IoT devices to encrypt their transmissions across the internet Helps Secures against Man in the Middle (MTM), such as eavesdropping and DDoS Misuse Attacks Matrix SSL Open Source embedded SSL/TLS designed for small footprint, for Web Servers to implement encryption layer for Secure Management of remote devices (>50KB) Inside Secure s Matrix SSL / DTLS Tiny Supports IP Stack, TLS; if no IP and UDP only, DTLS. Designed for a tiny memory footprint of Security to be integrated into Applications. (>10KB) 11

Certificates and Beyond Digital Certificates: Prevalent for Authentication and Encryption Becoming smaller, but yet maintaining an appropriate level of Security 1 st Step in Securing IoT Threat Modeling and Intelligence Needs to be part of the overall Security Landscape Needs to be integral to Security planning Bottom Line Security is pivoting every 6 months. We have a continuous stream of new tools evolving and at our disposal. There is an unprecedented opportunity to get ahead of the curve and start to secure the IoT as it evolves, as opposed to an after thought. 12