RIOT CONTROL The Art of Managing Risk for Internet of Things

Similar documents
Enterprise Application Enablement for the Internet of Things

Key requirements for Interoperable IoT systems

IoT Solutions from Things to the Cloud

The Internet of Things (IoT)

Securing the Growth of IoT and M2M

Internet of Things From Idea to Scale

The Internet of Things. Giles Norman MobileFirst Consulting Manager, IBM. Daniel Dombach Director EMEA, Industry Solutions, Zebra Technologies

How To Understand The Power Of The Internet Of Things

Threat-Centric Security for Service Providers

Life With Big Data and the Internet of Things

End-to-End M2M and IoT Services

THE FUTURE OF SMART GRID COMMUNICATIONS

Intel: a Thought Leader Helping IoT Scale Out

The Internet of Everything

In the pursuit of becoming smart

Introduction to M2M Technologies What Wireless or Wired Option is Right For Your Company or Products

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

ITL BULLETIN FOR JANUARY 2011

Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems

CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS

Internet of Things. Opportunities for device differentiation

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya

Secure, Efficient, and Open Standard Internet of Things

IOT the Last Miles. Tze Chiew (PSM) Jaap Breepoel (FAE)

About the Authors Preface Acknowledgements List of Acronyms

Leading The World Into Connected Security. Paolo Florian Sales Engineer

Big Data s Potential in Securing the Internet of Things

Internet Connected Devices: Evolving from the Internet of Things to the Internet of Everything. Bill Morelli Associate Director

congatec AG How to come around the IoT data security challenges

The Internet of Things starts with intelligence inside

Introduction Chapter 1. Uses of Computer Networks

Virtual CPE and Software Defined Networking

A Peek into the Future-''Internet of Things''

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

How does Big Data disrupt the technology ecosystem of the public cloud?

The Internet of Things: Opportunities & Challenges

Internet of Things (IoT): A vision, architectural elements, and future directions

Simplifying the Global Deployment of Cellular Enabled Products

An Introduction to the Internet of Things (IoT)

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

M2M innovations that will drive the market: Big Data, Cloud and LTE technologies impact?

IoT Security & Privacy

The 5G Infrastructure Public-Private Partnership

Security for the Internet of Things

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M

Enabling Smart Data on M2M Gateways and Aggregators

Session Border Controllers in Enterprise

MACHINE TO MACHINE COMMUNICATIONS. ETSI TC M2M Overview June 2011

Future Directions for Internet of Things Work

NFV and SDN Answer or Question?

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC

Network Evolution, Cloud & Future Services. Opportunities & Challenges for Next-Decade Services

Chapter 11 Cloud Application Development

TELUS/IDC Internet of Things Study 2014

Making Sense of Internet of Things Protocols and Implementations

The Internet of Things... Hype or not?

SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240

Connected Intelligence and the 21 st Century Digital Enterprise

User and Iot Data Analytics. Empowered by Ericsson User Data Consolidation (UDC)

Machine-to-Machine Technologies

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Lights. Sensors. Action.

GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

IPv6 Based Sensor Home Networking

IoT Cloud, All Seen Alliance. Masanari Arai 荒 井 真 成 CEO, Kii Corpora0on

Developing the edge or scaling the core through corporate venturing Internet of Things. Daan Witteveen

Securing Smart City Platforms IoT, M2M, Cloud and Big Data

P o w e r i n g t h e I n t e r n e t o f T h i n g s

Security Business Intelligence Big Data for Faster Detection/Response

The Internet of Things

Palo Alto Networks. October 6

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

SVN5800 Secure Access Gateway

Transformational characteristics of IoT solutions for enterprises and smart cities

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

The Need for Intelligent Network Security: Adapting IPS for today s Threats

I believe. Satya Nadella CEO, Microsoft. History of making big bets

McAfee - Overview. Anthony Albisser

Huawei Agile Network FAQ What is an agile network? What is the relationship between an agile network and SDN?... 2

Networking technologies and applications

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

Understanding the impact of the connected revolution. Vodafone Power to you

The promise of SDN. EU Future Internet Assembly March 18, Yanick Pouffary Chief Technologist HP Network Services

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things

NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China

Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System

The Internet of Things:

Transcription:

RIOT CONTROL The Art of Managing Risk for Internet of Things Kim Singletary McAfee Session ID: Session Classification: Advanced

Intro What is IoT and why is it different? What are the risks? What are the emerging areas that will help provide security What can be done today

The Art The outcome of the application of human creative skills and imagination. http://news.nationalgeographic.com/news/2012/12/pictures/121205-earth-night-science-space/

IoT is BIG 40% projected growth in global data generated year over year vs. 5% growth in global IT spending 1 By 2020 40% of data will be generated by IoT 2 Connected Devices (IoT) will represent 24 Billion 3 1. McKinsey, Big Data:The next frontier for innovation, competition and productivity (June 2011) 2. IDC/EMC, Digital Universe (2011) 3. GSMA conducted by Machina Research

Change in Types of Data Cyclic or bursty data Retail POS Video Smaller Small Files files Smart Transport Asset tracking IP Voice Internet data Signage Big files Bigger Files Metering Industrial Controls Smart Health CCTV Constant data

Connected Devices In The Past

Why IoT? Ability to put Sensors in Everything Improved Power Management Ipv6 Ambient Networking (Everywhere) Open Standards Increased bandwidth and coverage Analyze Everything Processor Speed Big Data

Current Connected Devices

Future of IoT

IoT Applications Information and Analysis Tracking Behavior/Usage Enhanced Situational Awareness Sensor Driven Decision Analytics Automation And Control Process Optimization Optimized Resource Consumption Complex Autonomous Systems

11 Source: Forbes, 7/23/2012 Will you be ready for the M2M world? Ray Wang February 15, 2013

Industries Energy & Water Mgmt. Smart City/Smart Planet Robotics/Industrial Control Bldg. Mgmt./Automation Transportation Healthcare Military Retail Consumer Tech. Pockets of Innovation, Efficiency, Automation

Intent of Use = Risk Compliance Confidentiality Integrity - Availability Control Boundaries Physical Interactions Kinetic Outcomes

Engine or Service? Power by the Hour

The Thing Lifestyle?! X

The Security Architecture Access, Authentication, Authorization Data & Privacy Application Network

Security Issues for Pervasive IoT End-to-end security is not yet addressed in all the IoT related standards Attacks at physical layer Machine level integrity checks Identity linking Anonymity Secure deployment of credentials for lots of objects User interface to control/manage security

Network Network Types Shortwave Satellite LTE/5G WiMax/Microwave WiFi Femtocell Bluetooth Zigbee Dash7 PLC Context Setting Policy for Connection Duration Quality of Service Policy for Roaming Policy for Fail-Over Policy for Compliance Fail-Over Parameters Speed Error-rate Packet Loss Price Assurance/Reputation

Emerging Network for IoT IPv6 Management Tools Available? Support in organization for dual networks? Ready to leave comfort of NAT? Is someone squatting in your dark space? Open Flow to Software Defined Networks - Take control out of hands of infrastructure - ACL s and routing protocols will not provide enough agility for security

Emerging Network for IoT TRILL Possible Spanning Tree Alternative Get more efficiency of available bandwidth and meshed network Opportunity to Load Balance DNS Sec/DANE - Prevent DNS cache poisoning - Obtain Authentication of Named Entities with SSL info on certs

IoT Endpoint Control Boot or Power On Authentication Stop unauthorized devices from entering the network Proactive Intelligence in the Flow IETF REPUTON and IETF 6MAN/Packet Staining WG Include suspicious behavior indicator in flow Adaptive Information Infrastructure Holonic Systems; Dual in Nature Wholes in themselves Simultaneously integral or larger wholes Competitive Learning Nodes compete for right to respond Increasing specialization of each node of the cluster

Cloud Data Center - App Hardware Identification and Access Control Specify computing platforms - Intel TXT Cloud Security Standards and Metrics Zones/Compliance/Service Level for IoT Big Data/Analytics/Management Access Authority Retention Policy De-Identification of Context Specific Data

Today s Security Options Integrity Control (Endpoints and Embedded Systems) Hardware Assisted Rootkit Defense Global Threat Intelligence integrated at endpoint and network Network IPS and Softswitch IPS Asset Detection and Real-time Mgmt. Big Security Data Management

Summary IoT will be everywhere IoT will need orchestrators who can design and balance risk and reward models IoT is challenging and will be complex and intriguing

@ksingletary