secure connections for a smarter world - intrinsic id · 11/3/2017 · fall security summit 2017...
TRANSCRIPT
Fall Security Summit 2017
SecureConnectionsforaSmarterWorldSamiNassarVicePresident,CyberSecuritySolutionsNXPSemicondutors
Essential Technology
40B+ devices with intelligence shipped
in 2020
PROCESSING1B+ additional
consumers online, 30B+ connected devices
CONNECTIVITYPhysical and functional
security to protect smarter world
SECURITY
“COMPUTING IS MOVING FROM CLOUD TO EDGE;CREATING LOW LATENCY, ROBUST, SECURE SYSTEMS
WITH BETTER COST STRUCTURE”
40% of all data will be generated by transducers
stress network BW & consume
huge powerif transported and managed in cloud
distributed computing,
pushing processing to end-nodes and gateways
power-efficient, scalable, and secure
embedded processors
BY 2020 WILL CONTINUE TO SOLUTION NEED FOR
MCU ENERGY
SENSORS CONNECTIVITY
END NODESPAN/LAN
CONNECTIVITY GATEWAYWAN
CONNETIVITY CLOUD
“INTERNET SECURITY IS COMPROMISED ; ENTERING AN ERA OF ORGANIZED CYBERCRIME AND MILITARY CYBER WEAPONS”
45.7 MILLION Credit cards stolen
4 MILLION Employee federal records hacked
77 MILLION Compromised accounts
9 CERTIFICATES Stolen across 7 different domains
71+ ORGANIZATIONS HITDefense contractors, United Nations,
The Olympic Committee
85%Share of infected computers –
Iran, Indonesia, India
900,000Deutsche Telekom customers
affected in Germany
2,400TalkTalk routers
affected in the UK
Playstation Network OutageCOMODO Certification Authority Hack Department of Defense Hack TJX Hack – Albert Gonzalez
Operation Shady Rat Stuxnet Worm (Targeting Industrial Systems) Mirai Botnet Malware
STRATEGIC PRINCIPLES FOR SECURING THE IOTIncorporate Security at the design phase
Use hardware that incorporates security features
Enable in field ”Security Updates”
Build on recognized security practices
SECURITY TECHNOLOGY & EXPERTISESOLUTION PORTFOLIO ACROSS THREAT SPECTRUM
REMOTE/ ONLINELOGICAL ATTACKS
LOCAL - INTRUSIVEPHYSICAL ATTACKS
LOCAL- PROXIMITYSIDE CHANNEL ATTACKS
EXPERTISE
ECO-SYSTEM
Physical Tamper Resistance
Trust Provisioning
Security Certified Application
Secure Connectivity Stack
Encryption Acceleration
IC integrity:ROT, Secure boot, Protected Memory
Cryptography
Architecture
Protocol
“THE VISION OF A SMARTER WORLD WILL BE REALIZED THROUGH SECURE CONNECTIVITY, WHERE SECURITY IS END TO END BY DESIGN”
CONNECTED THINGS LIFE CYCLE
MANAGEMENTInteroperability
Authenticity
Device IntegritySW Management
Secure AccessCredential
Management
Data Integrity& Privacy
SECURITY 2.0 BUILT INTO EVERYTHING WE DO
SECURITY &PRIVACY BY DESIGN
Essential Technology
40B+ devices with intelligence shipped
in 2020
PROCESSING1B+ additional
consumers online, 30B+ connected devices
CONNECTIVITYPhysical and functional
security to protect smarter world
SECURITY