1 27 02 2020 2 cellular connectivity anywhere in the world
play

1 27/02/2020 2 Cellular Connectivity Anywhere In The World (2G, - PowerPoint PPT Presentation

1 27/02/2020 2 Cellular Connectivity Anywhere In The World (2G, 3G, 4G, LTE-M, soon NB-IoT) 180+ countries 540+ networks We are where you are In the Cloud Intra-Cloud Peering Connectivity Meta- Global Reliable and Secure for Device Data


  1. 1

  2. 27/02/2020 2

  3. Cellular Connectivity Anywhere In The World (2G, 3G, 4G, LTE-M, soon NB-IoT) 180+ countries 540+ networks

  4. We are where you are In the Cloud Intra-Cloud Peering Connectivity Meta- Global Reliable and Secure for Device Data delivered to Distributed Infrastructure Remote Access Cloud Service

  5. Our Customers – IoT Solutions Smart Home Smart City Health Retail Agriculture Alarm & Surveillance Parking Meter Fall Detection Inventory Mgmt Crop yield & storage Pest Control Traffic Control Health Monitoring Payment (PoS) Soil/nutrient Smart Metering Waste Management Remote Diagnosis Digital store Fences mon. Leak Detection Public Safety Medication Mgmt Customer Satisfaction Livestock surveillance Asset Mmgmt Manufacturing Transportation Environment Fleet Mgmt Air/water quality Stock inventory Mgmt Vehicle Diagnostics Animal tracking Noise Radiation Predictive Maintenance Connected Car Container tracking Flooding Safety Monitoring Rail monitoring Good temperature Solar & Air Energy Machine monitoring Art & Relic Preservation • B2B2B and B2C • Selling Connectivity as part of their services 6

  6. What is the motivation for cybercriminals? Individuals Government Moral – Religious – Criminal and Industry Political Groups Business Fame / Revenge Intelligence Purpose Money / Revenue

  7. Why are IoT devices in the focus of attackers?

  8. How do cybercriminals make money with IoT devices? Denial-of-Service Attack as a Service Ransomware Crypto Currency Mining (with less success)

  9. What does a common IoT attack look like? Mirai/Chalubo/Liquorbot • Attackers scan the public internet for IoT devices and utilize remote access ports to login (using brute force passwords) • Once control over the device execute a DDoS attack on a victim Stuxnet • Utilize exploits of windows machines and then spreads to Siemens SCADA PLCs in the same network – executing commands on the PLC • damaged e.g. Iranian atomic program Brickerbot Simplified Mirai attack scheme • Similar to Mirai – remote access / public internet and then making device unusable (brick)

  10. Top 5 cellular features for IoT device security 25+ Best Practices and cellular features to secure IoT devices and applications. Download here https://www.emnify.com/guide-for-cellular-iot-security

  11. Top 1: Secure Remote Access Mirai attack vector: Remote Access via public reachable address Static / Dynamic IP Private / Public IP address address of device Private IP - takes device off public Internet - Certificate based Static IP - allows remote access without dynamic DNS service authentication - Private key encryption Remote Access via VPN, by authenticating with cellular connectivity provider to get access to the device

  12. Top 2: Closing the Internet Gap Attack vector: Data Transmission over Public Internet Data secured in the network operator infrastructure using SIM authentication & data encryption Security Gap – between Mobile network and Application Infrastructure

  13. Top 2: Closing the Internet Gap Traditional - Private APN with IPsec Secure Intra-Cloud Connect APN • Private APNs - public IP addresses used • Intra-cloud connect (no public IPs) to establish secure tunnel • Setup in minutes • Devices and application can use private IP • Complete cloud service model addresses to communicate (no NAT) • Device and application in same VPC – • Data encrypted from infrastructure to cloud secure data transport and remote access • Secure remote access • ~x weeks to setup

  14. Top 3: Cellular Data Firewall Mirai attack vector: Infected Device can be controlled by attacker and attack victim (illegitimate traffic destinations)

  15. Top 4: Voice and SMS Service Firewall SMS attacks Voice Fraud • In case an attacker gets control of devices – via Data, SMS and make • Use SMS to trigger action on Fall 2019 premium calls SIM applet (S@T and Wireless 28 billion $ SIMjacker Internet Browser) • International Revenue Shared fraud in And 2019 fraud - company providing the • Actions: send location, make WIB attack premium number and the one an SMS, make a call renting sharing revenues A2P SMS Voice Internal SMS External SMS ON OFF MT/MO SMS

  16. Top 5: Connectivity Monitoring via Real-Time Datastreamer • Connectivity Data needs to be part of anomaly detection – requires 360° view on system • User Error vs. Attack • Real-Time requirements • Operational Service Dashboard

  17. Summary: Cellular Security Benefits Prevents Mirai Own private Central Control Cellular is a attacks - Central Monitoring network between of connectivity separate network Remote access, for anomaly all devices and security per device (Stuxnet) Closing the gap, detection applications or group Firewall 25+ Best Practices and cellular features to secure IoT devices and applications. With utilizing cellular connectivity features – the most common IoT attacks are prevented. Download here https://www.emnify.com/guide-for-cellular-iot-security

  18. 19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend