SlideShare une entreprise Scribd logo
1  sur  118
www.rapidstart.com.sg www.globalstf.org
1
Internet of Things (IoT)
Cloud Security
Dr. Anton Ravindran
Lecture at Ryerson Univ - 2014
www.rapidstart.com.sg www.globalstf.org
2
WEB BROWSER
1993
www.rapidstart.com.sg www.globalstf.org
3
5000
Exabytes
www.rapidstart.com.sg www.globalstf.org
4
Bits Metric
1000 1 Kilobit
1000000 1 Megabit
1000000000 1 Gigabit
1000000000000 1 Terabit
1000000000000000 1 Petabit
1000000000000000000 1 Exabit
1000000000000000000000 1 Zettabit
1000000000000000000000000 1 Yottabit
www.rapidstart.com.sg www.globalstf.org
5
90%
www.rapidstart.com.sg www.globalstf.org
6
www.rapidstart.com.sg www.globalstf.org
7
www.rapidstart.com.sg www.globalstf.org
8
IOT CAN BE VIEWED AS A
NETWORK OF NETWORKS
SOURCE: CISCO IBSG
www.rapidstart.com.sg www.globalstf.org
9
THINGS?
www.rapidstart.com.sg www.globalstf.org
10
www.rapidstart.com.sg www.globalstf.org
11
PEOPLE - THINGSPEOPLE - PEOPLE THINGS - THINGS
www.rapidstart.com.sg www.globalstf.org
12
WHAT IS IOT?
• THE INTERNET OF THINGS (IOT) IS THE NETWORK OF PHYSICAL OBJECTS ACCESSED
THROUGH THE INTERNET, AS DEFINED BY TECHNOLOGY ANALYSTS AND VISIONARIES
• THESE OBJECTS CONTAIN EMBEDDED TECHNOLOGY TO INTERACT WITH INTERNAL
STATES OR THE EXTERNAL ENVIRONMENT.
• THEY ARE BASICALLY UNIQUELY IDENTIFIABLE OBJECTS AND THEIR VIRTUAL
REPRESENTATIONS IN AN INTERNET-LIKE STRUCTURE.
www.rapidstart.com.sg www.globalstf.org
13
STRUCTURE OF IOT
www.rapidstart.com.sg www.globalstf.org
14
TECHNOLOGY ROADMAP: THE
INTERNET OF THINGS
www.rapidstart.com.sg www.globalstf.org
15
HOW?
www.rapidstart.com.sg www.globalstf.org
16
www.rapidstart.com.sg www.globalstf.org
17
WHAT WILL WE DO WITH IT?
www.rapidstart.com.sg www.globalstf.org
18
CONNECT WITH THINGS?
18
www.rapidstart.com.sg www.globalstf.org
19
MONITOR THINGS?
www.rapidstart.com.sg www.globalstf.org
20
www.rapidstart.com.sg www.globalstf.org
21
SEARCH FOR THINGS
www.rapidstart.com.sg www.globalstf.org
22
www.rapidstart.com.sg www.globalstf.org
23
MANAGE THINGS
www.rapidstart.com.sg www.globalstf.org
24
CONTROL THINGS
www.rapidstart.com.sg www.globalstf.org
25
www.rapidstart.com.sg www.globalstf.org
26
2035?
Each person to be surrounded by
3,000 to 5,000 connected everyday things?
www.rapidstart.com.sg www.globalstf.org
27
WEAPON OF MASS DISRUPTION?
www.rapidstart.com.sg www.globalstf.org
28
PRIVACY & SECURITY
• IOT RAISES IMPORTANT QUESTIONS AND INTRODUCES NEW CHALLENGES FOR THE
SECURITY OF SYSTEMS AND PROCESSES AND THE PRIVACY OF INDIVIDUALS.
• SOME IOT APPLICATIONS ARE TIGHTLY LINKED TO SENSITIVE INFRASTRUCTURES AND
STRATEGIC SERVICES SUCH AS THE DISTRIBUTION OF WATER AND ELECTRICITY AND THE
SURVEILLANCE OF ASSETS.
• OTHER APPLICATIONS HANDLE SENSITIVE INFORMATION ABOUT PEOPLE, SUCH AS
THEIR LOCATION AND MOVEMENTS, OR THEIR HEALTH AND PURCHASING
PREFERENCES.
• CONFIDENCE IN AND ACCEPTANCE OF IOT WILL DEPEND ON THE PROTECTION IT
PROVIDES TO PEOPLE’S PRIVACY AND THE LEVELS OF SECURITY IT GUARANTEES TO
SYSTEMS AND PROCESSES.
www.rapidstart.com.sg www.globalstf.org
29
www.rapidstart.com.sg www.globalstf.org
30
www.rapidstart.com.sg www.globalstf.org
31
POLICIES & LEGISLATIONS
• INTERNAL POLICIES, STATE LEGAL AND REGULATORY ISSUES ARE EXTREMELY IMPORTANT
WHEN BUILDING IOT SYSTEMS THAT HAVE SECURITY IMPLICATIONS.
• TO VERIFY THAT A SERVICE PROVIDER HAS STRONG POLICIES AND PRACTICES THAT
ADDRESS LEGAL AND REGULATORY ISSUES, EACH CUSTOMER MUST HAVE ITS LEGAL
AND REGULATORY EXPERTS INSPECT THE PROVIDER’S POLICIES AND PRACTICES TO
ENSURE THEIR ADEQUACY.
• THE ISSUES TO BE CONSIDERED IN THIS REGARD INCLUDE DATA SECURITY AND EXPORT,
COMPLIANCE, AUDITING, DATA RETENTION AND DESTRUCTION, AND LEGAL DISCOVERY.
• IN THE AREAS OF DATA RETENTION AND DELETION, TRUSTED STORAGE AND TRUSTED
PLATFORM MODULE ACCESS TECHNIQUES CAN PLAY A KEY ROLE IN LIMITING ACCESS
TO SENSITIVE AND CRITICAL DATA.
www.rapidstart.com.sg www.globalstf.org
32
IT WILL CHANGE OUR LIVES
www.rapidstart.com.sg www.globalstf.org
33
www.rapidstart.com.sg www.globalstf.org
34
DIKW
SOURCE : CHAIM ZINS THEORY OF DIKW
www.rapidstart.com.sg www.globalstf.org
35
DATA
• ONE CANNOT BE ANALYTICAL WITHOUT DATA AND YOU CANT REALLY BE GOOD AT
ANALYTICS WITHOUT GOOD DATA.
www.rapidstart.com.sg www.globalstf.org
36
DATA
• IF DATA QUALITY IS NOT GOOD, THEN NO MATTER WHAT CUTTING ANALYTICAL
LANDSCAPE AND STATE OF ART TECHNOLOGY YOU HAVE IT WOULD BE “GARBAGE IN
GARBAGE OUT”.
• SO BEFORE THE DATA ANALYTICS IS DONE YOU SHOULD FIND A PLACE WHERE ALL THE
DATA ARE CLEANSED, HARMONIZED AND ARE OF GOOD DATA QUALITY.
• IT SOUNDS VERY SIMPLE, BUT IT’S THE MOST DIFFICULT THING AND MOST
ORGANIZATION SPEND LOT OF MONEY AND RESOURCE TO GET THIS CORRECT.
www.rapidstart.com.sg www.globalstf.org
37
INSIGHT VS. HINDSIGHT
ROI
Raw
data
Data
Cleansing &
Classification
Reports
& OLAP
Descriptive
modeling
Predictive
modeling
Data Information Knowledge Intelligence
Optimization
What will happen?
What is the best that
could happen?
EnterprisePerformance
Why did it happen?
Scenario modeling &
root cause analysis
What happened (hindsight)?
How can I act on
this insight?
www.rapidstart.com.sg www.globalstf.org
38
SOURCE: BI INTELLIGENCE
www.rapidstart.com.sg www.globalstf.org
39
TECHNOLOGIES
www.rapidstart.com.sg www.globalstf.org
40
 There are undoubtedly risks associated with the use of
Cloud-based services, just as there are risks associated
other delivery models.
Source: Capgemini
www.rapidstart.com.sg www.globalstf.org
41
HISTORY OF CLOUD
www.rapidstart.com.sg www.globalstf.org
42
FIVE KEY CLOUD ATTRIBUTES
 Shared / pooled resources
 Broad network access
 On-demand self-service
 Scalable and elastic
 Metered by use
www.rapidstart.com.sg www.globalstf.org
43
WHY SECURITY?
 A survey commissioned by Microsoft on ‘Cloud computing
among business leaders and the general population’ states that:
 58% of the general population and 86% of senior business leaders
are excited about the potential of cloud computing.
 But, more than 90% of these same people are concerned about
the security, access and privacy of their own data in the cloud.
Source: Microsoft
www.rapidstart.com.sg www.globalstf.org
44
Source: IBM
www.rapidstart.com.sg www.globalstf.org
45
WHAT IS CLOUD SECURITY?
Cloud
 Agility
 Self-service
 Scale
 Automation
Security
 Gate-keeper
 Standards
 Control
 Centralized
Cloud Security is security principles applied to protect data, applications and
infrastructure associated within the Cloud Computing technology.
www.rapidstart.com.sg www.globalstf.org
46
MARKET ANALYSIS
Market Size:
2012 : US $425.4 Million
2013 : US $629.6 Million
2014 : US $963.4 Million
WHAT MARKET SIZE ARE WE TALKING ABOUT
www.rapidstart.com.sg www.globalstf.org
47
GLOBAL CLOUD SECURITY MARKET GROWTH
ANALYSIS 2012-2014 (US$ MILLION)
425.4
629.6
963.4
0
200
400
600
800
1000
1200
2012 2013 2014
41.4% Compound annual
www.rapidstart.com.sg www.globalstf.org
48
GLOBAL CLOUD SECURITY MARKET BY
END-USER SEGMENTATION
38
31
17
9
5
Large Enterprises
Government Agencies
Cloud Service Providers
Medium Enterprises
www.rapidstart.com.sg www.globalstf.org
49
WHY IS CLOUD SECURITY IMPORTANT
 Increasing Usage of Cloud Services in Non-traditional Sectors
 Growing Adoption of Cloud Services in Government Departments
 Rise in Cloud Service-specific Attacks
 Growing Usage of Cloud Services for Critical Data Storage
 Rise in Employee Mobility
www.rapidstart.com.sg www.globalstf.org
50
CLOUD COMPUTING PROBLEMS
 Most security problems stem from:
 Loss of control
 Lack of trust
 Multi-tenancy
 These problems exist mainly in 3rd party management
models
 Self-managed clouds still have security issues, but not
related to above
www.rapidstart.com.sg www.globalstf.org
51
DEFINING SECURITY IN CLOUD
Confidentiality
Integrity
Availability
Accountability
Assurance
Resilience
Source: NIST
www.rapidstart.com.sg www.globalstf.org
52
TRENDS ASSOCIATED WITH CLOUD
SECURITY
 Increasing Partnerships between CSPs and Security Solution Providers
Expected
 Increasing Emergence of Cloud Service-specific Security Solution Providers
 Identity Management and Encryption to Remain the Top Cloud Security
Solutions Offered
 Increasing Availability of Cloud Security Solutions for Small and Medium-
sized Businesses (SMBs)
 Emergence of Strong Cloud Security Standard and Guidelines
www.rapidstart.com.sg www.globalstf.org
53
DATA SECURITY AND STORAGE
Data-in-transit
Data-at-rest
Processing of Data
(including Multi-tenancy)
www.rapidstart.com.sg www.globalstf.org
54
PRIVATE CLOUD VS. PUBLIC CLOUD
www.rapidstart.com.sg www.globalstf.org
55
CLOUD-BASED ATTACKS AND OUTAGES
www.rapidstart.com.sg www.globalstf.org
56
SONY’S ATTACK
 The Sony Pictures Entertainment hack was a release of confidential data
belonging to Sony Pictures Entertainment on November 24, 2014
 On September 1, 2015, plaintiffs and Sony reached an agreement in principle
to settle all of the claims of the putative class against SPE (Sony Pictures
Entertainment)
www.rapidstart.com.sg www.globalstf.org
57
VERIZON CLOUD OUTAGE
 Verizon (VZ) shut down its cloud infrastructure-as-a-service (IaaS) for roughly
40 hours in January 2015.
 While a cloud provider's worst fear is a prolonged outage, Verizon
Communications stunned customers by scheduling to take its cloud offline
for some 40 hours over the weekend to implement a comprehensive system
maintenance project.
 One reason for the upgrade of its cloud infrastructure, ironically, was to
prevent future outages.
 While many customers were peeved their provider intentionally cut their
cloud service, some took solace knowing Verizon spent those 40 hours
adding seamless upgrade capabilities that would enable future upgrades to
be executed on live systems without disruptions, or even the need to be
reboot servers.
www.rapidstart.com.sg www.globalstf.org
58
GOOGLE COMPUTE ENGINE OUTAGE
 Multiple zones of Google's IaaS offering went down just before midnight of
Feb 18th, 2015. After about an hour of downtime, service for most affected
customers returned around 1 a.m. the next morning.
 While some connectivity issues lasted almost three hours, there were roughly
40 minutes during which most outbound data packets being sent by Google
Compute Engine virtual machines were ending up in the wind.
 Google said the problem was "unacceptable" and apologized to users who
were affected.
www.rapidstart.com.sg www.globalstf.org
59
AOL OUTAGE
 On 2015 February 19, apparently some people were actually affected when
AOL’s email service suffered a widespread outage beginning around 4 a.m.
Eastern.
 The problem, which started in the U.K. and spread to the U.S., made it
impossible for many AOL users to log in to their accounts.
 While the AOL jokes come easy, there were real complaints online from
people still using the vintage email addresses. AOL said a network issue was
at fault.
www.rapidstart.com.sg www.globalstf.org
60
AMAZON OUTAGE #1
 In April 2011, Amazon EC2 went offline due to a network configuration
problem.
 Companies such as Foursquare, Quora, Reddit were offline for 12-48 hrs.
 Companies that had invested in multiple availability zones were less affected
(e.g. Netflix).
 Amazon provided 10 days credit to the companies as compensation.
www.rapidstart.com.sg www.globalstf.org
61
AMAZON OUTAGE #2
 In August 2011, a lightning strike in Dublin caused a datacenter blackout for
24-48 hrs.
 Due to the sudden failure, data in many servers was in an inconsistent state.
 EBS (Elastic Block Storage) services were affected; but EC2 remained online so
this did not count as downtime under the SLA.
 These incidents raised serious doubts about the future of cloud.
www.rapidstart.com.sg www.globalstf.org
62
LESSONS LEARNED
 Manage risks and prepare for failure just as you would with traditional IT.
 Utilize multiple availability zones and multiple regions.
 Design the SLAs carefully.
 Do not take your provider’s assurances for granted.
 Design for the cloud computing model and supplement the resilience of the
cloud provider.
www.rapidstart.com.sg www.globalstf.org
63
We need security at following levels:
 Server Access Security
 Internet Access Security
 Database Access Security
 Data privacy Security
 Program access Sercurity
SECURITY AT DIFFERENT LEVELS
www.rapidstart.com.sg www.globalstf.org
64
Dealing with Network and Physical Layer!!!
Network Layer2
(Host to Cloud)
Physical Layer 1
Physical Layer 2
Network Layer 1
Node X Node Y
www.rapidstart.com.sg www.globalstf.org
65
At Broad Level,
Two major question are:
 How much secure is the data?
 How much secure is the code?
RESEARCH QUESTION
www.rapidstart.com.sg www.globalstf.org
66
 What is Data security at Physical Layer?
 What is Data Security at Network Layer?
 What about investigation Support?
 How much safe is data from Natural Disaster?
 How much trusted is Encryption scheme of Service provider?
WE NEED TO ANSWER FOLLOWING
QUESTION
www.rapidstart.com.sg www.globalstf.org
67
GARTNER FORECAST
www.rapidstart.com.sg www.globalstf.org
68
GLOBAL CLOUD SECURITY SOFTWARE MARKET AS
A PERCENTAGE OF GLOBAL IT
SECURITY SOFTWARE MARKET 2010 AND 2014
Source: TechNavio Analysis
www.rapidstart.com.sg www.globalstf.org
69
CSA ENTERPRISE ARCHITECTURE
 The Trusted Cloud Initiative Reference Architecture is both a methodology
and a set of tools that enables security architects, and risk management
professionals to leverage a common set of solutions.
 These solutions fulfill a set of common requirements that risk managers must
assess regarding the operational status of internal IT security and cloud
provider controls.
www.rapidstart.com.sg www.globalstf.org
70
CSA ENTERPRISE ARCHITECTURE
www.rapidstart.com.sg www.globalstf.org
71
THANK YOU
www.rapidstart.com.sg www.globalstf.org
72
COMMERCIAL VENDOR SOLUTIONS
 Trend Micro SecureCloud
 AppRiver SaaS-based e-mail and Web security tools
 Awareness Technologies
 Barracuda Web Security Flex
 CloudPassage Halo SVM and Halo Firewall
 M86 Security - Secure Web Service Hybrid
 Panda Cloud Protection
 SafeNet's Trusted Cloud Fabric
 Symantec. Cloud Services
www.rapidstart.com.sg www.globalstf.org
73
www.rapidstart.com.sg www.globalstf.org
74
www.rapidstart.com.sg www.globalstf.org
75
OPERATIONAL INTELLIGENCE - IOT
www.rapidstart.com.sg www.globalstf.org
76
IOT – COMING SOON TO AN AIRLINE NEAR YOU
www.rapidstart.com.sg www.globalstf.org
77
“No foreign nation, no hacker, should be able to shut down our networks, steal our
trade secrets, or invade the privacy of American families, especially our kids. We
are making sure our government integrates intelligence to combat cyber threats,
just as we have done to combat terrorism, and tonight, I urge this Congress to
finally pass the legislation we need to better meet the evolving threat of cyber-
attacks, combat identity theft, and protect our children’s information. If we don’t
act, we’ll leave our nation and our economy vulnerable. If we do, we can continue
to protect the technologies that have unleashed untold opportunities for people
around the globe”
www.rapidstart.com.sg www.globalstf.org
78
Date (2014) Company Number of records
exposed
Types of records
25 Jan Michael’s 2,600,000 Payment cards
6 Feb Home Depot 20,000 Employee info
14 Mar Sally Beauty Supply 25,000 Credit/debit card
17 Apr Aaron Brothers 400,000 Payment cards
22 Apr Lowa state University 48,729 Student social security
numbers
30 May Home depot 30,000 Credit/debit card
22 Jul Goodwill Industries 868,000 Payment systems
18 Aug Community Health Systems 4,500,000 Patient data
21 Aug United Postal Service 105,000 Credit/debit card
28 Aug JP Morgan Chase 1,000,000 Financial information
2 Sep Home Depot 56,000,000 Credit/debit card
2 Sep Viator/Trip Advisor 880,000 Payment cards
25 Sep Central Dermatology 76,258 Patient data
7 Nov Home Depot 53,000,000 Email addresses
10 Nov US Postal service 800,000 Personal data
18 Nov Staples 1.200,000 Credit/debit card
www.rapidstart.com.sg www.globalstf.org
79
WHAT IS “CYBERSECURITY?”
www.rapidstart.com.sg www.globalstf.org
80
Source: Scalar
www.rapidstart.com.sg www.globalstf.org
81
Source: Scalar
www.rapidstart.com.sg www.globalstf.org
82
SOME DEFINITIONS
 According to the U.S. Dept of Commerce:
 n. cybersecurity: See “information security”
 n. information security: The protection of information against
unauthorized disclosure, transfer, modification, or destruction, whether
accidental or intentional.
www.rapidstart.com.sg www.globalstf.org
83
SOME DEFINITIONS
 According to H.R. 4246 “Cyber Security Information Act”:
cybersecurity: “The vulnerability of any computing system, software
program, or critical infrastructure to, or their ability to resist, intentional
interference, compromise, or incapacitation through the misuse of, or by
unauthorized means of, the Internet, public or private telecommunications
systems or other similar conduct that violates Federal, State, or international
law, that harms interstate commerce of the United States, or that threatens
public health or safety.”
www.rapidstart.com.sg www.globalstf.org
84
SOME DEFINITIONS
 According to S. 1901 “Cybersecurity Research and Education Act of 2002”:
cybersecurity: “information assurance, including scientific, technical, management, or any other relevant
disciplines required to ensure computer and network security, including, but not limited to, a discipline
related to the following functions:
(A) Secure System and network administration and operations.
(B) Systems security engineering.
(C) Information assurance systems and product acquisition.
(D) Cryptography.
(E) Threat and vulnerability assessment, including risk management.
(F) Web security.
(G) Operations of computer emergency response teams.
(H) Cybersecurity training, education, and management.
(I) Computer forensics.
(J) Defensive information operations.
www.rapidstart.com.sg www.globalstf.org
85
SOME DEFINITIONS
 According to S. 1900 “Cyberterrorism Preparedness Act of 2002 ”:
cybersecurity: “information assurance, including information security,
information technology disaster recovery, and information privacy.”
www.rapidstart.com.sg www.globalstf.org
86
ONE WAY TO THINK ABOUT IT
 cybersecurity = security of cyberspace
www.rapidstart.com.sg www.globalstf.org
87
 cybersecurity = security of cyberspace
information systems
and networks
ONE WAY TO THINK ABOUT IT
www.rapidstart.com.sg www.globalstf.org
88
ONE WAY TO THINK ABOUT IT
 cybersecurity = security of information systems and
networks
www.rapidstart.com.sg www.globalstf.org
89
 cybersecurity = security of information systems and
networks
+ with the goal of
protecting
operations and
assets
ONE WAY TO THINK ABOUT IT
www.rapidstart.com.sg www.globalstf.org
90
 cybersecurity = security of information systems and
networks with the goal of protecting operations and assets
ONE WAY TO THINK ABOUT IT
www.rapidstart.com.sg www.globalstf.org
91
 cybersecurity = security of information systems and
networks with the goal of protecting operations and
assets
security in the face of
attacks, accidents and
failures
ONE WAY TO THINK ABOUT IT
www.rapidstart.com.sg www.globalstf.org
92
 cybersecurity = security of information systems and
networks in the face of attacks, accidents and failures with
the goal of protecting operations and assets
ONE WAY TO THINK ABOUT IT
www.rapidstart.com.sg www.globalstf.org
93
 cybersecurity = security of information systems and
networks in the face of attacks, accidents and failures with
the goal of protecting operations and assets
availability, integrity
and secrecy
ONE WAY TO THINK ABOUT IT
www.rapidstart.com.sg www.globalstf.org
94
 cybersecurity = availability, integrity and secrecy of
information systems and networks in the face of attacks,
accidents and failures with the goal of protecting operations
and assets
(Still a work in progress.)
ONE WAY TO THINK ABOUT IT
www.rapidstart.com.sg www.globalstf.org
95
IN CONTEXT
 corporate cybersecurity = availability, integrity and secrecy
of information systems and networks in the face of attacks,
accidents and failures with the goal of protecting a
corporation’s operations and assets
 national cybersecurity = availability, integrity and secrecy of
the information systems and networks in the face of attacks,
accidents and failures with the goal of protecting a nation’s
operations and assets
www.rapidstart.com.sg www.globalstf.org
96
WHAT IS
HAPPENING…
www.rapidstart.com.sg www.globalstf.org
97
INCREASING DEPENDENCE
 We are increasingly dependent on the Internet:
 Directly
 Communication (Email, IM, VoIP)
 Commerce (business, banking, e-commerce, etc)
 Control systems (public utilities, etc)
 Information and entertainment
 Sensitive data stored on the Internet
 Indirectly
 Biz, Edu, Gov have permanently replaced physical/manual
processes with Internet-based processes
Source: CalTech
www.rapidstart.com.sg www.globalstf.org
98
SECURITY NOT A PRIORITY
 Other design priorities often trump security:
Cost
Speed
Convenience
Open Architecture
Backwards Compatibility
www.rapidstart.com.sg www.globalstf.org
99
CYBERSECURITY ROADBLOCKS
 Not enough metrics to measure security
 Internet is inherently international
 Private sector owns most of the infrastructure
 “Cybersecurity Gap”: a cost/incentive disconnect?
 Businesses will pay to meet business imperatives
 Who’s going to pay to meet national security imperatives?
www.rapidstart.com.sg www.globalstf.org
100
THE CHALLENGE
 A solution to this problem will require both the right
technology and the right public policy.
 This is the cybersecurity challenge.
www.rapidstart.com.sg www.globalstf.org
101
IOT - EVERYTHING CAN BE
HACKED!
 Any device with an operating system can
be hacked, be it a thermostat, TV or even
a toilet.
 In recent years, consumers have generally
been wise enough to protect their
computers from cybercriminals and
harmful software.
 But their household electronics are
woefully unprepared for the next wave of
cyber attacks.
 Consumers are inviting whole new wave
of security risks into their homes even
without realizing it.
www.rapidstart.com.sg www.globalstf.org
102
RETAIL CYBER SECURITY: CLOUD, BIG
DATA AND IOT
www.rapidstart.com.sg www.globalstf.org
103
CYBER SECURITY ISSUES
- DUE TO CLOUD, BIG
DATA ANALYTICS & IOT
www.rapidstart.com.sg www.globalstf.org
104
RISKS ARE CONTEXT-AWARE
AND SITUATIONAL
 Concerning the identification of privacy, data protection and
security risks, it depends on the context and the purpose of
the objects that are considered (E.g. Health, Geo Location).
 The more the individuals are involved in the process, the
more it becomes difficult to identify and assess.
 For example, in Smart Home and Smart Grid applications,
how to ensure that some principles of privacy and data
protection, like informed consent and data minimization,
can survive in an automated and open environment.
www.rapidstart.com.sg www.globalstf.org
105
TRACEABILITY, PROFILING OR
UNLAWFUL PROCESSING
 The increased collection of data may raise issues of
authentication and trust in the objects.
 By using information collected about and from multiple
objects related to a single person, that person may become
more easily identifiable and better known.
www.rapidstart.com.sg www.globalstf.org
106
INDIVIDUAL’S PRIVACY VIOLATION
 The natural characteristic of IoT environment is the prevalence of such
devices which have potential to collect multiplicity of data types and huge
amount of data from users in cloud.
 This leads to automatic identification of persons, as well as their habits,
interests, locations etc.
 In combination with data available from other services or sources, data
mining activities might even create new knowledge on individuals that might
not be revealed by separately examining the underlying datasets.
 Example: Implementation of contactless credit cards, from which the name
and card number can be read without any authentication. With this data it is
possible for attackers to purchase the goods with the identity and bank
account of the card holder.
www.rapidstart.com.sg www.globalstf.org
107
LOSS OF USER CONTROL
 The main goals of IoT is to give some autonomy to the objects and to enable
automated decisions over cloud.
 It leads to loss of control leading to serious impact on many aspects of
individual's everyday lives.
 IoT will help elderly or disabled people to stay longer at home and in control
of their own lives, but their control of certain “fine-grained decisions” might
become limited.
 Decisions taken automatically by devices or applications, based on this huge
set of sensed data might not be transparent to the data subjects and
therefore create the sense of loss of control.
www.rapidstart.com.sg www.globalstf.org
108
REPURPOSING OF DATA
 Due to explosion of increased amount of data in cloud-based IoT
environment, the data will be used for some other additional purposes too,
other than those originally specified.
 Repurposing of data can be in the cards even before data collection begins
 This is not only a violation of individual right to privacy but also it may impact
on wider social and public acceptance.
www.rapidstart.com.sg www.globalstf.org
109
HEALTH RELATED IMPLICATIONS
 High dependability on the cloud, big data technologies in eHealth creates
significant security and privacy risks.
 There are risks with respect to patient identification and reliability of
collected information.
 The information gathered from the cloud system/database used in a health
application could also reveal that the person suffers from specific diseases
and this could be used for physically attacking this person.
www.rapidstart.com.sg www.globalstf.org
110
WHAT IS CYBER CRIME?
 Crime committed using a computer and the internet to steal a person’s
identity or illegal imports or malicious programs.
 Cybercrime is nothing but where the computer used as an object or subject
of crime.
www.rapidstart.com.sg www.globalstf.org
111
CATEGORIZE OF CYBERCRIME
 The Computer as a Target : using a computer to attack other computers.
 The computer as a weapon : using a computer to commit real world crimes.
www.rapidstart.com.sg www.globalstf.org
112
TYPES OF CYBER ATTACKS
 Financial fraud: 11%
 Sabotage of data/networks: 17%
 Theft of proprietary information: 20%
 System penetration from the outside: 25%
 Denial of service: 27%
 Unauthorized access by insiders: 71%
 Employee abuse of internet privileges: 79%
 Viruses: 85%
Source: FBI
www.rapidstart.com.sg www.globalstf.org
113
CYBER CRIME
 “ If you experienced computer system intrusions by someone from outside
your organization, indicate the type of activity performed by the intruder.”
 Manipulate data integrity 6.8%
 Installed a sniffer 6.6%
 Stole password files 5.6%
 Proving/scanning systems 14.6%
 Trojan logons 5.8%
 IP spoofing 4.8%
 Introduced virus 10.6%
 Denied use of services 6.3%
Source: FBI
www.rapidstart.com.sg www.globalstf.org
114
TYPES OF CYBER CRIME
 HACKING
 CHILD PORNOGRAPHY
 DENIAL OF SERVICE ATTACK
 VIRUS DISSEMINITION
 COMPUTER VANDALISM
 CYBER TERRORISM
 SOFTWARE PIRACY
www.rapidstart.com.sg www.globalstf.org
115
www.rapidstart.com.sg www.globalstf.org
116
SAFETY TIPS TO CYBER CRIME
 Use antivirus software
 Insert firewalls
 Uninstall unnecessary software
 Maintain backup
 Check security settings
 Stay anonymous - choose a genderless screen name
 Never give your full name or address to strangers
www.rapidstart.com.sg www.globalstf.org
117
 Learn ‘Etiquette' - follow it and expect it from
others
 Don't respond to harassing or negative
messages (flames)
 Get out of uncomfortable or hostile situations
quickly
 Save offending messages
 Learn more about Internet privacy
SAFETY TIPS TO CYBER CRIME
www.rapidstart.com.sg www.globalstf.org
118
THANK YOU

Contenu connexe

Tendances

Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 

Tendances (19)

How to develop the IoT products
How to develop the IoT productsHow to develop the IoT products
How to develop the IoT products
 
Importance of IOT in Modern Life
Importance of IOT in Modern LifeImportance of IOT in Modern Life
Importance of IOT in Modern Life
 
Internet of Things (IoT) Expert Session Webinar
Internet of Things (IoT) Expert Session WebinarInternet of Things (IoT) Expert Session Webinar
Internet of Things (IoT) Expert Session Webinar
 
Openbar 11 - Leuven - IoT from hype to reality - Aptus
Openbar 11 - Leuven - IoT from hype to reality - AptusOpenbar 11 - Leuven - IoT from hype to reality - Aptus
Openbar 11 - Leuven - IoT from hype to reality - Aptus
 
[DevDay2019] Internet of Things- By: Dr. Anand Nayyar at Duy Tan University
[DevDay2019] Internet of Things- By: Dr. Anand Nayyar at Duy Tan University[DevDay2019] Internet of Things- By: Dr. Anand Nayyar at Duy Tan University
[DevDay2019] Internet of Things- By: Dr. Anand Nayyar at Duy Tan University
 
IoT Training, Learn IoT From Scratch With Tonex Training
IoT Training, Learn IoT From Scratch With Tonex TrainingIoT Training, Learn IoT From Scratch With Tonex Training
IoT Training, Learn IoT From Scratch With Tonex Training
 
Dynamic IoT data, protocol, and middleware interoperability with resource sli...
Dynamic IoT data, protocol, and middleware interoperability with resource sli...Dynamic IoT data, protocol, and middleware interoperability with resource sli...
Dynamic IoT data, protocol, and middleware interoperability with resource sli...
 
THE INTERNET OF THINGS IS GETTING REAL
THE INTERNET OF THINGS IS GETTING REALTHE INTERNET OF THINGS IS GETTING REAL
THE INTERNET OF THINGS IS GETTING REAL
 
TIA DevTalk Lampung - How IoT can Reshape the Future of Digital Products
TIA DevTalk Lampung - How IoT can Reshape the Future of Digital Products TIA DevTalk Lampung - How IoT can Reshape the Future of Digital Products
TIA DevTalk Lampung - How IoT can Reshape the Future of Digital Products
 
History of IoT: Timeline of Major Events.
History of IoT: Timeline of Major Events.History of IoT: Timeline of Major Events.
History of IoT: Timeline of Major Events.
 
Envision Future: Analysis of IoT Startup
Envision Future: Analysis of IoT Startup Envision Future: Analysis of IoT Startup
Envision Future: Analysis of IoT Startup
 
Future Internet of IoT- A Survey of Healthcare Internet of Things (HIoT) : A ...
Future Internet of IoT- A Survey of Healthcare Internet of Things (HIoT) : A ...Future Internet of IoT- A Survey of Healthcare Internet of Things (HIoT) : A ...
Future Internet of IoT- A Survey of Healthcare Internet of Things (HIoT) : A ...
 
IoT and its application by Akash Singh
IoT and its application by Akash SinghIoT and its application by Akash Singh
IoT and its application by Akash Singh
 
Conclusion Connect state of IoT 2019 Review io t solutions world congress 2019
Conclusion Connect state of IoT 2019 Review io t solutions world congress 2019Conclusion Connect state of IoT 2019 Review io t solutions world congress 2019
Conclusion Connect state of IoT 2019 Review io t solutions world congress 2019
 
IoT Startup State of The Union
IoT Startup State of The Union  IoT Startup State of The Union
IoT Startup State of The Union
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
The Internet of Things - Industry Trends and Key Players
The Internet of Things - Industry Trends and Key PlayersThe Internet of Things - Industry Trends and Key Players
The Internet of Things - Industry Trends and Key Players
 
Introduction to IoT by Sachin Pukale
Introduction to IoT by Sachin PukaleIntroduction to IoT by Sachin Pukale
Introduction to IoT by Sachin Pukale
 
IoT : Research, Development, Challenges
IoT: Research, Development, ChallengesIoT: Research, Development, Challenges
IoT : Research, Development, Challenges
 

Similaire à Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran

What I learned from RSAC 2019
What I learned from RSAC 2019What I learned from RSAC 2019
What I learned from RSAC 2019
Ulf Mattsson
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 

Similaire à Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran (20)

Dawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton RavindranDawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton Ravindran
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
CL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and Planning
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
What I learned from RSAC 2019
What I learned from RSAC 2019What I learned from RSAC 2019
What I learned from RSAC 2019
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 

Plus de GSTF (8)

GSTF Testimonial
GSTF TestimonialGSTF Testimonial
GSTF Testimonial
 
GSTF Testimonial
GSTF TestimonialGSTF Testimonial
GSTF Testimonial
 
GSTF Testimonial
GSTF TestimonialGSTF Testimonial
GSTF Testimonial
 
GSTF Singapore Testimonial
GSTF Singapore TestimonialGSTF Singapore Testimonial
GSTF Singapore Testimonial
 
Smart homes, smart cities & smart nations by dr. anton ravindran
Smart homes, smart cities & smart nations by dr. anton ravindranSmart homes, smart cities & smart nations by dr. anton ravindran
Smart homes, smart cities & smart nations by dr. anton ravindran
 
Entrepreneurship EDUCATION by Dr. Anton Ravindran
Entrepreneurship EDUCATION by Dr. Anton RavindranEntrepreneurship EDUCATION by Dr. Anton Ravindran
Entrepreneurship EDUCATION by Dr. Anton Ravindran
 
Appointment of Global Knowledgeas Authorized Training Partner of GSTF for Nor...
Appointment of Global Knowledgeas Authorized Training Partner of GSTF for Nor...Appointment of Global Knowledgeas Authorized Training Partner of GSTF for Nor...
Appointment of Global Knowledgeas Authorized Training Partner of GSTF for Nor...
 
Powerful Technologies Changing the Planet
Powerful Technologies Changing the PlanetPowerful Technologies Changing the Planet
Powerful Technologies Changing the Planet
 

Dernier

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Dernier (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 

Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran