Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.

Security for the Internet of Things: A Call to Action

70 779 vues

Publié le

The Internet of Things (IoT) offers many industries significant new opportunities, but it also exposes them and their customers to a host of security issues. Securing the IoT requires new ways of thinking that can defend the enterprise and its customers against attackers and privacy abuses.

Publié dans : Technologie
  • DOWNLOAD FULL BOOKS, INTO AVAILABLE FORMAT ......................................................................................................................... ......................................................................................................................... ,DOWNLOAD FULL. PDF EBOOK here { https://tinyurl.com/yyxo9sk7 } ......................................................................................................................... ,DOWNLOAD FULL. EPUB Ebook here { https://tinyurl.com/yyxo9sk7 } ......................................................................................................................... ,DOWNLOAD FULL. doc Ebook here { https://tinyurl.com/yyxo9sk7 } ......................................................................................................................... ,DOWNLOAD FULL. PDF EBOOK here { https://tinyurl.com/yyxo9sk7 } ......................................................................................................................... ,DOWNLOAD FULL. EPUB Ebook here { https://tinyurl.com/yyxo9sk7 } ......................................................................................................................... ,DOWNLOAD FULL. doc Ebook here { https://tinyurl.com/yyxo9sk7 } ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... .............. Browse by Genre Available eBooks ......................................................................................................................... Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, Cookbooks, Crime, Ebooks, Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult,
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • How can I improve my memory book? How can I improve my memory recall? visit to learn...♥♥♥ https://tinyurl.com/brainpill101
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • DOWNLOAD FULL BOOKS, INTO AVAILABLE FORMAT ......................................................................................................................... ......................................................................................................................... 1.DOWNLOAD FULL. PDF EBOOK here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB Ebook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. doc Ebook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. PDF EBOOK here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB Ebook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. doc Ebook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... .............. Browse by Genre Available eBooks ......................................................................................................................... Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, Cookbooks, Crime, Ebooks, Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult,
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • The security is a important Things
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • My dear, How are you today? i will like to be your friend My name is Sheikha Ghunaim , am a 43 years old divorcee. Please write to me in my email ( Sheikhaghunaim2@hotmail.com ). im honest and open mind single woman. im going to tell more when i see your response. Regards Sheikha.
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici

Security for the Internet of Things: A Call to Action

  1. 1. Security Call to Action: Preparing for the Internet of Things
  2. 2. Copyright © 2015 Accenture All rights reserved. 2 The Internet of Things (IoT) is already here Many industries are now using the IoT, which integrates people, data and intelligent machines—to introduce new products and services, boost customer relationships and improve operations. #IoTSecurity
  3. 3. Copyright © 2015 Accenture All rights reserved. 3 The IoT extends an enterprise’s reach • New applications, digital services and business models • Cost savings from process automation • Increased precision from software controls • Informed decision making regarding physical assets • Real-time process optimization IoT technology is fundamentally changing how industries operate by making possible: The IoT will transform organizations and countries alike, stimulating economic expansions, boosting competitiveness and increasing productivity and growth in industries worldwide. #IoTSecurity Real-time optimization Improved asset utilization Reasoning and taking complex action Informed decision making by physical assets
  4. 4. Copyright © 2015 Accenture All rights reserved. 4 The IoT offers many industries significant new opportunities, but it also exposes them and their customers to a host of security issues: For the IoT to succeed, organizations and consumers need to believe that its benefits outweigh its risks. Today’s connected world presents new security issues *World Economic Forum, in collaboration with Accenture, “Industrial Internet of Things: Unleashing the Potential of Connected Products and Services” • Executives list cyber attack vulnerability as their most important IoT concern, followed closely by personal data breaches* • Previously secure closed systems now offer remote access and control, potentially enabling hostile parties to take control of appliances, machines, finances and identities • Press reports indicate hackers have already breached everything from major corporate databases to thousands of everyday consumer devices #IoTSecurity
  5. 5. Copyright © 2015 Accenture All rights reserved. 5 What security issues do organizations face? IoT-based services (such as medical devices, control systems and vehicles) require continuity and high availability Operational security Privacy Digital identities Software patching Access management Time services Communication protocol diversity Valuable data require protection Many IoT devices lack human users who can install security updates Diverse protocols for IoT devices complicate security Many IoT devices depend on hard-coded access keys, making them vulnerable to attacks In the absence of universal standards, each implementation requires unique approaches to managing authentication and access Logging systems must identify events without relying on time-of-day data Securing the IoT requires new ways of thinking that can defend the enterprise and its customers against attackers and privacy abuses. #IoTSecurity
  6. 6. Copyright © 2015 Accenture All rights reserved. 6 Understanding the IoT threats that applications, networks and devices face • Accessing passwords in plain text • Sending unencrypted confidential information enables eavesdropping • Social engineering attacks that trick users into revealing confidential information Attacks on applications Attacks on networks Attacks on devices • Exploiting vulnerabilities in protocols • Impersonating devices • Inserting rogue devices to gain unauthorized network access • Accessing error information to identify unmonitored information • Targeting end-user devices like TVs and household appliances, or industrial infrastructure such as supervisory control and data acquisition (SCADA) systems • Attacking devices that depend on hard-coded access keys ExamplesThreats • Household heating and power units • Malicious software loaded on point-of- sale terminals to steal credit card and payment information and cause financial, privacy and confidentiality issues • Medical devices, such as insulin pumps and defibrillators with embedded web servers connected to the Internet or hospital networks • Universal plug and play protocol vulnerability • Industrial control systems (SCADA) • Smart meters • Medical devices • Traffic flow sensors • Connected vehicle control systems #IoTSecurity
  7. 7. Copyright © 2015 Accenture All rights reserved. 7 Many industrial control systems employ highly intricate and precise mechanisms that automate complex industrial processes Malicious programming could alter control settings and cause catastrophic failure. Exploring four security scenarios: #1 Industrial control systems Copyright © 2015 Accenture All rights reserved. 7 #IoTSecurity
  8. 8. Copyright © 2015 Accenture All rights reserved. 8 Attacks on connected cars can affect on- board diagnostics and other systems such as the anti-lock brakes. Research firm IHS Automotive estimates that globally, 23 million cars are connected to the Internet in some capacity. By 2020 it expects that figure to rise to 152 million. Exploring four security scenarios: #2 Connected vehicles Copyright © 2015 Accenture All rights reserved. 8 *McCarthy, Niall. “Connected Cars bye the Numbers [Infographic].” Jan 27, 2015. http://www.forbes.com/sites/niallmccarthy/2015/01/27/connected-cars-by-the-numbers- infographic/ #IoTSecurity
  9. 9. Copyright © 2015 Accenture All rights reserved. 9 Exploring four security scenarios: #3 Unmanned aerial vehicles Attacks on unmanned aerial vehicles (drones) could lead to intentional crashes or vehicle theft. Copyright © 2015 Accenture All rights reserved. 9 #IoTSecurity
  10. 10. Copyright © 2015 Accenture All rights reserved. 10 The IoT has enabled the enterprise to connect with suppliers and customers intimately, providing retailers with more information about their consumers than ever – but what does this mean for consumer privacy? Exploring four security scenarios: #4 Connected retail Copyright © 2015 Accenture All rights reserved. 10 #IoTSecurity
  11. 11. Copyright © 2015 Accenture All rights reserved. 11 Security call to action: Gauge security readiness #IoTSecurity
  12. 12. Copyright © 2015 Accenture All rights reserved. 12 • Engineer trust into connected products—Apply secure-by-design principles to components • Adopt a new operational mindset—Continuously monitor the IoT’s operational and security health • Develop contextualized threat models—Incorporate key business goals, the underlying technical infrastructure, and potential threats that can disrupt the business into the models. • Apply mobile and cyber-physical system (CPS) security lessons— Consider the lessons learned in mobile and CPS arenas • Adopt privacy-by-design principles—Maintain access and authorization rights to data sets • Track and use emerging standards—Understand emerging standards and consider joining standards bodies • Continue to educate systems users—Improve recognition of and response to increasingly sophisticated attacks Getting started on the path to increased IoT security #IoTSecurity
  13. 13. Copyright © 2015 Accenture All rights reserved. 13 Share best security practices through a global security commons Broad IoT actions for stakeholders Clarify and simplify data protection and liability policies Collaborate on long- term, strategic R&D to solve security challenges #IoTSecurity
  14. 14. Copyright © 2015 Accenture All rights reserved. 14 #IoTSecurity www.accenture.com/securityIoT Join the conversation #IoTSecurity
  15. 15. Copyright © 2015 Accenture All rights reserved. 15 Contacts #IoTSecurity

×