The Home Security: Internet of
Things Paradox
Presented by: Golden LocksmithSurvey by: HP
Is home
security
really
secure?
Gartner, Ins.
Forecasts that 4.9
billion connected
things will be in
use in 2015, up 30
percent from
2014, and will
reach 25 billion by
2020.
Deficiencies Include:
 Authentication
 Authorization
 Cloud Interfaces
 Mobile Interfaces
 Privacy
The Internet of things paradox
Vulnerable To Account Harvesting
 Unrestricted account enumeration: The ability to determine
whether a specific account is valid on a system.
 Weak Password Policy: The lack of a policy and/or the presence of
a weak policy.
 Lack of account lockout mechanism: The failure to lock out an
account after a certail number of failed access attempts.
Account Harvesting is exacerbated when
video access is granted to additional
users such as family members or
neighbors.
Top 5 Vulnerable Categories Identified
 Privacy (100%) – raised privacy concerns regarding the collection of names, addresses,
dates of birth, phone numbers, and even credit card numbers. Video image leaks are also
an area of concern.
 Authorization (100%) – an attacker can use vulnerabilities such as weak passwords, insecure
password recovery mechanisms, and poorly protected credentials to gain access to a
system.
 Insecure Cloud (70%) – cloud-based web interfaces exhibit account enumeration concerns.
 Insecure Mobile (50%) have enumeration concerns with their mobile application interface.
 Insecure software/fireware (60%) – did not include obvious update capabilities
Are You The Only One Monitoring Your Home?
If video streaming is available through a cloud-based
web or mobile application interface, then video can be
viewed by an internet-based attacker from hacked
accounts anywhere in the world.
Three Action To Mitigate Risks
 Include
security in
feature
considerations
when
evaluating
potential IoT
product
purchases
 Avoid using
system defaults
for usernames
and passwords
whenever
possible, and
choose good
passwords,
when the option
is available.
 Don’t share
account access
with anyone
outside your
immediate
family and stress
secure password
practices with
those who have
access.
The Federal Trade Commission (FTC)
recommends that IoT device manufactures
incorporate security into the design of
connected products.

More Related Content

PDF
Why Your Mobile Device Isn’t As Secure As You Think
PDF
Mobile app security
PDF
Ensuring Mobile Device Security
PPTX
Mobile security
PPTX
Mobile Security Research Projects Help
PDF
CyberSecurity - UH IEEE Presentation 2015-04
PDF
Android security a survey of issues, malware penetration, and defenses
PDF
Security and Your Business
Why Your Mobile Device Isn’t As Secure As You Think
Mobile app security
Ensuring Mobile Device Security
Mobile security
Mobile Security Research Projects Help
CyberSecurity - UH IEEE Presentation 2015-04
Android security a survey of issues, malware penetration, and defenses
Security and Your Business

What's hot (20)

PPTX
Ms810 assignment viruses and malware affecting moblie devices
PPTX
Threats of Public Wi-Fi
PPTX
Cyber Security - Moving Past "Best Practices"
PPTX
Authentication service security
PPTX
CYBER SECURITY
PDF
NormShield 2018 Cyber Security Risk Brief
PPTX
Mobile security
PPTX
Mobile security
PDF
Top Seven Risks of Enterprise Mobility - How to protect your business
PDF
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)
PDF
Mobile Security: The 5 Questions Modern Organizations Are Asking
PDF
Cybersecurity Series - Cyber Defense for Internal Auditors
PDF
The Seven Kinds of Security
PPTX
Mobile security
PPTX
Digital Security
PPTX
Gaining A Foothold
PPTX
How Does a Data Breach Happen?
PPTX
Mobile security in Cyber Security
PPTX
Cyber security awareness for end users
PPTX
Cyber security
Ms810 assignment viruses and malware affecting moblie devices
Threats of Public Wi-Fi
Cyber Security - Moving Past "Best Practices"
Authentication service security
CYBER SECURITY
NormShield 2018 Cyber Security Risk Brief
Mobile security
Mobile security
Top Seven Risks of Enterprise Mobility - How to protect your business
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)
Mobile Security: The 5 Questions Modern Organizations Are Asking
Cybersecurity Series - Cyber Defense for Internal Auditors
The Seven Kinds of Security
Mobile security
Digital Security
Gaining A Foothold
How Does a Data Breach Happen?
Mobile security in Cyber Security
Cyber security awareness for end users
Cyber security
Ad

Similar to The Internet of things paradox (20)

PDF
Unicom Conference - Mobile Application Security
PDF
Cybersecurity Practices to Adopt in 2025_ An All-inclusive Guide for Business...
PDF
LIFT OFF 2017: IoT and MSS Deep Dive
PPTX
itmsday2.pptx
PDF
Cn35499502
PDF
Guide Preview: Ensuring your enterprise image-viewer if fully secure
PDF
3 steps security
PDF
Sholove cyren web security - technical datasheet2
PPTX
Can your company survive a modern day cyber attack?
PDF
Evolutionand impactofhiddenmobilethreats wandera
PPTX
Mobile Payments: Protecting Apps and Data from Emerging Risks
PPTX
"IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016
PDF
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
PPTX
Cyber Security PPT.pptx
PDF
Mobile Security: 5 Steps to Mobile Risk Management
PPTX
Accellion - The European Information Security Summit, London
PDF
Multi Factor Authentication Whitepaper Arx - Intellect Design
PDF
Security attacks taxonomy on
PDF
4514ijmnct01
PDF
An Identity Crisis at the Center of Every IoT Product
Unicom Conference - Mobile Application Security
Cybersecurity Practices to Adopt in 2025_ An All-inclusive Guide for Business...
LIFT OFF 2017: IoT and MSS Deep Dive
itmsday2.pptx
Cn35499502
Guide Preview: Ensuring your enterprise image-viewer if fully secure
3 steps security
Sholove cyren web security - technical datasheet2
Can your company survive a modern day cyber attack?
Evolutionand impactofhiddenmobilethreats wandera
Mobile Payments: Protecting Apps and Data from Emerging Risks
"IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
Cyber Security PPT.pptx
Mobile Security: 5 Steps to Mobile Risk Management
Accellion - The European Information Security Summit, London
Multi Factor Authentication Whitepaper Arx - Intellect Design
Security attacks taxonomy on
4514ijmnct01
An Identity Crisis at the Center of Every IoT Product
Ad

More from Golden Locksmith (7)

PPT
Troubleshoot and fixing a deadbolt
PPTX
Your 17 diy home security essentials
PPTX
Most common auto security mistakes
PPTX
Is your home at the gun point of burglars?
PPTX
Is your home at the gun point of burglars?
PPTX
2014’s biggest winners and losers in privacy and security
PPTX
How to Reinforce a door during installation
Troubleshoot and fixing a deadbolt
Your 17 diy home security essentials
Most common auto security mistakes
Is your home at the gun point of burglars?
Is your home at the gun point of burglars?
2014’s biggest winners and losers in privacy and security
How to Reinforce a door during installation

Recently uploaded (20)

PDF
Complications of Minimal Access-Surgery.pdf
PDF
semiconductor packaging in vlsi design fab
PDF
HVAC Specification 2024 according to central public works department
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PPTX
Education and Perspectives of Education.pptx
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
PDF
Journal of Dental Science - UDMY (2021).pdf
PDF
Race Reva University – Shaping Future Leaders in Artificial Intelligence
PDF
Empowerment Technology for Senior High School Guide
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Complications of Minimal Access-Surgery.pdf
semiconductor packaging in vlsi design fab
HVAC Specification 2024 according to central public works department
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
Education and Perspectives of Education.pptx
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
Journal of Dental Science - UDMY (2021).pdf
Race Reva University – Shaping Future Leaders in Artificial Intelligence
Empowerment Technology for Senior High School Guide
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
FORM 1 BIOLOGY MIND MAPS and their schemes
Unit 4 Computer Architecture Multicore Processor.pptx
AI-driven educational solutions for real-life interventions in the Philippine...
B.Sc. DS Unit 2 Software Engineering.pptx
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
Share_Module_2_Power_conflict_and_negotiation.pptx
Uderstanding digital marketing and marketing stratergie for engaging the digi...
Introduction to pro and eukaryotes and differences.pptx
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...

The Internet of things paradox

  • 1. The Home Security: Internet of Things Paradox Presented by: Golden LocksmithSurvey by: HP Is home security really secure?
  • 2. Gartner, Ins. Forecasts that 4.9 billion connected things will be in use in 2015, up 30 percent from 2014, and will reach 25 billion by 2020. Deficiencies Include:  Authentication  Authorization  Cloud Interfaces  Mobile Interfaces  Privacy
  • 4. Vulnerable To Account Harvesting  Unrestricted account enumeration: The ability to determine whether a specific account is valid on a system.  Weak Password Policy: The lack of a policy and/or the presence of a weak policy.  Lack of account lockout mechanism: The failure to lock out an account after a certail number of failed access attempts.
  • 5. Account Harvesting is exacerbated when video access is granted to additional users such as family members or neighbors.
  • 6. Top 5 Vulnerable Categories Identified  Privacy (100%) – raised privacy concerns regarding the collection of names, addresses, dates of birth, phone numbers, and even credit card numbers. Video image leaks are also an area of concern.  Authorization (100%) – an attacker can use vulnerabilities such as weak passwords, insecure password recovery mechanisms, and poorly protected credentials to gain access to a system.  Insecure Cloud (70%) – cloud-based web interfaces exhibit account enumeration concerns.  Insecure Mobile (50%) have enumeration concerns with their mobile application interface.  Insecure software/fireware (60%) – did not include obvious update capabilities
  • 7. Are You The Only One Monitoring Your Home? If video streaming is available through a cloud-based web or mobile application interface, then video can be viewed by an internet-based attacker from hacked accounts anywhere in the world.
  • 8. Three Action To Mitigate Risks  Include security in feature considerations when evaluating potential IoT product purchases  Avoid using system defaults for usernames and passwords whenever possible, and choose good passwords, when the option is available.  Don’t share account access with anyone outside your immediate family and stress secure password practices with those who have access.
  • 9. The Federal Trade Commission (FTC) recommends that IoT device manufactures incorporate security into the design of connected products.