20
Michele Colajanni Interdepartment Research Center on Security (CRIS) Università di Modena e Reggio Emilia [email protected] Cybersecurity in industry and industrial products (“The need for disruptive ideas”)

Cybersecurity in industry and industrial products · Cloudification Human Machine Interfaces Augmented reality Virtual reality ... –Eager Time to Market (“get ahead of the competitors”)

  • Upload
    others

  • View
    11

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cybersecurity in industry and industrial products · Cloudification Human Machine Interfaces Augmented reality Virtual reality ... –Eager Time to Market (“get ahead of the competitors”)

Michele ColajanniInterdepartment Research Center on Security (CRIS)

Università di Modena e Reggio Emilia

[email protected]

Cybersecurity in industry

and industrial products

(“The need for disruptive ideas”)

Page 2: Cybersecurity in industry and industrial products · Cloudification Human Machine Interfaces Augmented reality Virtual reality ... –Eager Time to Market (“get ahead of the competitors”)

The exponential progress or the dawn of

4th Industrial Revolution

Mobile growing

Smart sensors

rising

Planetary IoT

Autonomous agents

Advanced robotics

Big Data ecosystem:Real-time analytics, deep

learning, predictive intelligence,

problem solving

Processing and storage

costs falling

Cloudification

Human Machine

Interfaces

Augmented reality

Virtual reality

Michele Colajanni - "Cyber Security in Industry" - CyberROAD - Cagliari, 25 May 2016 2

3D-4D printing

Novel materials

and drugs

Future

healthE-health

Page 3: Cybersecurity in industry and industrial products · Cloudification Human Machine Interfaces Augmented reality Virtual reality ... –Eager Time to Market (“get ahead of the competitors”)

Cyber world

Michele Colajanni - "Cyber Security in Industry" - CyberROAD - Cagliari, 25 May 2016 3

S E C U R I T Y ?

• Unlimited computational and storage resources

• Everything can be recorded, nothing will be

forgotten

• All-to-all connections

• Pervasive computational thinking

“Whatever the future, it will depend on computing”

(Grady Booch) …

… and computing depends on DATA

Page 4: Cybersecurity in industry and industrial products · Cloudification Human Machine Interfaces Augmented reality Virtual reality ... –Eager Time to Market (“get ahead of the competitors”)

Today: Anything in common in smart objects?

Michele Colajanni - "Cyber Security in Industry" - CyberROAD - Cagliari, 25 May 2016 4

Page 5: Cybersecurity in industry and industrial products · Cloudification Human Machine Interfaces Augmented reality Virtual reality ... –Eager Time to Market (“get ahead of the competitors”)

“Smart” Things

The informed consent about smart objects and services is

formally perfect and actually a fraud. Yes, we know: it’s a

customer error not to read and understand ToS, but …

Michele Colajanni - "Cyber Security in Industry" - CyberROAD - Cagliari, 25 May 2016 5

They gather customer’s

data. They learn to

correlate different data:

–to better satisfy

the needs of

the customer– to increase the efficiency of

product advertisements

SMARTER FRIDGE

KNOWS

WHAT YOU NEED

BEFORE YOU DO

Page 6: Cybersecurity in industry and industrial products · Cloudification Human Machine Interfaces Augmented reality Virtual reality ... –Eager Time to Market (“get ahead of the competitors”)

“Data war”: C vs C(C = Countries, Companies, Citizens, Customers, Criminals)

Michele Colajanni - "Cyber Security in Industry" - CyberROAD - Cagliari, 25 May 2016 6

“Privatization of privacy”

Page 7: Cybersecurity in industry and industrial products · Cloudification Human Machine Interfaces Augmented reality Virtual reality ... –Eager Time to Market (“get ahead of the competitors”)

Novel business models are appearing

Customer’s data have a value. Privacy is a value

Michele Colajanni - "Cyber Security in Industry" - CyberROAD - Cagliari, 25 May 2016 7

AT&T offers different prices based on how

jealously users guard their privacy: $70 per-

month for gigabit service and additional $29

a month to customers who opt out of

AT&T's "Internet Preferences" program

TSU Social network

“Online ads generate revenues

for the TSU platforms. Our

community gets up to 90% of

all revenues to you. It’s your

content, own it”

“Ethics by design”

Page 8: Cybersecurity in industry and industrial products · Cloudification Human Machine Interfaces Augmented reality Virtual reality ... –Eager Time to Market (“get ahead of the competitors”)

We have other problems

8Michele Colajanni - "Cyber Security in Industry" - CyberROAD - Cagliari, 25 May 2016

HP 2014 study reveals: 70% of Internet of

Things Devices are Vulnerable to Attacks

On average, 25 vulnerabilities per device.

Highlights include:

• Privacy concerns

• Insufficient authorization

• Lack of transport encryption

• Insecure Web interface

• Inadequate software protection

Page 9: Cybersecurity in industry and industrial products · Cloudification Human Machine Interfaces Augmented reality Virtual reality ... –Eager Time to Market (“get ahead of the competitors”)

From personal to professional healthcare

IoT is becoming a serious scenario

9Michele Colajanni - "Cyber Security in Industry" - CyberROAD - Cagliari, 25 May 2016

Page 10: Cybersecurity in industry and industrial products · Cloudification Human Machine Interfaces Augmented reality Virtual reality ... –Eager Time to Market (“get ahead of the competitors”)

The scenario is becoming even more serious

in Industrial IoT and Industrial products

10Michele Colajanni - "Cyber Security in Industry" - CyberROAD - Cagliari, 25 May 2016

Page 11: Cybersecurity in industry and industrial products · Cloudification Human Machine Interfaces Augmented reality Virtual reality ... –Eager Time to Market (“get ahead of the competitors”)

Consumer IoT

• Mandatory

– Low prices

– Eager Time to Market (“get ahead of the competitors”)

• Acceptable

– The customer pays for the object

– The customer doesn’t pay for the service Actually he/she

pays through a (conscious) privacy violation

– Minimum level of security and then patches

– Standards are not so important

– Rapid obsolescence of the object

More time for a more expensive, standardized and

secure object does not really pay back the Producer

Michele Colajanni - "Cyber Security in Industry" - CyberROAD - Cagliari, 25 May 2016 11

Page 12: Cybersecurity in industry and industrial products · Cloudification Human Machine Interfaces Augmented reality Virtual reality ... –Eager Time to Market (“get ahead of the competitors”)

Industrial IoT

• Electric power transmission and distribution

• Industrial control systems

• Oil and natural gas systems

• Water and waste-water treatment plants

• Healthcare devices

• Transportation system

• …

• Security-critical: Industrial IoT systems collect data and

are exposed to attacks

• Safety-critical: their failure can cause irreparable harm to

the physical system under control and to the people

Michele Colajanni - "Cyber Security in Industry" - CyberROAD - Cagliari, 25 May 2016 12

Page 13: Cybersecurity in industry and industrial products · Cloudification Human Machine Interfaces Augmented reality Virtual reality ... –Eager Time to Market (“get ahead of the competitors”)

Security MUST be integrated with Safety

Michele Colajanni - "Cyber Security in Industry" - CyberROAD - Cagliari, 25 May 2016 13

Availability

IntegrityConfidentiality

Safety

“Freedom from unacceptable

risk of physical injury or of

damage to the health of

people, either directly, or

indirectly as a result of

damage to property or to the

environment”

Page 14: Cybersecurity in industry and industrial products · Cloudification Human Machine Interfaces Augmented reality Virtual reality ... –Eager Time to Market (“get ahead of the competitors”)

Crossroads of the digital revolution

14

Industrial IoT

Some hope:

Security and privacy

by design, compliance

and incentives can

win

Consumer IoT No hope:The model based on Time-to-Market,

privacy violation and products based

on limited security is winning

Michele Colajanni - "Cyber Security in Industry" - CyberROAD - Cagliari, 25 May 2016

IN T

HE

FU

TU

RE

Page 15: Cybersecurity in industry and industrial products · Cloudification Human Machine Interfaces Augmented reality Virtual reality ... –Eager Time to Market (“get ahead of the competitors”)

Industrial IoT: An optimistic vision

1. Time-to-Market is less aggressive because quality is

more important

2. Awareness of the (consumer) companies

– IoT costs have a minor impact on the plant investment

– Medium-long term technology is required

– Security and safety have a value

– Standards are important

3. Political and social awareness about security and

safety of IoT is increasing

Michele Colajanni - "Cyber Security in Industry" - CyberROAD - Cagliari, 25 May 2016 15

Most IoT products in critical systems will be

enriched by Security and Safety by design

Page 16: Cybersecurity in industry and industrial products · Cloudification Human Machine Interfaces Augmented reality Virtual reality ... –Eager Time to Market (“get ahead of the competitors”)

Mobile Web + App

World Wide WebPC Internet

Michele Colajanni - "Cyber Security in Industry" - CyberROAD - Cagliari, 25 May 2016

INDUSTRIAL

INTERNET OF

THINGS

Smart objects

The day after tomorrow

Autonomous objects

Cloud and social

systems

16

Page 17: Cybersecurity in industry and industrial products · Cloudification Human Machine Interfaces Augmented reality Virtual reality ... –Eager Time to Market (“get ahead of the competitors”)

Michele Colajanni - "Cyber Security in Industry" - CyberROAD - Cagliari, 25 May 2016 17

Page 18: Cybersecurity in industry and industrial products · Cloudification Human Machine Interfaces Augmented reality Virtual reality ... –Eager Time to Market (“get ahead of the competitors”)

Your empathy?

Michele Colajanni - "Cyber Security in Industry" - CyberROAD - Cagliari, 25 May 2016 18

OR

Page 19: Cybersecurity in industry and industrial products · Cloudification Human Machine Interfaces Augmented reality Virtual reality ... –Eager Time to Market (“get ahead of the competitors”)

Conclusions

• Pessimistic about data privacy

• Partially optimistic about security in

Industrial IoT

• We are living in exponential times:

data, attacks, information, traffic,

technology, sensors, …

• Human are characterized by linear

or sublinear growth capacity

Michele Colajanni - "Cyber Security in Industry" - CyberROAD - Cagliari, 25 May 2016 19

It’s better to switch some investments from linear

improvements to disruptive ideas if we want to avoid

that the dawn of 4th industrial revolution coincides with

human sunset It’s your time young researchers!

Page 20: Cybersecurity in industry and industrial products · Cloudification Human Machine Interfaces Augmented reality Virtual reality ... –Eager Time to Market (“get ahead of the competitors”)

Q&A

email: [email protected]

home page: Google(Michele Colajanni)