iot security ongoing challenges
play

IOT SECURITY ONGOING CHALLENGES Selvana Naiken Gopalla - PowerPoint PPT Presentation

IOT SECURITY ONGOING CHALLENGES Selvana Naiken Gopalla Information Security Consultant CERT-MU | National Computer Board OUTLINE The Internet of Insecure Things New Devices, New Security Challenges IOT Specific Security Issues


  1. IOT SECURITY – ONGOING CHALLENGES Selvana Naiken Gopalla Information Security Consultant CERT-MU | National Computer Board

  2. OUTLINE The Internet of Insecure Things New Devices, New Security Challenges IOT Specific Security Issues Preventing Future Attacks

  3. NEW DEVICES, NEW SECURITY CHALLENGES

  4. NUMBER OF CONNECTED DEVICES

  5. By 2020, more than 25% of identified enterprise attacks will involve IoT, though IoT will account for only 10% of IT security budgets. Gartner, 2016

  6. Security is a battle of inches, and even the one-inch square device on your wrist may be the attack surface for the bad guys. The Connected Car and Smart Watch Problem

  7. LINUX/MOOSE – THE IOT BOTNET WITH AN APPETITE FOR SOCIAL NETWORKS YouTube, Periscope, Kiwi and Instagram 86% Instagram 86% Periscope, YouTube, Flipagram 3% Kiwi and Flipagram 3% 1,700 fake accounts 1,700 fake accounts 72% suspended 72% suspended Twitter 8% Twitter 8% Gmail and Yahoo email account creation requests

  8. LINUX/MOOSE BEHAVIOUR Kill Replicate processes Service Eavesdrop listening Proxying Tunnel

  9. SPOTTING FAKE ACCOUNTS CREATED BY LINUX/MOOSE

  10. SPOTTING FAKE ACCOUNTS CREATED BY LINUX/MOOSE

  11. SPOTTING FAKE ACCOUNTS CREATED BY LINUX/MOOSE

  12. LINUX/MOOSE HABITAT – TARGETED DEVICES Vendors Confirmed as Being Affected: Hik Actiontec Netgear Synology Vision TP-Link ZyXEL Zhone Source: ESET, Canada

  13. CLEANING LINUX/MOOSE Factory Update Change Reset firmware Password

  14. LINUX/MOOSE PREVENTION Change Install latest default firmware passwords Deny access Disable on ports 22, Telnet login 23, 80, 443

  15. October 21, 2016 164 countries affected Reddit Vietnam 12.8% Brazil 11.8% United States at 10.9% Twitter 49,657 unique IPs hosting China 8.8% Mexico 8.4% Mirai-infected devices Spotify Source: SecurityWeek, 2016 Also in Top 10: South Korea, Taiwan, Russia, Romania GitHub and Colombia Montenegro, Tajikistan and Somalia PayPal Amazon Source: SecurityWeek , 2016 Netflix

  16. MIRAI MITIGATION IN 3 STEPS Change Disconnect Reboot password

  17. MIRAI PREVENTION Password Change Port Monitoring Device Update Disable Device Universal Plug Capabilities and Play (UPnP) Reputable Vendors

  18. INFORMATION SECURITY VS. IOT SECURITY Information Security IoT Security A C I Infosec C I A

  19. SECURITY & PRIVACY ARE NOT THE ONLY ISSUES Inter-operability standard Legal Regulatory and Rights Emerging Economy and development

  20. HOW AND WHEN WILL WE GET A SECURE INTERNET OF THINGS? Emphasise Lifecycle, Access control security from future-proofing, and device day one updates authentication Prepare for Know your security enemy breaches

  21. INITIATIVES TO DETECT AND ERADICATE BOTNETS IN MAURITIUS In line with the Government’s vision to make Mauritius secure and resilient, CERT-MU is in the process of setting up an infrastructure to proactively detect and take appropriate measures against botnets Implementation of this system will provide safe and secure environment for businesses The solution can be extended to IOT devices

  22. INCIDENT STATISTICS REPORTED TO CERT-MU- YEAR 2015

  23. INCIDENT STATISTICS REPORTED TO CERT-MU - OCTOBER 2016

  24. INITIATIVES TO DETECT AND ERADICATE BOTNETS IN MAURITIUS In line with the Government’s vision to make Benefits: Mauritius secure and resilient, CERT-MU is in the process of setting up an infrastructure to proactively detect and take appropriate Mitigation of existing measures against botnets botnets Prevention of new Implementation of this system will provide safe infections and secure environment for businesses Minimizing profitability of botnets Visualize threat landscape The solution can be extended to IOT devices of the Mauritian cyberspace

  25. THANK YOU!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend