Top Banner
SHADOW DEVICES: Something is Lurking in Your Network
10

Shining a Light on Shadow Devices

Apr 11, 2017

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Shining a Light on Shadow Devices

SHADOW DEVICES:

Something is Lurking inYour Network

Page 2: Shining a Light on Shadow Devices

Mobile Devices can connect directly to thecellular data network for a path around your security controls.

SHADOW DEVICES:

Smart Phones & Tablets

Page 3: Shining a Light on Shadow Devices

Allowing BYOB (bring your own device) can be cheaper but balancing protection of corporate data against antagonizing employees has been challenging.

SHADOW DEVICES:

Employee Devices

Page 4: Shining a Light on Shadow Devices

SHADOW DEVICES:

Printers & Scanners

Office Devices can become targets, providing attackers with beachheads on your networks.

Page 5: Shining a Light on Shadow Devices

SHADOW DEVICES:

Connected Security Devices

Attackers grant themselves access via a security device using the default password with physical security devices.

Page 6: Shining a Light on Shadow Devices

It could be a sensor collecting information from factory robots or a warehouse system, but many of these devices are networked too — so they can be attacked.

SHADOW DEVICES:

Control Systems &Equipment

Page 7: Shining a Light on Shadow Devices

SHADOW DEVICES:

HealthcareDevices

Ramifications of attacks on medical devices arefar more severe.

Page 8: Shining a Light on Shadow Devices

SHADOW DEVICES:

Thermostats,Security & Automation

Connected home items have a network connection and access to the Intertubes, so it can be attacked.

Page 9: Shining a Light on Shadow Devices

SHADOW DEVICES:

Remote ControlledAutomobiles

Moving automobiles, which can use a smart phone connection or its own internet, can be attacked and controlled remotely.

Page 10: Shining a Light on Shadow Devices

Protect YourEnvironment

Start protecting yourself by focusing on visibility to discover the entirety of your attack surface, and then determine the best means of providing controls to protect your environment.

SHADOW DEVICES: