SlideShare a Scribd company logo
Internet of Things(IoT):The Next Cyber
Security Target
Praveen Kumar Gandi
Head Information Security Services
ClicTest
praveen.g@clictest.com
By
Disclaimer: The images used in this presentation belong to their respective copyright holders and are used for educational purposes only. All
other rights are reserved.
Pre-
Internet
Internet of
CONTENT
Internet of
SERVICES
Internet of
PEOPLE
Internet of
THINGS
“HUMAN
TO
HUMAN”
“WWW” “WEB 2.0” “SOCIAL
MEDIA”
“MACHINE
TO
MACHINE”
• Fixed &
mobile
telephony
• SMS
• E-mail
• Information
• Entertainment
• E-productivity
• E-commerce
• …
• Skype
• Facebook
• YouTube
• Twitter
• ….
• Identification,
tracking,
monitoring,
metering ….
• Semantically
structured and
shared data …
+ Smart
networks
+ Smart
IT platforms
& services
+ Smart
Phones &
applications
+ Smart
Devices,
objects & tags
+ Smart
Data & ambient
context
Evolution of Internet of Things
• According to Gartner's analysis,
there will be nearly 26 billion
devices on the Internet of Things
by 2020.
• As per ABI Research, an
estimation of more than 30
billion devices will be wirelessly
connected to Internet of Things.
• And as per the
MarketsandMarkets Analysis, the
estimated revenue generated on
these smart product sales by
2016 will be $1 Trillion.
Importance of Internet of Things
Source: Cisco
Internet of Things(IoT)
• Originally, The Internet of Things (IoT) refers
to “the interconnection of uniquely
identifiable embedded computing devices
within the existing Internet infrastructure”.
• As the technology advances, the term
Internet of Things(IoT) denotes to
“Advanced connectivity of devices, systems,
and services that goes beyond machine-to-
machine communications (M2M) and covers
a variety of protocols, domains, and
applications”.
Source: http://en.wikipedia.org/wiki/Internet_of_Things
Internet of Things(IoT)
• The IoT represents an evolution of future
as many physical devices communicate
with each other everyday through internet
and identify themselves with other
devices.
• The other technologies like RFID, Sensor
technologies, Wireless technologies, etc.
will also be used as method of
communication.
IPV6
Inexpensive and High
Speed Connection
Big
Data
and
Cloud
Inexpensive and
Powerful Hardware
Internet
Evolution
Source:Cisco
Types of Internet of Things
Information
Technology
• PCs
• Servers
• Virtualization
• Routers
• Switches
Personal Technology
• Tablets
• Smart phones
• Smart watches
• Home energy
• Home entertainment
• Home control
• Medical implants
• Medical wearables
Operational
Technology
• Industrial Control
Systems(ICS)
• Supervisory control
and data acquisition
• Medical machines
• Kiosks
• Manufacturing
• Cloud service
infrastructure
• Environmental
Monitoring
Do you know?
• The First IOT device
is Internet Coke
Machine at
Carnegie Mellon
University
introduced in the
year 1982”.
Internet of Things In Everyday Life
Internet of Things in Homes(Smart Homes)
How IoT works?
Source: Securing the IoT World by Aaron Guzman
Are Internet of Things Secure?
Smart Cars got pwned!!
Smart Lights can be Hacked
• Unsecure communication
between bridge and application
•Vulnerability in smart bulb
makes home black out by
security researcher
•Fixed in Latest Version
Vulnerabilities in IoT Devices
• Due to improper security model implementation and unsecure
communication between the device and application.
• Any device on the same Wi-Fi network can command or control these
devices.
How far IoT can be hacked?
Remember “Fire Sale” in Die Hard 4.0
Hurdles Securing the IoT
• There is no consistent or
official software update
process or mechanism
• There is little or no
understanding of the cyber
threats embedded in their
systems
• There is lack of accountability
for device security
• Improper configuration or
purpose-built features that
equate to security flaws
• Data privacy
Securing the IoT
• Keep your Software/firmware
Updated
• Ensure that connectivity is Secure.
eg: Two Factor Authentication
• Secure the location of the
data being reported by
IoT-linked devices.
• Encrypt the System.
eg: Two-Person Controls
Securing the IoT
• Ensure Supply Chain
Security.
Prevention of counterfeit hardware by
procedures to certify manufacturers’ supply
chain processes to prevent the introduction of
malicious code.
• Support IoT security.
We must support regulation that requires that
IoT devices meet security standards, just as we
require standards for our electrical devices
with UL approval requirements.
Securing the IoT
• Use out of band (OOB) systems
– closed systems (intranets) that
are not open to the public.
The Defence Department uses IoT linked devices, but
they are mainly out of reach from hackers because they
are OOB. Defence weapons systems and even sensor-
wearing soldiers report critical status information to
centralized control centres that feed decision
makers. While less vulnerable to being hacked, these
OOB systems are subject to insider attacks.
Securing the IoT
• Support Standardization.
Eg: OWASP
Securing the IoT
Source: IoT-Attack-Surfaces-Defcon-2015
Securing the IoT
• Stay informed.
National Institute of Standards and
Technology and Federal Guidance such as
Federal Information Processing Standards
(FIPS) address critical steps that are needed
to secure and protect information and critical
systems.
Thank You !
Praveen Kumar G
Head Information Security Services |ClicTest
E-mail: praveen.g@clictest.com

More Related Content

PPTX
Big data in real estate
Rajesh Chilamanthula
 
PDF
[Bucharest] From SCADA to IoT Cyber Security
OWASP EEE
 
PPTX
Principals of IoT security
IoT613
 
PPTX
IoT - IT 423 ppt
Mhae Lyn
 
PPTX
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Mohan Kumar G
 
PDF
Integrated Cybersecurity and the Internet of Things
Dr David Probert
 
PPTX
IoT based on cyber security in defense industry and critical infrastructures
UITSEC Teknoloji A.Ş.
 
PDF
Cyber services IoT Security
Gábor Nagymajtényi
 
Big data in real estate
Rajesh Chilamanthula
 
[Bucharest] From SCADA to IoT Cyber Security
OWASP EEE
 
Principals of IoT security
IoT613
 
IoT - IT 423 ppt
Mhae Lyn
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Mohan Kumar G
 
Integrated Cybersecurity and the Internet of Things
Dr David Probert
 
IoT based on cyber security in defense industry and critical infrastructures
UITSEC Teknoloji A.Ş.
 
Cyber services IoT Security
Gábor Nagymajtényi
 

Viewers also liked (18)

PDF
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Capgemini
 
PDF
Scaling IoT Security
Bill Harpley
 
ODP
Owasp IoT top 10 + IoTGOAT Cyber Security Meeting Brazil 3rd 2015
Mauro Risonho de Paula Assumpcao
 
PPTX
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
Dataconomy Media
 
PDF
7 Strategies for Reducing IoT Cyber Risk
Hector Del Castillo, CPM, CPMM
 
PPTX
CyberSecurity Best Practices for the IIoT
Creekside Marketing Group, LLC
 
PDF
The 5 elements of IoT security
Julien Vermillard
 
PPT
Smart Grid Cyber Security
JAZEEL K T
 
PPT
IoT security (Internet of Things)
Sanjay Kumar (Seeking options outside India)
 
PDF
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
CA Technologies
 
PPTX
Internet of Things
Cisco Services
 
PPTX
Cyber security presentation
Bijay Bhandari
 
PDF
Cyber Security - awareness, vulnerabilities and solutions
inLabFIB
 
PPT
THE INTERNET OF THINGS
Ramana Reddy
 
PPT
Internet of Things and its applications
Pasquale Puzio
 
PDF
Internet of Things
Vala Afshar
 
PDF
20090630 Business models for the Internet of Services
Arian Zwegers
 
PDF
Internet of things, New Challenges in Cyber Crime
Murray Security Services
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Capgemini
 
Scaling IoT Security
Bill Harpley
 
Owasp IoT top 10 + IoTGOAT Cyber Security Meeting Brazil 3rd 2015
Mauro Risonho de Paula Assumpcao
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
Dataconomy Media
 
7 Strategies for Reducing IoT Cyber Risk
Hector Del Castillo, CPM, CPMM
 
CyberSecurity Best Practices for the IIoT
Creekside Marketing Group, LLC
 
The 5 elements of IoT security
Julien Vermillard
 
Smart Grid Cyber Security
JAZEEL K T
 
IoT security (Internet of Things)
Sanjay Kumar (Seeking options outside India)
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
CA Technologies
 
Internet of Things
Cisco Services
 
Cyber security presentation
Bijay Bhandari
 
Cyber Security - awareness, vulnerabilities and solutions
inLabFIB
 
THE INTERNET OF THINGS
Ramana Reddy
 
Internet of Things and its applications
Pasquale Puzio
 
Internet of Things
Vala Afshar
 
20090630 Business models for the Internet of Services
Arian Zwegers
 
Internet of things, New Challenges in Cyber Crime
Murray Security Services
 
Ad

Similar to Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target (20)

PPTX
Security challenges for internet of things
Monika Keerthi
 
PPTX
IoT and the industrial Internet of Things - june 20 2019
John D. Johnson
 
PPTX
Assign 1_8812814ctm.pptx
pdevang
 
PPTX
IoT Security Briefing FBI 07 23-2017 final
Frank Siepmann
 
PPTX
pptt.pptx
AdityaRajput317826
 
PPTX
The internet of things (io t)
shashankvaidyar2
 
PPTX
The internet of things (io t) : IoT academy
AnkitThakkar46
 
PPTX
Security of iot device
Mayank Pandey
 
PPTX
Internet of Things Security
Tutun Juhana
 
PPTX
Internet of things (IoT)
GOPAL BASAK
 
PPTX
IoT security
YashKesharwani2
 
PPTX
All The Things: Security, Privacy & Safety in a World of Connected Devices
John D. Johnson
 
PPTX
Chapter 6 - IT Culture and the Society - Lesson 1.pptx
DondonGoles
 
PPTX
IOT.pptx
Bkannan2
 
PDF
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET Journal
 
PDF
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
HITCON GIRLS
 
PPTX
IOT – Internet of things.pptx (A Brief Introduction)
lakshikaworks23
 
PPTX
IOT – Internet of things.pptx A Brief Introduction
lakshikaworks23
 
PDF
Trust Modelling for Security of IoT Devices
ijtsrd
 
PDF
Huntsman - Internet of things (for IAP2015)
Huntsman Security
 
Security challenges for internet of things
Monika Keerthi
 
IoT and the industrial Internet of Things - june 20 2019
John D. Johnson
 
Assign 1_8812814ctm.pptx
pdevang
 
IoT Security Briefing FBI 07 23-2017 final
Frank Siepmann
 
The internet of things (io t)
shashankvaidyar2
 
The internet of things (io t) : IoT academy
AnkitThakkar46
 
Security of iot device
Mayank Pandey
 
Internet of Things Security
Tutun Juhana
 
Internet of things (IoT)
GOPAL BASAK
 
IoT security
YashKesharwani2
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
John D. Johnson
 
Chapter 6 - IT Culture and the Society - Lesson 1.pptx
DondonGoles
 
IOT.pptx
Bkannan2
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET Journal
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
HITCON GIRLS
 
IOT – Internet of things.pptx (A Brief Introduction)
lakshikaworks23
 
IOT – Internet of things.pptx A Brief Introduction
lakshikaworks23
 
Trust Modelling for Security of IoT Devices
ijtsrd
 
Huntsman - Internet of things (for IAP2015)
Huntsman Security
 
Ad

Recently uploaded (20)

PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PPTX
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PPT
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Software Development Company | KodekX
KodekX
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Doc9.....................................
SofiaCollazos
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Software Development Company | KodekX
KodekX
 
Software Development Methodologies in 2025
KodekX
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Doc9.....................................
SofiaCollazos
 

Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Security Target

  • 1. Internet of Things(IoT):The Next Cyber Security Target Praveen Kumar Gandi Head Information Security Services ClicTest [email protected] By Disclaimer: The images used in this presentation belong to their respective copyright holders and are used for educational purposes only. All other rights are reserved.
  • 2. Pre- Internet Internet of CONTENT Internet of SERVICES Internet of PEOPLE Internet of THINGS “HUMAN TO HUMAN” “WWW” “WEB 2.0” “SOCIAL MEDIA” “MACHINE TO MACHINE” • Fixed & mobile telephony • SMS • E-mail • Information • Entertainment • E-productivity • E-commerce • … • Skype • Facebook • YouTube • Twitter • …. • Identification, tracking, monitoring, metering …. • Semantically structured and shared data … + Smart networks + Smart IT platforms & services + Smart Phones & applications + Smart Devices, objects & tags + Smart Data & ambient context Evolution of Internet of Things
  • 3. • According to Gartner's analysis, there will be nearly 26 billion devices on the Internet of Things by 2020. • As per ABI Research, an estimation of more than 30 billion devices will be wirelessly connected to Internet of Things. • And as per the MarketsandMarkets Analysis, the estimated revenue generated on these smart product sales by 2016 will be $1 Trillion. Importance of Internet of Things Source: Cisco
  • 4. Internet of Things(IoT) • Originally, The Internet of Things (IoT) refers to “the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure”. • As the technology advances, the term Internet of Things(IoT) denotes to “Advanced connectivity of devices, systems, and services that goes beyond machine-to- machine communications (M2M) and covers a variety of protocols, domains, and applications”. Source: http://en.wikipedia.org/wiki/Internet_of_Things
  • 5. Internet of Things(IoT) • The IoT represents an evolution of future as many physical devices communicate with each other everyday through internet and identify themselves with other devices. • The other technologies like RFID, Sensor technologies, Wireless technologies, etc. will also be used as method of communication.
  • 6. IPV6 Inexpensive and High Speed Connection Big Data and Cloud Inexpensive and Powerful Hardware Internet Evolution
  • 8. Types of Internet of Things Information Technology • PCs • Servers • Virtualization • Routers • Switches Personal Technology • Tablets • Smart phones • Smart watches • Home energy • Home entertainment • Home control • Medical implants • Medical wearables Operational Technology • Industrial Control Systems(ICS) • Supervisory control and data acquisition • Medical machines • Kiosks • Manufacturing • Cloud service infrastructure • Environmental Monitoring
  • 9. Do you know? • The First IOT device is Internet Coke Machine at Carnegie Mellon University introduced in the year 1982”.
  • 10. Internet of Things In Everyday Life
  • 11. Internet of Things in Homes(Smart Homes)
  • 12. How IoT works? Source: Securing the IoT World by Aaron Guzman
  • 13. Are Internet of Things Secure?
  • 14. Smart Cars got pwned!!
  • 15. Smart Lights can be Hacked • Unsecure communication between bridge and application •Vulnerability in smart bulb makes home black out by security researcher •Fixed in Latest Version
  • 16. Vulnerabilities in IoT Devices • Due to improper security model implementation and unsecure communication between the device and application. • Any device on the same Wi-Fi network can command or control these devices.
  • 17. How far IoT can be hacked? Remember “Fire Sale” in Die Hard 4.0
  • 18. Hurdles Securing the IoT • There is no consistent or official software update process or mechanism • There is little or no understanding of the cyber threats embedded in their systems • There is lack of accountability for device security • Improper configuration or purpose-built features that equate to security flaws • Data privacy
  • 19. Securing the IoT • Keep your Software/firmware Updated • Ensure that connectivity is Secure. eg: Two Factor Authentication
  • 20. • Secure the location of the data being reported by IoT-linked devices. • Encrypt the System. eg: Two-Person Controls Securing the IoT
  • 21. • Ensure Supply Chain Security. Prevention of counterfeit hardware by procedures to certify manufacturers’ supply chain processes to prevent the introduction of malicious code. • Support IoT security. We must support regulation that requires that IoT devices meet security standards, just as we require standards for our electrical devices with UL approval requirements. Securing the IoT
  • 22. • Use out of band (OOB) systems – closed systems (intranets) that are not open to the public. The Defence Department uses IoT linked devices, but they are mainly out of reach from hackers because they are OOB. Defence weapons systems and even sensor- wearing soldiers report critical status information to centralized control centres that feed decision makers. While less vulnerable to being hacked, these OOB systems are subject to insider attacks. Securing the IoT
  • 23. • Support Standardization. Eg: OWASP Securing the IoT Source: IoT-Attack-Surfaces-Defcon-2015
  • 24. Securing the IoT • Stay informed. National Institute of Standards and Technology and Federal Guidance such as Federal Information Processing Standards (FIPS) address critical steps that are needed to secure and protect information and critical systems.
  • 25. Thank You ! Praveen Kumar G Head Information Security Services |ClicTest E-mail: [email protected]

Editor's Notes

  • #2: Hello Everyone, My Name is Praveen Kumar G. I am currently working as a Head Information Security Services for ClicTest. Today, I am going to speak about “Internet of Things(IoT): The Next Cyber Security Target”.
  • #5: In simple, we can say that the network of these interconnected physical objects or things embedded with electronics, software, sensors and connectivity.
  • #7: With the invention of these powerful and inexpensive hardware's, high speed internet connections, IPv6 and Big Data & Cloud technologies contributes towards the evolution of Internet which can support the IoT.
  • #8: Especially, with the help of IPv6. we can have almost unlimited number of IP addresses i.e. around 100 IP addresses for every atom on the face of the earth.
  • #11: Health Care: Patient care, elderly monitoring, remote diagnostics, equip monitoring, hospital hygiene, bio wearables, food sensors. Buildings: HVAC, security, lighting, electrical, transit, emergency alerts, occupancy and energy credits. Transport: Traffic routing, Telematics, Package monitoring, Smart Parking, Supply Chain, Shipping, public transport, Trains, Airlines. Home: Light bulbs, Security, pet feeding, smoke alarm, irrigation controller, refrigerator, washer/dryer, stove, energy monitoring.