13
CONFIDENTIAL INFORMATION This document is confidential and proprietary information of Target Soft Systems. Confidential Information includes, but is not limited to, the following: Corporate, Employee and Infrastructure Information about Target Soft Systems. Target Soft Systems implementation , Training methodology, cost, project management and quality processes. Any disclosure of Confidential Information to, or use of it by a third party (i.e., a party other than authorised , will be damaging to Target Soft Systems). Ownership of all Confidential Information, no matter in what media it resides, remains with Target Soft Systems( TSS ). Confidential Information in this document shall not be disclosed outside the buyer’s proposal evaluators and shall not be duplicated, used, or disclosed – in whole or in part – for any purpose other than to evaluate this

Ravi i ot-security

Embed Size (px)

Citation preview

Page 1: Ravi i ot-security

CONFIDENTIAL INFORMATIONThis document is confidential and proprietary information of Target Soft Systems. Confidential Information includes, but is not limited to, the following: Corporate, Employee and Infrastructure Information about Target Soft Systems.

Target Soft Systems implementation , Training methodology, cost, project management and quality processes. Any disclosure of Confidential Information to, or use of it by a third party (i.e., a party other than authorised , will be damaging to Target Soft Systems). Ownership of all Confidential Information, no matter in what media it resides, remains with Target Soft Systems( TSS ). Confidential Information in this document shall not be disclosed outside the buyer’s proposal evaluators and shall not be duplicated, used, or disclosed – in whole or in part – for any purpose other than to evaluate this proposal without specific written permission of an authorized representative of Target Soft Systems.

Page 2: Ravi i ot-security

SECURITY ISSUES IN IOT

Page 3: Ravi i ot-security

• More things are being connected to address a growing range of business needs. In fact, by 2020, more than 50 billion things will connect to the Internet—seven times our human population. Examples are wearable health and performance monitors, connected vehicles, smart grids, connected oilrigs, and connected manufacturing. This Internet of Things (IoT) will revolutionize the way we work, live, play, and learn.

• Inadequate security will be a critical barrier to large-scale deployment of IoT systems and broad customer adoption of IoT applications. Simply extending existing IT security architectures to the IoT will not be sufficient. The IoT world requires new security approaches, creating fertile ground for innovative and disruptive thinking and solutions.

Page 4: Ravi i ot-security

The security challenge• Devices are not reachable

– Most of the time a device is not connected• Devices can be lost and stolen

– Makes security difficult when the device is not connected• Devices are not crypto-engines

– Strong security difficult without processing power• Devices have finite life

– Credentials need to be tied to lifetime• Devices are transportable

– Will cross borders• Devices need to be recognised by many readers

– What data is released to what reader?

4

Page 5: Ravi i ot-security

Security work in an Internet of Things

AssuranceRisk analysisDevice analysisCrypto capability and export analysis

• RFID tags will not do crypto for some yearsSecurity objective

• Privacy protection• Identity protection• Traffic analysis protection

Identity and identifier managementSeparation of identity and identifier

Page 6: Ravi i ot-security

How to secure the internet of things ?

• With the expansion of the IoT market, protecting the company's data and IP is more important than ever. Here are four ways organisations can put security at the core of the IoT value proposition

Page 7: Ravi i ot-security

SECURITY TIPS FOR ORGANIZATIONS

1. Set up an integrated team of business executives and security specialists

2. Integrate security best practice with the IoT product development process

3. Educate consumers as well as front-line staff in security best practice

4. Address privacy concerns with transparent privacy policies

Page 8: Ravi i ot-security

1. Set up an integrated team of business executives and security specialists

Product managers working alongside security specialists to plan the product roadmap will ensure security is a key consideration when designing core features and functionality. An integrated team will allow for greater collaboration, ensure the business and security concerns are well balanced and any vulnerabilities can be identified early in the product lifecycle.

Page 9: Ravi i ot-security

2. Integrate security best practice with the IoT product development process

Business leaders need to identify where their organisation might be vulnerable through an analysis of disruptive attack scenarios, and the financial and non-financial impact of an attack on the organisation as well as the users. 

Page 10: Ravi i ot-security

3. Educate consumers as well as front-line staff in security best practice

Organisations must inform and educate consumers on best practice including regularly changing passwords, which is still one of the most common causes of a security breach, and offering advice on security patches. 

Page 11: Ravi i ot-security

4. Address privacy concerns with transparent privacy policies

To protect consumers from potential data privacy breaches, businesses need to develop privacy policies that clearly detail how the data collected from IoT products will be used, and these policies should be easily accessible to consumers. 

Page 12: Ravi i ot-security
Page 13: Ravi i ot-security

THANK YOU