SlideShare a Scribd company logo
1 of 29
Download to read offline
THIS TIME IT’S PERSONAL
Why Security and the IoT is Different
Justin Grammens, Lab 651
Fear of the Internet of Things
What We’ll Cover
• About Me
• What is the Internet of Things
• What’s the big deal?
• Example security exploits
• Anti-Patterns that should guarded against
• Emerging security techniques
About Me
• Software Engineer for 20+ years
• Serial Entrepreneur
• Cofounder of Lab 651& IoT Fuse
• Adjunct Professor at University of Saint Thomas teaching IoT
• Publisher of IoT Weekly News
• Excited for the next wave of connected things!
What is the Internet of Things?
Formal: The Internet of things (IoT) is the network of physical
devices, vehicles, home appliances, and other items
embedded with electronics, software, sensors, actuators, and
network connectivity which enable these objects to connect
and exchange data.
Practical: The physical world becoming one big information
system. We are moving from Internet of Computers (IoC) to IoT.
It should actually be called “Things on the Internet”.
IoC vs IoT…
What’s the Big Deal?
1. Massive Changes in Scale
2. Impact on the Physical World
Security Needs to Be
Addressed at Each Level
Security of IoT vs IoC
• IoT has both information attacks and physical tampering
• Nearly all use wireless communications
• “Denial of sleep” attacks to kill battery
• Devices are expected to run with low power
• Operating systems may not support sophisticated security approaches
• Often not easily updatable and no screen / user interface
• It’s not the massive, but smaller scale attacks are more worrisome
IoT vs IoC – Personal Data
• Estimated that the average household generates ~2TB of data a year, by 2020
expected to be 10TB of personal data.
• Researchers found that Vizio & Samsung T.V’s send data to 3rd parties are
have known vulnerabilities to listen into your home or what you watch
• FitBit can tell if you are active or not when you say you are
• Police used a woman’s Fitbit to discount a story of assault
• Tesla using data logs to disprove claims by automotive reviewers
• Things are becoming personal…
Hacking Devices “Broken Hearts” episode, Homeland, 2012
Yeah, but is this actually
possible?
Source: https://www.theverge.com/2017/8/30/16230048/fda-abbott-
pacemakers-firmware-update-cybersecurity-hack
Find Open Devices
Open Camera
This is new, but is it?
Mirai Botnet
• Malware infecting IP cameras,
routers & DVR players
• Infected between more than
600,000 devices
• Started by 3 college students
• Some countries in Africa were
taken offline
• Could have affected more than
185 million devices *
* Source: http://www.newsweek.com/mirai-botnet-
brought-down-internet-was-minecraft-stunt-747806
Owlet Baby Monitor
• Monitor your baby’s heartrate &
oxygen level
• Base station creates a
completely open WiFi
• Anyone in range could
• Send data to another
network/server
• Disable alerts
• Nest camera had similar exploit
Jeep Hack
• In 2015 security researchers
hacked a Jeep to take control of
the vehicle
• Used cellular network and the
devices Controller Area Network
(CAN)Bus
• Chrysler recalled 1.4 million
vehicles to fix this issue
Anti-Patterns
• Doing too much
• Just because you can run a full Linux OS, should you?
• Consider your end user – do they need root access?
• Input validation and buffer overflows need to be checked
• Bugs
• Integer overflows
• Race conditions
• Memory corruption
Anti-Patterns
• Weak encryption
• Service Passwords
• No authentication
• Default credentials that are easily discoverable
• Permanent credentials ( for support ), never changeable
• Failure to allow for revocation of credential or privilege
• Failure to allow for delegation of privilege to another legitimate party (forces work
arounds)
• Unclear instructions or defaults to the device be online, rather than opt in
Anti-Patterns
• No Authentication
• CAN bus how communication happens within an automobile. Never designed
for connections over the internet.
• Default Credentials
• EURECOM found 100,000 internet facing IoT devices with default passwords
• Permanent Credentials
• ComfortLink thermostat set root passwords that could not be changed. Finally
fixed after 2 years
Online Trust Alliance – IoT Rules
• Default passwords must be prompted to be reset or changed on first use
• All users must adhere to SSL best practices using industry standards
• All device sites and cloud services must use HTTPS encryption
• Manufacturers must conduct penetration testing of devices, applications and
services
• Manufacturers must have remediation plans when vulnerabilities are found
• All updates, patches, revision must be signed and verified
• Manufactures must provide a mechanism for the transfer of ownership
Emerging IoT Security Techniques
• TPM ( Trusted Platform Module ) – Cryptographic keys burned into devices
as it’s produced
• Two factor (or more) authentication
• Location based as verification
• Using a paired device (smartwatch) as access control
• Only send the data that you need and nothing more
Emerging IoT Security Techniques
• Where possible, say no to big data backends
• Forbes reports more than 112 million records spilled in 2015
• More than a petabyte (1015 bytes) of data accidentally exposed online
• New York Times reported that $50 million stolen from over 100,000 people using
“Get Transcripts” service from the IRS
• Instead - use concepts from Distributed Computing Systems
• Store data close to the person
• Provide time based access and deletion
Data Type Best Location for Data Consequences If Data Is Lost,
or the Network Is
Compromised or Disrupted
Sensitive/personal data On a personal device such as
a phone, laptop, backup
hard drive, or home computer
Loss of employment; public
humiliation; bullying or social
isolation, which could
potentially lead to suicide
Medical data On a local device that can
be shared with medical
professionals on a timed clock
Blackmailing; loss of
employment
Business data (e.g., LinkedIn
profile)
On publicly accessible servers
(shared)
N/A (this data was created
with the intention of sharing it)
Home automation system On a local network within the
home without access to a
larger network
Loss of access to or control of
lights, thermostats, or other
home systems
Credit: Calm Technology, Amber Case
Summary
• The world of connected devices ( IoT ) is still an emerging field
• Data available will become increasing personal and unfiltered
• As with prior technology changes:
• The IoT ( and mistakes ) will happen whether we like it or not
• Apply many of the same security practices from the IoC
• Leverage distributed computing and best practices for data storage
• Always provide mechanisms for updates
Thank You
Justin Grammens
justin@lab651.com
Links:
http://lab651.com
http://iotfuse.com
http://iotweeklynews.com

More Related Content

What's hot

How cloud native is adopted and what’s coming next
How cloud native is adopted and what’s coming nextHow cloud native is adopted and what’s coming next
How cloud native is adopted and what’s coming nextCheryl Hung
 
Secure Networking in Big Data Environments
Secure Networking in Big Data EnvironmentsSecure Networking in Big Data Environments
Secure Networking in Big Data EnvironmentsNapier University
 
Supercharged graph visualization for cyber security
Supercharged graph visualization for cyber securitySupercharged graph visualization for cyber security
Supercharged graph visualization for cyber securityCambridge Intelligence
 
Visualizing NoSQL databases as networks
Visualizing NoSQL databases as networksVisualizing NoSQL databases as networks
Visualizing NoSQL databases as networksCambridge Intelligence
 
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...Veselin Pizurica
 
Internet of Things introduction
Internet of Things introductionInternet of Things introduction
Internet of Things introductionVeselin Pizurica
 
Machine Learning for the Sensored Internet of Things
Machine Learning for the Sensored Internet of ThingsMachine Learning for the Sensored Internet of Things
Machine Learning for the Sensored Internet of ThingsSri Ambati
 
IoT - Life at the Edge
IoT - Life at the EdgeIoT - Life at the Edge
IoT - Life at the EdgeNick Hunn
 
Intel Lightning Talk
Intel Lightning TalkIntel Lightning Talk
Intel Lightning TalkEd Donahue
 
Towards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity ModelTowards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity ModelAlex Pinto
 
Fighting cybersecurity threats with Apache Spot
Fighting cybersecurity threats with Apache SpotFighting cybersecurity threats with Apache Spot
Fighting cybersecurity threats with Apache Spotmarkgrover
 
Cisco Paris DevNet Hackathon slideshow - Intro
Cisco Paris DevNet Hackathon slideshow - IntroCisco Paris DevNet Hackathon slideshow - Intro
Cisco Paris DevNet Hackathon slideshow - IntroBeMyApp
 
Insights into the Internet of Things
Insights into the Internet of ThingsInsights into the Internet of Things
Insights into the Internet of ThingsWiebke Toussaint
 
Data, Big Data and real time analytics for Connected Devices
Data, Big Data and real time analytics for Connected DevicesData, Big Data and real time analytics for Connected Devices
Data, Big Data and real time analytics for Connected DevicesSrinath Perera
 
Visualizing the neo4j graph database with key lines
Visualizing the neo4j graph database with key linesVisualizing the neo4j graph database with key lines
Visualizing the neo4j graph database with key linesCambridge Intelligence
 
SplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCPSplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCPSplunk
 
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...Luca Berardinelli
 
An open-source testbed for IoT systems
An open-source testbed for IoT systemsAn open-source testbed for IoT systems
An open-source testbed for IoT systemsAugusto Ciuffoletti
 
IoT Workshop Louisville
IoT Workshop LouisvilleIoT Workshop Louisville
IoT Workshop LouisvilleMike Branstein
 

What's hot (20)

How cloud native is adopted and what’s coming next
How cloud native is adopted and what’s coming nextHow cloud native is adopted and what’s coming next
How cloud native is adopted and what’s coming next
 
Secure Networking in Big Data Environments
Secure Networking in Big Data EnvironmentsSecure Networking in Big Data Environments
Secure Networking in Big Data Environments
 
Supercharged graph visualization for cyber security
Supercharged graph visualization for cyber securitySupercharged graph visualization for cyber security
Supercharged graph visualization for cyber security
 
Visualizing NoSQL databases as networks
Visualizing NoSQL databases as networksVisualizing NoSQL databases as networks
Visualizing NoSQL databases as networks
 
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
 
Internet of Things introduction
Internet of Things introductionInternet of Things introduction
Internet of Things introduction
 
Machine Learning for the Sensored Internet of Things
Machine Learning for the Sensored Internet of ThingsMachine Learning for the Sensored Internet of Things
Machine Learning for the Sensored Internet of Things
 
IoT - Life at the Edge
IoT - Life at the EdgeIoT - Life at the Edge
IoT - Life at the Edge
 
Intel Lightning Talk
Intel Lightning TalkIntel Lightning Talk
Intel Lightning Talk
 
Towards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity ModelTowards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity Model
 
Fighting cybersecurity threats with Apache Spot
Fighting cybersecurity threats with Apache SpotFighting cybersecurity threats with Apache Spot
Fighting cybersecurity threats with Apache Spot
 
Cisco Paris DevNet Hackathon slideshow - Intro
Cisco Paris DevNet Hackathon slideshow - IntroCisco Paris DevNet Hackathon slideshow - Intro
Cisco Paris DevNet Hackathon slideshow - Intro
 
Iot Workshop Columbus
Iot Workshop ColumbusIot Workshop Columbus
Iot Workshop Columbus
 
Insights into the Internet of Things
Insights into the Internet of ThingsInsights into the Internet of Things
Insights into the Internet of Things
 
Data, Big Data and real time analytics for Connected Devices
Data, Big Data and real time analytics for Connected DevicesData, Big Data and real time analytics for Connected Devices
Data, Big Data and real time analytics for Connected Devices
 
Visualizing the neo4j graph database with key lines
Visualizing the neo4j graph database with key linesVisualizing the neo4j graph database with key lines
Visualizing the neo4j graph database with key lines
 
SplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCPSplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCP
 
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...
 
An open-source testbed for IoT systems
An open-source testbed for IoT systemsAn open-source testbed for IoT systems
An open-source testbed for IoT systems
 
IoT Workshop Louisville
IoT Workshop LouisvilleIoT Workshop Louisville
IoT Workshop Louisville
 

Similar to This Time, It’s Personal: Why Security and the IoT Is Different

IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019John D. Johnson
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Positive Hack Days
 
2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptxssuser2cc0d4
 
Assign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxAssign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxpdevang
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)Rui Miguel Feio
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed Great Bay Software
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT SystemsSecurity Innovation
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxSelva914004
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
The internet of things.pptx
The internet of things.pptxThe internet of things.pptx
The internet of things.pptxLamisaFaria
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Duo Security
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014Adrian Wright
 

Similar to This Time, It’s Personal: Why Security and the IoT Is Different (20)

IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
IoT -Internet of Things
IoT -Internet of ThingsIoT -Internet of Things
IoT -Internet of Things
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
 
2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx
 
Assign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxAssign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptx
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
The internet of things.pptx
The internet of things.pptxThe internet of things.pptx
The internet of things.pptx
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
 

More from Justin Grammens

Scope Creep - Damned if I Do, Damned if I Don't
Scope Creep - Damned if I Do, Damned if I Don'tScope Creep - Damned if I Do, Damned if I Don't
Scope Creep - Damned if I Do, Damned if I Don'tJustin Grammens
 
Looking into the Future: Using Google's Prediction API
Looking into the Future: Using Google's Prediction APILooking into the Future: Using Google's Prediction API
Looking into the Future: Using Google's Prediction APIJustin Grammens
 
The Internet of Things - What It Is, Where Its Headed and Its Applications
The Internet of Things - What It Is, Where Its Headed and Its ApplicationsThe Internet of Things - What It Is, Where Its Headed and Its Applications
The Internet of Things - What It Is, Where Its Headed and Its ApplicationsJustin Grammens
 
Internet of Things: What It Is, Where's Headed and Its Applications
Internet of Things: What It Is, Where's Headed and Its ApplicationsInternet of Things: What It Is, Where's Headed and Its Applications
Internet of Things: What It Is, Where's Headed and Its ApplicationsJustin Grammens
 
Collaborative Learning - The Role Communities Play in IoT
Collaborative Learning - The Role Communities Play in IoTCollaborative Learning - The Role Communities Play in IoT
Collaborative Learning - The Role Communities Play in IoTJustin Grammens
 
Internet of Things: What it is, where it is going and how it is being applied.
Internet of Things: What it is, where it is going and how it is being applied.Internet of Things: What it is, where it is going and how it is being applied.
Internet of Things: What it is, where it is going and how it is being applied.Justin Grammens
 
Arduino, Open Source and The Internet of Things Landscape
Arduino, Open Source and The Internet of Things LandscapeArduino, Open Source and The Internet of Things Landscape
Arduino, Open Source and The Internet of Things LandscapeJustin Grammens
 
Gobot Meets IoT : Using the Go Programming Language to Control The “Things” A...
Gobot Meets IoT : Using the Go Programming Language to Control The “Things” A...Gobot Meets IoT : Using the Go Programming Language to Control The “Things” A...
Gobot Meets IoT : Using the Go Programming Language to Control The “Things” A...Justin Grammens
 
Physical Computing Using Go and Arduino
Physical Computing Using Go and ArduinoPhysical Computing Using Go and Arduino
Physical Computing Using Go and ArduinoJustin Grammens
 
The State of Arduino and IoT
The State of Arduino and IoTThe State of Arduino and IoT
The State of Arduino and IoTJustin Grammens
 
Voice Enabled Applications
Voice Enabled ApplicationsVoice Enabled Applications
Voice Enabled ApplicationsJustin Grammens
 
Adhearsion and Telegraph Framework Presentation
Adhearsion and Telegraph Framework PresentationAdhearsion and Telegraph Framework Presentation
Adhearsion and Telegraph Framework PresentationJustin Grammens
 
Asterisk-Java Framework Presentation
Asterisk-Java Framework PresentationAsterisk-Java Framework Presentation
Asterisk-Java Framework PresentationJustin Grammens
 

More from Justin Grammens (16)

Scope Creep - Damned if I Do, Damned if I Don't
Scope Creep - Damned if I Do, Damned if I Don'tScope Creep - Damned if I Do, Damned if I Don't
Scope Creep - Damned if I Do, Damned if I Don't
 
Looking into the Future: Using Google's Prediction API
Looking into the Future: Using Google's Prediction APILooking into the Future: Using Google's Prediction API
Looking into the Future: Using Google's Prediction API
 
The Internet of Things - What It Is, Where Its Headed and Its Applications
The Internet of Things - What It Is, Where Its Headed and Its ApplicationsThe Internet of Things - What It Is, Where Its Headed and Its Applications
The Internet of Things - What It Is, Where Its Headed and Its Applications
 
Internet of Things: What It Is, Where's Headed and Its Applications
Internet of Things: What It Is, Where's Headed and Its ApplicationsInternet of Things: What It Is, Where's Headed and Its Applications
Internet of Things: What It Is, Where's Headed and Its Applications
 
Collaborative Learning - The Role Communities Play in IoT
Collaborative Learning - The Role Communities Play in IoTCollaborative Learning - The Role Communities Play in IoT
Collaborative Learning - The Role Communities Play in IoT
 
Internet of Things: What it is, where it is going and how it is being applied.
Internet of Things: What it is, where it is going and how it is being applied.Internet of Things: What it is, where it is going and how it is being applied.
Internet of Things: What it is, where it is going and how it is being applied.
 
Arduino, Open Source and The Internet of Things Landscape
Arduino, Open Source and The Internet of Things LandscapeArduino, Open Source and The Internet of Things Landscape
Arduino, Open Source and The Internet of Things Landscape
 
Gobot Meets IoT : Using the Go Programming Language to Control The “Things” A...
Gobot Meets IoT : Using the Go Programming Language to Control The “Things” A...Gobot Meets IoT : Using the Go Programming Language to Control The “Things” A...
Gobot Meets IoT : Using the Go Programming Language to Control The “Things” A...
 
Physical Computing Using Go and Arduino
Physical Computing Using Go and ArduinoPhysical Computing Using Go and Arduino
Physical Computing Using Go and Arduino
 
The State of Arduino and IoT
The State of Arduino and IoTThe State of Arduino and IoT
The State of Arduino and IoT
 
Android Minnebar
Android MinnebarAndroid Minnebar
Android Minnebar
 
Android TCJUG
Android TCJUGAndroid TCJUG
Android TCJUG
 
Voice Enabled Applications
Voice Enabled ApplicationsVoice Enabled Applications
Voice Enabled Applications
 
Android Intro
Android IntroAndroid Intro
Android Intro
 
Adhearsion and Telegraph Framework Presentation
Adhearsion and Telegraph Framework PresentationAdhearsion and Telegraph Framework Presentation
Adhearsion and Telegraph Framework Presentation
 
Asterisk-Java Framework Presentation
Asterisk-Java Framework PresentationAsterisk-Java Framework Presentation
Asterisk-Java Framework Presentation
 

Recently uploaded

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

This Time, It’s Personal: Why Security and the IoT Is Different

  • 1. THIS TIME IT’S PERSONAL Why Security and the IoT is Different Justin Grammens, Lab 651
  • 2. Fear of the Internet of Things
  • 3. What We’ll Cover • About Me • What is the Internet of Things • What’s the big deal? • Example security exploits • Anti-Patterns that should guarded against • Emerging security techniques
  • 4. About Me • Software Engineer for 20+ years • Serial Entrepreneur • Cofounder of Lab 651& IoT Fuse • Adjunct Professor at University of Saint Thomas teaching IoT • Publisher of IoT Weekly News • Excited for the next wave of connected things!
  • 5. What is the Internet of Things? Formal: The Internet of things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and network connectivity which enable these objects to connect and exchange data. Practical: The physical world becoming one big information system. We are moving from Internet of Computers (IoC) to IoT. It should actually be called “Things on the Internet”.
  • 6. IoC vs IoT… What’s the Big Deal? 1. Massive Changes in Scale 2. Impact on the Physical World
  • 7.
  • 8.
  • 9. Security Needs to Be Addressed at Each Level
  • 10. Security of IoT vs IoC • IoT has both information attacks and physical tampering • Nearly all use wireless communications • “Denial of sleep” attacks to kill battery • Devices are expected to run with low power • Operating systems may not support sophisticated security approaches • Often not easily updatable and no screen / user interface • It’s not the massive, but smaller scale attacks are more worrisome
  • 11. IoT vs IoC – Personal Data • Estimated that the average household generates ~2TB of data a year, by 2020 expected to be 10TB of personal data. • Researchers found that Vizio & Samsung T.V’s send data to 3rd parties are have known vulnerabilities to listen into your home or what you watch • FitBit can tell if you are active or not when you say you are • Police used a woman’s Fitbit to discount a story of assault • Tesla using data logs to disprove claims by automotive reviewers • Things are becoming personal…
  • 12. Hacking Devices “Broken Hearts” episode, Homeland, 2012
  • 13. Yeah, but is this actually possible?
  • 17. This is new, but is it?
  • 18. Mirai Botnet • Malware infecting IP cameras, routers & DVR players • Infected between more than 600,000 devices • Started by 3 college students • Some countries in Africa were taken offline • Could have affected more than 185 million devices * * Source: http://www.newsweek.com/mirai-botnet- brought-down-internet-was-minecraft-stunt-747806
  • 19. Owlet Baby Monitor • Monitor your baby’s heartrate & oxygen level • Base station creates a completely open WiFi • Anyone in range could • Send data to another network/server • Disable alerts • Nest camera had similar exploit
  • 20. Jeep Hack • In 2015 security researchers hacked a Jeep to take control of the vehicle • Used cellular network and the devices Controller Area Network (CAN)Bus • Chrysler recalled 1.4 million vehicles to fix this issue
  • 21. Anti-Patterns • Doing too much • Just because you can run a full Linux OS, should you? • Consider your end user – do they need root access? • Input validation and buffer overflows need to be checked • Bugs • Integer overflows • Race conditions • Memory corruption
  • 22. Anti-Patterns • Weak encryption • Service Passwords • No authentication • Default credentials that are easily discoverable • Permanent credentials ( for support ), never changeable • Failure to allow for revocation of credential or privilege • Failure to allow for delegation of privilege to another legitimate party (forces work arounds) • Unclear instructions or defaults to the device be online, rather than opt in
  • 23. Anti-Patterns • No Authentication • CAN bus how communication happens within an automobile. Never designed for connections over the internet. • Default Credentials • EURECOM found 100,000 internet facing IoT devices with default passwords • Permanent Credentials • ComfortLink thermostat set root passwords that could not be changed. Finally fixed after 2 years
  • 24. Online Trust Alliance – IoT Rules • Default passwords must be prompted to be reset or changed on first use • All users must adhere to SSL best practices using industry standards • All device sites and cloud services must use HTTPS encryption • Manufacturers must conduct penetration testing of devices, applications and services • Manufacturers must have remediation plans when vulnerabilities are found • All updates, patches, revision must be signed and verified • Manufactures must provide a mechanism for the transfer of ownership
  • 25. Emerging IoT Security Techniques • TPM ( Trusted Platform Module ) – Cryptographic keys burned into devices as it’s produced • Two factor (or more) authentication • Location based as verification • Using a paired device (smartwatch) as access control • Only send the data that you need and nothing more
  • 26. Emerging IoT Security Techniques • Where possible, say no to big data backends • Forbes reports more than 112 million records spilled in 2015 • More than a petabyte (1015 bytes) of data accidentally exposed online • New York Times reported that $50 million stolen from over 100,000 people using “Get Transcripts” service from the IRS • Instead - use concepts from Distributed Computing Systems • Store data close to the person • Provide time based access and deletion
  • 27. Data Type Best Location for Data Consequences If Data Is Lost, or the Network Is Compromised or Disrupted Sensitive/personal data On a personal device such as a phone, laptop, backup hard drive, or home computer Loss of employment; public humiliation; bullying or social isolation, which could potentially lead to suicide Medical data On a local device that can be shared with medical professionals on a timed clock Blackmailing; loss of employment Business data (e.g., LinkedIn profile) On publicly accessible servers (shared) N/A (this data was created with the intention of sharing it) Home automation system On a local network within the home without access to a larger network Loss of access to or control of lights, thermostats, or other home systems Credit: Calm Technology, Amber Case
  • 28. Summary • The world of connected devices ( IoT ) is still an emerging field • Data available will become increasing personal and unfiltered • As with prior technology changes: • The IoT ( and mistakes ) will happen whether we like it or not • Apply many of the same security practices from the IoC • Leverage distributed computing and best practices for data storage • Always provide mechanisms for updates