1 Big Data s Potential in Securing the Internet of Things SESSION ID: ANF-W02 James Kobielus IBM Big Data Evangelist
2 The emerging infrastructure of Smarter Planet Cloud Mobile Social Internet of Things
3 Some call this the Internet of Everything
4 So what exactly is the Internet of Things? Vision of a Smarter Planet where sensors, intelligence, and connectivity are embedded into every human artifact, every element of the natural world, and even every physical person. (IBM) A network of physical objects that contain embedded tech to communicate, sense, and interact with internal states or external environment (Gartner) Uniquely identifiable objects (things) and their virtual representations in an Internet-like structure. (Wikipedia) AKA: Machine to Machine (M2M) Internet, Sensor Internet, Ambient Internet, Industrial Internet, Pervasive Computing.
5 What s driving the Internet of Things? Proliferation of low cost, smaller, smarter, embeddable sensors, processors, actuators, and communications components Explosion of mobile devices Rollout of advanced wireless networks Today the connected devices market is dominated by mobile phones, but this will change in the future as a new wave of smartphones, tablets, consumer electronics and M2M devices connect everything from cars to health services and even entire cities GSMA (link) 5 Source: Internet of Things: A 2013 HorizonWatch Trend Report (BP Ready)
6 Current Internet of Things apps are industry-focused Industry sector Applications Automotive and transport Fleet tracking, consumer connected cars Security Consumer connected alarms, commercial connected alarms, consumer connected security sensors, commercial connected security sensors Healthcare Cardiovascular disease monitoring, other disease monitoring, body area networks Government Video surveillance devices, police patrol car first responder devices, paramedic first responder devices, fire fighter first responder devices Utilities Commercial electric meters, commercial water meters, commercial gas meters, residential utility meters Retail Point-of-sale terminals, vending machines Financial services ATMs Source: Analysis Mason, M2M device connections, revenue and ARPU: worldwide forecast , May 2012
7 Emerging Internet of Things apps in consumer world Smart vehicles Smart homes Smart schools Smartphones Smart wearables Smart healthcare
8 How big is the Internet of Things becoming? Approximately 10 billion devices are already permanently connected to the Internet today, with a further 50 billion to 60 billion devices attaching intermittently. These numbers are expected to rise to more than 200 billion by Source: Gartner Volumes: pervasive IoT links driving collection, analysis, transmission, and delivery of increasing volumes of IoT data. Velocities: real-time IoT links driving implementation of lowlatency connections to support continuous, streaming interactions among physical and digital entities Varieties: myriad IoT links driving implementation of standards to support fluid, flexible, contextual, robust, secure interactions among endpoints and infrastructures in diverse consumer, business, and other domains Throughout the Smarter Planet Connecting millions of locations, billions of people, and trillions of devices In real time, continuously, often with guaranteed end-to-end latencies With embedded analytic intelligence at endpoints and in the infrastructure Enterprise IT implications: storage, server/compute capacity, network capacity, connectivity, quality of service, security, etc.
9 Forecasts call for billions of connected things Smart Connected Devices To Reach 13.5 Billion in Harbor Research (link) Ericsson CEO Hans Vestberg estimates 50 billion devices will be connected to the Web by 2020 (link) John Gantz of IDC forecasts 15 billion devices will be communicating over the network by the year 2015 (link) 50 Billion Connections in 2020 Ericsson (from page 18 of 2010 annual report) Source: Internet of Things: A 2013 HorizonWatch Trend Report (BP Ready)
10 The Internet of Things soon will be everywhere Impact on Consumers Top Ten Applications Impact on Business - Industries Soiurce: Internet of Things: A 2013 HorizonWatch Trend Report (BP Ready) The Connected Life will be underpinned by seamless and pervasive connectivity between people and processes, enabling a wealth of valuable context-aware services to be delivered immediately and automatically. Individuals will enjoy personalised experiences whenever, wherever and for whatever they are required. GSMA (link) All of those instrumented and interconnected things are becoming intelligent. They are being linked to powerful new backend systems that can process all that data, and to advanced analytics capable of turning it into real insight, in real time. - IBM (link)
11 From a security perspective, is this Pandora s Box? Surround everybody everywhere with everything we ve got!!!!!!!!!
12 Is the Internet of Things too big, diverse, pervasive, and dynamic to secure comprehensively?
13 What s the problem? Securing everything everywhere forevermore is the ultimate pipe dream. But securing every "thing" is becoming a critical issue as we move into the IoT era. Security is critical to IoT's adoption. How vulnerable are we to security vulnerabilities and privacy violations from the IoT? Can we "trust" the sensors, actuators, rules engines, and other connected thingamabobs that we embed in every element of our existence?
14 How acute is the IoT security problem? Surge of new devices will usher in an unprecedented wave of security concerns. [Gigacom, Aug 2010] The Internet of Things has an impact on the security and privacy of the involved stakeholders Measures ensuring the architecture's resilience to attacks, data authentication, access control and client privacy need to be established. An adequate legal framework must take the underlying technology into account and would best be established by an international legislator, which is supplemented by the private sector. [Computer Law & Security Review, Jan 2010] (emphases added)
15 Does the general public feel exposed to IoT? In the post-snowden age, many people are not reassured by statements such as this from former CIA director David Petraeus, who was discussing the surveillance potential of IoT-equipped "smart homes": "Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters all connected to the next-generation internet using abundant, low-cost, and high-power computing, the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing. Source:http://www.wired.com/dangerroom/2012/03/petraeus-tv-remote/
16 How does IoT complicate the security pro s life? So far, nobody has a comprehensive vision for how--or even if--the human race will be able to manage end-to-end security in the coming IoT world. The security devil is always in the details of the attack and the IoT is an endless proliferation of details. Every new "thing"--sensor, actuator, data source, data consumer, routing intermediary, etc--is a new security-relevant detail that stirs up a wide range of collateral security issues. Every new networked IoT endpoint is a new potential attack vector or launching point that the baddies can exploit. 16
17 How does IoT complicate the security pro s life? (continued) Potentially, every time you plug in a new IoT-networked device that is infected with malware or simply open to unauthorized third-party exploitation, the vulnerabilities start. Someone somewhere might exploit the new access point to gain illicit access to sensitive assets, to damage software and data, and to wage distributed denial of service attacks. 17
18 Where do we start to address IoT security? In the past, IT security has been based on establishing secure boundaries and firewalls around internal IT systems. The IoT model is defined by extreme access to many different devices that collect and leverage vast amounts of data. The concept of controlled access is changing with the IoT model to one of controlled trust to enable the wide range of possible solutions. IoT implementations must effectively deal with authorization, authentication, access control, privacy, and trust requirements while not negatively impacting usability objectives. Source: IBM Academy of Technology, Themes White Paper, Internet of Things (April 2012)
19 Are there IoT security standards? Not yet Considering the ever-expanding diversity of IoT endpoints--in scale, features, deployments, etc.--the security standards should be framed in functional terms that are agnostic to underlying physical implementations of the things themselves.
20 Ongoing EU effort to define IoT security To holistically embed effective and efficient security and privacy mechanisms into IoT devices and the protocols and services they utilise.privacy and security are major concerns, in particular to EU citizen. An IoT-A will ensure that appropriate mechanisms are deeply embedded in the IoT architecture, covering the hardware of its devices, communication and interaction protocols and the information level. To implement this goal IoT-A will extensively investigate and take into account service privacy and IoT access security aspects throughout the architecture design activities dealing with service accommodation, indentification and IoT-A platform realisations. Source:
21 IoT security must be comprehensive, multi-level Source: IDC Worldwide Internet of Things (IoT) Forecast: Billions of Things, Trillions of Dollars (October 2013)
22 Overall IoT security reference framework IoT endpoints Do you trust the things themselves? IoT interactions IoT ecosystems Do you trust the things interactions with the world around them? Do you trust the things value chains in the physical and virtual world?
23 Securing IoT endpoints Everybody recognizes that the first line of IoT security must be built into the things themselves. At the very least, we should: rely on standardized IoT interfaces incorporate robust security and attack-protections safeguards in the development of IoT products; leverage widely vetted open security standards in IoT products; embed modular security-aware hardware and software designs in IoT products; and conduct independent review, auditing, and penetration testing of security in IoT products Implement policy-driven bulk IoT device provisioning, configuration, & security patching A big-data repository of thing identities, profiles, configurations, privileges, histories, and other metadata will prove essential for endpoint security.
24 Securing IoT interactions Security vulnerabilities are consequences of how IoT endpoints interact with users, local &remote applications, cloud &other infrastructures, and each other. At the very least, we should: Leverage identity, authentication, access control, message encryption, transport-level security, key exchange, digital signatures, de-identification, privacy, intrusion detection, alerting, auditing, monitoring, malware prevention, DDoS prevention, and other infrastructure services in IoT environments Use analytic and trend-analysis tools to identify threats across the entire IoT cloud under your purview. Monitor and log IoT security-relevant events Embed and continuously update analytics algorithms that detect various security issues, predictively pre-empt attacks, and automatically alert, escalate, and log all priority issues. Escalate exceptional, unprecedented, and undiagnosed IoT issues to human security analysts for further investigation. A big-data security incident & event management repository will be the foundation for logging IoT events for predictive, real-time, & historical analysis.
25 Securing IoT ecosystems Security vulnerabilities may introduced anywhere in the constellation of solution providers, service businesses, certification authorities, and others who build, deploy, test, manage, and vouch for the endpoints and infrastructures. At the very least, we must: Assemble the compliance, legal, contractual, trust, reputation, governance, operational, and risk management frameworks to handle the interlocking responsibilities of all these parties for ensuring end-to-end IoT security. Inspect, certify, vet, monitor, and audit the suppliers of IoT components and life-cycle services for conformance to generally accepted IoT security practices Implement strong authentication, permission management, content encryption, tamperproofing, and other technical safeguards to prevent unauthorized parties in the value chain from gaining access to sensitive data A big-data ecosystem registry will facilitate tracking of all value-chain parties who touch security-sensitive things throughout their life cycles.
26 Summary Comprehensive IoT security is multilayered: device and application endpoints, middleware and infrastructures, vendor ecosystems. Fortunately, the IoT industry and security professionals are beginning to address these challenges on many fronts. As new IoT technologies take hold and new threats reveal themselves, the global security framework will grow more complex. Ongoing refinement of IoT security standards, practices, and tools will go on indefinitely.
Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance
#924, 5 A The catchy phrase Internet of Things (IoT) or the Web of Things has become inevitable to the modern world. Today wireless technology has reached its zenith making it possible to interact with
The Internet of Things The Power of Actionable Insight An introduction to the Internet of Things Chris Vetor Business Unit Executive, WW Programs firstname.lastname@example.org More and more of the world s activity
RIOT CONTROL The Art of Managing Risk for Internet of Things Kim Singletary McAfee Session ID: Session Classification: Advanced Intro What is IoT and why is it different? What are the risks? What are the
Article 6: September 2014 Internet of Things This year the focus of business has shifted to the Internet of Things (IoT), the connection and sharing of information between objects, machines, people and
OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE MACHINE-TO-MACHINE ENABLE AND SECURE A CONNECTED LIFE DRIVEN BY GOVERNMENT REGULATIONS, COMPANY AND CONSUMER NEEDS, PRODUCTS ARE TRANSFORMED INTO INTELLIGENT,
Next Internet Evolution: Getting Big Data insights from the Internet of Things Internet of things are fast becoming broadly accepted in the world of computing and they should be. Advances in Cloud computing,
Understanding the impact of the connected revolution Vodafone Power to you 02 Introduction With competitive pressures intensifying and the pace of innovation accelerating, recognising key trends, understanding
A HARVARD BUSINESS REVIEW ANALYTIC SERVICES REPORT INTERNET OF THINGS: SCIENCE FICTION OR BUSINESS FACT? Copyright 2014 Harvard Business School Publishing. sponsored by SPONSOR PERSPECTIVE Each year the
Verizon Wireless PRIVATE NETWORK Take control of your network with Verizon Wireless Private Network and 4G LTE. THE CONNECTED WORKPLACE SERIES WIRELESS DEVICES CHALLENGE CONTROL. As networks evolve, companies
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
Systems of Discovery The Perfect Storm of Big Data, Cloud and Internet-of-Things Mac Devine CTO, IBM Cloud Services Division IBM Distinguished Engineer email@example.com twitter: mac_devine Forecast for
October 7, 2014 MES and Industrial Internet Jan Snoeij Board Member, MESA International Principal Consultant, CGI Do you know MESA? Agenda Introduction Internet of Things Big Data Smart Factory or Smart
Great Now We Have to Secure an Internet of Things John Pescatore SANS Director, Emerging Security Trends @John_Pescatore 1 What the Heck is That?? 2 Different Views of the Internet of Things 3 Different
INTRODUCTION At first, the Internet of Things (IoT) may seem like an idea straight out of science fiction. However, on closer consideration, we realize that the process of connecting everyday electronic
Accenture and Oracle: Leading the IoT Revolution ACCENTURE AND ORACLE The Internet of Things (IoT) is rapidly moving from concept to reality, as companies see the value of connecting a range of sensors,
Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application Introduction Security continues to be a hot topic in all areas of technology, including machine-tomachine (M2M) applications.
A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Predicting From the Edge in an IoT World IoT will produce 4,400 exabytes of data or 4,400 billion terabytes between 2013 and 2020. (IDC) Today, in the Internet of Things (IoT) era, the Internet touches
A New Approach to IoT Security 5 Key Requirements to Securing IoT Communications The Internet of Things promises to bring everything from microwaves to pacemakers and shipping fleets online, leverage enormous
WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution
User and Iot Data Analytics Empowered by Ericsson User Data Consolidation (UDC) content Market trends Opportunities Ericsson solution Benefits Extended view Values from insights Use cases Conclusion Ericsson
Driving IoT Adoption with Innovative IoT Cloud Management Ian Khan Manager of Innovation firstname.lastname@example.org www.solgenia.com The State of IoT The State of Cloud Managing & Monetizing IoT The State of IoT
Enabling Manufacturing Transformation in a Connected World John Shewchuk Technical Fellow DX Internet of Things What is the Internet of Things? The network of physical objects that contain embedded technology
M2M Analytics: A New Wave of Innovation By Susan Simmons and Sidhant Jalan To date, typical enterprise Machine to Machine (M2M) projects have replaced legacy processes to serve basic operational needs,
Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions
Oracle s Internet of Things Platform: The M2M Platform for a Connected World An Oracle White Paper July 2013 Oracle s Internet of Things Platform: The M2M Platform for a Connected World Oracle s Internet
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy. The number of Internet-connected smart devices is growing at a rapid pace. According to Gartner, the
IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems Proactively address regulatory compliance requirements and protect sensitive data in real time Highlights Monitor and audit data activity
The Industrial Internet of Things Overcoming Adoption Challenges to Release the Value Within IIoT What is the Internet of Things (IoT)? Smart Television Smart Light Control Smart Motion Sensor Smart Environment
1 Security as Architecture A fine grained multi-tiered containment strategy Andras R. Szakal IBM Distinguished Engineer Chief Software Architect, U.S. Federal SWG email@example.com 2 Objectives Cybersecurity
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
Gemalto M2M Make an M2M wish! Unleashing the Power of the Internet of Things Our M2M portfolio is enabling secure solutions in industries ranging from healthcare, retail services, smart energy, transportation,
Lights. Sensors. Action. There are over 4 billion outdoor lights around the globe. By taking advantage of the worldwide, outdoor lighting upgrade to LEDs, we are building out a new, planet-sized sensor
Circuit Protection is Key in Maintaining Growth for The Internet of Things INTRODUCTION The Internet of Things (IoT) promises a future that networks billions of smart, connected devices. The value of this
5 Key Trends in Connected Health One of the most exciting market opportunities in healthcare today is the near limitless set of innovative solutions that can be created through the integration of the Internet,
Deborah Orr, Forbes Insights Analyst Daniel Witteveen, Director, IBM Cloud Managed Backup and Data Virtualization 03/23/2015 The Big Bang: cloud resiliency and the data explosion 2015 IBM Corporation Agenda
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 2 How does IBM deliver cloud security? Contents 2 Introduction 3 Cloud governance 3 Security governance, risk management
: Consumerisation of Technology Technology democratization has weaved an ecosystem powered by intelligent systems, connectivity services, analytics, and technology infrastructure to deliver services. With
IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
WL Connected Living solutions unlock the power of IoT through engaging Connected Services The fast growing adoption of IoT and M2M services and an increasing demand for innovative IoT Cloud platform. The
White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...
Copyright 2015 Splunk Inc. Splunk Company Overview Name Title Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected
Best Practices in Mobile Device Management (MDM) Assoc. Prof. Dr. Thanachart Numnonda Executive Director IMC Institute Technology Trends 2 Gartner Top 10 Strategic Technology Trends 2012 2013 Media tablets
The Internet of Things (IoT) The New New Thing October 2014 Smart Planet Green Environment Environmental Sensors Water, power leak detection Pollution, weather monitoring Smart Cities Connected Communities
A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified
BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective Kit Colbert CTO, End-User Computing 2014 VMware Inc. All rights reserved. VMware: Addressing the Market From Data Center
The Challenge of Handling Large Data Sets within your Measurement System The Often Overlooked Big Data Aaron Edgcumbe Marketing Engineer Northern Europe, Automated Test National Instruments Introduction
Page 1: IoT Security & Privacy Technical White Paper June 2015 Page 2: Table of Contents The IoT ecosystem 3 A gold rush 3 Two major issues need to be overcome: Usability and Security 4 A centralised IoT
Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, firstname.lastname@example.org
Software Dedicated Cloud The Challenge Smartphones, mobility and the IoT are changing the way users consume digital information. They re changing the expectations and experience of customers interacting
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
A ZK Research Whitepaper November 2014 It s inesses to em s u b r o bra f e ce tim t he INTERNET OF THINGS The Era of the Internet of Things Has Arrived The term perfect storm is used to describe a scenario
I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by
The Internet of Things Risks and Challenges Providing the insight that enables our customers to make informed business decisions. Antony Price 03rd March 2015 Contents Internet of Things - The next threat
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
IBM Security Intrusion Prevention Solutions Sarah Cucuz email@example.com IBM Software Solution Brief IBM Security intrusion prevention solutions In-depth protection for networks, servers, endpoints
John Sheehy Systems Architect 18 Feb 2009 Building a smarter planet with a dynamic infrastructure DYNAMIC INFRASTRUCTURE Helping build a smarter planet 1 2009 IBM Corporation The world is smaller and flatter.
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
Internet of Things (IoT): Security Awareness Sandra Liepkalns, CRISC firstname.lastname@example.org So What is the Internet of Things Network of physical objects embedded with: Electronics, software, sensors
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
Internet of Things in Sweden telenorconnexion.com Copyright Telenor Connexion 2014. All rights reserved. Sweden at the forefront of IoT We are in the midst of a social revolution with the same critical
PRG Symposium Internet of Things From Idea to Scale September 12, 2014 email@example.com @AlexBlanter You are here today because you are interested in the Internet of Things and so is everybody
Securing and protecting the organization s most sensitive data A comprehensive solution using IBM InfoSphere Guardium Data Activity Monitoring and InfoSphere Guardium Data Encryption to provide layered
IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application
Introduction to M2M Technologies What Wireless or Wired Option is Right For Your Company or Products Webinar. December 15, 2015. Syed Zaeem Hosain ( Z ), CTO, Aeris. Syed.Hosain@aeris.net, Twitter: @AerisCTO
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP firstname.lastname@example.org Security Security is recognized as essential to protect vital processes and the systems that provide those
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion