smith gsma guidelines to secure the internet of things - etsi · guidelines to secure the internet...

Post on 31-May-2020

2 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Guidelines to Secure the Internet of ThingsIan Smith, IoT Security Lead, GSMA ismith@gsma.com

2

Guidelines for the Whole Ecosystem

Image © GSMA

Over 200 Pages of Advice and RecommendationsTo Secure Devices, Service Platforms and Networks

3 ‘Worked’ Examples – Wearables, Personal Drone and AutomotiveRisk and Privacy Impact Assessments

12 Principal Attack Models85 Detailed Recommendations

FAQs

Over 200 Pages of Advice and RecommendationsTo Secure Devices, Service Platforms and Networks

3 ‘Worked’ Examples – Wearables, Personal Drone and AutomotiveRisk and Privacy Impact Assessments

12 Principal Attack Models85 Detailed Recommendations

FAQs

3

GSMA IoT Security GuidelinesAddress the Key IoT “Challenges” of:

AVAILABILITYAVAILABILITY IDENTITYIDENTITY PRIVACYPRIVACY INTEGRITYINTEGRITY

LOW COMPLEXITY

LOW COMPLEXITY LOW POWERLOW POWER LONG

LIFECYCLESLONG

LIFECYCLESPHYSICALLY ACCESSIBLEPHYSICALLY ACCESSIBLE

in services and devices that are

4

Find out more…..Download the Guidelines:www.gsma.com/connectedliving/iot-security-guidelines

View GSMA IoT Security Webinar:http://www.gsma.com/connectedliving/webinar-highlights-securing-the-future-of-the-iot/

Talk to the GSMA Connected Living Team:Ian Smith - ismith@gsma.com

top related