14
CReAT CReAT CReAT CReAT – – Cybersecurity Cybersecurity Cybersecurity Cybersecurity Risk Risk Risk Risk Assessment Assessment Assessment Assessment Framework Framework Framework Framework for for for for IoT IoT IoT IoT Platforms Platforms Platforms Platforms Soumya Kanti Datta [email protected] Session Session Session Session: : :IoT IoT IoT IoT Risk Risk Risk Risk Assessment Assessment Assessment Assessment & & & Management Management Management Management

CReATCReAT– –––CybersecurityCybersecurityCybersecurityRisk … · 2019-07-25 · Microsoft PowerPoint - Soumya cybersecurity risk assessment 19 June Author: Soumya Created

  • Upload
    others

  • View
    8

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CReATCReAT– –––CybersecurityCybersecurityCybersecurityRisk … · 2019-07-25 · Microsoft PowerPoint - Soumya cybersecurity risk assessment 19 June Author: Soumya Created

CReATCReATCReATCReAT –––– CybersecurityCybersecurityCybersecurityCybersecurity RiskRiskRiskRisk

AssessmentAssessmentAssessmentAssessment FrameworkFrameworkFrameworkFramework forforforfor

IoTIoTIoTIoT PlatformsPlatformsPlatformsPlatforms

Soumya Kanti Datta

[email protected]

SessionSessionSessionSession:::: IoTIoTIoTIoT RiskRiskRiskRisk AssessmentAssessmentAssessmentAssessment &&&& ManagementManagementManagementManagement

Page 2: CReATCReAT– –––CybersecurityCybersecurityCybersecurityRisk … · 2019-07-25 · Microsoft PowerPoint - Soumya cybersecurity risk assessment 19 June Author: Soumya Created

19-06-2019 CReAT | IoTWeek 2019 2

Page 3: CReATCReAT– –––CybersecurityCybersecurityCybersecurityRisk … · 2019-07-25 · Microsoft PowerPoint - Soumya cybersecurity risk assessment 19 June Author: Soumya Created

Cyberattack resilience and privacy

Source: http://www.itworld.com/

19-06-2019 CReAT | IoTWeek 2019 3

Cyber-criminals stepping up attacks on IoT systems

Privacy concerns in disruptive technologies

No uniform Cyberattack resilience methodology

Page 4: CReATCReAT– –––CybersecurityCybersecurityCybersecurityRisk … · 2019-07-25 · Microsoft PowerPoint - Soumya cybersecurity risk assessment 19 June Author: Soumya Created

Increased attacks …

19-06-2019 CReAT | IoTWeek 2019 4

• Multiple DDoS attacks led toinaccessibility of Github,Twitter, and more in October2016.

• Attacks carried out by IoT devicesincluding printers, IP cameras,and baby monitors.

• Stuxnet – malicious computerprogram targeting industrialcomputer systems around adecade ago.

Page 5: CReATCReAT– –––CybersecurityCybersecurityCybersecurityRisk … · 2019-07-25 · Microsoft PowerPoint - Soumya cybersecurity risk assessment 19 June Author: Soumya Created

Growing concerns …

19-06-2019 CReAT | IoTWeek 2019 5

• Critical infrastructure being targeted

• Legacy systems that do not handle latest security protocols

• Lack of standards for Industrial IoT security

• Scalability

• 32% of IIoT devices connect directly to the internet, bypassing traditional ITsecurity layers.

• Almost 40% said identifying, tracking and managing devices represented asignificant security challenge.

• Only 40% reported applying and maintaining patches and updates toprotect their IIoT devices and systems.

• 56% cited difficulty in patching as one of the greatest security challenges• More info - https://www.themanufacturer.com/articles/iiot-security-endpoints-

most-vulnerable-aspect/

Page 6: CReATCReAT– –––CybersecurityCybersecurityCybersecurityRisk … · 2019-07-25 · Microsoft PowerPoint - Soumya cybersecurity risk assessment 19 June Author: Soumya Created

Cybersecurity Risk Assessment – ETSI Framework

• OWASP Application Security Verification Standard Project

• Microsoft's STRIDE

• Common Vulnerability Scoring System

19-06-2019 CReAT | IoTWeek 2019 6

Page 7: CReATCReAT– –––CybersecurityCybersecurityCybersecurityRisk … · 2019-07-25 · Microsoft PowerPoint - Soumya cybersecurity risk assessment 19 June Author: Soumya Created

CReAT Framework for Cybersecurity Risk Assessment

19-06-2019 CReAT | IoTWeek 2019 7

Page 8: CReATCReAT– –––CybersecurityCybersecurityCybersecurityRisk … · 2019-07-25 · Microsoft PowerPoint - Soumya cybersecurity risk assessment 19 June Author: Soumya Created

CReAT Framework Testing in Fed4FIRE+

19-06-2019 CReAT | IoTWeek 2019 8

Risk assessment in terms of

• DDoS detection

• Insufficient authentication, authorization

• Insecure Cloud web services

No security breach observed

Page 9: CReATCReAT– –––CybersecurityCybersecurityCybersecurityRisk … · 2019-07-25 · Microsoft PowerPoint - Soumya cybersecurity risk assessment 19 June Author: Soumya Created

Cyber Resilience• Ability to prepare for, respond to and recover from cyber attacks.

• It helps an organisation protect against cyber risks, defend against and limit theseverity of attacks, and ensure its continued survival despite an attack.

• Emerged over the past few years because traditional cyber securitymeasures are no longer enough.

• It is now commonly accepted that it’s no longer a matter of ‘if’ but ‘when’ an organisation will suffer a cyber attack.

19-06-2019 CReAT | IoTWeek 2019 9

Source: Symantec

Whitepaper

Page 10: CReATCReAT– –––CybersecurityCybersecurityCybersecurityRisk … · 2019-07-25 · Microsoft PowerPoint - Soumya cybersecurity risk assessment 19 June Author: Soumya Created

Four Step Approach

Manage and Protect

• Malware protection

• Data security

• Identity and access control

• Encryption, network security …

Identify and detect

• Continuous monitoring of network and information systems to detect anomalies and potential cyber security incidents before they can cause any significant damage.

Respond and recover

• Incident response management program

• Measures to ensure business continuity

• Restore normalcy as soon as possible

Govern and assure

• Such program and measures are a part of enterprise organization and built into business.

19-06-2019 CReAT | IoTWeek 2019 10

Page 11: CReATCReAT– –––CybersecurityCybersecurityCybersecurityRisk … · 2019-07-25 · Microsoft PowerPoint - Soumya cybersecurity risk assessment 19 June Author: Soumya Created

Conclusion

• Risk assessment must beperformed at the early phasesof product and servicedefinition, development.

• Security, privacy, and trust arekey aspects when designingwinning UX.

19-06-2019 CReAT | IoTWeek 2019 11

Source - https://www.reddit.com/r/Iota/comments/6axglx/how_does_iota_help_with_the_huge_iot_security/

Page 12: CReATCReAT– –––CybersecurityCybersecurityCybersecurityRisk … · 2019-07-25 · Microsoft PowerPoint - Soumya cybersecurity risk assessment 19 June Author: Soumya Created

Acknowledgement

• The work leading to this presentation is a part of CReAT experiment ofFed4FIRE+.

• Fed4FIRE+ project has received funding under grant agreement No732638 from the Horizon 2020 Research and Innovation Programme,which is co-funded by the European Commission and the Swiss StateSecretariat for Education, Research and Innovation.

19-06-2019 CReAT | IoTWeek 2019 12

Page 13: CReATCReAT– –––CybersecurityCybersecurityCybersecurityRisk … · 2019-07-25 · Microsoft PowerPoint - Soumya cybersecurity risk assessment 19 June Author: Soumya Created

Thank You!!

19-06-2019 CReAT | IoTWeek 2019 13

Page 14: CReATCReAT– –––CybersecurityCybersecurityCybersecurityRisk … · 2019-07-25 · Microsoft PowerPoint - Soumya cybersecurity risk assessment 19 June Author: Soumya Created

Digiotouch Core Business• Sustainable and Secure Digital Transformation

• Cloud based, secure, End-to-End Paradise IoT Platform

Paradise IoT

Platform

Cyber security

Open Data

Cloud, Edge

Mobile Apps

Interope rability

ICT Standards

Smart CityMobility-as-a-

Service (MaaS)

Smart

Manufacturing

& Logistics

Healthcare

Paradise IoT

Platform

19-06-2019 CReAT | IoTWeek 2019 14