SlideShare a Scribd company logo
IOT
(Internet of
Things)
Security
Sanjay Kumar
Information Security Specialist
sanjay1519841 [at] gmail [dot] com
NULL/OWASP DELHI meet on 20th
June 2015
Agenda
• What is IoT (Internet of Things)?
• Threat Agents & Attack Vectors
• Security Weaknesses
• Technical Impacts
• Business Impacts
• OWASP Top 10 2014 for IOT
Introduction
The Internet of Things (IoT) refers to the ever-growing 
network of physical objects that feature an IP address for 
internet connectivity, and the communication that occurs 
between these objects and other Internet-enabled devices 
and systems.
Ubiquitous
Gartner: “IoT Installed Base Will Grow to 26
Billion Units By 2020.”  That number might be
too low.
•Every 
Auto
•Every Mobile
•Every Door
•Every Room

Every sensor in
any device

Could be in
bracelet

in every home,
office, building
or hospital room
…

in every city and
village ... on
Earth ...

Every sensor in
any device

Could be in
bracelet

in every home,
office, building
or hospital room
…

in every city and
village ... on
Earth ...
IoT security (Internet of Things)
IOT devices which could be vulnerable
Thermostat
To control home/office temperature
Assigned with IP
Watches and fitness monitors
Expose Personal Health Data
IOT devices which could be vulnerable
• Smart Cars
• Wireless Pacemaker & other implanted
device for monitoring health
• Biometrics
IOT devices which could be vulnerable
• The Internet of Things Device
• The Cloud
• The Mobile Application
• The Network Interfaces
• The Software
• Use of Encryption
• Use of Authentication
• Physical Security
• USB ports
All elements need to be
considered
OWASP Top 10
1. Insecure Web Interface
2. Insufficient Authentication/Authorization
3. Insecure Network Services
4. Lack of Transport Encryption
5. Privacy Concerns
6. Insecure Clould Interface
7. Insecure Mobile Interface
8. Insufficient Security Configurability
9. Insecure Software/Firmware
10.Poor Physical Security
1- Insecure Web
Interface
Checklist for
Insecure Web Interface
• Account Enumeration
• Weak Default Credentials
• Credentials Exposed in Network Traffic
• Cross-site Scripting (XSS)
• SQL-Injection
• Session Management
• Account Lockout
2- Insufficient
Authentication/Authorization
Checklist
• Lack of Password Complexity
• Poorly Protected Credentials
• Lack of Two Factor Authentication
• Insecure Password Recovery
• Privilege Escalation
• Lack of Role Based Access Control
3- Insecure Network
Services
Checklist
• Vulnerable Services
• Buffer Overflow
• Open Ports via UPnP
• Exploitable UDP Services
• Denial-of-Service
• DoS via Network Device Fuzzing
*UPnP: Universal Plug and Play (UPnP) is a set of networking protocols that permits networked
devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile
devices to seamlessly discover each other's presence on the network and establish functional
network services for data sharing.
4- Lack of Transport
Encryption
Checklist
• Unencrypted Services via the Internet
• Unencrypted Services via the Local
Network
• Poorly Implemented SSL/TLS
• Misconfigured SSL/TLS
5-Privacy Concerns
Checklist
• Collection of Unnecessary Personal
Information
6- Insecure Cloud
Interface
Checklist
• Account Enumeration
• No Account Lockout
• Credentials Exposed in Network Traffic
7-Insecure Mobile
Interface
Checklist
• Account Enumeration
• No Account Lockout
• Credentials Exposed in Network Traffic
8- Insufficient Security
Configurability
Checklist
• Lack of Granular Permission Model
• Lack of Password Security Options
• No Security Monitoring
• No Security Logging
9- Insecure
Software/Firmware
Checklist
• Encryption Not Used to Fetch Updates
• Update File not Encrypted
• Update Not Verified before Upload
• Firmware Contains Sensitive Information
• No Obvious Update Functionality
10-Poor Physical
Security
Checklist
• Access to Software via USB Ports
• Removal of Storage Media
Recommendation for IOT-
1
Recommendation for IOT-
2
Recommendation for IOT-
3
Recommendation for IOT-
4
Recommendation for IOT-
5
Recommendation for IOT-
6
Recommendation for IOT-
7
Recommendation for IOT-
8
Recommendation for IOT-
9
Recommendation for IOT-
10
Thank You

More Related Content

PPTX
Introduction to IoT Security
 
PPTX
Security in IoT
PPTX
Presentation on IOT SECURITY
PDF
IOT Security
PPTX
IoT security
PPTX
Malware ppt
PPT
Network Intrusion Detection System Using Snort
Introduction to IoT Security
 
Security in IoT
Presentation on IOT SECURITY
IOT Security
IoT security
Malware ppt
Network Intrusion Detection System Using Snort

What's hot (20)

PPTX
Iot(security)
PPTX
Iot Security, Internet of Things
PDF
Fundamentals of IoT Security
PDF
IoT and m2m
PPTX
Packet sniffers
PPTX
Network security
PPTX
PDF
Security challenges in IoT
PPTX
Iot Security
PDF
IoT Networking
PPTX
security and privacy-Internet of things
PPTX
Intrusion detection
 
PPTX
IOT privacy and Security
PPTX
Cyber Security in Society
PPTX
Mobile security
PPT
IDS and IPS
PDF
Basics of Cyber Security
PPTX
IoT Security
PPTX
IoT - Attacks and Solutions
PPT
Cyber Crime and Security
Iot(security)
Iot Security, Internet of Things
Fundamentals of IoT Security
IoT and m2m
Packet sniffers
Network security
Security challenges in IoT
Iot Security
IoT Networking
security and privacy-Internet of things
Intrusion detection
 
IOT privacy and Security
Cyber Security in Society
Mobile security
IDS and IPS
Basics of Cyber Security
IoT Security
IoT - Attacks and Solutions
Cyber Crime and Security
Ad

Viewers also liked (12)

PDF
The 5 elements of IoT security
PDF
Internet of Things - Privacy and Security issues
PDF
Overview of IoT and Security issues
PDF
Security in the Internet of Things
PPTX
Security for iot and cloud aug 25b 2017
PPT
IoT Security – Executing an Effective Security Testing Process
PPTX
Internet of things security challenges
PPTX
Fog computing
PPTX
fog computing ppt
PPTX
FOG COMPUTING
PPTX
Introduction of Cloud computing
PPTX
cloud computing ppt
The 5 elements of IoT security
Internet of Things - Privacy and Security issues
Overview of IoT and Security issues
Security in the Internet of Things
Security for iot and cloud aug 25b 2017
IoT Security – Executing an Effective Security Testing Process
Internet of things security challenges
Fog computing
fog computing ppt
FOG COMPUTING
Introduction of Cloud computing
cloud computing ppt
Ad

Similar to IoT security (Internet of Things) (20)

PPT
IoT Security by Sanjay Kumar
PPTX
Null mumbai-iot top 10
PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
PPTX
Internet of things
PPTX
Iot final
PPTX
IOT- UNIT-1.pptx
PDF
IT to IOT Evolution
PDF
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
PPTX
Emerging Technology Chapter 4 internets of things
PPTX
IoT-Device-Security-DRAFT-slide-presentation
PPT
1_Introduction to IoT_Basic Terminologies.ppt
PDF
IOT Notes Unit 1.pdf Internet of Things
PDF
TOP 6 Security Challenges of Internet of Things
PPTX
IoT in ITS: Network Impacts
PPTX
PPTX
Internet of Things Basics and its protocols
PPTX
IoT-Device-Security.pptx
PPTX
Spirent: The Internet of Things: The Expanded Security Perimeter
PPTX
IoT PPT introduction to internet of things
IoT Security by Sanjay Kumar
Null mumbai-iot top 10
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Internet of things
Iot final
IOT- UNIT-1.pptx
IT to IOT Evolution
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Emerging Technology Chapter 4 internets of things
IoT-Device-Security-DRAFT-slide-presentation
1_Introduction to IoT_Basic Terminologies.ppt
IOT Notes Unit 1.pdf Internet of Things
TOP 6 Security Challenges of Internet of Things
IoT in ITS: Network Impacts
Internet of Things Basics and its protocols
IoT-Device-Security.pptx
Spirent: The Internet of Things: The Expanded Security Perimeter
IoT PPT introduction to internet of things

Recently uploaded (20)

PDF
Testing WebRTC applications at scale.pdf
PPTX
SAP Ariba Sourcing PPT for learning material
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
Digital Literacy And Online Safety on internet
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
Funds Management Learning Material for Beg
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
artificial intelligence overview of it and more
Testing WebRTC applications at scale.pdf
SAP Ariba Sourcing PPT for learning material
Design_with_Watersergyerge45hrbgre4top (1).ppt
introduction about ICD -10 & ICD-11 ppt.pptx
Job_Card_System_Styled_lorem_ipsum_.pptx
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Digital Literacy And Online Safety on internet
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Tenda Login Guide: Access Your Router in 5 Easy Steps
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
SASE Traffic Flow - ZTNA Connector-1.pdf
QR Codes Qr codecodecodecodecocodedecodecode
Slides PDF The World Game (s) Eco Economic Epochs.pdf
An introduction to the IFRS (ISSB) Stndards.pdf
Funds Management Learning Material for Beg
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PptxGenJS_Demo_Chart_20250317130215833.pptx
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
artificial intelligence overview of it and more

IoT security (Internet of Things)

Editor's Notes

  • #4: The Internet of Things (IoT, sometimes Internet of Everything) is the network of physical objects or "things" embedded[1] with electronics, software, sensors[2] and connectivity to enable it to achieve greater value and service by exchanging data with the manufacturer, operator and/or other connected devices. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure. Experts estimate that the IoT will consist of almost 50 billion objects by 2020.[3] The term “Internet of Things” was first documented by a British visionary, Kevin Ashton, in 1999.[4] Typically, IoT is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications (M2M) and covers a variety of protocols, domains, and applications.[5] The interconnection of these embedded devices (including smart objects), is expected to usher in automation in nearly all fields, while also enabling advanced applications like a Smart Grid.[6] Things, in the IoT, can refer to a wide variety of devices such as heart monitoring implants, biochip transponders on farm animals, electric clams in coastal waters,[7] automobiles with built-in sensors, or field operation devices that assist fire-fighters in search and rescue.[8] These devices collect useful data with the help of various existing technologies and then autonomously flow the data between other devices.[9] Current market examples include smart thermostat systems and washer/dryers that utilize Wi-Fi for remote monitoring. A thing, in the Internet of Things, can be a person with a heart monitor implant, a farm animal with a biochip transponder, an automobile that has built-in sensors to alert the driver when tire pressure is low — or any other natural or man-made object that can be assigned an IP address and provided with the ability to transfer data over a network. So far, the Internet of Things has been most closely associated with machine-to-machine (M2M) communication in manufacturing and power, oil and gas utilities. Products built with M2M communication capabilities are often referred to as being smart.
  • #5: Every one of those sensor and control points is generating data. Often, it's very informative and very private data. Systems are needed to help those devices talk to each other, manage all that data, and enforce proper access control.
  • #7: The carefully-regulated climate in your office can conceal the fact that to criminals your data is hot. Remotely programmable thermostats are just as vulnerable to attack as anything else, particularly if you’re using a third-party contractor to manage the office HVAC system (a la Target’s breach). But even if it’s a company-managed remote thermostat, it’s probably not smart to leave the temperature-setting to just anyone, especially a hacker.
  • #8: Take a look at your co-workers’ wrists, and it’s likely that one of them is wearing a smart watch or a fitness monitor, like a FitBit or Garmin VivoFit. And while your co-workers are being reminded to walk around the office to stay in shape, the devices themselves – particularly if they’re syncing to the Internet via a device on your network or even using your company’s Wi-Fi – are making your security strategy flabby.
  • #9: Smart Cars: Bluetooth, Car Ignition, Aircondition Smart Biometrics: Attacker can get hack into the system and steal personal identities & also can feed his/her data into system to gain access Implanted Device: http://www.forbes.com/sites/singularity/2012/12/06/yes-you-can-hack-a-pacemaker-and-other-medical-devices-too/