SlideShare a Scribd company logo
Abhishek Dwivedi
Security from Begining of design
●Security at design phase not at the end phase
● Many of of the security issues overlooked at beginning are forgotten at the
end
● Many of the startups doesn’t give priority to security but just feature
complete. Even product owner are unaware about the depth of security to
be implemented.
● Though we can count security implementation in IoT in 1-2-3 but having it
in place is not so simple if not well thought at the beginning. Even lot of
investment may to on toss.
● There are many ways to bring it in based on budget, volume, and product
life.
Abhishek Dwivedi
Hardware Security
●Make use of secured memory for sensitive data, such as ARM trustZone
●Make use of security chip for holding TSL private keys
●Use only secure boot enabled embedded processors for having a tamper
proof SBC.
● Remove debug port/interfaces in production devices
Abhishek Dwivedi
Network Security
●Keep communication secured by cryptography. TLS is a common for this
purpose.
●Know the identity of the end node and edge.
●Where ever more threats are possible, keep the identity trusted. Instead of
having only TLS, have certificates as well in place. X.509 is being adopted
widely.
●Don’t connect to unsecure or loosely secured WiFi. High risk of man in
middle attack. Such as over WPA2.
Abhishek Dwivedi
Security at software
●Sandbox apps running on OS. Such as flatpack, snappy.
●Keep kernel level security enabled and enforced on Linux based OS. MAC
and DAC enabled. Limit the access by right policy, don’t overlook while
writing the access policy configuration.
●Regular patch, specially security patches.
●Wherever possible have OTA in place for immediately resolve found
issues.
Abhishek Dwivedi
Identity and Role based administration
●Have bookkeeping of identity of edge/node type and specific role.
●Implement device activity analytics service at device and cloud.
●Blacklisting of suspicious activity on immediate and analyze after from
secure admin tunnel at the highest priority.
Abhishek Dwivedi
Proven examples of security breaches
●Remote code execution and having root level privilege in device.
●DirtyCOW, a very much famous bug in kernel got fixed in recent in Kernel.
●In SSH, race condition letting root access.
Abhishek Dwivedi
Thank you!!
This is just brief. Each topic has options and details.
Abhishek Dwivedi

More Related Content

PPTX
Firmware analysis 101
PDF
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
PDF
Beginners guide on how to start exploring IoT 2nd session
PPTX
Io t slides_iotvillage
PDF
Web Application Detection with SNORT
PDF
Embedded government espionage
PDF
Threat Hunting with Cyber Kill Chain
PDF
Symantec Freak Vulnerability Infographic
Firmware analysis 101
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
Beginners guide on how to start exploring IoT 2nd session
Io t slides_iotvillage
Web Application Detection with SNORT
Embedded government espionage
Threat Hunting with Cyber Kill Chain
Symantec Freak Vulnerability Infographic

What's hot (20)

PDF
Loc jack presentation
PPTX
VenkaSure Total Security+
PPT
Ict encryption agt_fabio_pietrosanti
PPT
Module5 desktop-laptop-security-b
PDF
How to be come a hacker slide for 2600 laos
PPTX
The Next Generation of Phishing
PPTX
Attack presentation
PDF
Blackhat USA Mobile Security Panel 2011
PPTX
Webinar On Ethical Hacking & Cybersecurity - Day2
PPTX
Frida - Objection Tool Usage
PDF
PDF
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
PDF
Digital self defense
PDF
When the internet bleeded : RootConf 2014
PDF
Datashur Presentation pin flash drive - Kingfin
PPT
Linux security-fosster-09
PDF
Internet of secure things
PDF
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
DOCX
Snort Intrusion Detection / Prevention System on PFSense Firewall
PPTX
Essential security for linux servers
Loc jack presentation
VenkaSure Total Security+
Ict encryption agt_fabio_pietrosanti
Module5 desktop-laptop-security-b
How to be come a hacker slide for 2600 laos
The Next Generation of Phishing
Attack presentation
Blackhat USA Mobile Security Panel 2011
Webinar On Ethical Hacking & Cybersecurity - Day2
Frida - Objection Tool Usage
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Digital self defense
When the internet bleeded : RootConf 2014
Datashur Presentation pin flash drive - Kingfin
Linux security-fosster-09
Internet of secure things
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Snort Intrusion Detection / Prevention System on PFSense Firewall
Essential security for linux servers
Ad

Similar to IoT security (20)

PPTX
Fundamental Best Practices in Secure IoT Product Development
PDF
Security for the IoT - Report Summary
PDF
Track 5 session 1 - st dev con 2016 - need for security for iot
PDF
Building security into the internetofthings
PDF
IoT Security and Privacy Considerations
PDF
Navigating the Complexities of IoT Security_ Best Practices
PPTX
Emerging Trends in Cybersecurity by Amar Prusty
PDF
Module 6.Security in Evolving Technology
PPTX
Security Testing for IoT Systems
PDF
Lecture 7 - Security
PDF
Considerations for a secure internet of things for cities and communities
PDF
Securing Startups
PPTX
LAS16-300K2: Geoff Thorpe - IoT Zephyr
PPTX
Hugo Fiennes - Security and the IoT - Electric Imp
PDF
Broken by design (Danny Fullerton)
PPTX
Practical approaches to IoT security
PDF
Host-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
PDF
Host-based Security
PDF
Top 10 IT Security Issues 2011
Fundamental Best Practices in Secure IoT Product Development
Security for the IoT - Report Summary
Track 5 session 1 - st dev con 2016 - need for security for iot
Building security into the internetofthings
IoT Security and Privacy Considerations
Navigating the Complexities of IoT Security_ Best Practices
Emerging Trends in Cybersecurity by Amar Prusty
Module 6.Security in Evolving Technology
Security Testing for IoT Systems
Lecture 7 - Security
Considerations for a secure internet of things for cities and communities
Securing Startups
LAS16-300K2: Geoff Thorpe - IoT Zephyr
Hugo Fiennes - Security and the IoT - Electric Imp
Broken by design (Danny Fullerton)
Practical approaches to IoT security
Host-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
Host-based Security
Top 10 IT Security Issues 2011
Ad

Recently uploaded (20)

PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
Abrasive, erosive and cavitation wear.pdf
PPTX
Current and future trends in Computer Vision.pptx
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPT
Occupational Health and Safety Management System
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PDF
Soil Improvement Techniques Note - Rabbi
PPTX
Fundamentals of Mechanical Engineering.pptx
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPT
introduction to datamining and warehousing
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
R24 SURVEYING LAB MANUAL for civil enggi
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
Abrasive, erosive and cavitation wear.pdf
Current and future trends in Computer Vision.pptx
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Automation-in-Manufacturing-Chapter-Introduction.pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Occupational Health and Safety Management System
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
Soil Improvement Techniques Note - Rabbi
Fundamentals of Mechanical Engineering.pptx
Fundamentals of safety and accident prevention -final (1).pptx
III.4.1.2_The_Space_Environment.p pdffdf
introduction to datamining and warehousing

IoT security

  • 2. Security from Begining of design ●Security at design phase not at the end phase ● Many of of the security issues overlooked at beginning are forgotten at the end ● Many of the startups doesn’t give priority to security but just feature complete. Even product owner are unaware about the depth of security to be implemented. ● Though we can count security implementation in IoT in 1-2-3 but having it in place is not so simple if not well thought at the beginning. Even lot of investment may to on toss. ● There are many ways to bring it in based on budget, volume, and product life. Abhishek Dwivedi
  • 3. Hardware Security ●Make use of secured memory for sensitive data, such as ARM trustZone ●Make use of security chip for holding TSL private keys ●Use only secure boot enabled embedded processors for having a tamper proof SBC. ● Remove debug port/interfaces in production devices Abhishek Dwivedi
  • 4. Network Security ●Keep communication secured by cryptography. TLS is a common for this purpose. ●Know the identity of the end node and edge. ●Where ever more threats are possible, keep the identity trusted. Instead of having only TLS, have certificates as well in place. X.509 is being adopted widely. ●Don’t connect to unsecure or loosely secured WiFi. High risk of man in middle attack. Such as over WPA2. Abhishek Dwivedi
  • 5. Security at software ●Sandbox apps running on OS. Such as flatpack, snappy. ●Keep kernel level security enabled and enforced on Linux based OS. MAC and DAC enabled. Limit the access by right policy, don’t overlook while writing the access policy configuration. ●Regular patch, specially security patches. ●Wherever possible have OTA in place for immediately resolve found issues. Abhishek Dwivedi
  • 6. Identity and Role based administration ●Have bookkeeping of identity of edge/node type and specific role. ●Implement device activity analytics service at device and cloud. ●Blacklisting of suspicious activity on immediate and analyze after from secure admin tunnel at the highest priority. Abhishek Dwivedi
  • 7. Proven examples of security breaches ●Remote code execution and having root level privilege in device. ●DirtyCOW, a very much famous bug in kernel got fixed in recent in Kernel. ●In SSH, race condition letting root access. Abhishek Dwivedi
  • 8. Thank you!! This is just brief. Each topic has options and details. Abhishek Dwivedi