guide to iot security…solar panel smart house smart mobility targeted technologies consumer...

1
TARGETED TECHNOLOGIES VULNERABLE TECHNOLOGIES PROTECTING OPERATION TECHNOLOGIES INDUSTRIAL CONTROL SYSTEMS PLC, RTU, HMI, SCADA PLANT PROCESS FIELD AUTOMOTIVE TECHNOLOGIES OBD, ECU, INFOTAINMENT SYSTEMS WINDSHIELD WIPERS INDICATORS SMART HOME AUTOMATIC GARAGE DOOR OPENERS HEATING / AC MECHANISMS ELECTRONIC SHUTTERS FIRE ALARMS CONNECTED WHITE GOODS REFRIGERATORS STOVES WASHERS WEARABLES AND HEARABLES EARBUDS SMART WATCHES SMART GLASSES SMART CITY IMPLEMENTATIONS TRANSPORTATION INFRASTRUCTURES ROADS RAILWAYS PORTS AND AIRPORTS SOLAR PANEL SMART HOUSE SMART MOBILITY TARGETED TECHNOLOGIES CONSUMER ELECTRONICS CAMCORDERS LAPTOP TABLETS MEDICAL AND HEALTHCARE DEVICES BLOOD PRESSURE MONITORS BLOOD GLUCOSE MONITORING GUIDE TO IoT SECURITY IP Connectivity New Vector Device connecting to the Internet and to all the malware, viruses, worms, trojans, and other crimeware that exist online Hardware Security Issues What types of secure hardware can be applied that fit to small and power- constrained devices? Lightweight and not too resource-intensive but still provide adequate security No Unified Protocol Security Lack of standard for security protocol for the IoT Problem of Access Control Controlling access to a network, configuring and applying an identity to the device. Using authentication mechanisms to ensure the appropriate security policies Functional Safety Demands Critical safety: the safety of human lives Consumer Protection Questions The protection of consumer information as they use smart products. This information could be about behaviour, location, habits, etc VULNERABLE TECHNOLOGIES HARDWARE GATEWAYS APPLICATIONS PROTECTING OPERATION TECHNOLOGIES The Big Push - what’s going to happen first? Hardware, Gateways, and Applications will be secured first. Then the rest will follow. IoT SECURITY DEVELOPMENT SECURE ELEMENT AS EMBEDDED IN THE DEVICE THE SECURE GATEWAY SECURITY AT APPLICATION LEVEL Secure Design and Product Development Source Code Review, Bug Testing, and Pen Testing Embedding Security, Trusted Computing Network Security (IPS / IDS, SIEM, FW) including wireless Encryption Key Management, PKI Trust Management and Secure OTA Authentication, Access Control Security Protocols Audits and Security Assessments Regulatory Compliance and Certification Data Protection and Privacy Guarantees Product Security Lifecycle Management SECURE THE THINGS AT ALL THE LAYERS © 2016 ABI Research [email protected] | Americas +1 516 624 2500 | Europe +44 203 326 0140 | Asia-Pacific +65 6592 0290 www.abiresearch.com

Upload: others

Post on 25-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: GUIDE TO IoT SECURITY…SOLAR PANEL SMART HOUSE SMART MOBILITY TARGETED TECHNOLOGIES CONSUMER ELECTRONICS CAMCORDERS LAPTOP TABLETS MEDICAL AND HEALTHCARE DEVICES BLOOD PRESSURE MONITORS

TARGETED TECHNOLOGIESVULNERABLE TECHNOLOGIESPROTECTING OPERATION TECHNOLOGIES

INDUSTRIAL CONTROL SYSTEMSPLC, RTU, HMI, SCADAPLANTPROCESSFIELD

AUTOMOTIVE TECHNOLOGIESOBD, ECU, INFOTAINMENT SYSTEMS WINDSHIELD WIPERS INDICATORS

SMART HOMEAUTOMATIC GARAGE DOOR OPENERS HEATING / AC MECHANISMS ELECTRONIC SHUTTERSFIRE ALARMS

CONNECTED WHITE GOODSREFRIGERATORSSTOVESWASHERS

WEARABLES AND HEARABLESEARBUDSSMART WATCHESSMART GLASSES

SMART CITY IMPLEMENTATIONS

TRANSPORTATIONINFRASTRUCTURESROADSRAILWAYSPORTS AND AIRPORTS

SOLAR PANELSMART HOUSESMART MOBILITY

TARGETED TECHNOLOGIES

CONSUMER ELECTRONICSCAMCORDERSLAPTOPTABLETS

MEDICAL AND HEALTHCARE DEVICESBLOOD PRESSURE MONITORSBLOOD GLUCOSE MONITORING

GUIDE TO IoT SECURITY

IP Connectivity New VectorDevice connecting to the Internet and to all the malware, viruses, worms, trojans, and other crimeware that exist online

Hardware Security IssuesWhat types of secure hardware can be applied that fit to small and power-constrained devices? Lightweight and not too resource-intensive but still provide adequate security

No Unified Protocol SecurityLack of standard for security protocol for the IoT

Problem of Access ControlControlling access to a network, configuring and applying an identity to the device. Using authentication mechanisms to ensure the appropriate security policies

Functional Safety DemandsCritical safety: the safety of human lives

Consumer Protection QuestionsThe protection of consumer information as they use smart products. This information could be about behaviour, location, habits, etc

VULNERABLE TECHNOLOGIES

HARDWARE

GATEWAYS

APPLICATIONS

PROTECTING OPERATION TECHNOLOGIES

The Big Push - what’s going to happen first? Hardware, Gateways, and Applications will be secured first. Then the rest will follow.

IoT SECURITY DEVELOPMENT

SECURE ELEMENT AS EMBEDDED IN THE DEVICE

THE SECURE GATEWAY

SECURITY AT APPLICATION LEVEL

■ Secure Design and Product Development

■ Source Code Review, Bug Testing, and Pen Testing

■ Embedding Security, Trusted Computing

■ Network Security (IPS / IDS, SIEM, FW) including wireless

■ Encryption Key Management, PKI

■ Trust Management and Secure OTA

■ Authentication, Access Control

■ Security Protocols

■ Audits and Security Assessments

■ Regulatory Compliance and Certification

■ Data Protection and Privacy Guarantees

■ Product Security Lifecycle Management

SECURE THE THINGS AT ALL THE LAYERS

© 2016 ABI Research [email protected] | Americas +1 516 624 2500 | Europe +44 203 326 0140 | Asia-Pacific +65 6592 0290 www.abiresearch.com