Top Banner
Big Change Revolution
56

IoT - Attacks and Solutions

Jan 21, 2018

Download

Technology

Ulf Mattsson
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IoT - Attacks and Solutions

Big Change

Revolution

Page 2: IoT - Attacks and Solutions

Are You Ready for a Big Change Revolution?

2

Source: www.firstpost.com

Page 3: IoT - Attacks and Solutions

• By 2018, digital business will require 50% fewer business process workers and 500% more key digital business jobs, compared with traditional models

• By 2018, the total cost of ownership for business operations will be reduced by 30% through smart machines and industrialized services

• By 2020, developed world life expectancy will increase by a half-year due to the widespread adoption of wireless health monitoring technology

3

Source: Gartner – Top 10 Strategic Predictions for 2015 and Beyond: Digital Business Is Driving 'Big Change‘, Oct 2014

A Changing Landscape 2018 - 2020

Page 4: IoT - Attacks and Solutions

Self Driving Cars: Are We at the Cusp of a Revolutionary Change?

4

Page 5: IoT - Attacks and Solutions

Micro-robots, the size of a grain of rice

5

Source: www.ted.com/talks/sarah_bergbreiter

Page 6: IoT - Attacks and Solutions

They’re Tracking When You Turn Off the Lights

6 Source: Wall Street Journal

Sensors to capture data on environmental conditions including sound volume, wind and carbon-dioxide levels, as well as behavioral data such as pedestrian traffic flow

Page 7: IoT - Attacks and Solutions

Jawbone Tracks Your Sleep Patterns

7

Source: Bogard, "the Internet of me."

Page 8: IoT - Attacks and Solutions

Samsung engineers are working on wearable for early stroke detection

8

Source: Early Detection Sensor and Algorithm Package (EDSAP)

Page 9: IoT - Attacks and Solutions

FTC Wants a Trusted, Secure Internet of Things

9

The Federal Trade

Commission (FTC)

Looking

At Apple

HealthKit

Source: www.cio-today.com

Page 10: IoT - Attacks and Solutions

• The Department of Homeland Security• Investigating 2 dozen cases of suspected cyber security

flaws in medical devices that could be exploited

• Can be detrimental to the patient, creating problems such as instructing an infusion pump to overdose a patient with drugs or forcing a heart implant to deliver a deadly jolt of electricity

• Encrypt medical data that’s stored

• PricewaterhouseCoopers study • $30billion annual cost hit to the U.S. healthcare system

due to inadequate medical-device interoperability

Security Threats of Connected Medical Devices

10

www.computing.co.uk/ctg/opinion/2390029/security-threats-of-connected-medical-devices#

Page 11: IoT - Attacks and Solutions

IoT is a Paradise for Hackers

11

Source: HP Security Research

• Almost 90 percent of the devices collect personal information such as name, address, date of birth, email, credit card number, etc.

• Un-encrypted format on to the cloud and big data, thus endangering the privacy of users

Page 12: IoT - Attacks and Solutions

• 26 billion devices on the Internet of Things by 2020 (Gartner)

• 15 Billion existing devices connectedto the internet (Intel)

• Not adequately protected at the device level• Cannot wait for a new generation of secure devices to be

developed

• Require robust and layered security controls

90% of world's data generated over last two years

12

Page 13: IoT - Attacks and Solutions

In 2015, ecosystems will transform fragmented wearables market

13

Page 14: IoT - Attacks and Solutions

A New World

Page 15: IoT - Attacks and Solutions

THE INTERNET OF THINGS

Page 16: IoT - Attacks and Solutions

THE INTERNET OF THINGS

Page 17: IoT - Attacks and Solutions

New Security Threats

Page 18: IoT - Attacks and Solutions
Page 19: IoT - Attacks and Solutions

Source: Frost & Sullivan, May 2017

Page 20: IoT - Attacks and Solutions

Source: Frost & Sullivan, May 2017

Page 21: IoT - Attacks and Solutions

Examples of New Attacks

Page 22: IoT - Attacks and Solutions

Source: Frost & Sullivan, May 2017

Page 23: IoT - Attacks and Solutions

Source: Frost & Sullivan, May 2017

Page 24: IoT - Attacks and Solutions

Source: Frost & Sullivan, May 2017

Page 25: IoT - Attacks and Solutions

Source: Frost & Sullivan, May 2017

Page 26: IoT - Attacks and Solutions

Source: Frost & Sullivan, May 2017

Page 27: IoT - Attacks and Solutions

Source: Frost & Sullivan, May 2017

Page 28: IoT - Attacks and Solutions

Source: Frost & Sullivan, May 2017

Page 29: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 30: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 31: IoT - Attacks and Solutions

Some Solutions

Page 32: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 33: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 34: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 35: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 36: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 37: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 38: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 39: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 40: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 41: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 42: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 43: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 44: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 45: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 46: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 47: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 48: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 49: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 50: IoT - Attacks and Solutions

Summary

Page 51: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 52: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 53: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 54: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 55: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017

Page 56: IoT - Attacks and Solutions

Source: Frost & Arbor, May 2017