TRANSPORTATION - SENSORS - AND THE SMART CITY GEOG 491/591 ADVANCED GIS



Similar documents
The Impact of Wireless LAN Technology on Compliance to the PCI Data Security Standard

The Internet of Things (IoT) Opportunities and Risks

Proofpoint Uncovers Internet of Things (IoT) Cyberattack

What is Really Needed to Secure the Internet of Things?

SanDisk Enterprise Secure USB Flash Drive Security Vulnerability

Smart Grid Security: A Look to the Future

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Malware & Botnets. Botnets

Risks and Rewards of the Internet of Things. Findings From ISACA s 2013 IT Risk/Reward Barometer

What Do You Mean My Cloud Data Isn t Secure?

JBoss security: penetration, protection and patching. David Jorm

Protection Against Advanced Persistent Threats

State of the Web 2015: Vulnerability Report. March Menlo Security Alright Reserved

CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends

Testing the Internet of Things

PCI DSS: An Evolving Standard

CYBER-CRIMINALS MERGE WITH APT

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

In the pursuit of becoming smart

Marble & MobileIron Mobile App Risk Mitigation

Brief self-introduction

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Fostering Incident Response and Digital Forensics Research

ICTN Enterprise Database Security Issues and Solutions

WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware

Cyber Watch. Written by Peter Buxbaum

The Hillstone and Trend Micro Joint Solution

TUSKEGEE CYBER SECURITY PATH FORWARD

What is Penetration Testing?

Table of Contents. Application Vulnerability Trends Report Introduction. 99% of Tested Applications Have Vulnerabilities

Security Practices for Online Collaboration and Social Media

CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks - 5 month later Date: 19 th October 2007

RACK911 Labs. Year in Review. May 6, 2014

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

The Essentials Series. PCI Compliance. sponsored by. by Rebecca Herold

E-Virus in Six Cisco Routers

Information Security

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Managed Security Monitoring: Network Security for the 21st Century

HIGHER STANDARDS. For Magnetic Contacts Needed As Security Vulnerabilities Are Exposed WHITE PAPER

IoT IT Security and Secure Development Life Cycle

Life Is Calling. Meet Your New CaptionCall Phone. Spoken Words into Captions. Free Service Means No Cost to You. 2 CaptionCall

TMCEC CYBER SECURITY TRAINING

Need for Database Security. Whitepaper

Put into test the security of an environment and qualify its resistance to a certain level of attack.

Home Automation and Cybercrime

SCADA Security: Challenges and Solutions

Overview of Banking Application Security and PCI DSS Compliance for Banking Applications

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01

Penetration Testing Service. By Comsec Information Security Consulting

SCADA Security Training

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

Security and Risk Analysis of VoIP Networks

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Securing the Growth of IoT and M2M

Achieving Information Security

A BETTER SOLUTION FOR MAINTAINING HEALTHCARE DATA SECURITY IN THE CLOUD

Internet of Things and Embedded Software Security.

Streamlining Web and Security

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Countermeasures against Bots

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

Secure Software Development Trends in the Oil & Gas Sectors. How the Microsoft Security Development Lifecycle helps protect critical industries

INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI

Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.

Information Technology Risk Management

Penetration Testing Scope Factors

or NOTwork? Turn your dealership s network into a secure, strategic asset CDK Rec mmendation Network Security Assessment

Domus, the connected home

Top 10 Security Trends

A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager

Productivity Starts With Speed. Put Your Business On The Fast Track With The Highest Speed Possible And Get It At The Best Price.

Windows Phone 8 Security Overview

Web Application Security Considerations

Beyond the Hype: Advanced Persistent Threats

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Smart (and safe) Lighting:

Application Security Testing. Jesper Kråkhede

INFORMATION SECURITY FOR YOUR AGENCY

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

Inviting Data Hackers to Lunch Without Knowing it

Anthem Hack, Cracked

Overview. Introduction. Conclusions WINE TRIAGE. Zero day analysis. Symantec Research Labs (SRL)

Myths, Mistakes and Outright Lies When it comes to network security P U R E S E C U R I T Y

More effective protection for your access control system with end-to-end security

WLAN Security Networking with Confidence

The Cost of Annoying Ads

IoT Security: Problems, Challenges and Solutions

ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS

Securing Endpoints without a Security Expert

Mobile Security Landscape in A Report

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

Senaca Shield Presents 10 Top Tip For Small Business Cyber Security

PCI Compliance: Protection Against Data Breaches

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

Point-Of-Sale Research Worksheet

Transcription:

Illustration: alengo/getty Images TRANSPORTATION - SENSORS - AND THE SMART CITY GEOG 491/591 ADVANCED GIS

Smart Cities PRIVACY SECURITY TRANSPORTATION - SENSORS - AND THE SMART CITY GEOG 491/591 ADVANCED GIS

SENSOR TAG EXPERIMENTS Hear student experiences UO BIKE COUNTER The State of the Sensor PRIVACY AND SECURITY What does it mean for Smart Cities? ACTIVITY Group discussion and perspectives on privacy and security GOALS - OBJECTIVES - OUTCOMES

SENSOR TAG EXPERIMENTATION FOR CLASS

Smart City Sensors Part 1 - Proposal Part 2 - Bicycle Transportation at UO Real-time Data Budget Visualization Privacy & Security Network Sampling Historic Data - Continuous Historic Data - Sampled Part 3 - Your Sensor Project Transportation / Mobility Individual or Team Theoretical Hybrid Applied Data Part 4 - Presentation

URL s to extract data from the bike counter Bike Counter The default is json format http://ig-coho.uoregon.edu/sensors/bikecounter?scale=hourly Adding &format=csv to the url http://ig-coho.uoregon.edu/sensors/bikecounter?scale=hourly&format=csv Change the scale variable to request: monthly, weekly, daily, or hourly 6

7

FAIR INFORMATION PRACTICE PRINCIPLES ( FIPPS ) NOTICE ACCESS CHOICE ACCOUNTABILITY DATA MINIMIZATION SECURITY ACCOUNTABILITY https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf INTERNET OF THINGS FTC STAFF REPORT - JANUARY 2015

https://www.truste.com/resources/privacy-research/gb-internet-of-things-index-2014/ TRANSPORTATION - SENSORS - AND THE SMART CITY GEOG 491/591 ADVANCED GIS

https://www.truste.com/resources/privacy-research/gb-internet-of-things-index-2014/ 10

https://www.truste.com/resources/privacy-research/gb-internet-of-things-index-2014/ 11

https://www.truste.com/resources/privacy-research/gb-internet-of-things-index-2014/ 12

https://www.truste.com/resources/privacy-research/gb-internet-of-things-index-2014/ 13

SMART CITY TECHNOLOGY MAY BE VULNERABLE TO HACKERS The New York Times - NICOLE PERLROTH PRIVACY RISKS EMERGING FROM THE ADOPTION OF INNOCUOUS WEARABLE SENSORS IN THE MOBILE ENVIRONMENT Andrew Raij ODOT EMBARKS ON BIG DATA PROJECT WITH PURCHASE OF STRAVA DATASET Bike portland.org ASSIGNED READINGS FOR TODAY

1. $20,000 for a year expensive or cheap? 2. One of the key points she hopes to make is that this is not quantitative data. It won t replace the counts we do, the purpose is to understand cycling behavior and answer questions like, Why do cyclists make the decisions they do? 3. If you re interested in using the data, you ll be disappointed to hear that as per their contract with Strava, ODOT cannot share any raw data: They can only share it in the form of a report or a heat map. ODOT EMBARKS ON BIG DATA PROJECT WITH PURCHASE OF STRAVA DATASET - BIKEPORTLAND.ORG

disclosure boundary, i.e., where privacy and publicity are in tension. We focus specifically on the choices data producers can make that displace this disclosure boundary for personal sensory data. In addition, the threats highlighted by our framework touch upon the identity boundary, and how unintended disclosure of an individual s behavior may change how others view the individual. PRIVACY RISKS EMERGING FROM THE ADOPTION OF INNOCUOUS WEARABLE SENSORS IN THE MOBILE ENVIRONMENT - ANDREW RAIJ

six elements: measurements, behaviors, contexts, restrictions, abstractions, and privacy threats. Data producers capture measurements with sensors, which can then be processed to infer behaviors and contexts.to control access to the data, data producers can put restrictions in place that prevent sharing of specified measurements and/or behaviors and contexts derived from them. To control the level of detail in the shared data, abstractions can be applied to unrestricted measurements, behaviors, and contexts. The set of disclosed behaviors and contexts, and the level of abstraction applied to each, ultimately decide the types and significance of the resulting privacy threats. PRIVACY RISKS EMERGING FROM THE ADOPTION OF INNOCUOUS WEARABLE SENSORS IN THE MOBILE ENVIRONMENT - ANDREW RAIJ

Participants were most concerned about sharing physical and temporal context together. There was a trend of increasing concern for place and timestamp, with the lowest concern for just sharing the behavior or context, the next level of concern for reporting the place or time of the behavior or context, and the highest level of concern for reporting both the place and time of the behavior or context. I d be concerned with people being able to tie the whens of my being stressed with the wheres. I d rather people not know that I felt stressed at my particular job or when at my house, because they wouldn t have the whole picture. PRIVACY RISKS EMERGING FROM THE ADOPTION OF INNOCUOUS WEARABLE SENSORS IN THE MOBILE ENVIRONMENT - ANDREW RAIJ

I am uncomfortable with someone watching over me that closely. It would be strange knowing that a person knew exactly where I was going to be, and when, at all times of the day. I wouldn t feel like I had any privacy. I don t like people to know whom I talked to at all...as i feel it s none of their business. I do not want to share even when I talk because people may find out with whom if it is marked with time, which can be private. I have this level of concern because whenever I am stressed out, I am around my mother. I guess I m a bit self-conscious over how little I exercise; I d hate to have that broadcast. PRIVACY RISKS EMERGING FROM THE ADOPTION OF INNOCUOUS WEARABLE SENSORS IN THE MOBILE ENVIRONMENT - ANDREW RAIJ

When we see that the data that feeds smart city systems is blindly trusted and can be easily manipulated that the systems can be easily hacked and there are security problems everywhere that is when smart cities become dumb cities, Mr. Cerrudo said. municipal leaders had to start thinking of their cities as vast attack surfaces that require security protection Last year, security companies discovered a hacking group, known both as Dragonfly and Energetic Bear, that was actively targeting power networks across the United States and Europe. Last year, the Department of Homeland Security acknowledged in a report that a sophisticated threat actor had broken into the control system network at a public utility, simply by guessing a password on an Internet-connected system. And in 2012, Chinese military hackers successfully breached the Canadian arm of Telvent. The company, now owned by Schneider Electric, produces software that allows oil and gas pipeline companies and power grid operators to gain access to valves, switches and security systems remotely. It also keeps detailed blueprints on more than half the oil and gas pipelines in North America. SMART CITY TECHNOLOGY MAY BE VULNERABLE TO HACKERS NICOLE PERLROTH

These systems are powered by specialized computer chips. These chips are cheap, and the profit margins slim. Aside from price, the way the manufacturers differentiate themselves from each other is by features and bandwidth. They typically put a version of the Linux operating system onto the chips, as well as a bunch of other open-source and proprietary components and drivers. They do as little engineering as possible before shipping, and there s little incentive to update their board support package until absolutely necessary. The system manufacturers usually original device manufacturers (ODMs) who often don t get their brand name on the finished product choose a chip based on price and features, and then build a router, server, or whatever. They don t do a lot of engineering, either. The brand-name company on the box may add a user interface and maybe some new features, make sure everything works, and they re done, too. http://www.wired.com/2014/01/theres-no-good-way-to-patch-the-internet-of-things-and-thats-a-huge-problem/ THE INTERNET OF THINGS IS WILDLY INSECURE AND OFTEN UNPATCHABLE - BRUCE SCHNEIER

Samsung privacy policy warns: Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of voice recognition. Orwell wrote: Any sound that Winston made, above the level of a very low whisper, would be picked up by it, moreover, so long as he remained within the field of vision which the metal plaque commanded, he could be seen as well as heard. There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. http://www.theguardian.com/technology/2015/feb/09/samsung-rejects-concern-over-orwellian-privacy-policy?utm_medium=twitter&utm_source=dlvr.it SAMSUNG REJECTS CONCERN OVER 'ORWELLIAN' PRIVACY POLICY - THE GUARDIAN - ALEX HERN

Security firm Proofpoint found that more than 100,000 smart devices including a connected refrigerator were used to send out more than 750,000 malicious emails between Dec. 23, 2013 and Jan. 6, 2014. Other embedded systems that got hacked gadgets included routers, media servers and televisions. Of course we humans are part of the problem. Hackers were able to access most of the gadgets because default passwords left the electronics devices exposed on public networks. From the press release: Bot-nets are already a major security concern and the emergence of thingbots may make the situation much worse said David Knight, General Manager of Proofpoint s Information Security division. Many of these devices are poorly protected at best and consumers have virtually no way to detect or fix infections when they do occur. Enterprises may find distributed attacks increasing as more and more of these devices come on-line and attackers find http://labs.sogeti.com/internet-things-world-fridge-spambot/ additional ways to exploit them. IN AN INTERNET OF THINGS WORLD YOUR FRIDGE COULD BE A SPAMBOT - SOGETI LABS

24

25

26

27

28

YOUR ASSIGNMENT 3 OR 4 DISCUSS THE POTENTIAL RISKS FOR PRIVACY AND SECURITY YOU NEED TO BALANCE EFFICIENCY WITH CONCERNS FOR BOTH THESE ISSUES WHAT WOULD YOU DO TO FOSTER TRUST AS: A CITY A CITIZEN GROUP ACTIVITY

PROPOSAL PREPARATION TEAMWORK THIS WEEK S LAB

32