SlideShare a Scribd company logo
IoT Security
IoT Security
Narudom Roongsiriwong, CISSP
Narudom Roongsiriwong, CISSP
November 8, 2017
November 8, 2017
WhoAmI
● Lazy Blogger
– Japan, Security, FOSS, Politics, Christian
– http://narudomr.blogspot.com
● Information Security since 1995
● Embedded System since 2002
● Head of IT Security and Solution Architecture,
Kiatnakin Bank PLC (KKP)
● Consultant for OWASP Thailand Chapter
● Committee Member of Cloud Security Alliance (CSA), Thailand
Chapter
● Committee Member of Thailand Banking Sector CERT (TB-CERT)
● Consulting Team Member for National e-Payment project
● Contact: narudom@owasp.org
My Journey to IoT Security
Microcontroller and Assembly Language
● 1986 Studied Electrical Engineering, Chulalongkorn
University
● 1987 Worked Part-Time, Controllers Using Zilog Z80
● 1989 Was Apprenticed at Intronics, Using Intel 8048
● 1989 Designed Heat Exchanger Controller as a
Senior Project, Using Intel 8031 (My Favorite 8051)
Network Security
● 1995 Started Working at Information and
Telecommunication Services (ITS) as Business
Development
● Was Assigned to Market a Firewall, “Eagle Raptor”
● Started My Life in Information Security
Embedded System and C/C++
● 2002 Started a Company, Structure and Composites,
Embedded System Design for Bridge and Building
Structure Monitoring
● 2004 First WiFi IP Based Bridge Structure Monitoring
System
● 2004 Became a Special Instructor in Embedded
System Design at Faculty of Engineering, Thammasat
University
● 2006 My Company Went Broke
● 2007 Joined Incotec Automation (Thailand)
● 2009 Joined Chanwanich, Project Implementation on
Smart Card, PLC and Information Security
Information Security Fundamental
What is Security?
 “The quality or state of being secure—to be free
from danger”
 A successful organization should have multiple
layers of security in place:

Physical security

Personal security

Operations security

Communications security

Network security

Information security
What is Information Security?
 The protection of information and its critical
elements, including systems and hardware that use,
store, and transmit that information
 Necessary tools: policy, awareness, training,
education, technology
Security Concepts
Security Concepts
Core
Design
Confidentiality Integrity Availibility
Authentication Authorization Accountability
Need to Know Least Privilege
Separation of
Duties
Defense in Depth
Fail Safe /
Fail Secure
Economy of
Mechanisms
Complete
Mediation
Open Design
Least Common
Mechanisms
Psychological
Acceptability
Weakest Link
Leveraging Existing
Components
Confidentiality-Integrity-Availability (CIA)
To ensure that
information and
vital services are
accessible for use
when required
To ensure the accuracy and completeness of information
to protect business processes
To ensure
protection against
unauthorized
access to or use of
confidential
information
Security vs. Usability
Security
Usability
Security vs. Safety (General Usage)
● Security is concerned with malicious humans that
actively search for and exploit weaknesses in a
system.
● Safety is protection against mishaps that are
unintended (such as accidents)
Why Secure IoT Ecosystems
Problems of IoT Security
● Initial design was for private communication
network then moved to IP network and later on the
Internet
● Firmware updates are hard or nearly impossible
after installations
● Started with basic security then found the security
flaws and attached more complex security
requirements later
● Low security devices from early design are still out
there and used in compatible fall-back mode
Flaw in Design
https://thehackernews.com/2017/08/car-safety-hacking.html
Flaw in Library
https://threatpost.com/bad-code-library-triggers-devils-ivy-vulnerability-in-millions-of-
iot-devices/126913/
Rises of Threats Target IoT Devices
https://securelist.com/honeypots-and-the-internet-of-things/78751/
Types of IoT Classified by Communication
● Client Type
– Most of implementation
– e.g. payment terminal, IP Camera (call back to server),
Smart Cars
● Server Type
– e.g. IP Camera (built-in web interface)
● Peer-to-Peer or Mesh
Typical IoT Infrastructure
Control Server
IoT Device
Private or Public
Internet
Public
Internet
Configuration App
Callback and wait for commands Remote control
Remote
Control App
Configure or
Update Firmware
Configure
Typical Attack: Fake Control Server
Control Server
IoT Device
Private or Public
Internet
Public
Internet
Callback and wait for commands
Remote control
Remote
Control App
Fake Control Server
Typical Attack: Attack on Device Open Ports
Control Server
IoT Device
Private or Public
Internet
Public
Internet
Callback and wait for commands Remote control
Remote
Control App
Typical Attack: Attack on Server Open Ports
Control Server
IoT Device
Private or Public
Internet
Public
Internet
Callback and wait for commands Remote control
Remote
Control App
Attack
Typical Attack: Steal Credential
Control Server
IoT Device
Private or Public
Internet
Public
Internet
Callback and wait for commands Remote control
Remote
Control App
Typical Attack:
Inject Bad Configuration or Firmware
Control Server
IoT Device
Private or Public
Internet
Public
Internet
Callback and wait for commands Remote control
Remote
Control App
Inject Bad
Configuration
or Firmware
Inject Bad
Configuration
Typical Attack: Sniff Data on Private Network
IoT Device
Private
Internet
Public
Internet
Callback and wait for commands Remote control
Remote
Control App
Control Server
Other Attack Surface Areas → See OWASP
● Ecosystem
● Device Memory
● Device Physical Interfaces
● Device Web Interface
● Device Firmware
● Device Network Services
● Administrative Interface
● Local Data Storage
● Cloud Web Interface
● Third-party Backend APIs
● Update Mechanism
● Mobile Application
● Vendor Backend APIs
● Ecosystem Communication
● Network Traffic
● Authentication/Authorization
● Privacy
● Hardware (Sensors)
https://www.owasp.org/index.php/IoT_Attack_Surface_Areas
OWASP Top 10 IoT Vulnerabilities 2014
I1 Insecure Web Interface
I2 Insufficient Authentication/Authorization
I3 Insecure Network Services
I4 Lack of Transport Encryption/Integrity Verification
I5 Privacy Concerns
I6 Insecure Cloud Interface
I7 Insecure Mobile Interface
I8 Insufficient Security Configurability
I9 Insecure Software/Firmware
I10 Poor Physical Security
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
Secure IoT Devices That We Use
Mirai Malware
● Malware that turns networked devices running Linux into
Malware that turns networked devices running Linux into
remotely controlled "bots" that can be used as part of a
remotely controlled "bots" that can be used as part of a
botnet in large-scale network attacks
botnet in large-scale network attacks
● Primarily targets online consumer devices such as IP cameras
Primarily targets online consumer devices such as IP cameras
and home routers using a table of more than 60 common
and home routers using a table of more than 60 common
factory default usernames and passwords, and logs into them
factory default usernames and passwords, and logs into them
to infect them with the Mirai malware
to infect them with the Mirai malware
● First found in August 2016
First found in August 2016
● Use in DDoS attacks
Use in DDoS attacks
– 20 September 2016 on the Krebs on Security site which reached 620
20 September 2016 on the Krebs on Security site which reached 620
Gbit/s and 1 Tbit/s attack on French web host OVH
Gbit/s and 1 Tbit/s attack on French web host OVH
– 21 October 2016 multiple major DDoS attacks in DNS services of DNS
21 October 2016 multiple major DDoS attacks in DNS services of DNS
service provider Dyn
service provider Dyn
– November 2016 attacks on Liberia's Internet infrastructure
November 2016 attacks on Liberia's Internet infrastructure
● The source code for Mirai has been published in hacker forums
The source code for Mirai has been published in hacker forums
as open-source
as open-source
What Can We Learn from Mirai Attacks?
● Do not use default passwords for all default
usernames
● If possible, do not allow configuration interface
from Internet side
● If the IoT devices are used only in the organization,
do not expose to the public Internet
● If there is a need to use from the Internet, open
only necessary ports and use non-default ports
where possible
iotsecurity-171108154118.pdf

More Related Content

PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PDF
The bad, the ugly and the weird about IoT
PDF
IoT Security, Mirai Revisited
PDF
IoT – Breaking Bad
PDF
IoT, Security & the Path to a Solution
PDF
Securing the Internet of Things
PPTX
IoT security
IoT Security: Debunking the "We Aren't THAT Connected" Myth
The bad, the ugly and the weird about IoT
IoT Security, Mirai Revisited
IoT – Breaking Bad
IoT, Security & the Path to a Solution
Securing the Internet of Things
IoT security

Similar to iotsecurity-171108154118.pdf (20)

PDF
This Time, It’s Personal: Why Security and the IoT Is Different
PPTX
Iot(security)
PDF
Io t security defense in depth charles li v1 20180425c
PDF
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
PPTX
IoT-Device-Security-DRAFT-slide-presentation
PPTX
IoT, Data Analytics and Big Data Security.pptx
PPTX
Security of IOT,OT And IT.pptx
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
PPTX
IoT-Device-Security.pptx
PDF
IoT Security.pdf
PPTX
Assign 1_8812814ctm.pptx
PPTX
Iot cyber security
PDF
IoT Security and Privacy Concerns: Safeguarding Your Connected Devices
PPTX
IoT Security Briefing FBI 07 23-2017 final
DOCX
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
PDF
IoT security Q3 2020 overview
PDF
[TestWarez 2017] Securing the Internet of Things
PPTX
Security Testing for IoT Systems
PDF
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
PPTX
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
This Time, It’s Personal: Why Security and the IoT Is Different
Iot(security)
Io t security defense in depth charles li v1 20180425c
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
IoT-Device-Security-DRAFT-slide-presentation
IoT, Data Analytics and Big Data Security.pptx
Security of IOT,OT And IT.pptx
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT-Device-Security.pptx
IoT Security.pdf
Assign 1_8812814ctm.pptx
Iot cyber security
IoT Security and Privacy Concerns: Safeguarding Your Connected Devices
IoT Security Briefing FBI 07 23-2017 final
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT security Q3 2020 overview
[TestWarez 2017] Securing the Internet of Things
Security Testing for IoT Systems
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
Ad

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
KodekX | Application Modernization Development
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Modernizing your data center with Dell and AMD
PDF
Electronic commerce courselecture one. Pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Cloud computing and distributed systems.
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Chapter 3 Spatial Domain Image Processing.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation theory and applications.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
KodekX | Application Modernization Development
CIFDAQ's Market Insight: SEC Turns Pro Crypto
NewMind AI Weekly Chronicles - August'25 Week I
Review of recent advances in non-invasive hemoglobin estimation
Modernizing your data center with Dell and AMD
Electronic commerce courselecture one. Pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Encapsulation_ Review paper, used for researhc scholars
Building Integrated photovoltaic BIPV_UPV.pdf
Network Security Unit 5.pdf for BCA BBA.
Cloud computing and distributed systems.
Digital-Transformation-Roadmap-for-Companies.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Ad

iotsecurity-171108154118.pdf

  • 1. IoT Security IoT Security Narudom Roongsiriwong, CISSP Narudom Roongsiriwong, CISSP November 8, 2017 November 8, 2017
  • 2. WhoAmI ● Lazy Blogger – Japan, Security, FOSS, Politics, Christian – http://narudomr.blogspot.com ● Information Security since 1995 ● Embedded System since 2002 ● Head of IT Security and Solution Architecture, Kiatnakin Bank PLC (KKP) ● Consultant for OWASP Thailand Chapter ● Committee Member of Cloud Security Alliance (CSA), Thailand Chapter ● Committee Member of Thailand Banking Sector CERT (TB-CERT) ● Consulting Team Member for National e-Payment project ● Contact: narudom@owasp.org
  • 3. My Journey to IoT Security
  • 4. Microcontroller and Assembly Language ● 1986 Studied Electrical Engineering, Chulalongkorn University ● 1987 Worked Part-Time, Controllers Using Zilog Z80 ● 1989 Was Apprenticed at Intronics, Using Intel 8048 ● 1989 Designed Heat Exchanger Controller as a Senior Project, Using Intel 8031 (My Favorite 8051)
  • 5. Network Security ● 1995 Started Working at Information and Telecommunication Services (ITS) as Business Development ● Was Assigned to Market a Firewall, “Eagle Raptor” ● Started My Life in Information Security
  • 6. Embedded System and C/C++ ● 2002 Started a Company, Structure and Composites, Embedded System Design for Bridge and Building Structure Monitoring ● 2004 First WiFi IP Based Bridge Structure Monitoring System ● 2004 Became a Special Instructor in Embedded System Design at Faculty of Engineering, Thammasat University ● 2006 My Company Went Broke ● 2007 Joined Incotec Automation (Thailand) ● 2009 Joined Chanwanich, Project Implementation on Smart Card, PLC and Information Security
  • 8. What is Security?  “The quality or state of being secure—to be free from danger”  A successful organization should have multiple layers of security in place:  Physical security  Personal security  Operations security  Communications security  Network security  Information security
  • 9. What is Information Security?  The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information  Necessary tools: policy, awareness, training, education, technology
  • 10. Security Concepts Security Concepts Core Design Confidentiality Integrity Availibility Authentication Authorization Accountability Need to Know Least Privilege Separation of Duties Defense in Depth Fail Safe / Fail Secure Economy of Mechanisms Complete Mediation Open Design Least Common Mechanisms Psychological Acceptability Weakest Link Leveraging Existing Components
  • 11. Confidentiality-Integrity-Availability (CIA) To ensure that information and vital services are accessible for use when required To ensure the accuracy and completeness of information to protect business processes To ensure protection against unauthorized access to or use of confidential information
  • 13. Security vs. Safety (General Usage) ● Security is concerned with malicious humans that actively search for and exploit weaknesses in a system. ● Safety is protection against mishaps that are unintended (such as accidents)
  • 14. Why Secure IoT Ecosystems
  • 15. Problems of IoT Security ● Initial design was for private communication network then moved to IP network and later on the Internet ● Firmware updates are hard or nearly impossible after installations ● Started with basic security then found the security flaws and attached more complex security requirements later ● Low security devices from early design are still out there and used in compatible fall-back mode
  • 18. Rises of Threats Target IoT Devices https://securelist.com/honeypots-and-the-internet-of-things/78751/
  • 19. Types of IoT Classified by Communication ● Client Type – Most of implementation – e.g. payment terminal, IP Camera (call back to server), Smart Cars ● Server Type – e.g. IP Camera (built-in web interface) ● Peer-to-Peer or Mesh
  • 20. Typical IoT Infrastructure Control Server IoT Device Private or Public Internet Public Internet Configuration App Callback and wait for commands Remote control Remote Control App Configure or Update Firmware Configure
  • 21. Typical Attack: Fake Control Server Control Server IoT Device Private or Public Internet Public Internet Callback and wait for commands Remote control Remote Control App Fake Control Server
  • 22. Typical Attack: Attack on Device Open Ports Control Server IoT Device Private or Public Internet Public Internet Callback and wait for commands Remote control Remote Control App
  • 23. Typical Attack: Attack on Server Open Ports Control Server IoT Device Private or Public Internet Public Internet Callback and wait for commands Remote control Remote Control App Attack
  • 24. Typical Attack: Steal Credential Control Server IoT Device Private or Public Internet Public Internet Callback and wait for commands Remote control Remote Control App
  • 25. Typical Attack: Inject Bad Configuration or Firmware Control Server IoT Device Private or Public Internet Public Internet Callback and wait for commands Remote control Remote Control App Inject Bad Configuration or Firmware Inject Bad Configuration
  • 26. Typical Attack: Sniff Data on Private Network IoT Device Private Internet Public Internet Callback and wait for commands Remote control Remote Control App Control Server
  • 27. Other Attack Surface Areas → See OWASP ● Ecosystem ● Device Memory ● Device Physical Interfaces ● Device Web Interface ● Device Firmware ● Device Network Services ● Administrative Interface ● Local Data Storage ● Cloud Web Interface ● Third-party Backend APIs ● Update Mechanism ● Mobile Application ● Vendor Backend APIs ● Ecosystem Communication ● Network Traffic ● Authentication/Authorization ● Privacy ● Hardware (Sensors) https://www.owasp.org/index.php/IoT_Attack_Surface_Areas
  • 28. OWASP Top 10 IoT Vulnerabilities 2014 I1 Insecure Web Interface I2 Insufficient Authentication/Authorization I3 Insecure Network Services I4 Lack of Transport Encryption/Integrity Verification I5 Privacy Concerns I6 Insecure Cloud Interface I7 Insecure Mobile Interface I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security
  • 39. Secure IoT Devices That We Use
  • 40. Mirai Malware ● Malware that turns networked devices running Linux into Malware that turns networked devices running Linux into remotely controlled "bots" that can be used as part of a remotely controlled "bots" that can be used as part of a botnet in large-scale network attacks botnet in large-scale network attacks ● Primarily targets online consumer devices such as IP cameras Primarily targets online consumer devices such as IP cameras and home routers using a table of more than 60 common and home routers using a table of more than 60 common factory default usernames and passwords, and logs into them factory default usernames and passwords, and logs into them to infect them with the Mirai malware to infect them with the Mirai malware ● First found in August 2016 First found in August 2016 ● Use in DDoS attacks Use in DDoS attacks – 20 September 2016 on the Krebs on Security site which reached 620 20 September 2016 on the Krebs on Security site which reached 620 Gbit/s and 1 Tbit/s attack on French web host OVH Gbit/s and 1 Tbit/s attack on French web host OVH – 21 October 2016 multiple major DDoS attacks in DNS services of DNS 21 October 2016 multiple major DDoS attacks in DNS services of DNS service provider Dyn service provider Dyn – November 2016 attacks on Liberia's Internet infrastructure November 2016 attacks on Liberia's Internet infrastructure ● The source code for Mirai has been published in hacker forums The source code for Mirai has been published in hacker forums as open-source as open-source
  • 41. What Can We Learn from Mirai Attacks? ● Do not use default passwords for all default usernames ● If possible, do not allow configuration interface from Internet side ● If the IoT devices are used only in the organization, do not expose to the public Internet ● If there is a need to use from the Internet, open only necessary ports and use non-default ports where possible