internet of secure things

17
What is Really Needed to Secure the Internet of Things?

Upload: korea-university

Post on 26-Jul-2015

15 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Internet of secure things

What is Really Needed to Secure the Internet of Things?

Page 2: Internet of secure things

Contents• Introduction

• OWASP Internet of Things Top Ten Project

• Security Challenges for IoT

• Cyber Warfare

• Security Requirements of IoST(Internet of Secure Things)

• Conclusion

• Question & Answer

Page 3: Internet of secure things

Introduction

• IoT includes everything in our life.

• But many devices are vulnerable from attack.

• It is necessary to secure the Things themselves.

Page 4: Internet of secure things

• Insecure Web Interface (XSS/SQLi/CSRF)

• Insufficient Authentication / Authorization

• Insecure Network Services (BOF / Fuzzing)

• Lack of Transport Encryption (Lack of SSL / TLS)

• Privacy Concerns (Data Encryption)

• Insecure Cloud Interface

• Insecure Mobile Interface

• Insufficient Security Configurability

• Insecure Software / Firmware (need Encrypted Update)

• Poor Physical Security (External Ports, Storage Eject)

Vulnerabilities of IoT Device

Page 5: Internet of secure things

Security Challenges for IoT• Critical Functionality

• Replication

• Security Assumptions

• Not easily Patched

• Long Life Cycle

• Proprietary / Industry specific Protocols

• Deployed outside of Enterprise Security Perimeter

Page 6: Internet of secure things

Critical Functionality

Page 7: Internet of secure things

Replication

Page 8: Internet of secure things

Replication

Page 9: Internet of secure things

Security Assumption

Page 10: Internet of secure things

Not Easily Patched

Page 11: Internet of secure things

Long Life Cycle

15~20Years

Page 12: Internet of secure things

Specific Protocols

Page 13: Internet of secure things

Deployed Outside of Enterprise Security Perimeter

Page 14: Internet of secure things

Cyber Warfare, StuxNet

Page 15: Internet of secure things

Secure Boot Secure code Updates

Data Security

AuthenticationSecure

CommunicationProtection

Against AttacksMonitoring

Embedded Security Management

Device Tampering Detection

Requirements IoST

Page 16: Internet of secure things

Conclusion

Security must be consideredearly in the design process.

Page 17: Internet of secure things