There is No Perimeter in IoT Security...There is No Perimeter in IoT Security Andrei Robachevsky...

9
Internet Society © 1992–2016 There is No Perimeter in IoT Security Andrei Robachevsky [email protected] IoT Week, 6-9 June 2017 Presentation title – Client name 1

Transcript of There is No Perimeter in IoT Security...There is No Perimeter in IoT Security Andrei Robachevsky...

Page 1: There is No Perimeter in IoT Security...There is No Perimeter in IoT Security Andrei Robachevsky robachevsky@isoc.org IoT Week, 6-9 June 2017 Presentation title –Client name 1 Despite

Internet Society © 1992–2016

There is No Perimeter in IoT Security

Andrei [email protected]

IoT Week, 6-9 June 2017

Presentation title – Client name 1

Page 2: There is No Perimeter in IoT Security...There is No Perimeter in IoT Security Andrei Robachevsky robachevsky@isoc.org IoT Week, 6-9 June 2017 Presentation title –Client name 1 Despite

Despite the global buzz around the Internet of Things, there is no single, universally accepted definition for the term…

2

A trend where a large number of embedded devices employ communication services offered by the Internet protocols (IAB)

A global infrastructure […] interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies (ITU-T)

From a broader perspective, the IoT can be perceived as a vision with technological and societal implications (ITU-T)

The Internet of Things (IoT) is a framework in which all things have a representation and a presence in the Internet (IEEE)

The extension of network connectivity and computing capability to objects, devices, sensors, and items not ordinarily considered to be computers (ISOC)

Page 3: There is No Perimeter in IoT Security...There is No Perimeter in IoT Security Andrei Robachevsky robachevsky@isoc.org IoT Week, 6-9 June 2017 Presentation title –Client name 1 Despite

Which configuration better describes the IoT?

3

Internet

AppCloudSmartApp

SmartApp

d)

a)

b)

c)

1. a)2. b)3. b), c), d)4. All of the above5. None of the above

Page 4: There is No Perimeter in IoT Security...There is No Perimeter in IoT Security Andrei Robachevsky robachevsky@isoc.org IoT Week, 6-9 June 2017 Presentation title –Client name 1 Despite

IoT is a system

4

The Internet of Things (IoT) is not just a device connected to the Internet - it is a complex, rapidly evolving system.

To understand the implications, analyserisks, and come up with effective security solutions we need to look ahead and take into account other components, such as Big Data and Artificial Intelligence (AI).

Page 5: There is No Perimeter in IoT Security...There is No Perimeter in IoT Security Andrei Robachevsky robachevsky@isoc.org IoT Week, 6-9 June 2017 Presentation title –Client name 1 Despite

IoT is a system

5

Big data AI

Page 6: There is No Perimeter in IoT Security...There is No Perimeter in IoT Security Andrei Robachevsky robachevsky@isoc.org IoT Week, 6-9 June 2017 Presentation title –Client name 1 Despite

Who is responsible?

6

To scale up we need a collective approach, addressing security challenges on all fronts.

The Online Trust Alliance IoT Security Framework provides a great foundation listing the baseline requirements for security and privacy.

Page 7: There is No Perimeter in IoT Security...There is No Perimeter in IoT Security Andrei Robachevsky robachevsky@isoc.org IoT Week, 6-9 June 2017 Presentation title –Client name 1 Despite

Different threat scenarios –Different existing approaches and communities

7

IoT as a botnet— DDoS attacks— SPAM— Other typical botnet activities

IoT as a privacy intruder (AI+BigData)— Surveillance— Espionage— Data breaches

IoT as a security threat— Misbehaving things/actuators, re-purposing— Physical security— Espionage/APT

Page 8: There is No Perimeter in IoT Security...There is No Perimeter in IoT Security Andrei Robachevsky robachevsky@isoc.org IoT Week, 6-9 June 2017 Presentation title –Client name 1 Despite

How to ignite action?

Engaging Forces for Security• Market forces— Recognising value of security — Affordable security

• Regulation forces— Compliance: product and the ISM processes— Facilitator rather than enforcer

• Societal forces— All parties involved are interested in innovative

and security IoT— Norm setting— Finding points of maximum impact

8

Page 9: There is No Perimeter in IoT Security...There is No Perimeter in IoT Security Andrei Robachevsky robachevsky@isoc.org IoT Week, 6-9 June 2017 Presentation title –Client name 1 Despite

Is paradigm shift needed?

Yes• Scale and speed of deployment

• Security means Safety

• Issues are amplified by BigData and AI

9