security challenges inemerging technologies iot...

26
www.security.ingrammicro.com © Ingram Micro Inc. Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Security Challenges in Emerging Technologies IoT & Wearables

Upload: others

Post on 20-May-2020

12 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

www.security.ingrammicro.com© Ingram Micro Inc. Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Security Challenges inEmerging Technologies IoT &Wearables

Page 2: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

A CONNECTED network of HETEROGENEOUS components that

I. SENSE data and

II. TRANSMIT it for

III. ANALYSIS and

IV. appropriate ACTION

WHAT IS THE INTERNET OF THINGS?

INTELLIGENTAUTOMATION

Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.2

Page 3: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

1405002 rev 6.27.14

3

WHAT THIS COULD MEAN

• Sensor’s on the driver’s wearable device

• Sensors in the car synched with the driver’s mobile phone

• Sensors in smart street lights installed on the road

• Car Accident• Emergency Services

Page 4: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

1405002 rev 6.27.14

4

IoT STATS

$11.1 tn

• IoT predicted market-value by 2025. -McKinsey

90%• ¼ billion connected cars

by 2020 -Gartner

28• Dubai’s rank in the

world’s smart city index. -AT Kearney

Page 5: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

1405002 rev 6.27.14

5

SCOPE

• WEARABLE DEVICES

• SMART WATCH

• FITNESS BAND

• HOME AUTOMATION SYSTEMS

• SMART APPLIANCES

• SMART LIGHTING

• CONNECTED HOME SECURITY

SYSTEM

• GOVERNANCE

• TRANSPORT

• ENERGY

• WASTE MANAGEMENT

• ENVIRONMENT

• EDUCATION

• HEALTHCARE

• LAW ENFORCEMENT

• INDUSTRIES

Page 6: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

1405002 rev 6.27.14

6

GOVERNANCE

ENVIRONMENT

INDUSTRIESTRANSPORT

LIVING

IoT ENABLED SMART CITY

• Industrial IoT is said to be worth USD 3.8

trillion. Honeywell Pulse, an app that lets

plant managers monitor the status of

critical equipment at all times in their

plants. Real-time anomaly detection and

response is conducted.

• Smart street lights in Sentosa, Singapore,

alert a central monitoring team in the

event of a lamp failure. This eliminates the

need for periodic physical checks.

• Lights can be made motion-based leading

to energy savings by up to 80%

• Dubai metro uses GPS to update

commuters on “Next Train” times.

• Cities in UK use GPS data to update

commuters on bus wait-times at bus stops

• USAID’s smart ‘band aid’ helps

doctors in Africa monitor Ebola

patients’ vital stats without having

to enter the “hot zone”.

• Wildlife conservationists in the

UAE are using connected

drones called “Wadi” to

consolidate images of wildlife

taken by more than 120 camera

traps in the Wadi Wurayah

National Park (RAK).

• The Agricultural sector in UAE,

which consumes 75% of the

annual water supply is deploying

smart irrigation techniques.

Water supply is optimized by soil

moisture content amongst other

factors.

• Smart wrist bands consolidate citizens’ access to public

utilities, whilst simplifying government efforts towards

administration, identity validation across sectors, etc.

Page 7: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

1405002 rev 6.27.14

77

Wearables

Page 8: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

1405002 rev 6.27.14

8

ONE OF THE FIRST WEARABLE COMPUTERS

Page 9: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

1405002 rev 6.27.14

9

WEARABLES IN THE MEA REGION

$0.36 billion

• MEA Wearables Market

20.1% • CAGR of MEA Wearables Market

71% • Basic wearables in the MEA market

Source: IDC

Page 10: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

1405002 rev 6.27.14

10

THE WEARABLES ECOSYSTEM

SIMILARITIES

• CARRIED ON/INSIDE USER’S BODY• COMPUTING POWER• ALWAYS CONNECTED• ALWAYS

• SENSING• COLLECTING• ANALYZING DATA

DIFFERENCES

FUNCTIONALITY

1. FITNESS• Fitness Tracker• Posture Coach

2. SMART WATCHES3. ALTERNATIVE REALITY

• Smart Glasses• VR Headsets

4. HEALTHCARE• Ingestibles• Implantables

5. GAMING• Smart suits• Gloves

FEATURES

• TYPE OF SENSOR• CAMERA• VOICE/VIDEO CALLING• ACCESS TO BODY’S VITAL

STATS

Page 11: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

1405002 rev 6.27.14

11

1. FITNESS

STEPS

SLEEP

DIET

LOCATION

HEARTRATE

BODY

COMPOSITION

POSTURE

Page 12: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

1405002 rev 6.27.14

12

2. SMART WATCHES

STEPS

SLEEP

LOCATION

HEART RATE

TEXTS CALLS

APPS

Page 13: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

1405002 rev 6.27.14

13

3. ALTERNATIVE REALITY

VIRTUAL REALITY

• ISOLATED FROM PHYSICAL WORLD

AUGMENTED REALITY

• BUILDS ON THE PHYSICAL WORLD

Ref: Samsung Ref: Microsoft

Page 14: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

1405002 rev 6.27.14

14

3. ALTERNATIVE REALITY –APPLICATIONS

CONSTRUCTION

AUTOMOTIVE

MEDICAL TRAINING

Ref: Bentley Systems

Ref: BMW

Page 15: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

1405002 rev 6.27.14

15

4. HEALTHCARE

INGESTIBLES BLOOD

PRESSUREBLOOD SUGARHEART RATE

REACTION TO

SPECIFIC

DRUGS/DOSAGES

COMPLIANCE

WITH MEDICATION

PLAN

Ref: Proteus

Page 16: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

Security In The IoT

Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 16Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.16

Page 17: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

1405002 rev 6.27.14

17

THE STATE OF INFORMATION TECHNOLOGY

Page 18: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

1405002 rev 6.27.14

18

EVOLVING FOCUS OF INFORMATION TECHNOLOGY

• PERSONALITY

• PROFESSIONAL PROFILE

• PERSONAL INFORMATION

• FINANCIAL DATA

• COMMUNICATION DATA

• BIOMETRIC DATA

HUMAN

LIFE

Page 19: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

1405002 rev 6.27.14

19

SHIFTING FOCUS OF INFORMATION SECURITY

HUMAN

LIFE

Page 20: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

1405002 rev 6.27.14

SECURITY IN THE IoT

INHERENT

WHOLISTIC

MEASURABLE

SECURITY BY DESIGN

• ALL COMPONENTS

• ALL LAYERS

• UNIVERSAL STANDARDS

• COMPARABILITY

• REPEATABILITY

Page 21: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

1405002 rev 6.27.14

CONSIDER THE CASE OF A SELF-DRIVING CAR

WEATHER

CONDITIONS SPATIAL AWARENESS

LOCATIONSPEED

• THE FUTURE OF MOBILITY IS SAID TO BE AUTONOMOUS AND ELECTRIC

• 25% OF ROAD TRIPS IN DUBAI TO BE DRIVERLESS BY 2030• 200 TESLA TAXIS HAVE BEEN ACQUIRED BY RTA, DUBAI

Page 22: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

1405002 rev 6.27.14

INHERENT SECURITY IN A SELF-DRIVING CAR

• SECURITY OVER FUNCTIONALITYDefault deny of any external code execution on the Electronic Control Unit (ECU).

• SECURE APPLICATION DEVELOPMENT STANDARDSFormal coding methodology, documented code review procedures, application vulnerability assessments

• PRINCIPLE OF LEAST PRIVILEGES AND NEED TO KNOWElectronic Control Units of autonomous cars are interconnected. If a single ECU is compromised, it can lead to compromise of more critical ECUs.

• INPUT VALIDATIONMalware is sent to autonomous cars to exploit vulnerabilities in application code. Input validation will promote protection levels against common coding attacks such as buffer overflow and injection attacks.

Page 23: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

1405002 rev 6.27.14

• HETEROGENEOUS UNIVERSE OF THINGS

• Each “Thing” is different from the other, and therefore is a new attack surface.

• Multiple “Things” from different vendors are built into a single autonomous car. They each bring varying levels of inherent security.

• Car makers are responsible for co-ordination across their parts suppliers and ensuring timely software updates, patches and fixes are released to customers.

• MONITORING

• How are false positives handled? • How are security alerts responded to?• How are security violations responded to?

WHOLISTIC SECURITY IN A SELF-DRIVING CAR

OWASP TOP 10 FOR IoT

Recommends a holistic approach that focusses not only on securing the Device, but also, the entire IoTecosystem. It looks at:

• The Device• The Cloud• The Mobile Application• Network Interfaces• Software• Use of Encryption• Use of Authentication• Physical Security• USB Ports

Page 24: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

1405002 rev 6.27.14

MEASURABLE SECURITY

• IoT SECURITY STANDARDS

• A universally accepted security standard for IoT is not available

• COMPARABILITY and REPEATABILITY

• comparability of security postures across multiple ecosystems

• repeatability of security efforts across periods of time

Page 25: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

• Who approves the sharing of

this data with third parties?

• Who ensures the user is

notified if his/her data is

breached?

• Right to be forgotten

• Who owns the user’s PII?PRIVACY

Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.25

Page 26: Security Challenges inEmerging Technologies IoT &Wearablessecurity.ingrammicro.com/security/media/Security-Media-Library/... · Security Challenges in Emerging Technologies IoT &

www.security.ingrammicro.com© Ingram Micro Inc. Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.