1.18k likes | 1.19k Vues
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran Lecture at Ryerson Univ - 2014
E N D
Internet of Things (IoT)Cloud Security Dr. Anton Ravindran Lecture at Ryerson Univ - 2014
1993 Web browser
5000 Exabytes
IoT Can Be Viewed as a Network of Networks Source: Cisco IBSG
People - things People - people Things - things
The Internet of Things (IoT) is the network of physical objects accessed through the Internet, as defined by technology analysts and visionaries These objects contain embedded technology to interact with internal states or the external environment. They are basically uniquely identifiable objects and their virtual representations in an Internet-like structure. What is IoT?
Each person to be surrounded by 3,000 to 5,000 connected everyday things? 2035?
IoT raises important questions and introduces new challenges for the security of systems and processes and the privacy of individuals. Some IoT applications are tightly linked to sensitive infrastructures and strategic services such as the distribution of water and electricity and the surveillance of assets. Other applications handle sensitive information about people, such as their location and movements, or their health and purchasing preferences. Confidence in and acceptance of IoT will depend on the protection it provides to people’s privacy and the levels of security it guarantees to systems and processes. Privacy & Security
Internal Policies, State Legal and regulatory issues are extremely important when building IoT systems that have security implications. To verify that a service provider has strong policies and practices that address legal and regulatory issues, each customer must have its legal and regulatory experts inspect the provider’s policies and practices to ensure their adequacy. The issues to be considered in this regard include data security and export, compliance, auditing, data retention and destruction, and legal discovery. In the areas of data retention and deletion, trusted storage and trusted platform module access techniques can play a key role in limiting access to sensitive and critical data. Policies & Legislations
DIKW Source : Chaim Zins Theory of DIKW
One cannot be analytical without data and you cant really be good at analytics without good data. Data
If Data Quality is not good, then no matter what cutting Analytical landscape and state of art technology you have it would be “GARBAGE IN GARBAGE OUT”. So before the data analytics is done you should find a place where all the data are cleansed, harmonized and are of good data quality. It sounds very simple, but it’s the most difficult thing and most organization spend lot of money and resource to get this correct. Data
How can I act on this insight? What is the best that could happen? What will happen? Why did it happen? What happened (hindsight)? Scenario modeling & root cause analysis Enterprise Performance Optimization Predictive modeling Descriptive modeling Reports & OLAP Data Cleansing & Classification ROI Raw data Insight Vs. Hindsight Data Information Knowledge Intelligence
There are undoubtedly risks associated with the use of Cloud-based services, just as there are risks associated other delivery models. Source: Capgemini
Five Key Cloud Attributes • Shared / pooled resources • Broad network access • On-demand self-service • Scalable and elastic • Metered by use
A survey commissioned by Microsoft on ‘Cloud computing among business leaders and the general population’ states that: • 58% of the general population and 86% of senior business leaders are excited about the potential of cloud computing. • But, more than 90% of these same people are concerned about the security, access and privacy of their own data in the cloud. Why Security? Source: Microsoft
What is Cloud Security? Cloud Security • Agility • Self-service • Scale • Automation • Gate-keeper • Standards • Control • Centralized Cloud Security is security principles applied to protect data, applications and infrastructure associated within the Cloud Computing technology.
Market Analysis What market size are we talking about Market Size: 2012 : US $425.4 Million 2013 : US $629.6 Million 2014 : US $963.4 Million
Global Cloud Security Market Growth Analysis 2012-2014 (US$ million)
Why is Cloud Security Important • Increasing Usage of Cloud Services in Non-traditional Sectors • Growing Adoption of Cloud Services in Government Departments • Rise in Cloud Service-specific Attacks • Growing Usage of Cloud Services for Critical Data Storage • Rise in Employee Mobility
Most security problems stem from: • Loss of control • Lack of trust • Multi-tenancy • These problems exist mainly in 3rd party management models • Self-managed clouds still have security issues, but not related to above Cloud Computing Problems