cybersecurity and the internet of things
play

Cybersecurity and the Internet of Things Week 9 Frank Chen | - PowerPoint PPT Presentation

Many of the appliances that we use today are connected to the Internet CS 88S Cybersecurity and the Internet of Things Week 9 Frank Chen | Spring 2017 Frank Chen | Spring 2017 Agenda Review week 7's material Smart Transportation


  1. Many of the appliances that we use today are connected to the Internet CS 88S Cybersecurity and the Internet of Things Week 9 Frank Chen | Spring 2017 Frank Chen | Spring 2017

  2. Agenda ● Review week 7's material ● Smart Transportation ● Healthcare Devices ● Smart Assistants ● Home Appliances ● MIRAI DDoS Attack Frank Chen | Spring 2017

  3. Agenda ● Review week 7's material ● Smart Transportation ● Healthcare Devices ● Smart Assistants ● Home Appliances ● MIRAI DDoS Attack Frank Chen | Spring 2017

  4. Tech Companies or Ad Companies? "Mobile now makes up 84 % of ad revenue" Source: http://tcrn.ch/2ktzjFU "Alphabet's revenue hit $21.5 billion, a 21 percent year-over-year increase. Of that revenue, $19.1 billion came from Google's advertising business" Source: http://bit.ly/2rf5Boe Frank Chen | Spring 2017

  5. Amazon Go's 3 Steps Make a video Get the Patents Prove then Wait Source: http://bit.ly/2iBsBxh Frank Chen | Spring 2017

  6. The Invisibility Cloak Image Source: http://bit.ly/2qZpIKA Frank Chen | Spring 2017

  7. A Cool Demo from CTF Frank Chen | Spring 2017

  8. Agenda ● Review week 7's material ● Smart Transportation ● Healthcare Devices ● Smart Assistants ● Home Appliances ● MIRAI DDoS Attack Frank Chen | Spring 2017

  9. Jeep Cherokee Frank Chen | Spring 2017 Source: jeep.com

  10. Remote Jeep Hack ● Zero-day exploit on Jeep Cherokees ● Attackers obtain wireless control, via the Internet, to any Jeep Cherokees Frank Chen | Spring 2017 For detailed explanation of the hack: http://bit.ly/2rdUL2Q

  11. UConnect Frank Chen | Spring 2017 Source: http://bit.ly/1ZcoZgH

  12. Hack Outline Send commands Rewrite through CAN bus to Exploit UConnect's Entertainment car's physical vulnerability to Hardware Chip components gain access Firmware (engines, wheel) Frank Chen | Spring 2017 Source: http://bit.ly/1ZcoZgH

  13. Steer Fast! Frank Chen | Spring 2017 Source: http://bit.ly/2aIa3ae

  14. Remote Jeep Hack Chrysler has issued a recall for 1.4 million vehicles as a result of Miller and Valasek’s research. The Message: Automakers need to be held accountable for their vehicles’ digital security. Frank Chen | Spring 2017 Source: http://bit.ly/1ZcoZgH

  15. Agenda ● Review week 7's material ● Smart Transportation ● Healthcare Devices ● Smart Assistants ● Home Appliances ● MIRAI DDoS Attack Frank Chen | Spring 2017

  16. Frank Chen | Spring 2017 Source: viastara.com

  17. Fitbit Data Dump "Cybercrime takes many forms, but one of the more insidious and perhaps less obvious manifestations is warranty fraud" - Brian Krebs Frank Chen | Spring 2017 Source: http://bit.ly/1nd7QGu

  18. Fitbit Hacked 1. Infect Fitbit with malware 2. Discover device & sync Malicious Computer 3. Inject payload into host Host Computer Frank Chen | Spring 2017 Source: http://bit.ly/2r5xfqq

  19. Agenda ● Review week 7's material ● Smart Transportation ● Healthcare Devices ● Smart Assistants ● Home Appliances ● MIRAI DDoS Attack Frank Chen | Spring 2017

  20. Frank Chen | Spring 2017 Source: qz.com

  21. How many are there? Siri Amazon Alexa Google Home Frank Chen | Spring 2017

  22. Alexa Demo Frank Chen | Spring 2017 Source: qz.com

  23. Incidents ● Dollhouse Incident ( http://bit.ly/2iUuaWW ) ● Connectivity Issues ( http://bit.ly/2fwb2L7 ) ● Amazon Alexa Murder Case (http://bit.ly/2luUdlK) Frank Chen | Spring 2017

  24. Preview for next week... "Do you have to give informed consent to be recorded each time you enter my Alexa-outfitted home?" Frank Chen | Spring 2017 Source: http://bit.ly/2luUdlK

  25. Preview for next week... "Google will share your information with companies, organizations, and individuals outside of Google if Google has a good-faith belief that access, use, preservation, or disclosure of the information is reasonably necessary to meet applicable law, regulation, legal process, or enforceable government request." Frank Chen | Spring 2017 Source: http://bit.ly/2luUdlK

  26. Agenda ● Review week 7's material ● Smart Transportation ● Healthcare Devices ● Smart Assistants ● Home Appliances ● MIRAI DDoS Attack Frank Chen | Spring 2017

  27. Frank Chen | Spring 2017 Source: nest.com

  28. Appliances Nest Thermostat Lorex Home Security Wink, TCP connected lighting system Blossom, smart August, smart water sprinkler door lock Samsung Smart Fridge Frank Chen | Spring 2017

  29. Secure? Or nah Frank Chen | Spring 2017 Source: http://bit.ly/2mkgTtn

  30. Security Issues ● Confidential Information ● Monetary Damage ● Physical Danger Frank Chen | Spring 2017 Source: wired.com

  31. Agenda ● Review week 7's material ● Smart Transportation ● Healthcare Devices ● Smart Assistants ● Home Appliances ● MIRAI DDoS Attack Frank Chen | Spring 2017

  32. Frank Chen | Spring 2017 Source: wired.com

  33. Review: DDoS Attack Frank Chen | Spring 2017 Source: wired.com

  34. Accessibility C I A Frank Chen | Spring 2017 http://tcrn.ch/2dt8sHy

  35. Frank Chen | Spring 2017 Source: bleepingcomputers.com

  36. Timeline of Events A second attack was reported at 11:52am and At 6:11pm, Dyn Internet users began First attack began at reported that they had reporting difficulties 7:00am (EDT) resolved the issue accessing websites Resolved by 9:20am A third attack began in the afternoon, after 4:00pm October 21, 2016 Frank Chen | Spring 2017 Source: krebsonsecurity.com

  37. Affected Websites Frank Chen | Spring 2017 Source: wired.com

  38. The MIRAI Virus ● Call-Home System connects to a command-and-control server (which could be another insecure ○ IoT device) to download details of whom to attack, and how. ● Set of Attack Routines generate a range of legitimate-looking streams of network traffic to eat ○ away at the victim’s network capacity. ● Network Scanner searches on the internet & try to login in various ways to build and report a ○ list of insecure IoT devices for the next wave of attacks. Frank Chen | Spring 2017 Source: http://bit.ly/2dLMyev

  39. The MIRAI Virus Open Source: https://github.com/jgamblin/Mirai-Source-Code Frank Chen | Spring 2017 Source: http://bit.ly/2dLMyev

  40. The MIRAI Virus Written in Go for Cross-Platform Support Frank Chen | Spring 2017 Source: http://bit.ly/2dLMyev

  41. The MIRAI Virus Uses built-in default passwords ... Frank Chen | Spring 2017 Source: http://bit.ly/2dLMyev

  42. Recommendations ● Don't use hardwired passwords ● Don't set default passwords ● Don’t allow unauthenticated or unencrypted protocols for inbound connections ● Don’t open administrative connections on the outside interface by default. Frank Chen | Spring 2017 Source: http://bit.ly/2dLMyev

  43. S�f��� �� ��� C���� T�� Do not use default password and username in IoT devices. Frank Chen | Spring 2017

  44. Next Week... Project DUE! Frank Chen | Spring 2017 Image Source: http://bit.ly/2pIoWQW

  45. Next Week... Frank Chen | Spring 2017

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend