SlideShare une entreprise Scribd logo
1  sur  38
Adrian Wright
VP Research & Board - ISSA-UK
CEO - Secoda Risk Management
The Internet of Things
What should we start thinking about & planning now?
Enterprise & The Internet of Things
Hitchhikers Guide to the Thingiverse1
New World? Or just Hype?2
Technology Drivers, Enablers, Challenges3
4 Security & Privacy Issues
Summary & Questions5
Start with a good quote:
And some cynical humour for good measure:
Talk is everywhere - even if IoT isn’t yet
"The Internet of Things is not a concept; it is a network. The true technology-
enabled Network of all networks". Edewede Oriwoh
(bio: http://www.researchgate.net/profile/Edewede_Oriwoh/ )
More devices than people
Implications
• IoT = Future where everyday physical objects will be connected to the
Internet and will be able to identify themselves to other devices
• IoT = Integration of the physical and virtual world
• IoT = Significant, as when a physical object is represented in the virtual
world it can be connected to other virtually represented objects & data
• IoT = Object can be monitored & managed based on preset
parameters
• IoT = Huge revenue opportunity to mobile operators. $1.2 trillion by
2020* Most profit coming from app devt rather than delivering
connectivity
* GSMA report Oct 2011 with AT&T, Deutsche Bank, KT, Telenor Connexion, Vodafone & Machina Research. Link to Report here:
http://machinaresearch.com/report-m2m-communications-service-provider-benchmarking-report-2013/
Projected growth
On the road to somewhere
When will it all happen?
Link to original paper: http://www.booz.com/media/file/Rise_Of_Generation_C.pdf
Gartner Hype Cycle
Link to image source: http://joemurphylibraryfuture.com/gartner-2012-hype-cycle-for-emerging-technologies/
M2M Your Life
Its already here…in places
However:
• Existing M2M solutions highly fragmented & typically
dedicated to a single application (e.g. fleet management,
meter reading, vending machines).
• Multitude of technical solutions & dispersed
standardisation activities result in slow development of
global M2M market.
• Standardisation is key enabler to remove technical barriers
& ensure interoperable M2M services & networks
• M2M / IoT has huge potential but currently comprises a
heterogeneous collection of established & emerging (often
competing) technologies & standards (although moves are
afoot here). This is because the concept applies to & has
grown from, a wide range of market sectors.
Market example – smart parking
What is it?
• Once upon a time the Internet was about connecting people via their
computers
• Then mobile allowed people to connect while on the move
• As simpler devices come equipped with IP connections, people have
largely left the room leaving all sorts of devices talking directly to each
other and to higher systems via the web, without human intervention or
supervision
• By 2020 30-50 billion ‘things’ will be connected to the internet, from
simple widgets like temperature sensors & domestic water meters to
more critical devices like medical monitors, power plant telemetry &
ATMs
• This is called M2M (Machine to Machine) communication, as distinct
from H2H (Human to Human) & dubbed “The Internet of Things”* (IoT)
• Today 12 bn devices connected to the internet, incl 8 bn mobile devices
* Term initially used by Kevin Ashton in 1999 (About Kevin Ashton: http://kevinjashton.com/ )
Will it actually happen in Enterprises?
No Yes
• No interoperability Standard(s):
• We create an “Internet of Silos”
• Privacy & Security Fears
• Slow transition to IPv6
• Big data analytics not evolved
• Battery technology doesn’t outstrip
Moore's Law
• No clear business benefits
• We can’t manage it
• Interoperability & connectivity sorted
• Standard(s) adopted
• Security & Privacy issues contained
• Large IP address ranges available
• Data analytics scale to meet
challenges
• Battery & solar technologies keep pace
• Clear business benefits identified
• Management supervisory systems &
standards emerge
Partially
Fragmented
Slower uptake
IoT Plans
Why bother now?
• Forrester say there’s low ‘connected world’
adoption among enterprise customers.
• 2013 networks & telecoms survey says
“50% of companies have no interest and/or
no plans to implement M2M or IoT
capabilities, while just 8% tell us they have
implemented”
• Lack of interest causes:
– security concerns (37%);
– costs (32%);
– technology immaturity (25%);
– integration challenges;
– migration and/or installation risks;
– regulatory issues.
• More pressing priorities
• Your strategy might simply be to say, ‘let’s
wait and see.”
• Historically, when we try to play catch
up – we never actually do
• Retrofitting costly & ineffective
• Like early PCs, dot com, mobile
adopters – early pioneers were winners
• If it takes off: You snooze – you lose!
CIO Viewpoint
Enterprise
Business/
Customer
Opportunity
Employees
IoT
(BYOD)
Internal
IoT
Implications for CIOs
• IoT in workplace will be another BYOD – IoT enabled personal devices
• Bring-your-own-Cloud: already here but IoT brings tighter integration
• Low-end infrastructure devices will start to appear IoT enabled
• Privacy issues: blurring the line between private & business data
• Liability questions: employee personal banking etc.
• ISACA recommends five steps enterprises can take to be agile in the
Internet of Things era:
– 1. Act quickly; enterprises cannot afford to be reactive
– 2. Govern the initiative to ensure that data remain secure and risks are
managed
– 3. Identify expected benefits and how to measure them
– 4. Leverage internal technology steering committee to communicate
benefits to the board.
– 5. Embrace creativity and encourage innovation.
CIO Challenges / Opportunities
• Technical debt (aka code quality) exposing creaking architecture to big data,
customers, salespeople
– Might want to start technical debt reversal sooner than later
• User driven and they’ll expect to just do things when the time comes
– Connectivity is key
• In many cases IoT systems using firmware that’s hard or impossible to patch
• Building automation is absolutely ripe for exploitation.
• The trick is to resolutely deploy the hype shield & look out for information
content that will deliver real value to the organisation.
“Much of the value from the Internet of
Things will come from the data, making Big
Data analysis a cornerstone of the success
of the Internet of Things and a clear reason
for CIOs to be involved.”
Concepts & Jargon
• Things: Physical entities whose identity, state (or surroundings) capable of
being relayed to an internet-connected IT infrastructure.
– Anything to which you can attach a sensor — a cow in a field, a container on a cargo
vessel, the air-conditioning unit in your office, a lamppost in the street — can
become a node in the Internet of Things.
• Sensors: Components of 'things' that gather and/or disseminate data
– e.g. location, altitude, velocity, temperature, illumination, motion, power, humidity,
blood sugar, air quality, soil moisture - you name it.
– Not ‘computers’ as such but have CPU, memory, storage, I/O, OS, app s/w
– Key point is increasingly cheap, plentiful, can communicate via internet & other
internet-connected devices
• Comms: (local-area) All IoT sensors require some means of relaying data to
the outside world.
– Plethora of short-range or local area, wireless technologies available incl RFID,
NFC, Wi-Fi, Bluetooth, Wireless M-Bus + wired Ethernet
Concepts & Jargon (cont.)
Libelium's customisable Waspmote
sensor/comms board (left) and the
Waspmote Plug & Sense enclosure (right),
with connections for sensors, antennas, a
solar panel and USB PC connectivity
• Comms: (wide-area) links, existing mobile
networks GSM, GPRS, 3G, LTE or WiMAX &
satellite connections.
– New wireless networks ultra-narrowband
SIGFOX & TV white-space NeulNET
emerging specifically for M2M connectivity.
– Fixed 'things' in convenient locations could
use wired Ethernet or phone lines for wide-
area connections
• Server: (on premise)
– Some M2M installations use local server to
collect & analyse data - both real time and
episodically - from assets on the local area
network.
– On-premise servers or simpler gateways
usually also connect cloud-based storage &
services.
Concepts & Jargon (cont.)
• Local scanning device: 'Things' with short-range
sensors located in a restricted area but not
permanently connected to a local area network
– (RFID-tagged livestock on a farm, or credit-card-toting
shoppers in a mall, for example). In this case, local
scanning devices extract data and transmit it onwards
for processing
• Storage & analytics: IoT will require massive,
scalable, storage & processing capacity
– Will almost invariably reside in the cloud, except for
specific localised or security-sensitive cases.
– Service providers will need access here to curate the
data & tweak analytics, but also for LoB processes
such as customer relations, billing, technical support
• User-facing services:
– Subsets of data & analyses from the IoT available to
users or subscribers, presented (hopefully) via easily
accessible navigable interfaces on full spectrum of
secure client devices
Network-level shift & challenges
• IoT data transfer patterns differ fundamentally from classic 'human-to-
human'.
• M2M communications orders of magnitude more nodes than H2H
– mostly low-bandwidth, upload-biased traffic.
• Many M2M applications need to deliver & process information in real
time, or near-real-time.
– Many nodes will have to be extremely low-power or self-powered (eg. solar
powered) devices.
• Requires billions of new IP addresses we currently don’t have.
– IPv4 restricted to c. 4.3 billion addresses.
– IPv6 required but it will have to be lightweight (likely with trimmed-down
security attributes)
– APNIC has already run out of addresses. Reclamation of unused IPv4
address space. Markets in IP addresses - to buy back space.
– Urgency on transition mechanisms IPv4 to 6
“The world as we have created it is a process of our thinking.
It cannot be changed without changing our thinking."
Albert Einstein”
Privacy anyone?
What’s changed security-wise?
• Underlying principle of M2M communications isn't particularly new.
– Similar technology has been used for decades at power stations, water utilities,
building control and management systems, usually in the more recognisable form of
supervisory control and data acquisition (SCADA) systems.
• However these systems are typically custom implementations
– Often running proprietary operating systems, and without any particular standard to
follow. Assumption is usually that they’re behind a firewall
• CT scanners, MRI scanners, dialysis machines - they're on an internet.
– They talk IP, and they have massively vulnerable operating systems. They're running
embedded versions of Windows
• Smart meters, ATMs, SCADA systems, rollout of patches and updates
– Tends to be slower than you would normally have compared with your home PC,
where you get a normal update every week or so or every month
– there's a lightweight version of IPv6 you can use on M2M type of communications, but
it's not full IPv6
• Sheer scale and numbers of things to secure…
Control Maturity
Unconsciously
Uncontrolled
Consciously
Uncontrolled
Unconsciously
Controlled
Consciously
Controlled
Unaware of what IoT is
No strategy / policy
No definition
No deployment visibility or
control
Some strategy & policy
Some definition & insight
Maybe some standards
No education & awareness
No process for identifying ,
controlling & managing
deployments
No strategy & policy
No definition & insight
But no deployments due to
other reasons:
Culture / fixed mindset / rigid
command & control
Technical, economic or other
inhibitors
Its known & understood
Well communicated
strategy, policy, stds
Governs appropriate use
Good awareness
Visibility & control of all
deployment programmes
Security FUD corner
• The security implications are obvious, where hackers might able to do anything
from running up people’s electricity bills to shutting down an oil pipeline.
– We’ve already had a preview of this with the Stuxnet SCADA story and M2M / The
Internet of Things will take us infinitely deeper into that territory…
• Denial of service (DoS) could have new consequences.
– Many field-based devices will be powered from batteries. Hit them with long bursts
of spurious requests and you’ll kill their power.
• Encrypting information tends to be a processor-intensive task
– Meaning devices need to be selective as to what to encrypt, as opposed to the
web's trend toward full end-to-end encryption.
– Unless nanotechnology and battery manufacturing increases as per Moore's Law,
it's going to be a huge issue.
• You don't want to have devices with any kind of identification left lying around
– Need effective disposal or self-disposal processes built into protocols. Once
decommissioned they'll need to ‘mission impossible’ – like, self destruct remotely
• Slow transition from IPv4 networks to IPv6 could harm M2M uptake.
– With IPv4 addresses nearing exhaustion, networks simply won't have enough
addresses to assign to the explosion of devices unless they transition to IPv6
No security standard…anytime soon
• "It's either going to take a standard for the industry to agree on, or a
very powerful vendor to make things work, so that everyone kind of
says, 'Well, that works, so I'm just going to use that for the pure ease of
use.' It might be completely proprietary, but all we really care about is
that stuff works and stuff's secure, in that order, unfortunately."
• “It's entirely possible that despite the work by research groups,
standards and possibly security could be circumvented entirely if a
powerful enough company stepped up”
• "We can be sure of one thing: The lion’s share of IoT growth over the
next 3-5 years is going to occur in market segments where the value is
tangible – and these are almost wholly seen in the business-centric
marketplace". Alex Brisbourne
Security forecast
• Information Security is often an afterthought for nascent technology &
nearly always in catch-up mode, retrofitting, patching, firefighting.
• IoT presents a unique opportunity to build in security from the off
• If IoT takes off as predicted, there won’t be opportunities to retrofit
security after the fact, due to sheer scale & technical issues
• Whoever achieves market dominance over IoT could ultimately hold
the keys to securing civilisation – and might not do a good job of it!
• Market fragmentation and resulting lack of standards major problem
• Low-cost, mass-market devices from China or ?? What’s in them?
• Western civilisation will be hugely more vulnerable than those who
might attack us. Critical infrastructure, privacy et al
• In this future gold rush, will security be sacrificed for other gains?
• PRISM, NSA, Orwell,1984 & Big Brother. When everything and
everyone can be tracked & monitored – who will police the police?
CIO Priorities - Gartner
Gartner analysts advise CIOs to do 3 things now:
• Start taking a lead figuring out information needs the organisations has
from its own Internet of Things.
– Information analysis drive business case, re efficiency, reduced costs &
increased revenue.
• Create a team to become the experts on Internet of Things.
– Build knowledge, skills & partnerships.
• Ensure big data efforts are aligned with your IoT strategies
– Data analysis is the driving force behind IoT, and should include the
information you intend to get from your network of “things”
Things to ponder
1. Is this a new problem, or just a new take on an existing one?
2. Are there enough IP addresses available for these billions of 'things'? Or will
we be forced into IPv6, carrier-grade NAT, or end up putting large numbers of
devices behind each public IP address, and what are the security implications
of those choices?
3. The dumber the connected device, the more basic the security attributes of
the device are likely to be. So how will the billions of such devices be security-
monitored and updated to maintain security in the face of emerging threats?
4. What are the implications for protecting critical infrastructure and cyber-
warfare/espionage? Could hackers shut off all our water, drain our bank
accounts, melt our ice cream and turn all the traffic lights to red?
5. Flooding market with low-cost, mass-market devices usually means buying
from economies like China or Vietnam. With the Huawei debate escalating,
how can we be certain of no hidden trapdoors inside these widgets?
6. Big Data: do we have the technologies to analyse massive amounts of data?
7. With the PRISM scandal, will Privacy become an obsolete concept?
Help!
Link to original work: http://farm2.staticflickr.com/1419/5159177886_1276e96f54_b.jpg
Get Involved!
We need to look ahead this time!
adrian.wright@issa-uk.org
adrian.wright@secoda.com
t. 44 (0)8456 4 27001
m.44 (0)780 363 9704

Contenu connexe

Tendances

IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain ConvergenceAhmed Banafa
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Sudha Jamthe
 
Next Dimension IIoT Presentation
Next Dimension IIoT PresentationNext Dimension IIoT Presentation
Next Dimension IIoT PresentationNext Dimension Inc.
 
10 predictions for the future of IoT
10 predictions for the future of IoT10 predictions for the future of IoT
10 predictions for the future of IoTAhmed Banafa
 
Four essential truths of the IoT
Four essential truths of the IoTFour essential truths of the IoT
Four essential truths of the IoTW. David Stephenson
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)milemadinah
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019Ahmed Banafa
 
Internet of everything ppt
Internet of everything pptInternet of everything ppt
Internet of everything pptLavanya Sharma
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT Ahmed Banafa
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019Ahmed Banafa
 
IoT, AI and Blockchain: Catalysts for Digital Transformation
IoT, AI and Blockchain: Catalysts for Digital TransformationIoT, AI and Blockchain: Catalysts for Digital Transformation
IoT, AI and Blockchain: Catalysts for Digital TransformationAhmed Banafa
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principlesardexateam
 
What is next for IoT and IIoT
What is next for IoT and IIoTWhat is next for IoT and IIoT
What is next for IoT and IIoTAhmed Banafa
 
IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018Mario Drobics
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017Ahmed Banafa
 

Tendances (20)

IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
 
Next Dimension IIoT Presentation
Next Dimension IIoT PresentationNext Dimension IIoT Presentation
Next Dimension IIoT Presentation
 
10 predictions for the future of IoT
10 predictions for the future of IoT10 predictions for the future of IoT
10 predictions for the future of IoT
 
Four essential truths of the IoT
Four essential truths of the IoTFour essential truths of the IoT
Four essential truths of the IoT
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
Internet of everything ppt
Internet of everything pptInternet of everything ppt
Internet of everything ppt
 
INTERNET OF THINGS
INTERNET OF THINGSINTERNET OF THINGS
INTERNET OF THINGS
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
IoT -Internet of Things
IoT -Internet of ThingsIoT -Internet of Things
IoT -Internet of Things
 
IoT, AI and Blockchain: Catalysts for Digital Transformation
IoT, AI and Blockchain: Catalysts for Digital TransformationIoT, AI and Blockchain: Catalysts for Digital Transformation
IoT, AI and Blockchain: Catalysts for Digital Transformation
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
M2M_IoT_Presentation
M2M_IoT_PresentationM2M_IoT_Presentation
M2M_IoT_Presentation
 
What is next for IoT and IIoT
What is next for IoT and IIoTWhat is next for IoT and IIoT
What is next for IoT and IIoT
 
IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017
 
Internet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for futureInternet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for future
 

En vedette

DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012Kim Jensen
 
Protecting Essential Information
Protecting Essential InformationProtecting Essential Information
Protecting Essential InformationKim Jensen
 
Café Gennemslagskraft I Pressen Mar10
Café Gennemslagskraft I Pressen Mar10Café Gennemslagskraft I Pressen Mar10
Café Gennemslagskraft I Pressen Mar10AVCmm
 
One Year in Cape Town: Still in Love? By Permjot Valia
One Year in Cape Town: Still in Love? By Permjot Valia One Year in Cape Town: Still in Love? By Permjot Valia
One Year in Cape Town: Still in Love? By Permjot Valia RAMP Group
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter packKim Jensen
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsKim Jensen
 

En vedette (8)

DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012
 
Protecting Essential Information
Protecting Essential InformationProtecting Essential Information
Protecting Essential Information
 
Café Gennemslagskraft I Pressen Mar10
Café Gennemslagskraft I Pressen Mar10Café Gennemslagskraft I Pressen Mar10
Café Gennemslagskraft I Pressen Mar10
 
One Year in Cape Town: Still in Love? By Permjot Valia
One Year in Cape Town: Still in Love? By Permjot Valia One Year in Cape Town: Still in Love? By Permjot Valia
One Year in Cape Town: Still in Love? By Permjot Valia
 
Chm slides lektion 03
Chm slides lektion 03Chm slides lektion 03
Chm slides lektion 03
 
Dom Pedro I
Dom Pedro IDom Pedro I
Dom Pedro I
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter pack
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 

Similaire à ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014

Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoTAhmed Banafa
 
IoT-Introduction.pptx
IoT-Introduction.pptxIoT-Introduction.pptx
IoT-Introduction.pptxImpanaR2
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxSelva914004
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptnadoje
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptxOdedeleIfeoluwa
 
IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesAsim Rais Siddiqui
 
2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptxssuser2cc0d4
 
IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017paul young cpa, cga
 
Iot.pptx
Iot.pptxIot.pptx
Iot.pptxgagag8
 
2016 iot summit_guy_bieber9
2016 iot summit_guy_bieber92016 iot summit_guy_bieber9
2016 iot summit_guy_bieber9Guy Bieber
 
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)Jackson Shaw
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalEslam Nader
 
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxThe-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxHadHic
 

Similaire à ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014 (20)

Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
 
IoT-Introduction.pptx
IoT-Introduction.pptxIoT-Introduction.pptx
IoT-Introduction.pptx
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
CHA_001_IOT.pptx
CHA_001_IOT.pptxCHA_001_IOT.pptx
CHA_001_IOT.pptx
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
 
IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and Challenges
 
Shubham hatzade
Shubham hatzadeShubham hatzade
Shubham hatzade
 
Leveraging IOT and Latest Technologies
Leveraging IOT and Latest TechnologiesLeveraging IOT and Latest Technologies
Leveraging IOT and Latest Technologies
 
2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx
 
Iot presentation1
Iot presentation1Iot presentation1
Iot presentation1
 
IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017
 
Iot.pptx
Iot.pptxIot.pptx
Iot.pptx
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
2016 iot summit_guy_bieber9
2016 iot summit_guy_bieber92016 iot summit_guy_bieber9
2016 iot summit_guy_bieber9
 
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digital
 
The internet of things
The internet of thingsThe internet of things
The internet of things
 
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxThe-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
 

Dernier

Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 

Dernier (20)

Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 

ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014

  • 1. Adrian Wright VP Research & Board - ISSA-UK CEO - Secoda Risk Management The Internet of Things What should we start thinking about & planning now?
  • 2. Enterprise & The Internet of Things Hitchhikers Guide to the Thingiverse1 New World? Or just Hype?2 Technology Drivers, Enablers, Challenges3 4 Security & Privacy Issues Summary & Questions5
  • 3. Start with a good quote: And some cynical humour for good measure:
  • 4. Talk is everywhere - even if IoT isn’t yet
  • 5. "The Internet of Things is not a concept; it is a network. The true technology- enabled Network of all networks". Edewede Oriwoh (bio: http://www.researchgate.net/profile/Edewede_Oriwoh/ )
  • 7. Implications • IoT = Future where everyday physical objects will be connected to the Internet and will be able to identify themselves to other devices • IoT = Integration of the physical and virtual world • IoT = Significant, as when a physical object is represented in the virtual world it can be connected to other virtually represented objects & data • IoT = Object can be monitored & managed based on preset parameters • IoT = Huge revenue opportunity to mobile operators. $1.2 trillion by 2020* Most profit coming from app devt rather than delivering connectivity * GSMA report Oct 2011 with AT&T, Deutsche Bank, KT, Telenor Connexion, Vodafone & Machina Research. Link to Report here: http://machinaresearch.com/report-m2m-communications-service-provider-benchmarking-report-2013/
  • 9. On the road to somewhere
  • 10. When will it all happen? Link to original paper: http://www.booz.com/media/file/Rise_Of_Generation_C.pdf
  • 11. Gartner Hype Cycle Link to image source: http://joemurphylibraryfuture.com/gartner-2012-hype-cycle-for-emerging-technologies/
  • 13. Its already here…in places However: • Existing M2M solutions highly fragmented & typically dedicated to a single application (e.g. fleet management, meter reading, vending machines). • Multitude of technical solutions & dispersed standardisation activities result in slow development of global M2M market. • Standardisation is key enabler to remove technical barriers & ensure interoperable M2M services & networks • M2M / IoT has huge potential but currently comprises a heterogeneous collection of established & emerging (often competing) technologies & standards (although moves are afoot here). This is because the concept applies to & has grown from, a wide range of market sectors.
  • 14. Market example – smart parking
  • 15. What is it? • Once upon a time the Internet was about connecting people via their computers • Then mobile allowed people to connect while on the move • As simpler devices come equipped with IP connections, people have largely left the room leaving all sorts of devices talking directly to each other and to higher systems via the web, without human intervention or supervision • By 2020 30-50 billion ‘things’ will be connected to the internet, from simple widgets like temperature sensors & domestic water meters to more critical devices like medical monitors, power plant telemetry & ATMs • This is called M2M (Machine to Machine) communication, as distinct from H2H (Human to Human) & dubbed “The Internet of Things”* (IoT) • Today 12 bn devices connected to the internet, incl 8 bn mobile devices * Term initially used by Kevin Ashton in 1999 (About Kevin Ashton: http://kevinjashton.com/ )
  • 16. Will it actually happen in Enterprises? No Yes • No interoperability Standard(s): • We create an “Internet of Silos” • Privacy & Security Fears • Slow transition to IPv6 • Big data analytics not evolved • Battery technology doesn’t outstrip Moore's Law • No clear business benefits • We can’t manage it • Interoperability & connectivity sorted • Standard(s) adopted • Security & Privacy issues contained • Large IP address ranges available • Data analytics scale to meet challenges • Battery & solar technologies keep pace • Clear business benefits identified • Management supervisory systems & standards emerge Partially Fragmented Slower uptake
  • 18. Why bother now? • Forrester say there’s low ‘connected world’ adoption among enterprise customers. • 2013 networks & telecoms survey says “50% of companies have no interest and/or no plans to implement M2M or IoT capabilities, while just 8% tell us they have implemented” • Lack of interest causes: – security concerns (37%); – costs (32%); – technology immaturity (25%); – integration challenges; – migration and/or installation risks; – regulatory issues. • More pressing priorities • Your strategy might simply be to say, ‘let’s wait and see.” • Historically, when we try to play catch up – we never actually do • Retrofitting costly & ineffective • Like early PCs, dot com, mobile adopters – early pioneers were winners • If it takes off: You snooze – you lose!
  • 20. Implications for CIOs • IoT in workplace will be another BYOD – IoT enabled personal devices • Bring-your-own-Cloud: already here but IoT brings tighter integration • Low-end infrastructure devices will start to appear IoT enabled • Privacy issues: blurring the line between private & business data • Liability questions: employee personal banking etc. • ISACA recommends five steps enterprises can take to be agile in the Internet of Things era: – 1. Act quickly; enterprises cannot afford to be reactive – 2. Govern the initiative to ensure that data remain secure and risks are managed – 3. Identify expected benefits and how to measure them – 4. Leverage internal technology steering committee to communicate benefits to the board. – 5. Embrace creativity and encourage innovation.
  • 21. CIO Challenges / Opportunities • Technical debt (aka code quality) exposing creaking architecture to big data, customers, salespeople – Might want to start technical debt reversal sooner than later • User driven and they’ll expect to just do things when the time comes – Connectivity is key • In many cases IoT systems using firmware that’s hard or impossible to patch • Building automation is absolutely ripe for exploitation. • The trick is to resolutely deploy the hype shield & look out for information content that will deliver real value to the organisation. “Much of the value from the Internet of Things will come from the data, making Big Data analysis a cornerstone of the success of the Internet of Things and a clear reason for CIOs to be involved.”
  • 22. Concepts & Jargon • Things: Physical entities whose identity, state (or surroundings) capable of being relayed to an internet-connected IT infrastructure. – Anything to which you can attach a sensor — a cow in a field, a container on a cargo vessel, the air-conditioning unit in your office, a lamppost in the street — can become a node in the Internet of Things. • Sensors: Components of 'things' that gather and/or disseminate data – e.g. location, altitude, velocity, temperature, illumination, motion, power, humidity, blood sugar, air quality, soil moisture - you name it. – Not ‘computers’ as such but have CPU, memory, storage, I/O, OS, app s/w – Key point is increasingly cheap, plentiful, can communicate via internet & other internet-connected devices • Comms: (local-area) All IoT sensors require some means of relaying data to the outside world. – Plethora of short-range or local area, wireless technologies available incl RFID, NFC, Wi-Fi, Bluetooth, Wireless M-Bus + wired Ethernet
  • 23. Concepts & Jargon (cont.) Libelium's customisable Waspmote sensor/comms board (left) and the Waspmote Plug & Sense enclosure (right), with connections for sensors, antennas, a solar panel and USB PC connectivity • Comms: (wide-area) links, existing mobile networks GSM, GPRS, 3G, LTE or WiMAX & satellite connections. – New wireless networks ultra-narrowband SIGFOX & TV white-space NeulNET emerging specifically for M2M connectivity. – Fixed 'things' in convenient locations could use wired Ethernet or phone lines for wide- area connections • Server: (on premise) – Some M2M installations use local server to collect & analyse data - both real time and episodically - from assets on the local area network. – On-premise servers or simpler gateways usually also connect cloud-based storage & services.
  • 24. Concepts & Jargon (cont.) • Local scanning device: 'Things' with short-range sensors located in a restricted area but not permanently connected to a local area network – (RFID-tagged livestock on a farm, or credit-card-toting shoppers in a mall, for example). In this case, local scanning devices extract data and transmit it onwards for processing • Storage & analytics: IoT will require massive, scalable, storage & processing capacity – Will almost invariably reside in the cloud, except for specific localised or security-sensitive cases. – Service providers will need access here to curate the data & tweak analytics, but also for LoB processes such as customer relations, billing, technical support • User-facing services: – Subsets of data & analyses from the IoT available to users or subscribers, presented (hopefully) via easily accessible navigable interfaces on full spectrum of secure client devices
  • 25. Network-level shift & challenges • IoT data transfer patterns differ fundamentally from classic 'human-to- human'. • M2M communications orders of magnitude more nodes than H2H – mostly low-bandwidth, upload-biased traffic. • Many M2M applications need to deliver & process information in real time, or near-real-time. – Many nodes will have to be extremely low-power or self-powered (eg. solar powered) devices. • Requires billions of new IP addresses we currently don’t have. – IPv4 restricted to c. 4.3 billion addresses. – IPv6 required but it will have to be lightweight (likely with trimmed-down security attributes) – APNIC has already run out of addresses. Reclamation of unused IPv4 address space. Markets in IP addresses - to buy back space. – Urgency on transition mechanisms IPv4 to 6
  • 26. “The world as we have created it is a process of our thinking. It cannot be changed without changing our thinking." Albert Einstein”
  • 28. What’s changed security-wise? • Underlying principle of M2M communications isn't particularly new. – Similar technology has been used for decades at power stations, water utilities, building control and management systems, usually in the more recognisable form of supervisory control and data acquisition (SCADA) systems. • However these systems are typically custom implementations – Often running proprietary operating systems, and without any particular standard to follow. Assumption is usually that they’re behind a firewall • CT scanners, MRI scanners, dialysis machines - they're on an internet. – They talk IP, and they have massively vulnerable operating systems. They're running embedded versions of Windows • Smart meters, ATMs, SCADA systems, rollout of patches and updates – Tends to be slower than you would normally have compared with your home PC, where you get a normal update every week or so or every month – there's a lightweight version of IPv6 you can use on M2M type of communications, but it's not full IPv6 • Sheer scale and numbers of things to secure…
  • 29. Control Maturity Unconsciously Uncontrolled Consciously Uncontrolled Unconsciously Controlled Consciously Controlled Unaware of what IoT is No strategy / policy No definition No deployment visibility or control Some strategy & policy Some definition & insight Maybe some standards No education & awareness No process for identifying , controlling & managing deployments No strategy & policy No definition & insight But no deployments due to other reasons: Culture / fixed mindset / rigid command & control Technical, economic or other inhibitors Its known & understood Well communicated strategy, policy, stds Governs appropriate use Good awareness Visibility & control of all deployment programmes
  • 30. Security FUD corner • The security implications are obvious, where hackers might able to do anything from running up people’s electricity bills to shutting down an oil pipeline. – We’ve already had a preview of this with the Stuxnet SCADA story and M2M / The Internet of Things will take us infinitely deeper into that territory… • Denial of service (DoS) could have new consequences. – Many field-based devices will be powered from batteries. Hit them with long bursts of spurious requests and you’ll kill their power. • Encrypting information tends to be a processor-intensive task – Meaning devices need to be selective as to what to encrypt, as opposed to the web's trend toward full end-to-end encryption. – Unless nanotechnology and battery manufacturing increases as per Moore's Law, it's going to be a huge issue. • You don't want to have devices with any kind of identification left lying around – Need effective disposal or self-disposal processes built into protocols. Once decommissioned they'll need to ‘mission impossible’ – like, self destruct remotely • Slow transition from IPv4 networks to IPv6 could harm M2M uptake. – With IPv4 addresses nearing exhaustion, networks simply won't have enough addresses to assign to the explosion of devices unless they transition to IPv6
  • 31. No security standard…anytime soon • "It's either going to take a standard for the industry to agree on, or a very powerful vendor to make things work, so that everyone kind of says, 'Well, that works, so I'm just going to use that for the pure ease of use.' It might be completely proprietary, but all we really care about is that stuff works and stuff's secure, in that order, unfortunately." • “It's entirely possible that despite the work by research groups, standards and possibly security could be circumvented entirely if a powerful enough company stepped up” • "We can be sure of one thing: The lion’s share of IoT growth over the next 3-5 years is going to occur in market segments where the value is tangible – and these are almost wholly seen in the business-centric marketplace". Alex Brisbourne
  • 32. Security forecast • Information Security is often an afterthought for nascent technology & nearly always in catch-up mode, retrofitting, patching, firefighting. • IoT presents a unique opportunity to build in security from the off • If IoT takes off as predicted, there won’t be opportunities to retrofit security after the fact, due to sheer scale & technical issues • Whoever achieves market dominance over IoT could ultimately hold the keys to securing civilisation – and might not do a good job of it! • Market fragmentation and resulting lack of standards major problem • Low-cost, mass-market devices from China or ?? What’s in them? • Western civilisation will be hugely more vulnerable than those who might attack us. Critical infrastructure, privacy et al • In this future gold rush, will security be sacrificed for other gains? • PRISM, NSA, Orwell,1984 & Big Brother. When everything and everyone can be tracked & monitored – who will police the police?
  • 33. CIO Priorities - Gartner Gartner analysts advise CIOs to do 3 things now: • Start taking a lead figuring out information needs the organisations has from its own Internet of Things. – Information analysis drive business case, re efficiency, reduced costs & increased revenue. • Create a team to become the experts on Internet of Things. – Build knowledge, skills & partnerships. • Ensure big data efforts are aligned with your IoT strategies – Data analysis is the driving force behind IoT, and should include the information you intend to get from your network of “things”
  • 34. Things to ponder 1. Is this a new problem, or just a new take on an existing one? 2. Are there enough IP addresses available for these billions of 'things'? Or will we be forced into IPv6, carrier-grade NAT, or end up putting large numbers of devices behind each public IP address, and what are the security implications of those choices? 3. The dumber the connected device, the more basic the security attributes of the device are likely to be. So how will the billions of such devices be security- monitored and updated to maintain security in the face of emerging threats? 4. What are the implications for protecting critical infrastructure and cyber- warfare/espionage? Could hackers shut off all our water, drain our bank accounts, melt our ice cream and turn all the traffic lights to red? 5. Flooding market with low-cost, mass-market devices usually means buying from economies like China or Vietnam. With the Huawei debate escalating, how can we be certain of no hidden trapdoors inside these widgets? 6. Big Data: do we have the technologies to analyse massive amounts of data? 7. With the PRISM scandal, will Privacy become an obsolete concept?
  • 35. Help! Link to original work: http://farm2.staticflickr.com/1419/5159177886_1276e96f54_b.jpg
  • 37. We need to look ahead this time!