Guidelines to Secure the Internet of ThingsIan Smith, IoT Security Lead, GSMA [email protected]
2
Guidelines for the Whole Ecosystem
Image © GSMA
Over 200 Pages of Advice and RecommendationsTo Secure Devices, Service Platforms and Networks
3 ‘Worked’ Examples – Wearables, Personal Drone and AutomotiveRisk and Privacy Impact Assessments
12 Principal Attack Models85 Detailed Recommendations
FAQs
Over 200 Pages of Advice and RecommendationsTo Secure Devices, Service Platforms and Networks
3 ‘Worked’ Examples – Wearables, Personal Drone and AutomotiveRisk and Privacy Impact Assessments
12 Principal Attack Models85 Detailed Recommendations
FAQs
3
GSMA IoT Security GuidelinesAddress the Key IoT “Challenges” of:
AVAILABILITYAVAILABILITY IDENTITYIDENTITY PRIVACYPRIVACY INTEGRITYINTEGRITY
LOW COMPLEXITY
LOW COMPLEXITY LOW POWERLOW POWER LONG
LIFECYCLESLONG
LIFECYCLESPHYSICALLY ACCESSIBLEPHYSICALLY ACCESSIBLE
in services and devices that are
4
Find out more…..Download the Guidelines:www.gsma.com/connectedliving/iot-security-guidelines
View GSMA IoT Security Webinar:http://www.gsma.com/connectedliving/webinar-highlights-securing-the-future-of-the-iot/
Talk to the GSMA Connected Living Team:Ian Smith - [email protected]