IoT Security Threats and Strategies

iot security part 1 the data may 2016 n.w
1 / 17
Embed
Share

Explore the world of Internet of Things (IoT) security with insights on connected devices, data management, collaboration, and potential risks. Discover how IoT building blocks can be secured and learn about attack scenarios and risks to safeguard your IoT infrastructure effectively.

  • IoT Security
  • Threats
  • Strategies
  • Data Management
  • Risks

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. IoT Security Part 1, The Data May 2016 Angelo Brancato, CISSP, CISM. CCSK Chief Technologist HPE Security angelo.brancato@hpe.com Mobile: +49 174 1502278

  2. This Presentation is recorded: https://youtu.be/hOtw333hsKE

  3. What is the Internet of Things? It s about connected devices, systems, and things Gartner estimates 26 billion connected devices by 2020. It s about data from the things IDC predicts IoT data will account for 10% of the world s data by 2020. It s about new insights Business, engineering, scientific insights

  4. What is the Internet of Things? Collaboration & Analytics Interconnect Operations Technology (OT) and Information Technology (IT) to enable Machine to Machine communication (M2M) and collaboration. Collect all data and transform the business model In-band Analytics with Analytics to gain new business insights. Out-of-band Analytics and Long-Term Learning One single breach though, can destroy the whole business model! IT OT

  5. What are the main IoT Building Blocks that need to be secured? Applications that present and visualize the findings and key performance indicators (KPI). Open ecosystem for partners and suppliers. Visualization Data, Applications, Communication, Users IoT Platform IoT Cloud / Platform Operations and control of the IoT infrastructure. Central data storage. Contextual enrichment, Big-Data analytics and (deep) machine learning. Turning Data into insights. Turning insights into Business Transformation. Ubiquitous, reliable and secure communication technology for all endpoints and edge devices. Connectivity Processing unit sitting on the same physical entity (e.g. car, turbine, airplane, building) as the IoT endpoints. Translates the OT protocol (e.g. SCADA) to an IT protocols (e.g. TCP/IP). Ingests and pre-processes the data (also called Edge Analytics or Real-Time Analytics or In-band Analytics). Edge Computing Distributed Sensors and Actuators - either mobile or stationary but always connected to the IoT cloud via the internet or a private network. IoT endpoints can connect directly or via an edge computing device. IoT endpoints can also communicate to each others (machine to machine M2M) IoT Endpoints

  6. What are the main Attack Scenarios and Risks? Visualization Rogue Endpoints / Edge Devices A rogue device (endpoint or edge computing device that has been installed on the IoT network without explicit authorization, added by a malicious person) whose data is accepted by the rest of the IoT infrastructure can cause immense damage by rendering the data useless and/or causing unwanted behavior in the whole system. IoT Platform IoT Cloud / Platform Compromised Endpoints / Edge Devices Vulnerable Software on the devices may result in compromised systems. Especially lightweight and price sensitive endpoint devices are extremely hard to patch in a timely manner after a vulnerability has been detected. Connectivity Edge Computing Data Leakage Data from the endpoint- and edge computing devices can hold sensitive information such as personally identifiable information (PII). Leakage of unprotected data can lead to financial and reputational damage. IoT Endpoints

  7. What are the main Attack Scenarios and Risks? Visualization Man-In-The-Middle Attacks (MitM) Attackers that sneak into the communication between two parties (e.g. IoT Edge and IoT Cloud) who believe they are directly communicating with each other, can cause immense damage to the whole IoT system. IoT Platform IoT Cloud / Platform Denial-of-Service Attack (DoS) IoT cloud services like Web(APIs) portals, VPN can be disrupted and made unavailable temporarily or indefinitely. Connectivity Unauthorized Access By simulating the identity of authorized endpoints, rogue endpoints can sneak their way into the system. Edge Computing IoT Endpoints

  8. What are the main Attack Scenarios and Risks? Visualization Vulnerable Web Applications and APIs Vulnerabilities in the IoT clouds web applications and API interfaces can lead to a denial of service, data loss or a complete take over of the application. The most common web application security flaws are listed in the OWASP Top10 and must be protected by all means. IoT Platform IoT Cloud / Platform Targeted Attacks IoT infrastructures are like all other environments for attackers if and when there is sensitive data that can be monetized. Targeted attacks (Advanced Persistent Threats APT) must be detected as soon as possible to take away what the attackers need most time to find and exfiltrate/damage the valuable data. Connectivity Edge Computing IoT Endpoints

  9. HPE Security Solutions Overview HPE Security ArcSight (Security Intelligence) Visualization Data, Applications, Communication, Users HPE Security Fortify (Application Security) IoT Platform IoT Cloud / Platform HPE Security Data Security (Voltage/Atalla) HPE Aruba (Communication Security) Connectivity Edge Computing IoT Endpoints

  10. HPE Security Solutions Overview HPE Security ArcSight (Security Intelligence) Visualization Communication Data, Applications, Communication, Users HPE Security Fortify (Application Security) HPE Solution Application Data Event Correlation and Real-Time (Security) Incident Notification (SIEM Security Information ArcSight IoT Platform IoT Cloud / Platform HPE Security Data Security (Voltage/Atalla) and Event Management) and Security Analytics (DNS Malware Analytics, User Behavior Analytics) Fortify Static Application Security Testing (Source Code Scanning), Dynamic Application Security Scanning (Black- Box Scanning of Web-Applications) and Real-time Application Self Protection (RASP) HPE Aruba (Communication Security) Connectivity End-to-End Protection of sensitive data thru Data De-Identification (Data Masking: Secure Stateless Tokenization and Format Preserving Encryption) Voltage Edge Computing Enterprise Secure Key Management (ESKM Public Key Infrastructure) Atalla Aruba Authentication Authorization, Accounting (AAA) (Clearpass Policy Manager: CPPM), (Application-)Firewalling, VPN IoT Endpoints https://www.hpe.com/us/en/solutions/security.html

  11. HPE Security Solutions Overview HPE Security ArcSight (Security Intelligence) Visualization Data, Applications, Communication, Users Data, Applications, Communication, Users HPE Security Fortify (Application Security) IoT Platform IoT Cloud / Platform HPE Security Data Security (Voltage/Atalla) HPE Aruba (Communication Security) Connectivity Edge Computing IoT Endpoints

  12. HPE Secure IoT Application Lifecycle HPE Security ArcSight (Security Intelligence) HPE ADM (Application Delivery Management) Visualization HPE ITOM (IT Operations Management) Data, Applications, Communication, Users HPE Security Fortify (Application Security) IoT Cloud / Platform HPE Security Data Security (Voltage/Atalla) HPE Aruba (Communication Security) HPE ADM, ITOM and Security solutions provide a secure IoT Application Lifecycle Connectivity Edge Computing IoT Endpoints

  13. IoT Data Protection with HPE Security Data Security

  14. Data Centric Security for end-to-end protection with HPE Security Data Security (Voltage SecureData) End-to-End Protection Call W.Wolf now Call W.Wolf now xgbl i.hull xii FPE xgbl i.hull xii FPE xgbl i.hull xii FPE xgbl i.hull xii FPE Protects Data On-Premise, Cloud and Big Data environments Protects Data on Creation, in Transition, at Rest and on Access FPE: Format Preserving Encryption

  15. End-to-End Event Data Protection for connected Trucks Authorized and On-Demand Data Identification Data IoT Platform Transport / Storage / Processing of De-Identified (protected) Data Data Data Data De-Identification on Edge-Computing Device on the Trucks Data ECU Data GPS Sensor Data

  16. Live Demo

  17. Thank You! Angelo Brancato,CISSP, CISM. CCSK Chief Technologist HPE Security angelo.brancato@hpe.com Mobile: +49 174 1502278 hpe.com/security

More Related Content