SlideShare a Scribd company logo
1 of 25
Download to read offline
IoT Security
John Patrick Lita
Information Security Consultant
Agenda
• IOT How it Starts
• The internet of Things
• Purpose of IoT
• IOT Challenges
• The Stuxtnet
• IOT Landscape
2
How it start
Image from: http://asmarterplanet.com/blog/2014/09/ramping-up.html
3
Effect of the Internet
Image from: https://foxxr.com/internet-marketing/social-media-marketing/
4
Internet Usage and Population
Statistics
Source: www.internetlivestats.com/internet-users-by-country/
5
IOT Connected worldwide
https://iot-analytics.com/10-internet-of-things-applications/
6
Example of IoT Revolution
Industrial Automation Health Care Automation Smart Cars
Smart City Smart House Human no smart
7
What is IoT? 8
The internet of things (IoT) is the
network of physical devices, vehicles,
buildings and other items—embedded
with electronics, software, sensors,
actuators, and network connectivity
that enable these objects to collect
and exchange data.
The Internet of Things
• The term Internet of Things
was first used by Kevin
Ashton in 1999.
• uniquely identifiable through
its embedded computing
system but is able to
interoperate within the
existing Internet
infrastructure
9
IOT Characteristics
Ambient
Intelligence
Flexible
Structure
Semantic
Sharing
Complex
Access
Technology
Event
Driven
10
Technology Implementation
RFID Sensor Smart Tech Nano Tech
To identify
and track
the data
of things
To collect
and process
the data to
detect the
changes in
the physical
status of
things
To enhance
the power
of the
network by
devolving
processing
capabilities
to different
part of the
network.
To make the
smaller and
smaller
things have
the ability
to connect
and interact.
11
Purpose of Internet of Things
IOT
Application
Management
Retail
Logistics
Health Care
Food
Education
12
Management
• Waste Management
• Data Management
• Production Management
• Urban Management
• Energy Management
• Transportation
Management
13
Health Management
• Your Medical Record is stored as Data
• Track your Drug Usage / Dosage
• Web Application for Hospital / Pharmacy
• Efficiency delivering emergency treatment
more faster
• Manage your Check-up using a mobile
application
14
Traffic Management
• Reduce Traffic Congestion
• Sensors connected to traffic signal keeping sending information to a
central server o number of vehicles piling
• Analytics platform get real-time data from sensors, traffic signals within 2
km of intended junction & GIS Mapping of roads
• Save Life on road
• A message is sent to the ambulance display panel in front of the driver
informing him which the road to take
• A message is also sent to hospital system prompting them to get ready
including auto message to the doctor’s phone to rush back if he is out
• Help Prevent and Catch crime
• All information from CCTV, Sensors on the road, criminal database and
information from police command centre is continuously fed to analytics
platform which keeps analysing the information and take decisions
• Police squad is dispatched to site to check bad contents and take
necessary actions
Source: http://www.cisco.com/web/IN/about/network/smart_traffic.html
15
Food Management
• Cutting waste when storing crops, by continuously
monitoring for microscopic pests that will spoil
then
• Monitoring the activities of livestock, ensuring
optimum diary yields
• Nutrition calculations
• Control food quality, health and safety
• Prevent over production and shortage
• Cab produce affordable food because of less in
transpiration (No man in the middle), Direct Buyers
to Sellers
16
Education Management
• School Administration
• Attendance Management
• Voting System
• Enrolment System
• School Security
• Monitoring the numbers of people inside the school building
• Monitoring the Entrance and the presence of any individual
for emergency purpose
• Teaching Management
• Video presentation
• Information Management
• Foreign Language learning
• Time paced and long distance education
Source:
http://www.systech.com/the-implications-of-the-internet-of-things-for-education
http://blogs.princeton.edu/etc/2012/02/24/the-internet-of-things/
17
IOT Timeline 18
IOT Challenges 19
5 Key Challenges for the Industrial
Internet of Things (IIoT)
Key Challenge #1: Settling on Device Capabilities
•The real risk to what we call ‘manufacturing integrity’ is when products
and services that may be well suited for a typical office setting are
presented as solving the same problems in a manufacturing environment
without completely understanding the associated requirements
(environmental, hazardous areas, reliability and availability of services,
etc.)
Key Challenge #2: Supply Chain Concerns
•Functionality is not the only focus that manufacturers will need to address
in the coming years. Cost and industrial reliability will also play a part as
early adopters vie to make the transition to IIoT. As embedded systems
increasingly make their way into enterprises, the onus will be on
manufacturers to maintain the integrity of their supply chains.
Source: www.tripwire.com/state-of-security/featured/5-key-challenges-for-the-industrial-internet-of-things-iiot/
20
5 Key Challenges for the Industrial
Internet of Things (IIoT)
Key Challenge #3: Security
• IIoT devices are in no way exempt from this. For example, according to Carr, “the
brief period of time it takes to plug in a laptop (that has an internet connection) to a
flow computer in order to download a software upgrade is all it takes to upload
malicious malware such as BlackEnergy or Stuxnet.”
Key Challenge #4: Bridging the Gaps that Divide Us
• Security is a significant concern when it comes to implementing IoT. However, as with
any new technology, technical problems are ultimately no match for issues that divide
people and prevent us from working and adapting together.
• And IT engineers and architects must understand the difference between business
processes and manufacturing processes
Key Challenge #5: Safety
• The fifth and final key challenge enterprises face when implementing IIoT is safety.
This concern relates to how the deep integration of connected devices and physical
controls are introducing new methods of attack.
Source: www.tripwire.com/state-of-security/featured/5-key-challenges-for-the-industrial-internet-of-things-iiot/
21
Video Presentation:
Stuxnet explanation and Demo
https://www.youtube.com/watch?v=RS2WGRP7DpA
22
IOT Landscape 23
References:
• http://www.slideshare.net/MhaeLyn/iot-30545508
• http://asmarterplanet.com/blog/2014/09/ramping-up.html
• https://foxxr.com/internet-marketing/social-media-marketing
• https://iot-analytics.com/10-internet-of-things-applications/
• http://www.cisco.com/web/IN/about/network/smart_traffic.html
• http://www.systech.com/the-implications-of-the-internet-of-things-for-
education
• www.tripwire.com/state-of-security/featured/5-key-challenges-for-the-
industrial-internet-of-things-iiot/
• http://blogs.princeton.edu/etc/2012/02/24/the-internet-of-things/
Youtube Video Stuxnet Explanation and Demonstration:
• https://www.youtube.com/watch?v=RS2WGRP7DpA
24
Thank you for Listening! 25
John Patrick Lita
john.patrick.lita@owasp.org
www.owasp.org/index.php/Manila

More Related Content

What's hot

All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018Ahmed Banafa
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain ConvergenceAhmed Banafa
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsChromeInfo Technologies
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
 
IoT advatage and disadvantage
IoT advatage and disadvantageIoT advatage and disadvantage
IoT advatage and disadvantageRubel Biswas
 
Internet of things –
Internet of things –Internet of things –
Internet of things –Mathews Job
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT securityIoT613
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceAltoros
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
Chapter 3.docx
Chapter 3.docxChapter 3.docx
Chapter 3.docxAmir Khan
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Sudha Jamthe
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019Ahmed Banafa
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystemrahulbindra
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIAhmed Banafa
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionDr Laurent Guiraud
 
IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018Mario Drobics
 

What's hot (20)

All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
Ethical issues in internet of things
Ethical issues in internet of thingsEthical issues in internet of things
Ethical issues in internet of things
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
IoT advatage and disadvantage
IoT advatage and disadvantageIoT advatage and disadvantage
IoT advatage and disadvantage
 
Internet of things –
Internet of things –Internet of things –
Internet of things –
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to Face
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
Chapter 3.docx
Chapter 3.docxChapter 3.docx
Chapter 3.docx
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystem
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a Solution
 
IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018
 

Viewers also liked

Understanding sql Injection
Understanding sql InjectionUnderstanding sql Injection
Understanding sql InjectionPotato
 
Machine Learning/ Data Science: Boosting Predictive Analytics Model Performance
Machine Learning/ Data Science: Boosting Predictive Analytics Model PerformanceMachine Learning/ Data Science: Boosting Predictive Analytics Model Performance
Machine Learning/ Data Science: Boosting Predictive Analytics Model PerformanceT. Scott Clendaniel
 
Understanding dom based xss
Understanding dom based xssUnderstanding dom based xss
Understanding dom based xssPotato
 
Understanding CSRF
Understanding CSRFUnderstanding CSRF
Understanding CSRFPotato
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT securityJulien Vermillard
 
Web appsec and it’s 10 best SDLC practices
Web appsec and it’s 10 best SDLC practicesWeb appsec and it’s 10 best SDLC practices
Web appsec and it’s 10 best SDLC practicesPotato
 
Makalah teori ukuran dan peluang
Makalah teori ukuran dan peluangMakalah teori ukuran dan peluang
Makalah teori ukuran dan peluangrukmono budi utomo
 
Bab2 merakit merawat dan_memperbaiki_komputer_personal
Bab2 merakit merawat dan_memperbaiki_komputer_personalBab2 merakit merawat dan_memperbaiki_komputer_personal
Bab2 merakit merawat dan_memperbaiki_komputer_personalAgung Sakepris
 
From Problems to Preventive Care
From Problems to Preventive CareFrom Problems to Preventive Care
From Problems to Preventive Carefaultyadult7689
 
Tugas Metode Numerik Pendidikan Matematika UMT
Tugas Metode Numerik Pendidikan Matematika UMTTugas Metode Numerik Pendidikan Matematika UMT
Tugas Metode Numerik Pendidikan Matematika UMTrukmono budi utomo
 
Ayurveda for fall health
Ayurveda for fall healthAyurveda for fall health
Ayurveda for fall healthNeelam Toprani
 
2014 Shipper Symposium - Becoming a Shipper of Choice
2014 Shipper Symposium - Becoming a Shipper of Choice2014 Shipper Symposium - Becoming a Shipper of Choice
2014 Shipper Symposium - Becoming a Shipper of ChoiceTransplace
 
The Three Little Aviator Pigs By Brad Hatcher
The Three Little Aviator Pigs By Brad HatcherThe Three Little Aviator Pigs By Brad Hatcher
The Three Little Aviator Pigs By Brad HatcherBrad Hatcher
 
MGT101 - Financial Accounting- Lecture 42
MGT101 - Financial Accounting- Lecture 42MGT101 - Financial Accounting- Lecture 42
MGT101 - Financial Accounting- Lecture 42Bilal Ahmed
 

Viewers also liked (19)

Understanding sql Injection
Understanding sql InjectionUnderstanding sql Injection
Understanding sql Injection
 
Machine Learning/ Data Science: Boosting Predictive Analytics Model Performance
Machine Learning/ Data Science: Boosting Predictive Analytics Model PerformanceMachine Learning/ Data Science: Boosting Predictive Analytics Model Performance
Machine Learning/ Data Science: Boosting Predictive Analytics Model Performance
 
Understanding dom based xss
Understanding dom based xssUnderstanding dom based xss
Understanding dom based xss
 
Understanding CSRF
Understanding CSRFUnderstanding CSRF
Understanding CSRF
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
 
Web appsec and it’s 10 best SDLC practices
Web appsec and it’s 10 best SDLC practicesWeb appsec and it’s 10 best SDLC practices
Web appsec and it’s 10 best SDLC practices
 
Makalah teori ukuran dan peluang
Makalah teori ukuran dan peluangMakalah teori ukuran dan peluang
Makalah teori ukuran dan peluang
 
Optimisasi
OptimisasiOptimisasi
Optimisasi
 
Bab9 wan
Bab9 wanBab9 wan
Bab9 wan
 
Uniformes oficial
Uniformes oficialUniformes oficial
Uniformes oficial
 
Bab2 merakit merawat dan_memperbaiki_komputer_personal
Bab2 merakit merawat dan_memperbaiki_komputer_personalBab2 merakit merawat dan_memperbaiki_komputer_personal
Bab2 merakit merawat dan_memperbaiki_komputer_personal
 
From Problems to Preventive Care
From Problems to Preventive CareFrom Problems to Preventive Care
From Problems to Preventive Care
 
Tugas Metode Numerik Pendidikan Matematika UMT
Tugas Metode Numerik Pendidikan Matematika UMTTugas Metode Numerik Pendidikan Matematika UMT
Tugas Metode Numerik Pendidikan Matematika UMT
 
Ayurveda for fall health
Ayurveda for fall healthAyurveda for fall health
Ayurveda for fall health
 
2014 Shipper Symposium - Becoming a Shipper of Choice
2014 Shipper Symposium - Becoming a Shipper of Choice2014 Shipper Symposium - Becoming a Shipper of Choice
2014 Shipper Symposium - Becoming a Shipper of Choice
 
The Three Little Aviator Pigs By Brad Hatcher
The Three Little Aviator Pigs By Brad HatcherThe Three Little Aviator Pigs By Brad Hatcher
The Three Little Aviator Pigs By Brad Hatcher
 
Web 2ggg
Web 2gggWeb 2ggg
Web 2ggg
 
MGT101 - Financial Accounting- Lecture 42
MGT101 - Financial Accounting- Lecture 42MGT101 - Financial Accounting- Lecture 42
MGT101 - Financial Accounting- Lecture 42
 
:3
:3:3
:3
 

Similar to IOT Security - ICCT College of Engineering

Industrial engineering 4.0
Industrial engineering 4.0Industrial engineering 4.0
Industrial engineering 4.0Pramod kathamore
 
2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptxssuser2cc0d4
 
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityPro Mrkt
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptxChandravadhanaNaraya
 
19ESKCS144_Mohit_Jain_IOT.pptx
19ESKCS144_Mohit_Jain_IOT.pptx19ESKCS144_Mohit_Jain_IOT.pptx
19ESKCS144_Mohit_Jain_IOT.pptxMohitJain686863
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesAhmed Banafa
 
Internet Of Things (IOT) For Beginners
Internet Of Things (IOT) For BeginnersInternet Of Things (IOT) For Beginners
Internet Of Things (IOT) For BeginnersSrashti Jain
 
IT to IOT Evolution
IT to IOT EvolutionIT to IOT Evolution
IT to IOT EvolutionJayakumar PP
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainHeather Vescent
 
The importance of cie in the digital era
The importance of cie in the digital eraThe importance of cie in the digital era
The importance of cie in the digital eraRicardo de Almeida
 
Presentation on Internet of Things
Presentation on Internet of ThingsPresentation on Internet of Things
Presentation on Internet of ThingsPranay Prabhat
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)milemadinah
 

Similar to IOT Security - ICCT College of Engineering (20)

Internet of things
Internet of thingsInternet of things
Internet of things
 
Industrial engineering 4.0
Industrial engineering 4.0Industrial engineering 4.0
Industrial engineering 4.0
 
2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx
 
IOT PPT.pptx
IOT PPT.pptxIOT PPT.pptx
IOT PPT.pptx
 
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
19ESKCS144_Mohit_Jain_IOT.pptx
19ESKCS144_Mohit_Jain_IOT.pptx19ESKCS144_Mohit_Jain_IOT.pptx
19ESKCS144_Mohit_Jain_IOT.pptx
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
Internet Of Things (IOT) For Beginners
Internet Of Things (IOT) For BeginnersInternet Of Things (IOT) For Beginners
Internet Of Things (IOT) For Beginners
 
IT to IOT Evolution
IT to IOT EvolutionIT to IOT Evolution
IT to IOT Evolution
 
Internet of Things (IoT
Internet of Things (IoTInternet of Things (IoT
Internet of Things (IoT
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
 
The importance of cie in the digital era
The importance of cie in the digital eraThe importance of cie in the digital era
The importance of cie in the digital era
 
Presentation on Internet of Things
Presentation on Internet of ThingsPresentation on Internet of Things
Presentation on Internet of Things
 
IIot_Keynote.pptx
IIot_Keynote.pptxIIot_Keynote.pptx
IIot_Keynote.pptx
 
CHA_001_IOT.pptx
CHA_001_IOT.pptxCHA_001_IOT.pptx
CHA_001_IOT.pptx
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 

IOT Security - ICCT College of Engineering

  • 1. IoT Security John Patrick Lita Information Security Consultant
  • 2. Agenda • IOT How it Starts • The internet of Things • Purpose of IoT • IOT Challenges • The Stuxtnet • IOT Landscape 2
  • 3. How it start Image from: http://asmarterplanet.com/blog/2014/09/ramping-up.html 3
  • 4. Effect of the Internet Image from: https://foxxr.com/internet-marketing/social-media-marketing/ 4
  • 5. Internet Usage and Population Statistics Source: www.internetlivestats.com/internet-users-by-country/ 5
  • 7. Example of IoT Revolution Industrial Automation Health Care Automation Smart Cars Smart City Smart House Human no smart 7
  • 8. What is IoT? 8 The internet of things (IoT) is the network of physical devices, vehicles, buildings and other items—embedded with electronics, software, sensors, actuators, and network connectivity that enable these objects to collect and exchange data.
  • 9. The Internet of Things • The term Internet of Things was first used by Kevin Ashton in 1999. • uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure 9
  • 11. Technology Implementation RFID Sensor Smart Tech Nano Tech To identify and track the data of things To collect and process the data to detect the changes in the physical status of things To enhance the power of the network by devolving processing capabilities to different part of the network. To make the smaller and smaller things have the ability to connect and interact. 11
  • 12. Purpose of Internet of Things IOT Application Management Retail Logistics Health Care Food Education 12
  • 13. Management • Waste Management • Data Management • Production Management • Urban Management • Energy Management • Transportation Management 13
  • 14. Health Management • Your Medical Record is stored as Data • Track your Drug Usage / Dosage • Web Application for Hospital / Pharmacy • Efficiency delivering emergency treatment more faster • Manage your Check-up using a mobile application 14
  • 15. Traffic Management • Reduce Traffic Congestion • Sensors connected to traffic signal keeping sending information to a central server o number of vehicles piling • Analytics platform get real-time data from sensors, traffic signals within 2 km of intended junction & GIS Mapping of roads • Save Life on road • A message is sent to the ambulance display panel in front of the driver informing him which the road to take • A message is also sent to hospital system prompting them to get ready including auto message to the doctor’s phone to rush back if he is out • Help Prevent and Catch crime • All information from CCTV, Sensors on the road, criminal database and information from police command centre is continuously fed to analytics platform which keeps analysing the information and take decisions • Police squad is dispatched to site to check bad contents and take necessary actions Source: http://www.cisco.com/web/IN/about/network/smart_traffic.html 15
  • 16. Food Management • Cutting waste when storing crops, by continuously monitoring for microscopic pests that will spoil then • Monitoring the activities of livestock, ensuring optimum diary yields • Nutrition calculations • Control food quality, health and safety • Prevent over production and shortage • Cab produce affordable food because of less in transpiration (No man in the middle), Direct Buyers to Sellers 16
  • 17. Education Management • School Administration • Attendance Management • Voting System • Enrolment System • School Security • Monitoring the numbers of people inside the school building • Monitoring the Entrance and the presence of any individual for emergency purpose • Teaching Management • Video presentation • Information Management • Foreign Language learning • Time paced and long distance education Source: http://www.systech.com/the-implications-of-the-internet-of-things-for-education http://blogs.princeton.edu/etc/2012/02/24/the-internet-of-things/ 17
  • 20. 5 Key Challenges for the Industrial Internet of Things (IIoT) Key Challenge #1: Settling on Device Capabilities •The real risk to what we call ‘manufacturing integrity’ is when products and services that may be well suited for a typical office setting are presented as solving the same problems in a manufacturing environment without completely understanding the associated requirements (environmental, hazardous areas, reliability and availability of services, etc.) Key Challenge #2: Supply Chain Concerns •Functionality is not the only focus that manufacturers will need to address in the coming years. Cost and industrial reliability will also play a part as early adopters vie to make the transition to IIoT. As embedded systems increasingly make their way into enterprises, the onus will be on manufacturers to maintain the integrity of their supply chains. Source: www.tripwire.com/state-of-security/featured/5-key-challenges-for-the-industrial-internet-of-things-iiot/ 20
  • 21. 5 Key Challenges for the Industrial Internet of Things (IIoT) Key Challenge #3: Security • IIoT devices are in no way exempt from this. For example, according to Carr, “the brief period of time it takes to plug in a laptop (that has an internet connection) to a flow computer in order to download a software upgrade is all it takes to upload malicious malware such as BlackEnergy or Stuxnet.” Key Challenge #4: Bridging the Gaps that Divide Us • Security is a significant concern when it comes to implementing IoT. However, as with any new technology, technical problems are ultimately no match for issues that divide people and prevent us from working and adapting together. • And IT engineers and architects must understand the difference between business processes and manufacturing processes Key Challenge #5: Safety • The fifth and final key challenge enterprises face when implementing IIoT is safety. This concern relates to how the deep integration of connected devices and physical controls are introducing new methods of attack. Source: www.tripwire.com/state-of-security/featured/5-key-challenges-for-the-industrial-internet-of-things-iiot/ 21
  • 22. Video Presentation: Stuxnet explanation and Demo https://www.youtube.com/watch?v=RS2WGRP7DpA 22
  • 24. References: • http://www.slideshare.net/MhaeLyn/iot-30545508 • http://asmarterplanet.com/blog/2014/09/ramping-up.html • https://foxxr.com/internet-marketing/social-media-marketing • https://iot-analytics.com/10-internet-of-things-applications/ • http://www.cisco.com/web/IN/about/network/smart_traffic.html • http://www.systech.com/the-implications-of-the-internet-of-things-for- education • www.tripwire.com/state-of-security/featured/5-key-challenges-for-the- industrial-internet-of-things-iiot/ • http://blogs.princeton.edu/etc/2012/02/24/the-internet-of-things/ Youtube Video Stuxnet Explanation and Demonstration: • https://www.youtube.com/watch?v=RS2WGRP7DpA 24
  • 25. Thank you for Listening! 25 John Patrick Lita john.patrick.lita@owasp.org www.owasp.org/index.php/Manila