2. Implementation Areas of IoT and
Productivity Measures
Pitch
Management
40/100
Food
45/100
Retail
75/100
Logistics
50/100
Pharmaceutical Industry
70/100
Education
65/100
3. IoT Characteristic We are in a period where not only
personal computers, tablets and
smart phones but also many
different systems including critical
infrastructures and defense
equipment are connected to the
internet. In parallel with this, cyber
security threats are increasing at
significant levels each passing
day.
Cyber attacks targeting IoT
networks cause unrecoverable
physical and economical impacts.
Event-driven
Environmental information
Flexible structure
Semantic sharing
Complicated access
technologies
5. The ability of
attackers for gaining
access to control
systems having
network connection
is extremely high.
Control systems have
common
vulnerabilities with
traditional
information
technologies.
Protocols that are
not secure but
transfer data are
used.
Vulnerability-related
database attacks and
interruptions in
communication
System Security Basic Control Points
7. Signature-based How Anomaly Detection
Customized
Security Expertise
What-Why Defense Automation
Device-based When Technology-based
Internet-based Where System Control
Attack Detection Who Attack Detection
Before After
Cyber Security Action 5Ws1H
9. Risk Probability Vulnerability Threat
2.2 2.3
3.3
4.5
Education Health Logistics Food
1.1
2.2
3.3
4.4
In threat table, an increase is
observed at breaking points
where sectoral based
productivity improves.
In IoT-based functioning,
cyber security and threat
pain-points are observed.
Productivity Security
10. Inadequate Authentication01
Data Breach and Privacy Violation02
Weak Physical Security03
Insecure Network Services04
Insecure Web Interface05
Deficiencies in Encrypting
Communication06
Insecure Cloud Computing07
Insecure Software08
11. IOT
REPORT InSeptember 2016,security newssiteKrebsOnSecurity
wentdarkformorethan 24hours following whatwas
believed tobearecord breaking 620gigabits oftrafficper
second DDoS attack delivered bytheuseofIoTdevices.
This attackwaslaunched byanIoTbotnet (Mirai DDoS
Trojan) andbelieved tobethelargest DDoS attack against
asecurity blogger. Theattack’ssizewasalmostoverthe
double whatAkamai(the CND andcloud service provider
ofKrebs) hadeverseenbefore.Theattackwassobigthat
Akamaihadtocancel thesecurity blogger’s account.
DOS/DDOSATTACKS
CYBERSECURITY
12. IoT-based Cyber Attacks and Threat Trends
0
1
2
3
4
5
6
DoS/DDoS Internal Threats Malware/APT Phishing Physical Threats Information Security
Flaws
80% Between 2015 Quarter3 – 2016 Quarter4 there has been an increase in economical
losses caused by IoT based cyber attacks. In parallel with this, organizations suffered
significant and unrecoverable data, financial and reputational losses.
13. Analysis Attack Types
Threat Risk
Dos/DDoS Attacks Business Loss
Phishing Attacks Reputation Loss
Malware Attack Financial Loss
Brute Force Attack Process Failure
XSS Vulnerability Privacy Violation
APT Attack Financial Impact
AttackTime Dos/DDoS
Phishing
Brute Force
Malware
SQLi
XSS
Attack
Types
7.2
9.3
6.4
2.2
External
Threat
External
Threat
4.4
3.9 Human
Factor
1st Day 2nd Day 3rd Day 4th Day 5th Day 6th Day 7th Day
AttackAverage
Electronical Systems
Confidential Documents
Critical Processes
NationalCyberSecurityAttackLevels
Attack Percentage
External
Threat