1 / 24

IoT (Internet of Things) and Security

ITU Workshop on “ICT Security Standardization for Developing Countries” (Geneva, Switzerland, 15-16 September 2014). IoT (Internet of Things) and Security. Mikhail Kader, DSE, Cisco mkader@cisco.com. Abstract.

Télécharger la présentation

IoT (Internet of Things) and Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ITU Workshop on “ICT Security Standardizationfor Developing Countries” (Geneva, Switzerland, 15-16 September 2014) IoT (Internet of Things) and Security Mikhail Kader, DSE, Cisco mkader@cisco.com

  2. Abstract • More things are being connected to address a growing range of business needs. In fact, by 2020, more than 50 billion things will connect to the Internet—seven times our human population. Examples are wearable health and performance monitors, connected vehicles, smart grids, connected oilrigs, and connected manufacturing. This Internet of Things (IoT) will revolutionize the way we work, live, play, and learn. • Inadequate security will be a critical barrier to large-scale deployment of IoT systems and broad customer adoption of IoT applications. Simply extending existing IT security architectures to the IoT will not be sufficient. The IoT world requires new security approaches, creating fertile ground for innovative and disruptive thinking and solutions.

  3. Agenda Introduction Extraordinary Benefits Major Security Challenges Delivering Security Across the Extended Network

  4. What Is the Internet of Things? The Internet of Things is the intelligent connectivity of physical devices driving massive gains in efficiency, business growth, and quality of life”

  5. Relationship to the Internet of Everything (IoE) People Connecting People in More Relevant, Valuable Ways Process Delivering the Right Informationto the Right Person (or Machine) at the Right Time IoE Things Physical Devices and Objects Connected to the Internet andEach Other for IntelligentDecision Making Data Leveraging Data intoMore Useful Information for Decision Making Networked Connection of People, Process, Data, Things

  6. IoT Is Here Now – and Growing! 50 50 Billion “Smart Objects” 40 Rapid Adoption Rate of Digital Infrastructure: 5X Faster Than Electricity and Telephony 30 BILLIONS OF DEVICES World Population 25 20 InflectionPoint 12.5 10 7.2 7.6 6.8 TIMELINE 0 Source: Cisco IBSG, 2011 2010 2015 2020

  7. IoT Delivers Extraordinary Benefits

  8. Connected Rail Operations • Passenger security • In-station and onboard safety • Visibility into key events • Route optimization • Enhanced Customer Service • Increased efficiency • Collision avoidance • Fuel savings CRITICAL SENSING • Transform “data” to “actionable intelligence” • Proactive maintenance • Accident avoidance Cost savings, improved safety, superior service

  9. Smart City • Connected traffic signals • Reduced congestion • Improved emergency services response times • Lower fuel usage • Parking and lighting • Increased efficiency • Power and cost savings • New revenue opportunities • City services • Efficient service delivery • Increased revenues • Enhanced environmental monitoring capabilities Safety, financial, and environmental benefits

  10. The Connected Car • Wireless Router • Online entertainment • Mapping, dynamic re-routing, safety and security CONNECTED SENSORS • Transform “data” to “actionable intelligence” • Enable proactive maintenance • Collision avoidance • Fuel efficiency • Urban Connectivity • Reduced congestion • Increased efficiency • Safety (hazard avoidance) Actionable intelligence, enhanced comfort, unprecedented convenience

  11. APPLICATION AND BUSINESS INNOVATION … But It Also Adds Complexity New Business Models Partner Ecosystem Applications Data Integration Big Data Analytics Control Systems Application Integration Device and Sensor Innovation Application Interfaces Unified Platform APPLICATION ENABLEMENT PLATFORM Infrastructure Interfaces APPLICATION CENTRIC INFRASTRUCTURE Infrastructure

  12. What Comprises IoT Networks?

  13. The Flip Side: Major Security Challenges

  14. IoT Expands Security Needs Increased Attack Surface Threat Diversity Impact and Risk Remediation Protocols Compliance and Regulation IoT CONNECTIVITY Security Converged, Managed Network Resilience at Scale Distributed Intelligence Application Enablement

  15. What Can Breach IoT Networks? • What can’t? • Billions of connected devices • Secure and insecure locations • Security may or may not be built in • Not owned or controlled by IT … but data flows through the network • Any node on your network can potentially provide access to the core

  16. Smart City • Remote access • Increased traffic congestion • Creation of unsafe conditions • System control • Device manipulation • Remote monitoring • Creation of unsafe conditions Potential impact to services and public safety • Service manipulation • Environmental degradation • System shutdown • Lost revenue

  17. IT Breach via OT Network * Source: KrebsonSecurity, May 2014 • Breached via Stolen Credentials from HVAC Vendor • 40 Million Credit And Debit Cards Stolen • PII Stolen From 70 Million Customers • Reputation Damage* • 46% drop in year-over-year profit • 5.3% drop in year-over-year revenue • 2.5% drop in stock price • CEO Fired

  18. Unintended Security Exposures* * Source: Wired, November 2013 Farm Feeding System in the U.S. Mine Ventilation System in Romania Hydroelectric Plant in the U.S.

  19. Delivering Security Across the Extended Network

  20. APPLICATION AND BUSINESS INNOVATION The Secure IoT Architecture – IT Plus OT! Services Security New Business Models Partner Ecosystem Cloud-based Threat Analysis / Protection Data Integration Big Data Analytics Control Systems Application Integration Applications Services Network and Perimeter Security Application Interfaces Application Enablement Platform Device and Sensor Innovation Physical Security Infrastructure Interfaces Device-level Security / Anti-tampering Application Centric Infrastructure End-to-End Data Encryption

  21. IT and OT are Inherently Different • IT • OT • Connectivity: “Any-to-Any” • Network Posture: Confidentiality, Integrity, Availability (CIA) • Security Solutions: Cybersecurity; Data Protection • Response to Attacks: Quarantine/Shutdown to Mitigate • Connectivity: Hierarchical • Network Posture: Availability, Integrity, Confidentiality (AIC) • Security Solutions: Physical Access Control; Safety • Response to Attacks: Non-stop Operations/Mission Critical – Never Stop, Even if Breached

  22. IT/OT Converged Security Model IT Cloud Enterprise Network Network Security DMZ Application Control Demilitarized Zone Identity Services OT Secure Access Supervisory Automation & Control ConfigMgmt

  23. Conclusion: Securely Embrace IoT! • New challenges require new thinking! • avoid operational siloes • networking and convergence are key • a sound security solution is integrated throughout • build for the future • Security must be pervasive • inside and outside the network • device- and data-agnostic • proactive and intelligent • Intelligence, not data • convergence, plus analytics • speed is essential for real-time decisions

  24. Mikhail Kader, DSE, Cisco mkader@cisco.com

More Related