Download - Internet of secure things
![Page 1: Internet of secure things](https://reader031.vdocument.in/reader031/viewer/2022020218/55b4d915bb61eb315d8b456e/html5/thumbnails/1.jpg)
What is Really Needed to Secure the Internet of Things?
![Page 2: Internet of secure things](https://reader031.vdocument.in/reader031/viewer/2022020218/55b4d915bb61eb315d8b456e/html5/thumbnails/2.jpg)
Contents• Introduction
• OWASP Internet of Things Top Ten Project
• Security Challenges for IoT
• Cyber Warfare
• Security Requirements of IoST(Internet of Secure Things)
• Conclusion
• Question & Answer
![Page 3: Internet of secure things](https://reader031.vdocument.in/reader031/viewer/2022020218/55b4d915bb61eb315d8b456e/html5/thumbnails/3.jpg)
Introduction
• IoT includes everything in our life.
• But many devices are vulnerable from attack.
• It is necessary to secure the Things themselves.
![Page 4: Internet of secure things](https://reader031.vdocument.in/reader031/viewer/2022020218/55b4d915bb61eb315d8b456e/html5/thumbnails/4.jpg)
• Insecure Web Interface (XSS/SQLi/CSRF)
• Insufficient Authentication / Authorization
• Insecure Network Services (BOF / Fuzzing)
• Lack of Transport Encryption (Lack of SSL / TLS)
• Privacy Concerns (Data Encryption)
• Insecure Cloud Interface
• Insecure Mobile Interface
• Insufficient Security Configurability
• Insecure Software / Firmware (need Encrypted Update)
• Poor Physical Security (External Ports, Storage Eject)
Vulnerabilities of IoT Device
![Page 5: Internet of secure things](https://reader031.vdocument.in/reader031/viewer/2022020218/55b4d915bb61eb315d8b456e/html5/thumbnails/5.jpg)
Security Challenges for IoT• Critical Functionality
• Replication
• Security Assumptions
• Not easily Patched
• Long Life Cycle
• Proprietary / Industry specific Protocols
• Deployed outside of Enterprise Security Perimeter
![Page 6: Internet of secure things](https://reader031.vdocument.in/reader031/viewer/2022020218/55b4d915bb61eb315d8b456e/html5/thumbnails/6.jpg)
Critical Functionality
![Page 7: Internet of secure things](https://reader031.vdocument.in/reader031/viewer/2022020218/55b4d915bb61eb315d8b456e/html5/thumbnails/7.jpg)
Replication
![Page 8: Internet of secure things](https://reader031.vdocument.in/reader031/viewer/2022020218/55b4d915bb61eb315d8b456e/html5/thumbnails/8.jpg)
Replication
![Page 9: Internet of secure things](https://reader031.vdocument.in/reader031/viewer/2022020218/55b4d915bb61eb315d8b456e/html5/thumbnails/9.jpg)
Security Assumption
![Page 10: Internet of secure things](https://reader031.vdocument.in/reader031/viewer/2022020218/55b4d915bb61eb315d8b456e/html5/thumbnails/10.jpg)
Not Easily Patched
![Page 11: Internet of secure things](https://reader031.vdocument.in/reader031/viewer/2022020218/55b4d915bb61eb315d8b456e/html5/thumbnails/11.jpg)
Long Life Cycle
15~20Years
![Page 12: Internet of secure things](https://reader031.vdocument.in/reader031/viewer/2022020218/55b4d915bb61eb315d8b456e/html5/thumbnails/12.jpg)
Specific Protocols
![Page 13: Internet of secure things](https://reader031.vdocument.in/reader031/viewer/2022020218/55b4d915bb61eb315d8b456e/html5/thumbnails/13.jpg)
Deployed Outside of Enterprise Security Perimeter
![Page 14: Internet of secure things](https://reader031.vdocument.in/reader031/viewer/2022020218/55b4d915bb61eb315d8b456e/html5/thumbnails/14.jpg)
Cyber Warfare, StuxNet
![Page 15: Internet of secure things](https://reader031.vdocument.in/reader031/viewer/2022020218/55b4d915bb61eb315d8b456e/html5/thumbnails/15.jpg)
Secure Boot Secure code Updates
Data Security
AuthenticationSecure
CommunicationProtection
Against AttacksMonitoring
Embedded Security Management
Device Tampering Detection
Requirements IoST
![Page 16: Internet of secure things](https://reader031.vdocument.in/reader031/viewer/2022020218/55b4d915bb61eb315d8b456e/html5/thumbnails/16.jpg)
Conclusion
Security must be consideredearly in the design process.
![Page 17: Internet of secure things](https://reader031.vdocument.in/reader031/viewer/2022020218/55b4d915bb61eb315d8b456e/html5/thumbnails/17.jpg)