SlideShare a Scribd company logo
Dark - Side of Internet of Things (IOT)
Dark - Side of Internet of Things (IOT)
Dark - Side of Internet of Things (IOT)
The Sensors
The Cloud
M2M
Dark - Side of Internet of Things (IOT)
PHYSICAL
DIGITAL
1. Tiny
Computers
2. Massive
Computers
3. Physical is becoming Digital
4. Digital is becoming Physical
Chrysler Recalled
1.4M Vehicles for Bug Fix
Dark - Side of Internet of Things (IOT)
Dark - Side of Internet of Things (IOT)
Dark - Side of Internet of Things (IOT)
Dark - Side of Internet of Things (IOT)
“Hey Siri, What is Ransomeware?”
A type of malware designed to block access to a computer system until a
sum of money is paid.
Smart PacemakersSmart Thermostats
Dark - Side of Internet of Things (IOT)
• Inconvenience
“What is the time now sir?”
-- Sorry my Watch is Dead….
Dark - Side of Internet of Things (IOT)
#1 Resource Constraints
#2 The STRIDE Threat Vectors
SECURITY PRIVACY ANONYMITY
Obscurity
by
Security
Design
Planning Design Implement..n Verification Validation Deployment Operations
Pick Atleast Two
We tend to Over-estimate the effect of a technology in the short run
and Under-estimate the effect in the long run.
- Amara’s Law
“It ain't what you don't know that gets you into trouble.
It's what you know for sure that just ain't so.”
AbhinavBiswas@ecil.gov.in
@Abhinav_BIswas

More Related Content

PPTX
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
PPTX
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
PPTX
Modern Cyber Threat Protection techniques for Enterprises
PDF
Profile securitarian
PDF
Securing the Internet of Things
PPT
IoT Security by Sanjay Kumar
PPTX
Privacy and Security in the Internet of Things
PPTX
Technical Challenges in Cyber Forensics
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Modern Cyber Threat Protection techniques for Enterprises
Profile securitarian
Securing the Internet of Things
IoT Security by Sanjay Kumar
Privacy and Security in the Internet of Things
Technical Challenges in Cyber Forensics

What's hot (20)

PPTX
Insights Into Modern Day Threat Protection
PPTX
Security Impact of Data Visibility - Your New 90-Second Superpower
PDF
Internet of Things - Privacy and Security issues
PDF
Internet of Things Security Patterns
PPTX
IOT privacy and Security
PPT
IoT Security – Executing an Effective Security Testing Process
PPTX
Iot Security, Internet of Things
PDF
Ethical hacking and social engineering
PDF
Top 10 Cyber Security Tips for SMEs
PDF
IoT Security, Mirai Revisited
PPTX
Securing Internet of Things
PPTX
Ethical Hacking Workshop Presentation
PDF
IOT Security
PDF
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
PDF
Shining a Light on Shadow Devices
PPTX
Ethical hacking
PDF
Privacy & Security for the Internet of Things
PPTX
Your Thing is Pwned - Security Challenges for the IoT
PDF
Security Aspects in IoT - A Review
PPTX
The Basics of Ethical Hacking
Insights Into Modern Day Threat Protection
Security Impact of Data Visibility - Your New 90-Second Superpower
Internet of Things - Privacy and Security issues
Internet of Things Security Patterns
IOT privacy and Security
IoT Security – Executing an Effective Security Testing Process
Iot Security, Internet of Things
Ethical hacking and social engineering
Top 10 Cyber Security Tips for SMEs
IoT Security, Mirai Revisited
Securing Internet of Things
Ethical Hacking Workshop Presentation
IOT Security
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
Shining a Light on Shadow Devices
Ethical hacking
Privacy & Security for the Internet of Things
Your Thing is Pwned - Security Challenges for the IoT
Security Aspects in IoT - A Review
The Basics of Ethical Hacking
Ad

Similar to Dark - Side of Internet of Things (IOT) (20)

PPTX
Demystifying the Dark-Side of Internet of Things (IOT): A Journey through Sec...
PDF
2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target
PDF
Fall2015SecurityShow
PDF
Cyber security-briefing-presentation
PPTX
Chapter 5
PPTX
Ch01 NetSec5e Network Security Essential Chapter 1.pptx
PPTX
Cloud, social networking and BYOD collide!
PPTX
Art Hathaway - Artificial Intelligence - Real Threat Prevention
PDF
Cyber Security.pdf
PPTX
DamballaOverview
PPTX
UNIT-3-Cybercrime Mobile and Wireless Devices-1.pptx
PPTX
Unit-3.pptx
PDF
Buckle Up
PDF
2015 Cybersecurity Predictions
PPTX
Threat modeling the security of the enterprise
PPTX
iPads on your network? Take Control with Unified Policy and Management
PPTX
Medtec - Cyber-security Challenges on the Horizon
PDF
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
PDF
BYOD: Device Control in the Wild, Wild, West
PPT
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Demystifying the Dark-Side of Internet of Things (IOT): A Journey through Sec...
2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target
Fall2015SecurityShow
Cyber security-briefing-presentation
Chapter 5
Ch01 NetSec5e Network Security Essential Chapter 1.pptx
Cloud, social networking and BYOD collide!
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Cyber Security.pdf
DamballaOverview
UNIT-3-Cybercrime Mobile and Wireless Devices-1.pptx
Unit-3.pptx
Buckle Up
2015 Cybersecurity Predictions
Threat modeling the security of the enterprise
iPads on your network? Take Control with Unified Policy and Management
Medtec - Cyber-security Challenges on the Horizon
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
BYOD: Device Control in the Wild, Wild, West
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Ad

Recently uploaded (20)

PPTX
artificial intelligence overview of it and more
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PPTX
newyork.pptxirantrafgshenepalchinachinane
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
E -tech empowerment technologies PowerPoint
PPTX
Funds Management Learning Material for Beg
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
Database Information System - Management Information System
PDF
Introduction to the IoT system, how the IoT system works
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPT
Ethics in Information System - Management Information System
PPTX
Internet Safety for Seniors presentation
PDF
Slides PDF: The World Game (s) Eco Economic Epochs.pdf
PDF
The Evolution of Traditional to New Media .pdf
PPTX
Introduction to cybersecurity and digital nettiquette
artificial intelligence overview of it and more
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
newyork.pptxirantrafgshenepalchinachinane
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
The New Creative Director: How AI Tools for Social Media Content Creation Are...
artificialintelligenceai1-copy-210604123353.pptx
SASE Traffic Flow - ZTNA Connector-1.pdf
E -tech empowerment technologies PowerPoint
Funds Management Learning Material for Beg
SAP Ariba Sourcing PPT for learning material
Database Information System - Management Information System
Introduction to the IoT system, how the IoT system works
Power Point - Lesson 3_2.pptx grad school presentation
Mathew Digital SEO Checklist Guidlines 2025
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Ethics in Information System - Management Information System
Internet Safety for Seniors presentation
Slides PDF: The World Game (s) Eco Economic Epochs.pdf
The Evolution of Traditional to New Media .pdf
Introduction to cybersecurity and digital nettiquette

Dark - Side of Internet of Things (IOT)

Editor's Notes

  • #2: A very good afternoon to all of you Gentlemen.
  • #3: With the advent of IOT, we are drifting into an era of smart things. We started with smart phones, smart watches…then moving on to smart TVs, smart refrigerators, smart bulbs, smart electric meters, and combining them all together we have smart home. We are also talking about smart traffic management, smart car parking, smart retail, smart healthcare, smart energy, smart industries and finally we are building a smart planet I suppose....
  • #4: But why is every ‘thing’ getting smarter? Is it just a marketing gimmick. Or the things are really getting smarter. If yes, what is making things smart… Is it because of some small things which are getting smaller and smaller.
  • #5: The sensors We now have accelerometers, gyroscopes, proximity sensors, humidity sensors, gps location sensors in the size range of millimeters. Your typical smartphone itself has about 10 sensors on an average. So, Is this proliferation of small small sensors is what making things smart.
  • #6: Or is it because of these big things, the servers, the cloud.. Computing is becoming incredibly powerful day by day….and its growing exponentially With more capacity, more performance, more capability and more change in the next 10 years than the last 50 Big Data Analytics, Machine Learning, Predictive & Prescriptive Intelligence all are possible because of these big machines. So can we say The Cloud is making everything smart.
  • #7: Or it is because of the rise of M2M IOT devices are getting ubiquitously connected…50 billion devices connected by 2020 as per Gartner. Devices can talk to each other without human intervention even. And can take decision themselves. Gone are the days when you would use an app on ur phone to order milk from a grocery store. Smart refrigerators can automate this. It can sense the unavailability of milk n order by itself. So is M2M & Connectivity making things smart.
  • #8: I believe it’s the combination of all three. These are the 3 things which is making every thing smart. When we combine these 3 we get the power of innovating interesting IOT systems, applications and services. Let it be the wearables, the implantables, the injectables…every smart thing is leveraging these 3 technologies. And if we give a closer look, all smart things are doing this.
  • #9: They are enabling us to bridge the gap btwn the physical world where we all live in and the digital world where we get the power of data-driven decisions. The tiny computers of physical world, the sensors are getting connected to these massive computers that exist in the digital world, call it the cloud, hpc watever. They are connected in ways that allows the physical to become digital. To sample the world, to turn it into something that those massive big computers can ingest And then in return we are able to take the digital and make it physical And when digital things become physical, digital threats also become physical threats
  • #10: Consider this car by Chrysler…The Jeep Cherokee An awesome SUV with smart features like hands-free voice command control for dashboard funtions, smart infotainment system with capabilities of integration with your icloud & google drive. You can easily create a wifi hotspot using 4G LTE module embedded into the car. So a pretty nice car with cool smart features…bt it was hacked. It was demonstated in Blackhat Conf last year. These guys Reverse Engineered Car Firmware & Communications Protocol, And took over Dashboard functions, Steering, Transmission and Brakes They Remotely controlled the car & showed how they can crash the car without the knowledge of the driver.
  • #11: This is World’s First Interactive Doll by a company called Mattel. It uses Uses Voice Recognition technology & Progressive Machine Learning to Play interactive games & tells jokes to your kid, read a book & do language translations. It can also tailor conversations based on history. Note intelligence is not put into the doll….it’s connected to those massive computers of digital world. This seems a very interesting proposition in terms of IOT. But, this was hacked. The doll failed to validate SSL Certificates and hence the hacker quite cunningly used MITM Attacks to get control over the doll. He got access to the all audio files recorded by the doll. He could penetrate into the home wifi network and was able to sniff user credentials for regular internet traffic. But is this the only threat. Just imagine, what can happen if this doll teaches offensive things to your kid. What if someone is eavesdropping on our children without our knowledge. Now, Eavesdropping can also happen through other smart devices.. Like smart TVs..
  • #12: Smart TVs are coming with inuitive voice command & control these days.. We are becoming lazy enough to even use the wireless remote. What if that same microphone in the TV can be used to listen to your private communications in your bed room. Smart TVs have also been reported to be hacked & infected by malware for automated Ad Clicks and cryptocurrency mining.
  • #13: About 10% of the World’s Population suffer from Diabetes. Same is happening with Pacemakers also. Pacemakers can also be monitored using mobile apps these days. Imagine what if by exploiting a simple app on your phone the attacker can send wrong signals to the packemaker. It can be disastrous. And things are getting much worse.
  • #14: Fully autonomous computing system… Smaller than the size of a grain of rice. Less than a half a centimeter Small computers have sensors, a processor and a radio in it to transmit data. Solar cells power the battery with ambient light Sensing temperature, pressure, and taking images. Collective Swarm…Fog Computing – Micro Cloud....Putting it into soil for smart Agricultures..But dark side.. These device have no security built-in. All collected sensor data is published in open air using radio waves. Now, We are not able to secure one Iot device...Imagine how difficult it would be to secure a cluster of these small small devices.
  • #15: Ransomeware have been quite popular in the Cyber Security Space since past few years where the hacker will put a malware in your system that will encrypt you hard disk and wil prevent u to access ur data until u pay a ransom... Ransomeware has also started penetrating into the IOT sector. Take the case of Nest Thermostats, the home owner went for a vacation and got a message that his room temperature has been increased to 40^C. His room will be very hot when he come back. To unlock the thermostat please pay me some xyz bitcoins. Now, just predict…How much do you think someone would pay to remove ransomware from a pacemaker? The scenario is not too far-fetched; in fact, it is much more deadly. Of course, anyone launching an IoT ransomware attack will need to consider just *how* they will inform the device’s owner of their financial demands. That’s obvious on a laptop, but presents more of a challenge on a pacemaker unless the attacker has also managed to determine, say, their victim’s email address.
  • #16: DOS is one more problem in IOT.
  • #18: May be nothing. May be the hacker gets to know how many eggs u have, or how much milk u drink. Or simply gets to know that are not home. But think it like this, what if one day the CBI comes knocking at ur door telling that ur fridge is being used for sending threatening emails to the Prime Minister of India. We all know about bots & botnets…what if the attacker turns ur fridge into a bot to do DOS Attacks on other networks. Now why is all this happening….can’t we make these smart devices smart enough to be secure. What is stopping us to make IOT Secure. It’s the Resource Constraints.
  • #19: Any typical IOT deployment would look like this. Sensors in field, Aggregators & gateways in premise Then IoT data platform which can be both in-premise or in cloud. & finally the Analytics platform in cloud… But as we move from the cloud to the fog to the field...the first iot security challenge we face is the resource contraint problem... And by resources i mean, limited CPU, limited memory in KBs, limited power, etc. And because of that, Implementing Crytographic encryption..Impmenting AV on field devices is a big challenge. Like implementing a light encryption scheme on a pacemaker could decrease its battery life from about a decade to as little as a few years because the device is not designed to sustain those operations. The more resource intensive the encryption, the more dire the situation.
  • #20: The 2nd IOT Security Challenge the rapidly expanding IOT Attack Surface, The STRIDE Threat Vectors Attacks are getting innovatve day by day, bt they can be classified amon these 6 buckets. S - Hoc can we kno we are talking to the right device. PKI T – Data is not tampered before it is sent to the aggregator or the cloud. Re calibrated by replacing with firmware. R - No logs are stored. How can we verify later if something malicious is done from some device. Cyber forensics on IoT I – Data Sent through radio waves without encryption..who know’s whos collecting this data. D – IOT is all about The right data at the right time. E – Target Hack - Forward facing from internet only
  • #21: We need to understand the difference b/w Security, Privacy & Anonymity because these 3 terms are very much related & often confusing.
  • #22: If u see, there’s no silver bullet that can effectively mitigate all IOT threats. We can’t apply Security by Obscurity principles in IOT. We can’t say our IOT product is secure because it uses propreitary protocols, indigenous hardware or air-gapped networks. We need to think security by design. And security can not be an afterthought. It has to considered & implemented in all of theses stages. Lot of research is going on in various parts of the world\ regarding. How to bootstrap trust and security, from the very basic Design stage. Powerful Systems on a Chip (SOC) with embedding hardware security support l Elliptic Curve Cryptography with reduced computational demands To Address there threats IOT Business Model has to change…Earlier we used to build product, ship them and forget about them until we had to service them, but now in the world of IOT we have to ship and remember. Remember where are our devices and wat they doing that they shouldn’t.
  • #23: Next, We need to understand the delicate balance of speed to market and the appropriate level of security. We should atleast pick two. One more thing I would like to highlight here is: To Address IOT threats, IOT Business Model has to change…Earlier we used to build product, ship them and forget about them until we had to service them, but now in the world of IOT we have to ship and remember. Remember where are our devices and wat they doing that they shouldn’t.
  • #24: I believe in Amara’s law, We tend to Overstimate technology in the short run and Understimate the impact of it on the long run.
  • #25: Thank you all.