Top Banner
Drones, Phones, and Pwns: The Promise (and Dangers) of IoT APIs © 2014 CA. All rights reserved. <name> <date> Jaime Ryan Senior Director, Product Management & Strategy CA Technologies July 23, 2014
50

Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely Leverage IoT

Jul 14, 2015

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

Drones, Phones, and Pwns: The Promise (and Dangers) of IoT APIs

© 2014 CA. All rights reserved.

<name>

<date> Jaime Ryan

Senior Director, Product Management & Strategy

CA Technologies

July 23, 2014

Page 2: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

2 © 2014 CA. ALL RIGHTS RESERVED.

What does the future hold?

Page 3: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

3 © 2014 CA. ALL RIGHTS RESERVED.

These ain’t your daddy’s drones

Page 4: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

4 © 2014 CA. ALL RIGHTS RESERVED.

They’re accessible

Page 5: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

5 © 2014 CA. ALL RIGHTS RESERVED.

They’re affordable

Page 6: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

6 © 2014 CA. ALL RIGHTS RESERVED.

They’re powerful

Page 7: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

7 © 2014 CA. ALL RIGHTS RESERVED.

They’re ubiquitous

Page 8: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

8 © 2014 CA. ALL RIGHTS RESERVED.

They’re unobtrusive

Page 9: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

9 © 2014 CA. ALL RIGHTS RESERVED.

What happens when we scale up?

Page 10: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

10 © 2014 CA. ALL RIGHTS RESERVED.

What can we accomplish now?

Page 11: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

11 © 2014 CA. ALL RIGHTS RESERVED.

Emergency services

Page 12: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

12 © 2014 CA. ALL RIGHTS RESERVED.

Emergency services

Page 13: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

13 © 2014 CA. ALL RIGHTS RESERVED.

Even the innocuous

Page 14: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

14 © 2014 CA. ALL RIGHTS RESERVED.

Location is important

Page 15: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

15 © 2014 CA. ALL RIGHTS RESERVED.

Detail is important

Page 16: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

16 © 2014 CA. ALL RIGHTS RESERVED.

What does this have to do with the Internet of Things?

Page 17: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

17 © 2014 CA. ALL RIGHTS RESERVED.

Internet

Page 18: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

18 © 2014 CA. ALL RIGHTS RESERVED.

Things

Page 19: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

19 © 2014 CA. ALL RIGHTS RESERVED.

WCoT (Word Cloud of Things)

Page 20: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

20 © 2014 CA. ALL RIGHTS RESERVED.

Dumb Things

Collect Data Do Something

Quantified Self Track exercise, calories consumed, sleeping habits

Suggestion-based fitness Create customized workouts, social running routes, sleep suggestions

Surveillance Capture images/video – home, retail, gambling

Security Unlock door based on Bluetooth or NFC proximity

Agricultural Sensors Track conditions in soil, air, supply chain

Industrial Farm Equipment Increase/decrease irrigation, feed, pesticides

Smart Parking Record and plot empty parking spaces

Connected Meters Email driver when it’s time to pay for more time

Disease Tracking Wearables Sensors in underwear, pacemakers,

Notification and Medication Administration

Remind patient to take medications; notify emergency medical personnel prior to seizure

Manage Retail Inventory Location of items in-store, automatically updated inventory

Ordering/Loss Prevention Place new order upon low inventory; alert staff if removed from store

Energy Usage Tracking Identify power-guzzling appliances, collect meter readings

Home Automation Turn on lights, manage AC/heating, regulate power

Page 21: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

21 © 2014 CA. ALL RIGHTS RESERVED.

Supply Chain

Page 22: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

22 © 2014 CA. ALL RIGHTS RESERVED.

The evolution of connectivity

Page 23: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

23 © 2014 CA. ALL RIGHTS RESERVED.

Smart Things

Bridge the gap between dumb things

Allow for human interaction and decision-making

Create/enforce policy - IFTTT

Portal/UI into the world of data

App-based

Laptops, desktops, tablets, phones, smartwatches

Page 24: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

24 © 2014 CA. ALL RIGHTS RESERVED.

What does the architecture look like?

Cloud

Sensors & Actuators

Mobile/App

Marketplace

Mobile/App Server

Gateway

Server Gateway

Overlapping Domains of Interest (Clustered Graphs)

Mobile/App

Mobile/App

Mobile/App

Domain A

Domain B

Domain C = A ∩ B

Domain E = C ∩ …

Page 25: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

25 © 2014 CA. ALL RIGHTS RESERVED.

Lots of Frameworks

Page 26: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

26 © 2014 CA. ALL RIGHTS RESERVED.

Lots of Protocols

Page 27: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

27 © 2014 CA. ALL RIGHTS RESERVED.

Lots of SDKs

Page 28: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

28 © 2014 CA. ALL RIGHTS RESERVED.

APIs are fundamental to the Internet of Things

{ “min”: “23C”, “max”: “11C”…}

Page 29: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

29 © 2014 CA. ALL RIGHTS RESERVED.

How could I get pwned?

Page 30: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

30 © 2014 CA. ALL RIGHTS RESERVED.

Data exposure

Page 31: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

31 © 2014 CA. ALL RIGHTS RESERVED.

Of the worst kind

Page 32: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

32 © 2014 CA. ALL RIGHTS RESERVED.

Cars

Page 33: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

33 © 2014 CA. ALL RIGHTS RESERVED.

Game consoles

Page 34: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

34 © 2014 CA. ALL RIGHTS RESERVED.

Facebook

Page 35: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

35 © 2014 CA. ALL RIGHTS RESERVED.

Phones

Page 36: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

36 © 2014 CA. ALL RIGHTS RESERVED.

Address Books

Page 37: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

37 © 2014 CA. ALL RIGHTS RESERVED.

Not just the NSA

Page 38: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

38 © 2014 CA. ALL RIGHTS RESERVED.

Not even just law enforcement

Page 39: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

39 © 2014 CA. ALL RIGHTS RESERVED.

What are the concerns?

IDENTITY

CUSTODY

PRIVACY

• How do we make sure we retain control? • How do we authenticate ourselves in person and online? • How do we delegate information to interested parties?

• Who has our information? • What information do they have? • What do they need? • Who do we trust? Why?

• How does information get from one place to another? • Are those pathways secure? • What role do we play?

Page 40: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

40 © 2014 CA. ALL RIGHTS RESERVED.

Maintain awareness

Page 41: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

41 © 2014 CA. ALL RIGHTS RESERVED.

Maintain awareness

Page 42: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

42 © 2014 CA. ALL RIGHTS RESERVED.

My identities and data

Page 43: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

43 © 2014 CA. ALL RIGHTS RESERVED.

What steps to take in this new interconnected world?

Page 44: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

44 © 2014 CA. ALL RIGHTS RESERVED.

APIs are Central to the Modern Enterprise

Page 45: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

45 © 2014 CA. ALL RIGHTS RESERVED.

An Enterprise API Management Solution

Internet of Things

Partners/ 3rd-party Developer Community

Cloud Services

BYOD

Sister Company APIs Daughter Company APIs

Page 46: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

46 © 2014 CA. ALL RIGHTS RESERVED.

Developer Management

Health Tracking

Workflow

Performance Global Staging Developer Enrollment

API Docs

Forums

API Explorer

Rankings Quotas

Plans

Analytics Reporting

Config Migration

Patch Management Policy Migration

Operations Management

Throttling Prioritization Caching

Routing Traffic Control Transformation

Security

Interface Management

Composition Authentication Single Sign On API Keys Entitlements

OAuth 1.x OAuth 2.0 OpenID Connect

Identity Management

Key Functional Areas of API Management

Token Service

Page 47: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

47 © 2014 CA. ALL RIGHTS RESERVED.

Questions?

Page 48: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

Senior Director, Prouct Management & Strategy

[email protected]

@JRyanL7

https://www.facebook.com/Layer7

linkedin.com/company/ca-technologies

ca.com

Jaime Ryan

Page 49: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

49 © 2014 CA. ALL RIGHTS RESERVED.

References

http://techcrunch.com/2014/04/14/google-acquires-titan-aerospace-the-drone-company-pursued-by-facebook/

http://www.cnet.com/news/google-buys-solar-powered-drone-company-titan-aerospace/

http://finance.yahoo.com/news/facebooks-feature-users-thoroughly-creeped-005800620.html

http://www.foxnews.com/leisure/2013/09/04/hackers-find-weaknesses-in-car-computer-systems/

http://www.mirror.co.uk/news/technology-science/technology/spies-can-listen-your-iphone-3670347

http://www.theblaze.com/stories/2013/08/02/report-fbi-can-remotely-turn-on-phone-microphones-for-spying/

http://www.theblaze.com/stories/2011/04/18/can-your-smartphone-use-your-microphone-camera-to-gather-data-yes/

http://www.usatoday.com/story/news/nation/2013/12/08/cellphone-data-spying-nsa-police/3902809/

cow: https://www.flickr.com/photos/julochka/

milk: https://www.flickr.com/photos/crazytales562/

https://security.google.com/settings/security/permissions?pli=1

https://www.facebook.com/help/405183566203254/

http://www.businessinsider.com/facebook-app-privacy-controls-2012-10

Page 50: Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely  Leverage IoT

50 © 2014 CA. ALL RIGHTS RESERVED.

Copyright © 2014 CA. The Nike logo is either a registered trademark or trademark of Nike Corporation in the United States and/or other countries. The Sonos logo is either a registered trademark or trademark of Sonos Corporation in the United States and/or other countries. The Google logo is either a registered trademark or trademark of Google Corporation in the United States and/or other countries. The Facebook logo is either a registered trademark or trademark of Facebook Corporation in the United States and/or other countries. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies.

Certain information in this publication may outline CA’s general product direction. However, CA may make modifications to any CA product, software program, method or procedure described in this publication at any time without notice, and the development, release and timing of any features or functionality described in this publication remain at CA’s sole discretion. CA will support only the referenced products in accordance with (i) the documentation and specifications provided with the referenced product, and (ii)CA’s then-current maintenance and support policy for the referenced product. Notwithstanding anything in this publication to the contrary, this publication shall not: (i) constitute product documentation or specifications under any existing or future written license agreement or services agreement relating to any CA software product, or be subject to any warranty set forth in any such written agreement; (ii) serve to affect the rights and/or obligations of CA or its licensees under any existing or future written license agreement or services agreement relating to any CA software product; or (iii) serve to amend any product documentation or specifications for any CA software product.

THIS PRESENTATION IS FOR YOUR INFORMATIONAL PURPOSES ONLY. CA assumes no responsibility for the accuracy or completeness of the information. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENT “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. In no event will CA be liable for any loss or damage, direct or indirect, in connection with this presentation, including, without limitation, lost profits, lost investment, business interruption, goodwill, or lost data, even if CA is expressly advised in advance of the possibility of such damages.