SlideShare a Scribd company logo
Session ID:
Session Classification:
Kim Singletary
McAfee
Advanced
RIOT CONTROL
The Art of Managing Risk for
Internet of Things
► What is IoT and why is it different?
► What are the risks?
► What are the emerging areas that will help provide
security
► What can be done today
Intro
The outcome of the application of human creative skills and
imagination.
The Art
http://news.nationalgeographic.com/news/2012/12/pictures/121205-earth-night-science-space/
► 40% projected growth in global data generated year over
year vs. 5% growth in global IT spending 1
► By 2020
► 40% of data will be generated by IoT 2
► Connected Devices (IoT) will represent 24 Billion 3
1. McKinsey, Big Data:The next frontier for innovation, competition and productivity (June 2011)
2. IDC/EMC, Digital Universe (2011)
3. GSMA conducted by Machina Research
IoT is BIG
Change in Types of Data
Small
files
Big
files
Constant data
Cyclic or bursty data
Internet
data
Video
IP
Voice
Smart
Health
Smart
Transport
Asset
tracking
Metering
Retail
POS
Signage
Industrial
Controls
CCTV
Smaller Files Bigger Files
Connected Devices In The Past
Ability to put Sensors in Everything
► Improved Power Management
► Ipv6
Ambient Networking (Everywhere)
► Open Standards
► Increased bandwidth and coverage
Analyze Everything
► Processor Speed
► Big Data
Why IoT?
Current Connected Devices
Future of IoT
Tracking Behavior/Usage
Enhanced Situational Awareness
Sensor Driven Decision Analytics
Process Optimization
Optimized Resource Consumption
Complex Autonomous Systems
IoT Applications
Information and
Analysis
Automation
And Control
February 15, 201311
Source: Forbes, 7/23/2012
Will you be ready for the M2M world?
Ray Wang
► Energy & Water Mgmt.
► Smart City/Smart Planet
► Robotics/Industrial Control
► Bldg. Mgmt./Automation
► Transportation
► Healthcare
► Military
► Retail
► Consumer Tech.
Industries
Pockets of
Innovation,
Efficiency,
Automation
Compliance
Confidentiality – Integrity - Availability
Intent of Use = Risk
Control
Boundaries
Physical
Interactions
Kinetic
Outcomes
Engine or Service?
Power by the Hour
The Thing Lifestyle
√ ?
! X
The Security Architecture
Access,
Authentication,
Authorization
Data & Privacy
Application Network
► End-to-end security is not yet addressed in all the IoT
related standards
► Attacks at physical layer
► Machine level integrity checks
► Identity linking
► Anonymity
► Secure deployment of credentials for lots of objects
► User interface to control/manage security
Security Issues for Pervasive IoT
Network
Network Types
• Shortwave
• Satellite
• LTE/5G
• WiMax/Microwave
• WiFi
• Femtocell
• Bluetooth
• Zigbee
• Dash7
• PLC
Fail-Over Parameters
• Speed
• Error-rate
• Packet Loss
• Price
• Assurance/Reputation
Context Setting
• Policy for Connection
• Duration
• Quality of Service
• Policy for Roaming
• Policy for Fail-Over
• Policy for Compliance
► IPv6
► Management Tools Available?
► Support in organization for dual networks?
► Ready to leave comfort of NAT?
► Is someone squatting in your dark space?
► Open Flow to Software Defined Networks
- Take control out of hands of infrastructure
- ACL’s and routing protocols will not provide enough agility for
security
Emerging Network for IoT
► TRILL
► Possible Spanning Tree Alternative
► Get more efficiency of available bandwidth and meshed
network
► Opportunity to Load Balance
► DNS Sec/DANE
- Prevent DNS cache poisoning
- Obtain Authentication of Named Entities with SSL info
on certs
Emerging Network for IoT
► Boot or Power On Authentication
► Stop unauthorized devices from entering the network
► Proactive Intelligence in the Flow
► IETF REPUTON and IETF 6MAN/Packet Staining WG
► Include suspicious behavior indicator in flow
► Adaptive Information Infrastructure
► Holonic Systems; Dual in Nature
► Wholes in themselves
► Simultaneously integral or larger wholes
► Competitive Learning
► Nodes compete for right to respond
► Increasing specialization of each node of the cluster
IoT Endpoint Control
► Hardware Identification and Access Control
► Specify computing platforms - Intel TXT
► Cloud Security Standards and Metrics
► Zones/Compliance/Service Level for IoT
► Big Data/Analytics/Management
► Access Authority
► Retention Policy
► De-Identification of Context Specific Data
Cloud – Data Center - App
► Integrity Control (Endpoints and Embedded
Systems)
► Hardware Assisted Rootkit Defense
► Global Threat Intelligence integrated at
endpoint and network
► Network IPS and Softswitch IPS
► Asset Detection and Real-time Mgmt.
► Big Security Data Management
Today’s Security Options
► IoT will be everywhere
► IoT will need orchestrators who can design and balance
risk and reward models
► IoT is challenging and will be complex and intriguing
Summary
@ksingletary

More Related Content

PDF
Solving Industrial Data Integration with Machine Intelligence
PDF
IoT Security and Privacy Considerations
PPTX
Privacy and security in IoT
PDF
IoT Edge Intelligence - The need for new software development approaches
PPTX
Driving IT Transformation with Agile Analytics
PPTX
Edge intelligence slide share
PDF
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
PDF
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
Solving Industrial Data Integration with Machine Intelligence
IoT Security and Privacy Considerations
Privacy and security in IoT
IoT Edge Intelligence - The need for new software development approaches
Driving IT Transformation with Agile Analytics
Edge intelligence slide share
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2

What's hot (20)

PDF
Research Topics in IOT
PPTX
Internet of things security "Hardware Security"
PPTX
Internet of Things Forensics
PPT
M I Dentity 3 G 040111
PPTX
DocomUSA Cyber Security
PPTX
Internet of things security challenges
PPTX
Law seminars intl cybersecurity in the power industry
PDF
Cybridge Secure Content Filter for SCADA Networks
PPTX
Introduction to IoT Security
 
PPTX
Blockchain for Manufacturing Sector
PPTX
S_IOT_Intro.pptx
PPTX
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
PDF
IoT Internet of things
PPTX
Cross domain autonomous cooperation cross-domain autonomous cooperation
PPT
IoT Security by Sanjay Kumar
PPTX
Conference Security by Design - Gemalto - Security in IoT
PPTX
Iot Security
PPTX
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
PPTX
Internet of Things Security
PPTX
Securing Internet of Things
Research Topics in IOT
Internet of things security "Hardware Security"
Internet of Things Forensics
M I Dentity 3 G 040111
DocomUSA Cyber Security
Internet of things security challenges
Law seminars intl cybersecurity in the power industry
Cybridge Secure Content Filter for SCADA Networks
Introduction to IoT Security
 
Blockchain for Manufacturing Sector
S_IOT_Intro.pptx
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
IoT Internet of things
Cross domain autonomous cooperation cross-domain autonomous cooperation
IoT Security by Sanjay Kumar
Conference Security by Design - Gemalto - Security in IoT
Iot Security
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
Internet of Things Security
Securing Internet of Things
Ad

Similar to Sect f43 (20)

PDF
Drobics trustworthy io-t-for-industrial-applications
DOCX
Addressing security and privacy in io t ecosystem v0.4
PPTX
IoT and the industrial Internet of Things - june 20 2019
PPTX
Introduction to IOT security
PDF
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
PDF
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
PDF
Security in IoT
PPTX
Key challenges facing the future of IoT
PPTX
Future of IoT: Key Challenges to Face
PDF
Secure and Smart IoT using Blockchain and AI
PPTX
Iot Solution Development Platform
PPT
Lecture About Internet of Things, this ppt about basic knowladge about internet
DOCX
Security and Privacy considerations in Internet of Things
PDF
Emerging Technology Risk Series - Internet of Things (IoT)
PDF
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
PDF
IoT and IIoT - Security Challenges and Innovative Approaches
PDF
PPTX
Top Security Solutions for Hyperconnectivity and IoT: A Comprehensive Guide
PPTX
The internet of things (io t)
PPTX
The internet of things (io t) : IoT academy
Drobics trustworthy io-t-for-industrial-applications
Addressing security and privacy in io t ecosystem v0.4
IoT and the industrial Internet of Things - june 20 2019
Introduction to IOT security
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
Security in IoT
Key challenges facing the future of IoT
Future of IoT: Key Challenges to Face
Secure and Smart IoT using Blockchain and AI
Iot Solution Development Platform
Lecture About Internet of Things, this ppt about basic knowladge about internet
Security and Privacy considerations in Internet of Things
Emerging Technology Risk Series - Internet of Things (IoT)
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
IoT and IIoT - Security Challenges and Innovative Approaches
Top Security Solutions for Hyperconnectivity and IoT: A Comprehensive Guide
The internet of things (io t)
The internet of things (io t) : IoT academy
Ad

More from SelectedPresentations (20)

PDF
Длительное архивное хранение ЭД: правовые аспекты и технологические решения
PDF
Трансграничное пространство доверия. Доверенная третья сторона.
PDF
Варианты реализации атак через мобильные устройства
PDF
Новые технологические возможности и безопасность мобильных решений
PDF
Управление безопасностью мобильных устройств
PDF
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
PDF
Кадровое агентство отрасли информационной безопасности
PDF
Основное содержание профессионального стандарта «Специалист по безопасности и...
PDF
Основное содержание профессионального стандарта «Специалист по безопасности а...
PDF
Основное содержание профессионального стандарта «Специалист по технической за...
PDF
Основное содержание профессионального стандарта «Специалист по безопасности т...
PDF
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
PDF
Запись активности пользователей с интеллектуальным анализом данных
PDF
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
PDF
Обеспечение защиты информации на стадиях жизненного цикла ИС
PDF
Документ, как средство защиты: ОРД как основа обеспечения ИБ
PDF
Чего не хватает в современных ids для защиты банковских приложений
PDF
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
PDF
Оценка состояния, меры формирования индустрии информационной безопасности Рос...
PDF
Об угрозах информационной безопасности, актуальных для разработчика СЗИ
Длительное архивное хранение ЭД: правовые аспекты и технологические решения
Трансграничное пространство доверия. Доверенная третья сторона.
Варианты реализации атак через мобильные устройства
Новые технологические возможности и безопасность мобильных решений
Управление безопасностью мобильных устройств
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
Кадровое агентство отрасли информационной безопасности
Основное содержание профессионального стандарта «Специалист по безопасности и...
Основное содержание профессионального стандарта «Специалист по безопасности а...
Основное содержание профессионального стандарта «Специалист по технической за...
Основное содержание профессионального стандарта «Специалист по безопасности т...
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
Запись активности пользователей с интеллектуальным анализом данных
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
Обеспечение защиты информации на стадиях жизненного цикла ИС
Документ, как средство защиты: ОРД как основа обеспечения ИБ
Чего не хватает в современных ids для защиты банковских приложений
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
Оценка состояния, меры формирования индустрии информационной безопасности Рос...
Об угрозах информационной безопасности, актуальных для разработчика СЗИ

Sect f43

  • 1. Session ID: Session Classification: Kim Singletary McAfee Advanced RIOT CONTROL The Art of Managing Risk for Internet of Things
  • 2. ► What is IoT and why is it different? ► What are the risks? ► What are the emerging areas that will help provide security ► What can be done today Intro
  • 3. The outcome of the application of human creative skills and imagination. The Art http://news.nationalgeographic.com/news/2012/12/pictures/121205-earth-night-science-space/
  • 4. ► 40% projected growth in global data generated year over year vs. 5% growth in global IT spending 1 ► By 2020 ► 40% of data will be generated by IoT 2 ► Connected Devices (IoT) will represent 24 Billion 3 1. McKinsey, Big Data:The next frontier for innovation, competition and productivity (June 2011) 2. IDC/EMC, Digital Universe (2011) 3. GSMA conducted by Machina Research IoT is BIG
  • 5. Change in Types of Data Small files Big files Constant data Cyclic or bursty data Internet data Video IP Voice Smart Health Smart Transport Asset tracking Metering Retail POS Signage Industrial Controls CCTV Smaller Files Bigger Files
  • 7. Ability to put Sensors in Everything ► Improved Power Management ► Ipv6 Ambient Networking (Everywhere) ► Open Standards ► Increased bandwidth and coverage Analyze Everything ► Processor Speed ► Big Data Why IoT?
  • 10. Tracking Behavior/Usage Enhanced Situational Awareness Sensor Driven Decision Analytics Process Optimization Optimized Resource Consumption Complex Autonomous Systems IoT Applications Information and Analysis Automation And Control
  • 11. February 15, 201311 Source: Forbes, 7/23/2012 Will you be ready for the M2M world? Ray Wang
  • 12. ► Energy & Water Mgmt. ► Smart City/Smart Planet ► Robotics/Industrial Control ► Bldg. Mgmt./Automation ► Transportation ► Healthcare ► Military ► Retail ► Consumer Tech. Industries Pockets of Innovation, Efficiency, Automation
  • 13. Compliance Confidentiality – Integrity - Availability Intent of Use = Risk Control Boundaries Physical Interactions Kinetic Outcomes
  • 17. ► End-to-end security is not yet addressed in all the IoT related standards ► Attacks at physical layer ► Machine level integrity checks ► Identity linking ► Anonymity ► Secure deployment of credentials for lots of objects ► User interface to control/manage security Security Issues for Pervasive IoT
  • 18. Network Network Types • Shortwave • Satellite • LTE/5G • WiMax/Microwave • WiFi • Femtocell • Bluetooth • Zigbee • Dash7 • PLC Fail-Over Parameters • Speed • Error-rate • Packet Loss • Price • Assurance/Reputation Context Setting • Policy for Connection • Duration • Quality of Service • Policy for Roaming • Policy for Fail-Over • Policy for Compliance
  • 19. ► IPv6 ► Management Tools Available? ► Support in organization for dual networks? ► Ready to leave comfort of NAT? ► Is someone squatting in your dark space? ► Open Flow to Software Defined Networks - Take control out of hands of infrastructure - ACL’s and routing protocols will not provide enough agility for security Emerging Network for IoT
  • 20. ► TRILL ► Possible Spanning Tree Alternative ► Get more efficiency of available bandwidth and meshed network ► Opportunity to Load Balance ► DNS Sec/DANE - Prevent DNS cache poisoning - Obtain Authentication of Named Entities with SSL info on certs Emerging Network for IoT
  • 21. ► Boot or Power On Authentication ► Stop unauthorized devices from entering the network ► Proactive Intelligence in the Flow ► IETF REPUTON and IETF 6MAN/Packet Staining WG ► Include suspicious behavior indicator in flow ► Adaptive Information Infrastructure ► Holonic Systems; Dual in Nature ► Wholes in themselves ► Simultaneously integral or larger wholes ► Competitive Learning ► Nodes compete for right to respond ► Increasing specialization of each node of the cluster IoT Endpoint Control
  • 22. ► Hardware Identification and Access Control ► Specify computing platforms - Intel TXT ► Cloud Security Standards and Metrics ► Zones/Compliance/Service Level for IoT ► Big Data/Analytics/Management ► Access Authority ► Retention Policy ► De-Identification of Context Specific Data Cloud – Data Center - App
  • 23. ► Integrity Control (Endpoints and Embedded Systems) ► Hardware Assisted Rootkit Defense ► Global Threat Intelligence integrated at endpoint and network ► Network IPS and Softswitch IPS ► Asset Detection and Real-time Mgmt. ► Big Security Data Management Today’s Security Options
  • 24. ► IoT will be everywhere ► IoT will need orchestrators who can design and balance risk and reward models ► IoT is challenging and will be complex and intriguing Summary