SlideShare a Scribd company logo
IoT (Internet of Things) and Security
Muhammad Asim Khan
2
Abstract
More things are being connected to address a growing
range of business needs. In fact, by 2024, more than 83
billion things will connect to the Internet—seven times our
human population. Examples are wearable health and
performance monitors, connected vehicles, smart grids,
connected oil rigs, and connected manufacturing. This
Internet of Things (IoT) will revolutionize the way we work,
live, play, and learn.
Inadequate security will be a critical barrier to large-scale
deployment of IoT systems and broad customer adoption of
IoT applications. Simply extending existing IT security
architectures to the IoT will not be sufficient. The IoT world
requires new security approaches, creating fertile ground
for innovative and disruptive thinking and solutions.
Agenda
Introduction
Extraordinary Benefits
Major Security Challenges
Delivering Security Across the
Extended Network
3
What Is the Internet of Things?
The Internet of Things is the
intelligent connectivity of physical
devices driving massive gains in
efficiency, business growth, and
quality of life”
4
Relationship to the Internet of
Everything (IoE)
Networked Connection of People, Process, Data, Things
People
Connecting People in
More Relevant, Valuable
Ways
Process
Delivering the Right
Information
to the Right Person (or
Machine)
at the Right Time
Data
Leveraging Data into
More Useful Information
for Decision Making
Things
Physical Devices and
Objects Connected to the
Internet and
Each Other for Intelligent
Decision Making
IoE
IoE
7.2
7.2
6.8 7.6
7.6
IoT Is Here Now – and Growing!
Rapid
Rapid
Adoption
Adoption
Rate of Digital
Rate of Digital
Infrastructure:
Infrastructure:
5X Faster Than
5X Faster Than
Electricity and
Electricity and
Telephony
Telephony
50Billion
Billion
“
“Smart Objects”
Smart Objects”
50
2010 2015 2020
0
40
30
20
10
BILLIONS
OF
DEVICES
BILLIONS
OF
DEVICES
25
12.5
Inflection
Point
TIMELIN
TIMELIN
E
E
Source: Cisco IBSG, 2011
World
Population
IoT Delivers Extraordinary Benefits
Cost savings, improved safety, superior service
Connected Rail Operations
PASSENGER SECURITY
 In-station and onboard safety
 Visibility into key events
ROUTE OPTIMIZATION
 Enhanced Customer Service
 Increased efficiency
 Collision avoidance
 Fuel savings
CRITICAL SENSING
 Transform “data” to “actionable intelligence”
 Proactive maintenance
 Accident avoidance
Smart City
Safety, financial, and environmental benefits
CONNECTED TRAFFIC SIGNALS
 Reduced congestion
 Improved emergency services response times
 Lower fuel usage
PARKING AND LIGHTING
 Increased efficiency
 Power and cost savings
 New revenue opportunities
CITY SERVICES
 Efficient service delivery
 Increased revenues
 Enhanced environmental monitoring capabilities
The Connected Car
Actionable intelligence, enhanced comfort, unprecedented convenience
WIRELESS ROUTER
 Online entertainment
 Mapping, dynamic re-routing, safety and
security
CONNECTED SENSORS
 Transform “data” to “actionable intelligence”
 Enable proactive maintenance
 Collision avoidance
 Fuel efficiency
URBAN CONNECTIVITY
 Reduced congestion
 Increased efficiency
 Safety (hazard avoidance)
… But It Also Adds Complexity
Application Interfaces
Application Interfaces
Infrastructure Interfaces
Infrastructure Interfaces
New Business Models Partner Ecosystem
Applications
Unified Platform
Infrastructure
APPLICATION ENABLEMENT PLATFORM
APPLICATION CENTRIC INFRASTRUCTURE
Data
Integration
Big Data Analytics
Control
Systems
Application
Integration
What Comprises IoT Networks?
The Flip Side: Major Security
Challenges
IoT Expands Security Needs
Converged,
Managed Network
Resilience at
Scale
Security
Application
Enablement
Distributed
Intelligence
Increased Attack Surface
Threat Diversity
Impact and Risk
Remediation
Protocols
Compliance and Regulation
What Can Breach IoT Networks?
What can’t?
Billions of connected devices
Secure and insecure locations
Security may or may not be
built in
Not owned or controlled by IT
… but data flows through the
network
Any node on your network can potentially provide access to the core
Smart City
Potential impact to services and public safety
REMOTE ACCESS
 Increased traffic congestion
 Creation of unsafe conditions
SYSTEM CONTROL
 Device manipulation
 Remote monitoring
 Creation of unsafe conditions
SERVICE MANIPULATION
 Environmental degradation
 System shutdown
 Lost revenue
IT Breach via OT Network
Breached via Stolen Credentials from HVAC Vendor
40 Million Credit And Debit Cards Stolen
PII Stolen From 70 Million Customers
Reputation Damage*
46% drop in year-over-year profit
5.3% drop in year-over-year revenue
2.5% drop in stock price
CEO Fired
* Source: KrebsonSecurity, May 2014
Unintended Security Exposures*
Farm Feeding
System in the U.S.
Mine Ventilation
System in Romania
Hydroelectric Plant in
the U.S.
* Source: Wired, November 2013
Delivering Security Across the
Extended Network
The Secure IoT Architecture – IT Plus
OT!
Services
Application Interfaces
Application Interfaces
Infrastructure Interfaces
Infrastructure Interfaces
New Business Models Partner Ecosystem
Applications
Application Enablement Platform
Application Centric Infrastructure
Security
Data
Integrati
on
Big Data Analytics
Control
Systems
Applicati
on
Integrati
on
Network and
Perimeter
Security
Physical
Security
Device-level
Security /
Anti-tampering
Cloud-based
Threat Analysis
/ Protection
End-to-End
Data
Encryption
Services
IT and OT are Inherently Different
IT OT
• Connectivity: “Any-to-Any”
• Network Posture:
Confidentiality, Integrity,
Availability (CIA)
• Security Solutions:
Cybersecurity; Data
Protection
• Response to Attacks:
Quarantine/Shutdown to
Mitigate
• Connectivity: Hierarchical
• Network Posture:
Availability, Integrity,
Confidentiality (AIC)
• Security Solutions:
Physical Access Control;
Safety
• Response to Attacks: Non-
stop Operations/Mission
Critical – Never Stop, Even
if Breached
IT/OT Converged Security Model
IT
DMZ
OT
Enterprise Network
Supervisory
Demilitarized Zone
Automation & Control
Identity
Services
Cloud
Network
Security
Secure
Access
Application
Control
Config
Mgmt
Conclusion: Securely Embrace IoT!
New challenges require new thinking!
avoid operational siloes
networking and convergence are key
a sound security solution is integrated throughout
build for the future
Security must be pervasive
inside and outside the network
device- and data-agnostic
proactive and intelligent
Intelligence, not data
convergence, plus analytics
speed is essential for real-time decisions

More Related Content

PPTX
1. How will the IoT help your business - cisco
PPTX
nnnnnnnnnnnn7777777777777777777777777777777.pptx
PPTX
Iot Solution Development Platform
PDF
IoT-Enabled Predictive Maintenance Infobite
PDF
E-Toll Payment Using Azure Cloud
PDF
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
DOCX
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
PPTX
Arvind Mehrotra
1. How will the IoT help your business - cisco
nnnnnnnnnnnn7777777777777777777777777777777.pptx
Iot Solution Development Platform
IoT-Enabled Predictive Maintenance Infobite
E-Toll Payment Using Azure Cloud
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
Arvind Mehrotra

Similar to Lecture About Internet of Things, this ppt about basic knowladge about internet (20)

PPT
Cyber City Concept
PPS
02 ibm security for smart grids
PPTX
What happens in the Innovation of Things?
PPTX
Groupdsaacascasacascascascasccsca 5.pptx
PDF
F5 Networks: The Internet of Things - Ready Infrastructure
PPTX
presentation Comstor IoT_RTL
PPTX
Middle East IoT Workshop
PDF
An IOT based solution for Road Accidents
PDF
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
PPTX
isheji-copy_17cscsccccc44699508460 .pptx
PDF
Connecting Physical and Digital Worlds to Power the Industrial IoT
PDF
C white cisco_livecancun_nov_press
PDF
Top IoT and Telematics Security Threats to Watch in 2025
PDF
IoT from edge to cloud: bringing order to the chaos
PDF
Cyber Security Challenges on Latest Technologies
PPTX
TheInternetofThings
PPTX
Presentation-Watson_IoT_Platform-Long-08Feb2016
PPTX
IBM Internet of Things Offerings
PDF
Knowing where the safe zone is ovum october 22 2013
PPTX
Business Development, Industry Solutions, Internet of Everything Cisco India ...
Cyber City Concept
02 ibm security for smart grids
What happens in the Innovation of Things?
Groupdsaacascasacascascascasccsca 5.pptx
F5 Networks: The Internet of Things - Ready Infrastructure
presentation Comstor IoT_RTL
Middle East IoT Workshop
An IOT based solution for Road Accidents
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
isheji-copy_17cscsccccc44699508460 .pptx
Connecting Physical and Digital Worlds to Power the Industrial IoT
C white cisco_livecancun_nov_press
Top IoT and Telematics Security Threats to Watch in 2025
IoT from edge to cloud: bringing order to the chaos
Cyber Security Challenges on Latest Technologies
TheInternetofThings
Presentation-Watson_IoT_Platform-Long-08Feb2016
IBM Internet of Things Offerings
Knowing where the safe zone is ovum october 22 2013
Business Development, Industry Solutions, Internet of Everything Cisco India ...
Ad

More from ALAMGIRHOSSAIN256982 (11)

PPTX
Introduces the topic and presenter, setting the stage for a structured guide ...
PPTX
Belt and Road Initiative in My Country Bangladesh.pptx
PPT
Lecture_6_Using Operating Systems (Operating System Basics)_Ch_07A.ppt
PPTX
Ai lecture about VR technology discuss.pptx
PPT
The Global Economy in Crisis: Implictions for South Africa
PPTX
Hey English_Grammar_Tenses Start from Basic
PPT
ai based computer basic learning Lecture about Bigdata.ppt
PPT
Principles of Economics English Courseware
PPTX
Stephanie-Hollings_-ICES-2020-The-Perspectives-of-the-Belt-and-Road-Initiativ...
PPT
Lecture _1_Basic of Computer, Hardware, and Software (inside of computer reso...
PPTX
Phrasal Verbs-SEPARABLE-INSEPARABLE .ppt.pptx
Introduces the topic and presenter, setting the stage for a structured guide ...
Belt and Road Initiative in My Country Bangladesh.pptx
Lecture_6_Using Operating Systems (Operating System Basics)_Ch_07A.ppt
Ai lecture about VR technology discuss.pptx
The Global Economy in Crisis: Implictions for South Africa
Hey English_Grammar_Tenses Start from Basic
ai based computer basic learning Lecture about Bigdata.ppt
Principles of Economics English Courseware
Stephanie-Hollings_-ICES-2020-The-Perspectives-of-the-Belt-and-Road-Initiativ...
Lecture _1_Basic of Computer, Hardware, and Software (inside of computer reso...
Phrasal Verbs-SEPARABLE-INSEPARABLE .ppt.pptx
Ad

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
A Presentation on Artificial Intelligence
PPTX
Cloud computing and distributed systems.
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Encapsulation theory and applications.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Electronic commerce courselecture one. Pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
cuic standard and advanced reporting.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
A Presentation on Artificial Intelligence
Cloud computing and distributed systems.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
NewMind AI Monthly Chronicles - July 2025
Spectral efficient network and resource selection model in 5G networks
Encapsulation theory and applications.pdf
Review of recent advances in non-invasive hemoglobin estimation
Electronic commerce courselecture one. Pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
“AI and Expert System Decision Support & Business Intelligence Systems”
Network Security Unit 5.pdf for BCA BBA.
Understanding_Digital_Forensics_Presentation.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Chapter 3 Spatial Domain Image Processing.pdf

Lecture About Internet of Things, this ppt about basic knowladge about internet

  • 1. IoT (Internet of Things) and Security Muhammad Asim Khan
  • 2. 2 Abstract More things are being connected to address a growing range of business needs. In fact, by 2024, more than 83 billion things will connect to the Internet—seven times our human population. Examples are wearable health and performance monitors, connected vehicles, smart grids, connected oil rigs, and connected manufacturing. This Internet of Things (IoT) will revolutionize the way we work, live, play, and learn. Inadequate security will be a critical barrier to large-scale deployment of IoT systems and broad customer adoption of IoT applications. Simply extending existing IT security architectures to the IoT will not be sufficient. The IoT world requires new security approaches, creating fertile ground for innovative and disruptive thinking and solutions.
  • 3. Agenda Introduction Extraordinary Benefits Major Security Challenges Delivering Security Across the Extended Network 3
  • 4. What Is the Internet of Things? The Internet of Things is the intelligent connectivity of physical devices driving massive gains in efficiency, business growth, and quality of life” 4
  • 5. Relationship to the Internet of Everything (IoE) Networked Connection of People, Process, Data, Things People Connecting People in More Relevant, Valuable Ways Process Delivering the Right Information to the Right Person (or Machine) at the Right Time Data Leveraging Data into More Useful Information for Decision Making Things Physical Devices and Objects Connected to the Internet and Each Other for Intelligent Decision Making IoE IoE
  • 6. 7.2 7.2 6.8 7.6 7.6 IoT Is Here Now – and Growing! Rapid Rapid Adoption Adoption Rate of Digital Rate of Digital Infrastructure: Infrastructure: 5X Faster Than 5X Faster Than Electricity and Electricity and Telephony Telephony 50Billion Billion “ “Smart Objects” Smart Objects” 50 2010 2015 2020 0 40 30 20 10 BILLIONS OF DEVICES BILLIONS OF DEVICES 25 12.5 Inflection Point TIMELIN TIMELIN E E Source: Cisco IBSG, 2011 World Population
  • 8. Cost savings, improved safety, superior service Connected Rail Operations PASSENGER SECURITY  In-station and onboard safety  Visibility into key events ROUTE OPTIMIZATION  Enhanced Customer Service  Increased efficiency  Collision avoidance  Fuel savings CRITICAL SENSING  Transform “data” to “actionable intelligence”  Proactive maintenance  Accident avoidance
  • 9. Smart City Safety, financial, and environmental benefits CONNECTED TRAFFIC SIGNALS  Reduced congestion  Improved emergency services response times  Lower fuel usage PARKING AND LIGHTING  Increased efficiency  Power and cost savings  New revenue opportunities CITY SERVICES  Efficient service delivery  Increased revenues  Enhanced environmental monitoring capabilities
  • 10. The Connected Car Actionable intelligence, enhanced comfort, unprecedented convenience WIRELESS ROUTER  Online entertainment  Mapping, dynamic re-routing, safety and security CONNECTED SENSORS  Transform “data” to “actionable intelligence”  Enable proactive maintenance  Collision avoidance  Fuel efficiency URBAN CONNECTIVITY  Reduced congestion  Increased efficiency  Safety (hazard avoidance)
  • 11. … But It Also Adds Complexity Application Interfaces Application Interfaces Infrastructure Interfaces Infrastructure Interfaces New Business Models Partner Ecosystem Applications Unified Platform Infrastructure APPLICATION ENABLEMENT PLATFORM APPLICATION CENTRIC INFRASTRUCTURE Data Integration Big Data Analytics Control Systems Application Integration
  • 12. What Comprises IoT Networks?
  • 13. The Flip Side: Major Security Challenges
  • 14. IoT Expands Security Needs Converged, Managed Network Resilience at Scale Security Application Enablement Distributed Intelligence Increased Attack Surface Threat Diversity Impact and Risk Remediation Protocols Compliance and Regulation
  • 15. What Can Breach IoT Networks? What can’t? Billions of connected devices Secure and insecure locations Security may or may not be built in Not owned or controlled by IT … but data flows through the network Any node on your network can potentially provide access to the core
  • 16. Smart City Potential impact to services and public safety REMOTE ACCESS  Increased traffic congestion  Creation of unsafe conditions SYSTEM CONTROL  Device manipulation  Remote monitoring  Creation of unsafe conditions SERVICE MANIPULATION  Environmental degradation  System shutdown  Lost revenue
  • 17. IT Breach via OT Network Breached via Stolen Credentials from HVAC Vendor 40 Million Credit And Debit Cards Stolen PII Stolen From 70 Million Customers Reputation Damage* 46% drop in year-over-year profit 5.3% drop in year-over-year revenue 2.5% drop in stock price CEO Fired * Source: KrebsonSecurity, May 2014
  • 18. Unintended Security Exposures* Farm Feeding System in the U.S. Mine Ventilation System in Romania Hydroelectric Plant in the U.S. * Source: Wired, November 2013
  • 19. Delivering Security Across the Extended Network
  • 20. The Secure IoT Architecture – IT Plus OT! Services Application Interfaces Application Interfaces Infrastructure Interfaces Infrastructure Interfaces New Business Models Partner Ecosystem Applications Application Enablement Platform Application Centric Infrastructure Security Data Integrati on Big Data Analytics Control Systems Applicati on Integrati on Network and Perimeter Security Physical Security Device-level Security / Anti-tampering Cloud-based Threat Analysis / Protection End-to-End Data Encryption Services
  • 21. IT and OT are Inherently Different IT OT • Connectivity: “Any-to-Any” • Network Posture: Confidentiality, Integrity, Availability (CIA) • Security Solutions: Cybersecurity; Data Protection • Response to Attacks: Quarantine/Shutdown to Mitigate • Connectivity: Hierarchical • Network Posture: Availability, Integrity, Confidentiality (AIC) • Security Solutions: Physical Access Control; Safety • Response to Attacks: Non- stop Operations/Mission Critical – Never Stop, Even if Breached
  • 22. IT/OT Converged Security Model IT DMZ OT Enterprise Network Supervisory Demilitarized Zone Automation & Control Identity Services Cloud Network Security Secure Access Application Control Config Mgmt
  • 23. Conclusion: Securely Embrace IoT! New challenges require new thinking! avoid operational siloes networking and convergence are key a sound security solution is integrated throughout build for the future Security must be pervasive inside and outside the network device- and data-agnostic proactive and intelligent Intelligence, not data convergence, plus analytics speed is essential for real-time decisions

Editor's Notes

  • #3: I’m going to spend the first portion of this presentation talking about the benefits of IoT and why it’s so important to all types of businesses, and how it will benefit us in our daily lives; then I’ll discuss the security challenges it presents and offer advice and guidance on how to resolve those challenges.
  • #4: I want to take a moment to provide Cisco’s definition of IoT, to ensure we’re on the same page … To put it more in context of what it means for your business and for your daily life, this highly distributed network of connected smart objects is capable of dynamically generating, analyzing, and communicating intelligence that can be used by businesses to increase operational efficiency and power new business models, and by individuals to make life easier and more comfortable. … by connecting everyday objects and networking them together, we benefit from their ability to combine simple data to produce usable intelligence.
  • #5: IoE is the networked connection of people, process, data and things. IoE brings together people, processes, data, and things to make networked connections more relevant and valuable than ever before – turning information into actions that create new capabilities, richer experiences, and unprecedented economic opportunity for businesses, individuals, and countries. IoT is the “Things” portion. To be clear, by “things” we’re really talking about the network of sensors, objects, etc – not concentrating on the devices, themselves.
  • #6: … and IoT isn’t “science fiction” or something that will happen in the future – it’s real, and it’s here now. Cisco believes that the inflection point – the point at which the number of connected devices began outnumbering the number of men, women, and children on the planet – happened about five years ago; others in the industry believe that it happened about a year and a half ago. Similarly, Cisco believes that the number of connected objects will grow to about 50 billion over the next several years, while other estimates put that number at 25, 30, or even as high as 200 billion! Who’s right doesn’t really matter … the point is that we all universally agree on two things: 1) the point of inflection is in the past; and 2) gap is expected to widen exponentially over the next several years. So, IoT is here today, and will continue to grow!
  • #7: While these benefits can certainly inspire business owners, they can also be construed as largely academic … so let’s take a look at some real-world use cases, to show how IoT will benefit us in our daily lives …
  • #8: Using ruggedized cameras and communications equipment that can handle the vibration and jolts of a rapidly moving train, a connected network of IoT-enabled cameras can help improve passenger safety by analyzing and correlating events at various stations, as well as on trains – for actionable security intelligence. The intelligence gained from multiple connected systems can help identify bottlenecks, enable routes and schedules to be tuned for greater efficiency, and even avoid collisions. Likewise, sensors attached to critical parts such as wheels can proactively determine if a part needs to be replaced – before it can cause a devastating accident. Sensors can also alert supervisors if the train is being operated in an unsafe manner, or alert the operator of important changes in track conditions.
  • #9: In addition, IoT can dramatically reduce a city’s environmental impact and improve its efficiency while reducing costs: By connecting the city’s infrastructure that controls traffic signals, it can help save fuel usage and reduce traffic congestion, reducing pollution Controlling road lighting based on the actual need – such as when cars are approaching – can save millions of dollars and conserve energy; parking applications can let drivers know where the spots are available, and “dynamic pricing” based on need can be a new revenue source for the city. City services such as garbage pickup can be made significantly more efficient, reducing costs and therefore adding to the city’s bottom line
  • #10: Modern-day cars are a lot less mechanical than what our parents drove. Today’s cars are highly computerized, with hundreds of sensors to assess everything from tire pressure to a loose gas cap. But today, they’re hundreds of individual sensors. Today a dashboard light alerts the driver that they have a tire with low air pressure – but that’s it; no information on how low, whether or not there’s a leak, or even which tire is affected. IoT connects all of these sensors, so that data can be communicated and centrally analyzed to produce actionable intelligence. By monitoring not only the air pressure, but also: the speed of air escape; road conditions; outside temperature, atmospheric pressure, and other relevant data, a centralized controller can analyze that data to turn it into actionable intelligence … does the tire need to be serviced right away? Can it wait? Or is the loss in pressure to be expected, given the other environmental conditions? In addition, the car has the ability to connect with the city’s infrastructure that controls traffic signals and road lighting, and monitors public parking spaces to save fuel and reduce traffic congestion. Finally, the sensors can interact with third-party applications such as GPS/mapping to enable dynamic re-routing to avoid traffic, accidents, and other hazards. Similarly, Internet-based entertainment including music and move streaming/downloads can maximize the comfort of a road trip.
  • #11: IoT requires that connectivity tools be added to the platform, as well as some network elements such as smaller, more self-contained switches and routers for fields, plants, and other operational environments. These network elements are frequently deployed in challenging environments that include harsh weather conditions, significant amounts of vibration, etc., so they need to be ruggedized to function under these conditions. [ANIMATE] Now here’s where it gets interesting … one of the primary differences between your existing IT network and an IoT network is all of these additional devices, sensors, and other “smart objects”. It’s important to note that these objects are networked together, yet they’re independent of your network – you don’t own them; oftentimes can’t see them; and you don’t control them in any way, shape, or form. Yet they’re sending petabytes of data through your network – data that’s required by the applications to function properly. [ANIMATE] Another difference is in the applications, themselves. Unlike today’s monolithic applications, where the main value is delivered locally from the application’s code, IoT applications derive most of their value from the intelligence that is collected from, and distributed throughout, the network; the application itself is merely the method employed to access that intelligence. [ANIMATE] Which leads us to the other major infrastructure difference in an IoT network, which is required to communicate and process all of this intelligence …
  • #12: As mentioned on the previous slide, the “IoT Network” isn’t a completely separate entity … rather, it utilizes the existing IT network as its foundation, and then supplements it with operational technology (OT) and the billions of sensors, devices, and other smart objects.
  • #14: Despite its many business benefits, IoT increases security challenges in several ways: Increased attack surface – Due to the billions of new devices that are now connected Threat diversity – Due to the variety of objects – many of which are in insecure locations Impact & risk – More sensitive data is flowing through more connected devices, in more places throughout the world – and BTW, mostly outside the secure embrace of the existing network Remediation – Need to think differently about security – can’t necessarily isolate a system, because the cost of shutting it down may be greater than the cost of an infection … also, rather than hardening the outside but leaving the inside relatively insecure, need pervasive protection) Protocols – Security systems need to be considered as a continuous process – in addition to secure access, the system needs to be content-, context-, and threat-aware) Compliance & regulation – Regulatory compliance organizations are requiring tighter security and privacy controls than ever before, which is affecting a growing number of industries)
  • #15: Billions of new devices, located in more places throughout the world – many of which are insecure locations – are sending sensitive data through your network … however, these devices reside outside the secure embrace of the existing network. You don’t own them; oftentimes can’t see them; and you don’t control them in any way, shape, or form. Yet they’re sending petabytes of data through your network – data that’s required by the applications to function properly.
  • #16: Similarly, city services can be impacted, and even privacy and public safety can be thwarted …
  • #17: The Target breach is an excellent example of why IT and OT networks need to be converged, with centrally-managed security across them … - Centralized management and control, IPS/IDS, access control policies, and system segmentation could have prevented this PR and financial disaster
  • #18: But beyond the headlines, here are a few lower key real-world examples to serve as a reminder that any connected object can be used as an attack vector … so if those objects aren’t configured with the proper security controls, the consequences can be dire. Here are three examples of businesses that connected essential business systems to take advantage of IoT efficiencies … but also created significant security exposures: A pig farm in the mid-western United States … the entire feeding system is automated – not only when the feed is released, but the custom mix, as well. The entire system is in the clear, allowing visibility of the entire operation, as well as the capability to manipulate the schedule, mix, etc. Not only could this endanger the lives of the pigs, but it risks the livelihood of the owner, as well! The underground ventilation system for a coal mining company in Romania …. The control panel can be easily read, and may allow the system to be manipulated, putting hundreds of human lives at risk.
  • #19: To provide appropriate levels of security for IoE, we need to first understand that its two main components – IT and OT environments – are inherently different. This can be seen in a number of areas
  • #20: As I mentioned earlier, it’s important to understand that IoT doesn’t replace your existing network; rather, it supplements it, and relies on it in many ways. [ANIMATE] But then we add the emerging set of intelligent, IoT-enabled applications. [ANIMATE] … and, of course, billions of additional devices, sensors, and other “smart objects” that will create the intelligence for the applicatoins. [ANIMATE] Of course, services will need to be expanded to cover the new capabilities … [ANIMATE] And we’ll need additional layers of security to enjoy the many business benefits of IoT while maintaining a high level of data privacy and protection. Now remember I mentioned in the beginning that IoT is not a new network, but rather adjunct – and complementary – to your existing network. As a result, you still need network and perimeter security. In fact, the billions of connected objects in IoT networks create new attack vectors, so this layer of security is more important than ever. And since those billions of objects can be located quite literally anywhere in the world – in both secure and insecure environments – existing network security needs to be supplemented with device-level security and anti-tampering, to protect devices against low-tech attacks. Because it’s now connected, even the simplest object can provide a direct line into the core of your network if compromised. Finally, physical security should be implemented throughout your network, and integrated with your network security. Connected cameras, badge readers, RFID tags and other sensors, as well as video analytics, can add essential security intelligence to help protect your network, physical assets, critical data, and employees.
  • #21: This structural difference forms the foundation of the differences between the two environments …
  • #22: Taking a look at the converged security model, we can see how the various security solutions are implemented across the converged network to produce a comprehensive security solution for the entire extended network. It is centrally managed and controlled within IT, yet customized to fit the needs of the highly disparate environments.
  • #23: … and as we discussed earlier, when developing our security strategy for an IoT implementation, we need to take a fresh approach, rather than just trying to slap an old solution on a new challenge. Security isn’t something we bolt on as an afterthought, nor should a certain area be secured – rather, it must be built in to every aspect of the implementation. And we no longer have the ability to wait for decisions to be made … since IoT is all about producing real-time intelligence, our security decisions must do the same. That requires processing and analysis right at the edge to minimize latency.