SlideShare a Scribd company logo
IoT
(Internet of
Things)
Security
Sanjay Kumar
Information Security Specialist
sanjay1519841 [at] gmail [dot] com
NULL/OWASP Delhi meet on 20th
June 2015
Agenda
• What is IoT (Internet of Things)?
• Threat Agents & Attack Vectors
• Security Weaknesses
• Technical Impacts
• Business Impacts
• OWASP Top 10 2014 for IOT
Introduction
The Internet of Things (IoT) refers to the ever-growing 
network of physical objects that feature an IP address for 
internet connectivity, and the communication that occurs 
between these objects and other Internet-enabled devices 
and systems.
Ubiquitous
Gartner: “IoT Installed Base Will Grow to 26
Billion Units By 2020.”  That number might be
too low.
•Every 
Auto
•Every Mobile
•Every Door
•Every Room

Every sensor in
any device

Could be in
bracelet

in every home,
office, building
or hospital room
…

in every city and
village ... on
Earth ...

Every sensor in
any device

Could be in
bracelet

in every home,
office, building
or hospital room
…

in every city and
village ... on
Earth ...
IoT Security by Sanjay Kumar
IoT devices which could be vulnerable
Thermostat
To control home/office temperature
Assigned with IP
Watches and fitness monitors
Expose Personal Health Data
IoT devices which could be vulnerable
• Smart Cars
• Wireless Pacemaker & other implanted
device for monitoring health
• Biometrics
IoT devices which could be vulnerable
• The Internet of Things Device
• The Cloud
• The Mobile Application
• The Network Interfaces
• The Software
• Use of Encryption
• Use of Authentication
• Physical Security
• USB ports
All elements need to be
considered
OWASP Top 10
1. Insecure Web Interface
2. Insufficient Authentication/Authorization
3. Insecure Network Services
4. Lack of Transport Encryption
5. Privacy Concerns
6. Insecure Clould Interface
7. Insecure Mobile Interface
8. Insufficient Security Configurability
9. Insecure Software/Firmware
10.Poor Physical Security
1- Insecure Web
Interface
Checklist for
Insecure Web Interface
• Account Enumeration
• Weak Default
Credentials
• Credentials Exposed in
Network Traffic
• Cross-site Scripting
(XSS)
• SQL-Injection
• Session Management
• Account Lockout
2- Insufficient
Authentication/Authorization
Checklist
• Lack of Password Complexity
• Poorly Protected Credentials
• Lack of Two Factor Authentication
• Insecure Password Recovery
• Privilege Escalation
• Lack of Role Based Access Control
3- Insecure Network
Services
Checklist
• Vulnerable Services
• Buffer Overflow
• Open Ports via UPnP
• Exploitable UDP Services
• Denial-of-Service
• DoS via Network Device Fuzzing
4- Lack of Transport
Encryption
Checklist
• Unencrypted Services via the Internet
• Unencrypted Services via the Local
Network
• Poorly Implemented SSL/TLS
• Misconfigured SSL/TLS
5-Privacy Concerns
Checklist
• Collection of Unnecessary Personal
Information
6- Insecure Cloud
Interface
Checklist
• Account Enumeration
• No Account Lockout
• Credentials Exposed in Network Traffic
7-Insecure Mobile
Interface
Checklist
• Account Enumeration
• No Account Lockout
• Credentials Exposed in Network Traffic
8- Insufficient Security
Configurability
Checklist
• Lack of Granular Permission Model
• Lack of Password Security Options
• No Security Monitoring
• No Security Logging
9- Insecure
Software/Firmware
Checklist
• Encryption Not Used to Fetch Updates
• Update File not Encrypted
• Update Not Verified before Upload
• Firmware Contains Sensitive Information
• No Obvious Update Functionality
10-Poor Physical
Security
Checklist
• Access to Software via USB Ports
• Removal of Storage Media
Thank You
Recommendation for IOT-
1
Recommendation for IOT-
2
Recommendation for IOT-
3
Recommendation for IOT-
4
Recommendation for IOT-
5
Recommendation for IOT-
6
Recommendation for IOT-
7
Recommendation for IOT-
8
Recommendation for IOT-
9
Recommendation for IOT-
10
Thank You

More Related Content

PPT
IoT security (Internet of Things)
PPTX
Iot Security
PPTX
Home Automation System using iot
PDF
IoT Networking
PPTX
Introduction to IoT Security
 
PPTX
Internet of Things (IOT)
PPTX
Home automation based iot
PPTX
iot based home automation
IoT security (Internet of Things)
Iot Security
Home Automation System using iot
IoT Networking
Introduction to IoT Security
 
Internet of Things (IOT)
Home automation based iot
iot based home automation

What's hot (20)

PPTX
Internet of things startup basic
PPTX
IoT security
PPTX
Internet of things
PDF
Security challenges in IoT
PPTX
security and privacy-Internet of things
PPTX
10 min IoT ppt
PPTX
Introduction to IOT
PDF
Fundamentals of IoT Security
PPTX
Internet of things (IoT)
PPTX
IoT Security Risks and Challenges
PPTX
PPTX
iot seminar topic
PPTX
Internet of Things(IoT) - Introduction and Research Areas for Thesis
PPTX
Iot architecture
PDF
IoT and m2m
PPTX
Iot Security, Internet of Things
PPTX
Internet of things (IoT)
PPTX
Internet of things (IoT) with Azure
PPTX
IoT Basics
Internet of things startup basic
IoT security
Internet of things
Security challenges in IoT
security and privacy-Internet of things
10 min IoT ppt
Introduction to IOT
Fundamentals of IoT Security
Internet of things (IoT)
IoT Security Risks and Challenges
iot seminar topic
Internet of Things(IoT) - Introduction and Research Areas for Thesis
Iot architecture
IoT and m2m
Iot Security, Internet of Things
Internet of things (IoT)
Internet of things (IoT) with Azure
IoT Basics
Ad

Viewers also liked (20)

PPTX
Security in IoT
PDF
Will Internet of Things (IoT) be secure enough?
PPTX
IoT Security Imperative: Stop your Fridge from Sending you Spam
PDF
IoT Security in Action - Boston Sept 2015
PDF
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
PDF
IoT Meets Security
PDF
UX and Security for the IoT
PPTX
IoT Security: Cases and Methods [CON5446]
PDF
IoT Security: How Your TV and Thermostat are Attacking the Internet
PDF
Internet of Things and Future Internet
PPTX
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
PDF
BKK16-200 Designing Security into low cost IO T Systems
PPTX
CLOUDIFICATION FOR INTERNET OF THINGS - THE ROAD AHEAD
PPTX
A survey in privacy and security in Internet of Things IOT
PDF
SN-Security Architecture for Mobile Computing and IoT
PDF
IoT Security Elements
PDF
Theinjurylawnews
PPS
سمینار آشنائی Ims
PDF
Civic sports
PDF
2013 AMA Symposium Presentation: Dartmouth Site Redevelopment
Security in IoT
Will Internet of Things (IoT) be secure enough?
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security in Action - Boston Sept 2015
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
IoT Meets Security
UX and Security for the IoT
IoT Security: Cases and Methods [CON5446]
IoT Security: How Your TV and Thermostat are Attacking the Internet
Internet of Things and Future Internet
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
BKK16-200 Designing Security into low cost IO T Systems
CLOUDIFICATION FOR INTERNET OF THINGS - THE ROAD AHEAD
A survey in privacy and security in Internet of Things IOT
SN-Security Architecture for Mobile Computing and IoT
IoT Security Elements
Theinjurylawnews
سمینار آشنائی Ims
Civic sports
2013 AMA Symposium Presentation: Dartmouth Site Redevelopment
Ad

Similar to IoT Security by Sanjay Kumar (20)

PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
PPTX
Null mumbai-iot top 10
PDF
Track 5 session 1 - st dev con 2016 - need for security for iot
PPTX
IoT-Device-Security-DRAFT-slide-presentation
PPTX
Spirent: The Internet of Things: The Expanded Security Perimeter
PPTX
IoT-Device-Security.pptx
PPTX
Big data, Security, or Privacy in IoT: Choice is Yours
PDF
Securing the Internet of Things
PDF
TOP 6 Security Challenges of Internet of Things
PDF
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
PDF
2 cyber security challenges in io t
PPTX
IoT in ITS: Network Impacts
PDF
Io t security defense in depth charles li v1 20180425c
PDF
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
PPTX
IoT World - creating a secure robust IoT reference architecture
PPTX
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
PPTX
IoT with overview and basic Presentation.pptx
PDF
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
PPTX
Fundamentals of Network security
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Null mumbai-iot top 10
Track 5 session 1 - st dev con 2016 - need for security for iot
IoT-Device-Security-DRAFT-slide-presentation
Spirent: The Internet of Things: The Expanded Security Perimeter
IoT-Device-Security.pptx
Big data, Security, or Privacy in IoT: Choice is Yours
Securing the Internet of Things
TOP 6 Security Challenges of Internet of Things
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
2 cyber security challenges in io t
IoT in ITS: Network Impacts
Io t security defense in depth charles li v1 20180425c
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
IoT World - creating a secure robust IoT reference architecture
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
IoT with overview and basic Presentation.pptx
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Fundamentals of Network security

More from OWASP Delhi (20)

PDF
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
PDF
Securing dns records from subdomain takeover
PDF
Effective Cyber Security Report Writing
PPTX
Data sniffing over Air Gap
PPTX
UDP Hunter
PDF
Demystifying Container Escapes
PPTX
Automating WAF using Terraform
PPTX
Actionable Threat Intelligence
PDF
Threat hunting 101 by Sandeep Singh
PPTX
Owasp top 10 vulnerabilities
PPTX
Recon with Nmap
PPTX
Securing AWS environments by Ankit Giri
PDF
DMARC Overview
PDF
Cloud assessments by :- Aakash Goel
PDF
Pentesting Rest API's by :- Gaurang Bhatnagar
ODP
Wireless security beyond password cracking by Mohit Ranjan
PDF
IETF's Role and Mandate in Internet Governance by Mohit Batra
PDF
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
PPTX
ICS Security 101 by Sandeep Singh
PDF
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Securing dns records from subdomain takeover
Effective Cyber Security Report Writing
Data sniffing over Air Gap
UDP Hunter
Demystifying Container Escapes
Automating WAF using Terraform
Actionable Threat Intelligence
Threat hunting 101 by Sandeep Singh
Owasp top 10 vulnerabilities
Recon with Nmap
Securing AWS environments by Ankit Giri
DMARC Overview
Cloud assessments by :- Aakash Goel
Pentesting Rest API's by :- Gaurang Bhatnagar
Wireless security beyond password cracking by Mohit Ranjan
IETF's Role and Mandate in Internet Governance by Mohit Batra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
ICS Security 101 by Sandeep Singh
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra

Recently uploaded (20)

PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
A Presentation on Artificial Intelligence
PPTX
Cloud computing and distributed systems.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Modernizing your data center with Dell and AMD
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Electronic commerce courselecture one. Pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
The AUB Centre for AI in Media Proposal.docx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
20250228 LYD VKU AI Blended-Learning.pptx
A Presentation on Artificial Intelligence
Cloud computing and distributed systems.
NewMind AI Weekly Chronicles - August'25 Week I
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
cuic standard and advanced reporting.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Modernizing your data center with Dell and AMD
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Electronic commerce courselecture one. Pdf
Network Security Unit 5.pdf for BCA BBA.
Agricultural_Statistics_at_a_Glance_2022_0.pdf

IoT Security by Sanjay Kumar

Editor's Notes

  • #4: The Internet of Things (IoT, sometimes Internet of Everything) is the network of physical objects or "things" embedded[1] with electronics, software, sensors[2] and connectivity to enable it to achieve greater value and service by exchanging data with the manufacturer, operator and/or other connected devices. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure. Experts estimate that the IoT will consist of almost 50 billion objects by 2020.[3] The term “Internet of Things” was first documented by a British visionary, Kevin Ashton, in 1999.[4] Typically, IoT is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications (M2M) and covers a variety of protocols, domains, and applications.[5] The interconnection of these embedded devices (including smart objects), is expected to usher in automation in nearly all fields, while also enabling advanced applications like a Smart Grid.[6] Things, in the IoT, can refer to a wide variety of devices such as heart monitoring implants, biochip transponders on farm animals, electric clams in coastal waters,[7] automobiles with built-in sensors, or field operation devices that assist fire-fighters in search and rescue.[8] These devices collect useful data with the help of various existing technologies and then autonomously flow the data between other devices.[9] Current market examples include smart thermostat systems and washer/dryers that utilize Wi-Fi for remote monitoring. A thing, in the Internet of Things, can be a person with a heart monitor implant, a farm animal with a biochip transponder, an automobile that has built-in sensors to alert the driver when tire pressure is low — or any other natural or man-made object that can be assigned an IP address and provided with the ability to transfer data over a network. So far, the Internet of Things has been most closely associated with machine-to-machine (M2M) communication in manufacturing and power, oil and gas utilities. Products built with M2M communication capabilities are often referred to as being smart.
  • #5: Every one of those sensor and control points is generating data. Often, it's very informative and very private data. Systems are needed to help those devices talk to each other, manage all that data, and enforce proper access control.
  • #7: The carefully-regulated climate in your office can conceal the fact that to criminals your data is hot. Remotely programmable thermostats are just as vulnerable to attack as anything else, particularly if you’re using a third-party contractor to manage the office HVAC system (a la Target’s breach). But even if it’s a company-managed remote thermostat, it’s probably not smart to leave the temperature-setting to just anyone, especially a hacker.
  • #8: Take a look at your co-workers’ wrists, and it’s likely that one of them is wearing a smart watch or a fitness monitor, like a FitBit or Garmin VivoFit. And while your co-workers are being reminded to walk around the office to stay in shape, the devices themselves – particularly if they’re syncing to the Internet via a device on your network or even using your company’s Wi-Fi – are making your security strategy flabby.
  • #9: Smart Cars: Bluetooth, Car Ignition, Aircondition Smart Biometrics: Attacker can get hack into the system and steal personal identities & also can feed his/her data into system to gain access Implanted Device: http://www.forbes.com/sites/singularity/2012/12/06/yes-you-can-hack-a-pacemaker-and-other-medical-devices-too/