privacy and security in the internet of things

24
Jeff Katz | KIWI Privacy and Security in the Internet of Things

Upload: jeff-katz

Post on 08-Apr-2017

310 views

Category:

Data & Analytics


5 download

TRANSCRIPT

Page 1: Privacy and Security in the Internet of Things

Jeff Katz | KIWI

Privacy and Security in the Internet of Things

Page 2: Privacy and Security in the Internet of Things

Agenda• A bit about me• Privacy and Data Collection• Security and Data Protection• Guidelines• Example• Questions

Page 3: Privacy and Security in the Internet of Things

A small bio• Embedded Engineer, hardware and

software (but also backend, mobile, frontend, web...)

• Developed hardware to break Nintendo DS copy protection

• 7+ Years in Physical Access Control Industry

• VP Engineering, KIWI (more at kraln.com)

Page 4: Privacy and Security in the Internet of Things

Image Credit: Twitter @internetofshit

Page 5: Privacy and Security in the Internet of Things

Privacy• Ability to preclude information from

being shared or communicated• What is sensitive changes over time• What is private changes over time• Remember: Anonymized data isn’t 1

1 Ohm, Paul, Broken Promises of Privacy: Responding to the Surprising Failure of

Anonymization (August 13, 2009). UCLA Law Review, Vol. 57, p. 1701, 2010; U of Colorado

Law Legal Studies Research Paper No. 9-12. Available at SSRN: 

http://ssrn.com/abstract=1450006

Page 6: Privacy and Security in the Internet of Things

Data Collection• Don’t collect data you don’t need• Don’t use services that collect data in

order to provide your product or service• Avoid unintentional information leakage• Data is a double-edged sword• Pretend everything will become public!

Page 7: Privacy and Security in the Internet of Things

Example: Smart Thermostat• What you want

– House temperature auto-adjusts– House is warm when you come home– Less energy usage

• What you get leak– Knowledge about where other people are– When you are on vacation– Location information collected by

background service on your phone

Page 8: Privacy and Security in the Internet of Things

A designer knows he has achieved perfection not when there is nothing left to add, but when there is nothing left to take away.

Antoine de Saint-Exupery

Page 9: Privacy and Security in the Internet of Things

Example: Smart Power Meter• What you want

– Power usage over time– Optimize grid– Easy metering

• What you get leak– When people are home– What is being watched on TV– Ability to remotely kill power1

1 http://www.sciencedirect.com/science/article/pii/S1877050915008492

Page 10: Privacy and Security in the Internet of Things

But we’re the good guys!• Security breaches• Government intrusion• Corporate sale

Information you collect, even with the best of intentions, can be used against you and your customers.

Page 11: Privacy and Security in the Internet of Things

Security breaches• Any data you have can &

will be used against you• The more data you have,

the more valuable you are as a target

• Large or small scale possible

• Matter of when, not if!http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

Page 12: Privacy and Security in the Internet of Things

Example: Smart Lock• What you want

– Lock works with cellphone over Bluetooth– List of people who come and go, and when– No need for metal keys anymore

• What you everyone gets– List of people who come and go, and when– Ability to drain battery, lock people out of

their houses

Page 13: Privacy and Security in the Internet of Things

Government intrusion• 2013 Facebook: 38,000 requests• 6mo 2014 Twitter: 2,871 requests• 3mo 2014 Snapchat: 400 requests• Google:

https://www.eff.org/who-has-your-back-government-data-requests-2015

Page 14: Privacy and Security in the Internet of Things

Corporate sale• Barclays bank tells 13 million customers it is to start selling information on

their spending habits to other companieshttp://www.theguardian.com/business/2013/jun/24/barclays-bank-sell-customer-data

• Bell faces $750M lawsuit over allegedly selling customer datahttp://www.cbc.ca/news/canada/windsor/bell-faces-750m-lawsuit-over-allegedly-selling-customer-data-1.3037545

• “RadioShack Corp. won court approval to sell data on about 67 million customers in a $26.2 million deal for assets that also includes the bankrupt electronics retailer’s name.”

http://www.bloomberg.com/news/articles/2015-05-20/radioshack-receives-approval-to-sell-name-to-standard-general

Page 15: Privacy and Security in the Internet of Things

Security• The internet is radioactive ☢• Wireless communications are radioactive ☢• Users are very radioactive ☢• Minimize your exposure!• Strong encryption is your radiation shielding!• Keep your business-critical data, and your

user’s data, as far away from the danger as possible

Page 16: Privacy and Security in the Internet of Things

Example: LIFX• What you want

– App to control lightbulb– Easy set up, wireless control

• What you get– Mesh-network “encrypted” with keys sent

in plain-text– WIFI password broadcast unencrypted

http://www.contextis.com/resources/blog/hacking-internet-connected-light-bulbs/

Page 17: Privacy and Security in the Internet of Things

Medical Devices: Myth• High standards mean high quality• Enable doctors to work remotely• Security vulnerabilities do not exist, or

even if they did, they would not cause problems

• Medical devices are always airgapped

Page 18: Privacy and Security in the Internet of Things

Medical Devices: Reality• High standards mean lots of shortcuts• Enable anyone to access remotely• Security vulnerabilities do exist, and

create critical problems• Medical devices are almost never

airgapped. Many devices can be crashed just by running simple security scans (port scans)

Page 19: Privacy and Security in the Internet of Things

Why should I care?• Immunizations provide herd immunity!• Designing for privacy and security is

much easier and more effective than retrofitting

• Defense in depth• Think of your mom!

Page 20: Privacy and Security in the Internet of Things

Example: Smart “Toy”

http://motherboard.vice.com/read/yes-your-smart-dildo-can-be-hacked

• Remote control• Video• Sound

Do I really need to explain why this is a bad idea?

Page 21: Privacy and Security in the Internet of Things

What can I do?• Collect as little information as possible• What you collect, always secure/encrypt• Secure command & control channel• Have a disaster recovery plan• Have a privacy policy• Don’t re-invent the wheel• Work with security researchers

More ideas: https://msdn.microsoft.com/en-us/library/ms976532.aspx

Page 22: Privacy and Security in the Internet of Things

• Physical Access Control as a Service• Private apartments, service providers,

and house management companies• Mix of hardware, software, wireless

sensor network and web applications• High focus on privacy and security of

our users

Page 23: Privacy and Security in the Internet of Things
Page 24: Privacy and Security in the Internet of Things

Questions?

Jeff [email protected] / @kraln