josh corman-on-the-hackable-internet-of-things

23
Are your “smart” devices safe? Josh Corman on security vulnerabilities in the Internet of Things

Upload: hewlett-packard-enterprise-solutions

Post on 07-Jan-2017

744 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Josh Corman-on-the-hackable-internet-of-things

Are your “smart” devices safe?Josh Corman on security vulnerabilities in the Internet of Things

Page 2: Josh Corman-on-the-hackable-internet-of-things

In this excerpt from an interview in HPE Business Insights, security expert Josh Corman outlines some of the security issues raised by the growing reliance on the Internet of Things. Corman is the co-founder of the cyber safety organization “I Am The Cavalry.”

Page 3: Josh Corman-on-the-hackable-internet-of-things

“Software permeates everything we do.”

3

—Josh Corman

Page 4: Josh Corman-on-the-hackable-internet-of-things

“Software permeates everything we do.As connectivity seeps into every aspect of our lives, the line between personal and business devices becomes ever blurrier.”

4

—Josh Corman

Page 5: Josh Corman-on-the-hackable-internet-of-things

“Software permeates everything we do.As connectivity seeps into every aspect of our lives, the line between personal and business devices becomes ever blurrier. No organization is immune from the threat of a breach via an Internet of Things (IoT) connected device.”

5

—Josh Corman

Page 6: Josh Corman-on-the-hackable-internet-of-things

6

“It’s not beyond the realm of possibility for your organization to be hacked through the office coffeemaker…

Page 7: Josh Corman-on-the-hackable-internet-of-things

7

…or a wearable fitness device, thanks to a lack of thorough software security.”

Page 8: Josh Corman-on-the-hackable-internet-of-things

Imagine how much this expands the attack surface.

8

Page 9: Josh Corman-on-the-hackable-internet-of-things

We’re used to thinking about security vulnerabilities here…

9

Page 10: Josh Corman-on-the-hackable-internet-of-things

…but what about here?

10

Page 11: Josh Corman-on-the-hackable-internet-of-things

…here?

11

Page 12: Josh Corman-on-the-hackable-internet-of-things

12

…or here?

Page 13: Josh Corman-on-the-hackable-internet-of-things

Are hackers already interested in exploring these new vulnerabilities?

13

Page 14: Josh Corman-on-the-hackable-internet-of-things

You bet!

Researchers are finding that a multitude of vulnerable, exposed, unpatchable IoTsystems are already showing signs of exploitation, according to Corman.

14

Page 15: Josh Corman-on-the-hackable-internet-of-things

And not just that Jeep hack you heard about where the guys took over the car remotely and eventually ran it off the road.

http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/

15

Page 16: Josh Corman-on-the-hackable-internet-of-things

Talk about expanded attack surface!

16

Page 17: Josh Corman-on-the-hackable-internet-of-things

“New high-end cars are among the most sophisticated machines on the planet, containing 100 million or more lines of code.”

17Source: Complex Car Software Becomes the Weak Spot Under the Hood

By DAVID GELLES, HIROKO TABUCHI and MATTHEW DOLANSEPT. 26, 2015

Page 18: Josh Corman-on-the-hackable-internet-of-things

“New high-end cars are among the most sophisticated machines on the planet, containing 100 million or more lines of code.

Compare that with about 60 million lines of code in all of Facebook or 50 million in the Large Hadron Collider.”

18Source: Complex Car Software Becomes the Weak Spot Under the Hood

By DAVID GELLES, HIROKO TABUCHI and MATTHEW DOLANSEPT. 26, 2015

Page 19: Josh Corman-on-the-hackable-internet-of-things

Whose responsibility is it to secure all this complexity?

Page 20: Josh Corman-on-the-hackable-internet-of-things

For example, do you believe the auto manufacturers will be able to take care of securing all that code all across their software supply chain?

20

Page 23: Josh Corman-on-the-hackable-internet-of-things

Thank you