SlideShare a Scribd company logo
1 of 19
IoT Security
Frank H. Siepmann,CISM,CISSP, ISSAP, NSA-IAM, NSA-IEM
What Is the Internet ofThings (IoT)?
ITUโ€™s Definition:
โ€œInternet of things (IoT): A global
infrastructure for the information
society, enabling advanced
services by interconnecting
(physical and virtual) things based
on existing and evolving
interoperable information and
communication technologiesโ€
Source: International Telecom Union Rec. ITU-T Y.2060 (06/2012)
Categories of IoT Devices
๏‚  Network IoT device (I): Devices that only exist to ensure
Internet connectivity. Examples are Home routers, Home
Automation Hubs, etc.
๏‚  IoT only devices (II): Devices that have been created because of
the Internet connectivity. Examples would be: Amazonโ€™s Echo
and Google Home
๏‚  Legacy IoT enabled devices (III): Devices that have been
around for years or decades that are modified to allow for
Internet connectivity. Examples: Internet enabled Fridge,
ConnectedThermostats, etc.
Common IoTTechnologyVendors
๏‚  Major Software Platforms
๏‚  AndroidThings โ€“ Google
๏‚  Windows 10 IoT โ€“ Microsoft
๏‚  Home Kit โ€“ Apple
๏‚  AWS IoT platform โ€“ Amazon
๏‚  Bosch IoT Suite โ€“ Bosch
๏‚  Device Connection Platform โ€“ Ericsson
๏‚  IoT Foundation Device Cloud โ€“ IBM
๏‚  IoT Analytics Platform โ€“ CISCO
๏‚  Etc.
๏‚  Hardware Platforms
๏‚  Atmel Microcontroller
๏‚  Texas Instruments
๏‚  ARM
๏‚  Qualcomm IoT
๏‚  Intel IoT
๏‚  SamsungArtik IoT
๏‚  LANTronix
๏‚  SierraWireless
๏‚  Etc.
Ecosystems where IoT is being used
๏‚  Home
๏‚  Internet connectivity (e.g. Router)
๏‚  TV,TIVO,VoIP, Home cameras,
๏‚  Home automation (e.g. Locks)
๏‚  Amazon Echo, Google Home, etc.
๏‚  Car
๏‚  Entertainment Center, Hotspot,
Maintenance, Remote control
๏‚  Industry
๏‚  Smart Sensors
๏‚  Programable Logic Controllers (PLC)
Why are IoT DevicesVulnerable?
๏‚  Cost
๏‚  Manufacturing cost < 60 Cents (Source: Goldman Sachs)
๏‚  Full-blown Linux running on single board computer for $5 (Raspberry Zero)
๏‚  Processing Power
๏‚  Many IoT devices are very limited in Resources (Single Core, RAM < 500 MB)
๏‚  History
๏‚  Traditionally Security has not been an issue in the various ecosystems
๏‚  User Negligence
๏‚  Vendor supplied password not changed
๏‚  Insecure protocols (e.g.WEP) not turned off
๏‚  ProprietaryTechnology
๏‚  Not leveraging proven frameworks
๏‚  Segmentation/Trust
๏‚  Relying on โ€œtraditionalโ€ trust models
๏‚  Inability to Update
๏‚  No Update mechanism available to address a new security flaw
Raspberry Pi Zero: $5
IoT Attack Surface
๏‚  Internet
๏‚  Flaws in Internet facing Services
๏‚  Security Flaws in Implementation
๏‚  Wireless
๏‚  Use of InsecureWireless Protocol
๏‚  Security through Proprietary Protocol
๏‚  Security by โ€œDistanceโ€
๏‚  Physical
๏‚  Device is not physically secured
Software Defined Radio (SDR) receives signals 950 โ€“ 2150 MHZ all
for < $25
Shodan โ€“ IoT Search Engine
Shodan
โ€ข Search Engine for Internet
Connected Devices
โ€ข Shows which devices are
connected to the Internet,
where they are located and
who is using them
โ€ข Within minutes a list of
vulnerable devices on the
Internet can be compiled
Wigle.net โ€“Wireless Search Engine
Wigle.net
โ€ข Consolidates location and
information of wireless
networks world-wide to a
central database
โ€ข Site is crowdsourced with
people war-driving and
uploading their data
โ€ข Database can be queried by
applications via an API
Physical Security of IoT devices
Ring โ€“ Doorbell
โ€ข Doorbell that usesWiFi to
connect to Ringโ€™s service,
recording video and allowing
for Intercom
โ€ข WiFi password is stored on
the device
โ€ข Device is programmed via a
USB connector
โ€ข No physical securing of
device, besides some screws
IoT โ€œSpecialโ€ Attack
Vibration Speaker
โ€ข Vibration Speakers (VS) get
connected to surfaces that
are used to emit sound
โ€ข Connecting theVS to the
outside of a door with glass
allows to control devices like
Amazonโ€™s Alexa or Googleโ€™s
Home
โ€ข The possibilities are endless
Examples of IoT Attacks
Webcams used for DDoS
โ€ข Webcams with a security vulnerability
were used to launch one of the largest
DDoS attacks against Dyn, a DNS
service provider.
โ€ข Leveraging an amplification attack the
sheer number of devices was the
reason why the DDoS was initially
successful.
Home Router attacks
โ€ข Wireless Home Routers of various
vendors have been targeted by
malware. Redirecting DNS calls.
โ€ข One malware actually tries to secure the
router by identifying other infections
and trying to remove those.
SAMSUNG Fridge
โ€ข Samsung offers fridges that allow for
your Google Calendar to be displayed.
At least one model was vulnerable to a
man โ€“in-the-middle-attack, not
checking the SSL certificate presented
by Google (or in this case an attacker).
OnStar used to control car
โ€ข OnStar, used in GM vehicles, allowed for
an attacker to eavesdrop on
communication.With that they were
able to unlock the car and start it.
โ€ข Jeep had to recall 1.4m vehicles due to
hackers being able to hijack most of the
carโ€™s electronic functions.
Devilโ€™s Ivy โ€“
Vulnerability in gSoap Library used in IoT
๏‚  gSoap is a framework used by many IoT companies to implement the Open NetworkVideo
Interface Forum (ONVIF) protocol, used by e.g. Security cameras
๏‚  Small company behind gSOAP, known as Genivia, says that at least 34 companies use the code
in their IoT products (mainly physical security products)
๏‚  Genivia provided updated code that fixed the security vulnerability on 6/21/2017 all within 24h
of notification according to Geniviaโ€™s website.
๏‚  Genivia uses static code analysis! However, the flaw was two levels down.
๏‚  Many vendors struggling to get code out to the devices since updating the devices is in some
cases not possible, or users do not know about the flaw or are not skilled to perform an update
With a built-in update mechanism that acts independent from a user, the devices could
be updated as soon as a new firmware is available.
24h for new code, not bad!
Countermeasures
๏‚  Leverage Existing Frameworks
๏‚  Some IoT vendors have the tendency to โ€œre-inventโ€ the wheel e.g. Samsung fridge. This creates a
โ€œuniquenessโ€ that can result in vulnerabilities used but not publicly addressed.
๏‚  Other people with much better cyber security skills can do the work in fixing vulnerabilities for the IoT
company.
๏‚  Segmentation/Trust Relationships
๏‚  IoT devices that have Internet connectivity should not be part of a ecosystem that traditionally trusts each
other just by being a member.
๏‚  Additional mechanisms are needed to establish trust with a IoT device that has Internet connectivity e.g.
signing of messages end-to-end.
๏‚  Do not rely on Users for Security
๏‚  Studies have shown over and over that users are the weak link. One study showed that many IoT users do not
change the vendor set password.Vendors will need to โ€œforceโ€ users to be secure.
๏‚  Built-In Update mechanisms
๏‚  Security โ€œis a journeyโ€ an old saying but still true.What is secure today, might be vulnerable tomorrow.
EconomicTimes 08/13/17 โ€“
โ€œOver 50 Billion IoT Connected Devices By 2020โ€
What does this mean for Cybersecurity and Privacy?
๏‚  Increased complexity when implementing security controls and defining
regulations.
๏‚  Market will expand horizontally and vertically, creating even tighter pricing with
security being one cost factor to shave off.
๏‚  The large number of IoT devices by itself will face the same risks as cloud. If it fails,
it will fail really big.
๏‚  Regulations and laws will require adjustments.Already one case with Amazonโ€™s
Echo and voice recording Amazon keeps.
๏‚  Users will need to learn with IoT being in their homes that someone is watching
and hearing them all the time โ€“ maybe not in real-time.
QUESTIONS ?
Contact Information
Frank H. Siepmann
CISM, CISSP, ISSAP, NSA-IAM, NSA-IEM
Email: Frank.Siepmann@1SSA.NET
Phone: +1-571-982-9907
APPENDIX
Sources
๏‚  ESET survey - https://cdn5-
prodint.esetstatic.com/Imported_from_GWS2_0/US/resources/press/ESET_ConnectedLiv
es-DataSummary.pdf
๏‚  The EconomicTimes โ€“ http://economictimes.indiatimes.com/tech/internet/50-billion-iot-
connected-devices-by-2020-report/articleshow/59580306.cms
๏‚  WIRED - https://www.wired.com/2016/08/jeep-hackers-return-high-speed-steering-
acceleration-hacks/
๏‚  The Register - https://www.theregister.co.uk/2015/08/24/smart_fridge_security_fubar/
๏‚  Forbes - https://www.forbes.com/sites/thomasbrewster/2015/10/01/vigilante-malware-
makes-you-safer/#4b31988b1fd5
๏‚  WIRED - https://www.wired.com/2015/07/gadget-hacks-gm-cars-locate-unlock-start/
๏‚  Devilโ€™s Ivy - https://www.wired.com/story/devils-ivy-iot-vulnerability/
๏‚  VS Attack - https://www.youtube.com/channel/UCi-qfzbdNLFoJCUq8jRF3xw

More Related Content

What's hot

IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntelยฎ Software
ย 
Iot(security)
Iot(security)Iot(security)
Iot(security)Shreya Pohekar
ย 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityTutun Juhana
ย 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsStanford School of Engineering
ย 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoTVasco Veloso
ย 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
ย 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamAmit Rohatgi
ย 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay KumarOWASP Delhi
ย 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9Arvind Tiwary
ย 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesCharalampos Doukas
ย 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015Eurotech
ย 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
ย 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
ย 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prustyamarprusty
ย 
IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetNathan Wallace, PhD, PE
ย 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of ThingsBryan Len
ย 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsForgeRock
ย 

What's hot (20)

IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
ย 
Iot(security)
Iot(security)Iot(security)
Iot(security)
ย 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
ย 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
ย 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
ย 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
ย 
IOT Security
IOT SecurityIOT Security
IOT Security
ย 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you Spam
ย 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay Kumar
ย 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
ย 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
ย 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health Devices
ย 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015
ย 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
ย 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
ย 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
ย 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prusty
ย 
IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the Internet
ย 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
ย 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
ย 

Similar to IoT Security Briefing FBI 07 23-2017 final

Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxvoversbyobersby
ย 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaAvinash Sinha
ย 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
ย 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing BotBellaj Badr
ย 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...IJCSIS Research Publications
ย 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsJay Nagar
ย 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxmariuse18nolet
ย 
SmartSecuritySolution_for_IoT
SmartSecuritySolution_for_IoTSmartSecuritySolution_for_IoT
SmartSecuritySolution_for_IoTShiven Chawla
ย 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
ย 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatDuo Security
ย 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy AnkitThakkar46
ย 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)shashankvaidyar2
ย 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
ย 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
ย 
WHITE PAPERโ–ถ Insecurity in the Internet of Things
WHITE PAPERโ–ถ Insecurity in the Internet of ThingsWHITE PAPERโ–ถ Insecurity in the Internet of Things
WHITE PAPERโ–ถ Insecurity in the Internet of ThingsSymantec
ย 
Personal data breaches and securing IoT devicesยท By Damon Culber.docx
Personal data breaches and securing IoT devicesยท By Damon Culber.docxPersonal data breaches and securing IoT devicesยท By Damon Culber.docx
Personal data breaches and securing IoT devicesยท By Damon Culber.docxherbertwilson5999
ย 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisDaksh Raj Chopra
ย 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
ย 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
ย 

Similar to IoT Security Briefing FBI 07 23-2017 final (20)

Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
ย 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
ย 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
ย 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
ย 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
ย 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security Controls
ย 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
ย 
SmartSecuritySolution_for_IoT
SmartSecuritySolution_for_IoTSmartSecuritySolution_for_IoT
SmartSecuritySolution_for_IoT
ย 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
ย 
pptt.pptx
pptt.pptxpptt.pptx
pptt.pptx
ย 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
ย 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy
ย 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)
ย 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
ย 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
ย 
WHITE PAPERโ–ถ Insecurity in the Internet of Things
WHITE PAPERโ–ถ Insecurity in the Internet of ThingsWHITE PAPERโ–ถ Insecurity in the Internet of Things
WHITE PAPERโ–ถ Insecurity in the Internet of Things
ย 
Personal data breaches and securing IoT devicesยท By Damon Culber.docx
Personal data breaches and securing IoT devicesยท By Damon Culber.docxPersonal data breaches and securing IoT devicesยท By Damon Culber.docx
Personal data breaches and securing IoT devicesยท By Damon Culber.docx
ย 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
ย 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
ย 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
ย 

Recently uploaded

( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...nilamkumrai
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...SUHANI PANDEY
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
ย 
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
ย 
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLLucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLimonikaupta
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
ย 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
ย 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...SUHANI PANDEY
ย 
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort ServiceEnjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort ServiceDelhi Call girls
ย 
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
ย 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
ย 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
ย 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...roncy bisnoi
ย 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...SUHANI PANDEY
ย 
Enjoy NightโšกCall Girls Samalka Delhi >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Samalka Delhi >เผ’8448380779 Escort ServiceEnjoy NightโšกCall Girls Samalka Delhi >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Samalka Delhi >เผ’8448380779 Escort ServiceDelhi Call girls
ย 

Recently uploaded (20)

( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
ย 
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
ย 
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLLucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
ย 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
ย 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
ย 
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort ServiceEnjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort Service
ย 
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
ย 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
ย 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
ย 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
ย 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
ย 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
ย 
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐ŸฅตLow Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
ย 
Enjoy NightโšกCall Girls Samalka Delhi >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Samalka Delhi >เผ’8448380779 Escort ServiceEnjoy NightโšกCall Girls Samalka Delhi >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Samalka Delhi >เผ’8448380779 Escort Service
ย 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
ย 

IoT Security Briefing FBI 07 23-2017 final

  • 1. IoT Security Frank H. Siepmann,CISM,CISSP, ISSAP, NSA-IAM, NSA-IEM
  • 2. What Is the Internet ofThings (IoT)? ITUโ€™s Definition: โ€œInternet of things (IoT): A global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologiesโ€ Source: International Telecom Union Rec. ITU-T Y.2060 (06/2012)
  • 3. Categories of IoT Devices ๏‚  Network IoT device (I): Devices that only exist to ensure Internet connectivity. Examples are Home routers, Home Automation Hubs, etc. ๏‚  IoT only devices (II): Devices that have been created because of the Internet connectivity. Examples would be: Amazonโ€™s Echo and Google Home ๏‚  Legacy IoT enabled devices (III): Devices that have been around for years or decades that are modified to allow for Internet connectivity. Examples: Internet enabled Fridge, ConnectedThermostats, etc.
  • 4. Common IoTTechnologyVendors ๏‚  Major Software Platforms ๏‚  AndroidThings โ€“ Google ๏‚  Windows 10 IoT โ€“ Microsoft ๏‚  Home Kit โ€“ Apple ๏‚  AWS IoT platform โ€“ Amazon ๏‚  Bosch IoT Suite โ€“ Bosch ๏‚  Device Connection Platform โ€“ Ericsson ๏‚  IoT Foundation Device Cloud โ€“ IBM ๏‚  IoT Analytics Platform โ€“ CISCO ๏‚  Etc. ๏‚  Hardware Platforms ๏‚  Atmel Microcontroller ๏‚  Texas Instruments ๏‚  ARM ๏‚  Qualcomm IoT ๏‚  Intel IoT ๏‚  SamsungArtik IoT ๏‚  LANTronix ๏‚  SierraWireless ๏‚  Etc.
  • 5. Ecosystems where IoT is being used ๏‚  Home ๏‚  Internet connectivity (e.g. Router) ๏‚  TV,TIVO,VoIP, Home cameras, ๏‚  Home automation (e.g. Locks) ๏‚  Amazon Echo, Google Home, etc. ๏‚  Car ๏‚  Entertainment Center, Hotspot, Maintenance, Remote control ๏‚  Industry ๏‚  Smart Sensors ๏‚  Programable Logic Controllers (PLC)
  • 6. Why are IoT DevicesVulnerable? ๏‚  Cost ๏‚  Manufacturing cost < 60 Cents (Source: Goldman Sachs) ๏‚  Full-blown Linux running on single board computer for $5 (Raspberry Zero) ๏‚  Processing Power ๏‚  Many IoT devices are very limited in Resources (Single Core, RAM < 500 MB) ๏‚  History ๏‚  Traditionally Security has not been an issue in the various ecosystems ๏‚  User Negligence ๏‚  Vendor supplied password not changed ๏‚  Insecure protocols (e.g.WEP) not turned off ๏‚  ProprietaryTechnology ๏‚  Not leveraging proven frameworks ๏‚  Segmentation/Trust ๏‚  Relying on โ€œtraditionalโ€ trust models ๏‚  Inability to Update ๏‚  No Update mechanism available to address a new security flaw Raspberry Pi Zero: $5
  • 7. IoT Attack Surface ๏‚  Internet ๏‚  Flaws in Internet facing Services ๏‚  Security Flaws in Implementation ๏‚  Wireless ๏‚  Use of InsecureWireless Protocol ๏‚  Security through Proprietary Protocol ๏‚  Security by โ€œDistanceโ€ ๏‚  Physical ๏‚  Device is not physically secured Software Defined Radio (SDR) receives signals 950 โ€“ 2150 MHZ all for < $25
  • 8. Shodan โ€“ IoT Search Engine Shodan โ€ข Search Engine for Internet Connected Devices โ€ข Shows which devices are connected to the Internet, where they are located and who is using them โ€ข Within minutes a list of vulnerable devices on the Internet can be compiled
  • 9. Wigle.net โ€“Wireless Search Engine Wigle.net โ€ข Consolidates location and information of wireless networks world-wide to a central database โ€ข Site is crowdsourced with people war-driving and uploading their data โ€ข Database can be queried by applications via an API
  • 10. Physical Security of IoT devices Ring โ€“ Doorbell โ€ข Doorbell that usesWiFi to connect to Ringโ€™s service, recording video and allowing for Intercom โ€ข WiFi password is stored on the device โ€ข Device is programmed via a USB connector โ€ข No physical securing of device, besides some screws
  • 11. IoT โ€œSpecialโ€ Attack Vibration Speaker โ€ข Vibration Speakers (VS) get connected to surfaces that are used to emit sound โ€ข Connecting theVS to the outside of a door with glass allows to control devices like Amazonโ€™s Alexa or Googleโ€™s Home โ€ข The possibilities are endless
  • 12. Examples of IoT Attacks Webcams used for DDoS โ€ข Webcams with a security vulnerability were used to launch one of the largest DDoS attacks against Dyn, a DNS service provider. โ€ข Leveraging an amplification attack the sheer number of devices was the reason why the DDoS was initially successful. Home Router attacks โ€ข Wireless Home Routers of various vendors have been targeted by malware. Redirecting DNS calls. โ€ข One malware actually tries to secure the router by identifying other infections and trying to remove those. SAMSUNG Fridge โ€ข Samsung offers fridges that allow for your Google Calendar to be displayed. At least one model was vulnerable to a man โ€“in-the-middle-attack, not checking the SSL certificate presented by Google (or in this case an attacker). OnStar used to control car โ€ข OnStar, used in GM vehicles, allowed for an attacker to eavesdrop on communication.With that they were able to unlock the car and start it. โ€ข Jeep had to recall 1.4m vehicles due to hackers being able to hijack most of the carโ€™s electronic functions.
  • 13. Devilโ€™s Ivy โ€“ Vulnerability in gSoap Library used in IoT ๏‚  gSoap is a framework used by many IoT companies to implement the Open NetworkVideo Interface Forum (ONVIF) protocol, used by e.g. Security cameras ๏‚  Small company behind gSOAP, known as Genivia, says that at least 34 companies use the code in their IoT products (mainly physical security products) ๏‚  Genivia provided updated code that fixed the security vulnerability on 6/21/2017 all within 24h of notification according to Geniviaโ€™s website. ๏‚  Genivia uses static code analysis! However, the flaw was two levels down. ๏‚  Many vendors struggling to get code out to the devices since updating the devices is in some cases not possible, or users do not know about the flaw or are not skilled to perform an update With a built-in update mechanism that acts independent from a user, the devices could be updated as soon as a new firmware is available. 24h for new code, not bad!
  • 14. Countermeasures ๏‚  Leverage Existing Frameworks ๏‚  Some IoT vendors have the tendency to โ€œre-inventโ€ the wheel e.g. Samsung fridge. This creates a โ€œuniquenessโ€ that can result in vulnerabilities used but not publicly addressed. ๏‚  Other people with much better cyber security skills can do the work in fixing vulnerabilities for the IoT company. ๏‚  Segmentation/Trust Relationships ๏‚  IoT devices that have Internet connectivity should not be part of a ecosystem that traditionally trusts each other just by being a member. ๏‚  Additional mechanisms are needed to establish trust with a IoT device that has Internet connectivity e.g. signing of messages end-to-end. ๏‚  Do not rely on Users for Security ๏‚  Studies have shown over and over that users are the weak link. One study showed that many IoT users do not change the vendor set password.Vendors will need to โ€œforceโ€ users to be secure. ๏‚  Built-In Update mechanisms ๏‚  Security โ€œis a journeyโ€ an old saying but still true.What is secure today, might be vulnerable tomorrow.
  • 15. EconomicTimes 08/13/17 โ€“ โ€œOver 50 Billion IoT Connected Devices By 2020โ€ What does this mean for Cybersecurity and Privacy? ๏‚  Increased complexity when implementing security controls and defining regulations. ๏‚  Market will expand horizontally and vertically, creating even tighter pricing with security being one cost factor to shave off. ๏‚  The large number of IoT devices by itself will face the same risks as cloud. If it fails, it will fail really big. ๏‚  Regulations and laws will require adjustments.Already one case with Amazonโ€™s Echo and voice recording Amazon keeps. ๏‚  Users will need to learn with IoT being in their homes that someone is watching and hearing them all the time โ€“ maybe not in real-time.
  • 17. Contact Information Frank H. Siepmann CISM, CISSP, ISSAP, NSA-IAM, NSA-IEM Email: Frank.Siepmann@1SSA.NET Phone: +1-571-982-9907
  • 19. Sources ๏‚  ESET survey - https://cdn5- prodint.esetstatic.com/Imported_from_GWS2_0/US/resources/press/ESET_ConnectedLiv es-DataSummary.pdf ๏‚  The EconomicTimes โ€“ http://economictimes.indiatimes.com/tech/internet/50-billion-iot- connected-devices-by-2020-report/articleshow/59580306.cms ๏‚  WIRED - https://www.wired.com/2016/08/jeep-hackers-return-high-speed-steering- acceleration-hacks/ ๏‚  The Register - https://www.theregister.co.uk/2015/08/24/smart_fridge_security_fubar/ ๏‚  Forbes - https://www.forbes.com/sites/thomasbrewster/2015/10/01/vigilante-malware- makes-you-safer/#4b31988b1fd5 ๏‚  WIRED - https://www.wired.com/2015/07/gadget-hacks-gm-cars-locate-unlock-start/ ๏‚  Devilโ€™s Ivy - https://www.wired.com/story/devils-ivy-iot-vulnerability/ ๏‚  VS Attack - https://www.youtube.com/channel/UCi-qfzbdNLFoJCUq8jRF3xw