Great ideas, big data and little privacy? Bart Preneel iminds and COSIC KU Leuven



Similar documents
Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy

IoT & SCADA Cyber Security Services

IoT Security: Problems, Challenges and Solutions

Security in Smart Grid / IoT. Nenad Andrejević Comtrade Solutions Engineering

How To Protect Your Computer From Attack

What is Really Needed to Secure the Internet of Things?

Article 29 Working Party Issues Opinion on Cloud Computing

IoT Security: Problems, Challenges and Solutions

Workshop on Building international cooperation WG2 : Network Information Security / cyber security

TUSKEGEE CYBER SECURITY PATH FORWARD

Big Data, Big Risk, Big Rewards. Hussein Syed

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

A Systems Engineering Approach to Developing Cyber Security Professionals

KEY TRENDS AND DRIVERS OF SECURITY

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015

Michael Yakushev PIR-Center, Moscow (Russia)

future data and infrastructure

Developing Secure Software in the Age of Advanced Persistent Threats

In an age where so many businesses and systems are reliant on computer systems,

Securing the Microsoft Cloud

Securing the Internet of Things: Mapping Attack Surface Areas Using the OWASP IoT Top 10

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

The Internet of Things (IoT) Opportunities and Risks

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Security and Privacy

Software Development: The Next Security Frontier

Bellevue University Cybersecurity Programs & Courses

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

Introduction to Cyber Security / Information Security

European Commission Per

Securely Connect, Network, Access, and Visualize Your Data

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Security Threats on National Defense ICT based on IoT

Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

SECURITY RISK MANAGEMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Where every interaction matters.

Security Issues with Integrated Smart Buildings

The Next Generation Security Operations Center

CYBERSECURITY RISK MANAGEMENT

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Managing IT Security with Penetration Testing

Cyber Watch. Written by Peter Buxbaum

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

working group on foreign policy and grand strategy

Application Security Testing. Jesper Kråkhede

Perspectives on Cybersecurity in Healthcare June 2015

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Introduction to Information Security Management

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 MIKE.ZUSMAN@CARVESYSTEMS.COM

ICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE

Brainloop Cloud Security

The Protection Mission a constant endeavor

Social Impact of Privacy in Cloud Computing

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

How To Write An Article On The European Cyberspace Policy And Security Strategy

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

Big Data Big Security Problems? Ivan Damgård, Aarhus University

Car Cybersecurity: What do the automakers really think? 2015 Survey of Automakers and Suppliers Conducted by Ponemon Institute

Security and the Internet of Things

Goals. Understanding security testing

NSA Surveillance, National Security and Privacy

An Integrated CyberSecurity Approach for HEP Grids. Workshop Report.

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

Rational AppScan & Ounce Products

Transcription:

Great ideas, big data and little privacy? Bart Preneel iminds and COSIC KU Leuven

2

3

NSA calls the iphone users public 'zombies' who pay for their own surveillance 4

Snowden revelations NSA: Collect it all, know it all, exploit it all most capabilities could have been extrapolated from open sources But still massive scale and impact redundancy: at least 3 methods to get to Google s data many other countries collaborated (beyond five eyes): economy of scale industry collaboration through bribery, security letters, 5

Snowden revelations (2) Most spectacular: active defense networks Quantum insertion: answer before the legitimate website FoxAcid: specific malware devices supply chain subversion Translation in human terms: complete control of networks and systems, including bridging the air gaps No longer deniable 6

Lessons learned Never underestimate a motivated, well-funded and competent attacker Pervasive surveillance requires pervasive collection and active attacks (also on innocent bystanders) active attacks undermine integrity of and trust in computing infrastructure Economics of scale play a central role: it is not about the US or US/UK or even five eyes other nations have or are developing similar capabilities organized crime and terrorists working on this too 7

The state of cybersecurity Governments are undermining ICT systems rather than improving cybersecurity (and part of industry is helping) Problems at network level end-to-end deployment of encryption meta data: IP address, location, network protocols such as BGP, DNS Problems at system level: secure execution and update supply chain security 0-day market 8

IoT security risks More pervasive and intrusive: building, car, body low cost larger attack surface harder to update Security bringing down the grid hacking cars and drones burglary hacking medical devices 9

OWASP IoT top 10 2014 https://www.owasp.org/index.php/owasp_internet_of_things_top_ten_project 1 Insecure Web Interface 2 Insufficient Authentication/Authorization 3 Insecure Network Services 4 Lack of Transport Encryption 5 Privacy Concerns 6 Insecure Cloud Interface 7 Insecure Mobile Interface 8 Insufficient Security Configurability 9 Insecure Software/Firmware 10 Poor Physical Security 10

IoT privacy nightmare? What is privacy? What are the limitations of the current approach? What are the risks? HP IoT study: 90% of devices collected at least one piece of personal information via the device, the cloud or its mobile application 11

What is privacy? Abstract and subjective concept, hard to define Depends on cultural aspects, scientific discipline, stakeholder, context Conflicts are inherent transparency discretion harmony social control 12

Legal approach Data controller: trusted Limited purpose: can be hard to define Consent: how will this work in IoT? transparency discretion Irish privacy commissioner here harmony social control 13

Data breaches Profiling Discrimination Manipulation Prediction Mass surveillance Privacy problems 14

Architecture is politics [Mitch Kaipor 93] Need to rethink centralized architectures with massive storage of raw data (designed for advertising/search/cost) Avoid single point of trust that becomes single point of failure 15

Governance and Architectures: Back to principles Data minimization through infrastructure Minimum disclosure: avoid centralized massive amounts of data cryptomagic local computations with proof of security centralized storage but encrypted under local key (can still do computations!) 16

Open Solutions Open source solutions with effective governance who adds code who does code reviews 17

Conclusions IoT technologies bring major privacy and security risks we cannot afford to continue the deploy now and fix later model Need to rethink everything architectures: where is the data? building blocks deployment (including supply chain) update mechanisms Need open solutions with open audit Support: legislation (economic incentives) and non-proliferation treaties Essential to maintain our European sovereignty and values 18

CONTACT DETAILS Bart Preneel, iminds and COSIC KU Leuven ADDRESS: WEBSITE: EMAIL: TELEPHONE: Kasteelpark Arenberg 10 Bus 2452, 3000 Leuven homes.esat.kuleuven.be/~preneel/ Bart.Preneel@esat.kuleuven.be +32 16 321148 www.facebook.com/iminds @iminds 19

THANK YOU FOR YOUR TIME