Top Banner
Issue Date: Revision: Security & The Internet of Things (IoTs) Adli Wahid Security Specialist, APNIC [email protected]
15
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: APrIGF 2015: Security and the Internet of Things

Issue Date:

Revision:

Security & The Internet of Things (IoTs)Adli Wahid

Security Specialist, APNIC

[email protected]

Page 2: APrIGF 2015: Security and the Internet of Things

2

Adli Wahid

• Security Specialist at APNIC

• Security Outreach, Digital Forensics & Incident Response

• Board Member of Forum of Incident Response & Security Teams (FIRST)

• Working with Network Operators, CERTs/CSIRTs, LEAs, NGOs

Page 3: APrIGF 2015: Security and the Internet of Things

3

Talking Points

Goal:

To highlight some of the security concerns about the IoTs

1. Internet of Things or Internet of Anything

2. Security Risks

3. Security Considerations

Page 4: APrIGF 2015: Security and the Internet of Things

4

Internet of Things

Connect Compute Communicate

Page 5: APrIGF 2015: Security and the Internet of Things

5

IPv6

Security

Privacy

Innovation

Connectivity

Big Data & Cloud

Network

Entrepreneurship Wearables

IoTs

Quality of Life

Multiple Perspectives

Page 6: APrIGF 2015: Security and the Internet of Things

6

50 B

20 B

100 B

How many Billion Devices?

Page 7: APrIGF 2015: Security and the Internet of Things

7

Security Risks

Confidentiality

Integrity

Availability

Privacy

Loss of Life ?

Loss of $$

Cyber Crime

Zooming into Security

Page 8: APrIGF 2015: Security and the Internet of Things

8

Authentication (Password)

Patch & Vulnerability Management

Social Engineering

Security Awareness

Security Breaches

Encryption

Page 9: APrIGF 2015: Security and the Internet of Things

Challenges to Security Responder

9

Analysis Fix / Recover

• Source of Attack • Modus Operandi • Command & Control • Indicators of Compromise • Number of Bots / Infected

Computers • Numbers of Samples

• Patch Vulnerable Systems • Apply Firewall Rules • Clean Infected Computers • Disable Vulnerable Services • Remove Malicious Page

Page 10: APrIGF 2015: Security and the Internet of Things

10

Heartbleed (CVE-2014-0160)

• Critical Vulnerability affecting a very large user base discovered in April 2014

• 600k systems vulnerable

• Afer 2 months – 300k systems remain unpatched *

• Enterprise vs Home Systems

Page 11: APrIGF 2015: Security and the Internet of Things

11

Problems with CPEs• Customer Premise Equipments

• Common Default ‘not-secure’– Default password – Default Services Turned-on

• Case in point – Open DNS Resolvers – Exploited as platform to launch Amplification Attacks Distributed

Denial of Service attacks– Made worse by the relative ease to spoof IP address – (and Getting Away easily for launching attacks)

Page 12: APrIGF 2015: Security and the Internet of Things

12

Recursive DNS Servers: https://dnsscan.shadowserver.org

Page 13: APrIGF 2015: Security and the Internet of Things

13

Page 14: APrIGF 2015: Security and the Internet of Things

14

Will Security be the Same?

Limit Exposure of IoTs

Security Management

Default Security?

Roles & Responsibilities

Page 15: APrIGF 2015: Security and the Internet of Things

Issue Date:

Revision:

Thank You!

Adli Wahid (@adliwahid)

[email protected]

http://www.apnic.net