Internet of Things (IoT)

Slides:



Advertisements
Similar presentations
LISTING ACCESS POINT ON TOP OF THE LIST Hacking access point users By Uttam Gurung.
Advertisements

By Glenn Z.  A network is 2 or more computers connected to each other.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Part of the BRE Trust Protecting People, Property and the Planet Smart Buildings and Security: Developing a unified approach Will Lloyd BRE Global Limited,
Research Directions for the Internet of Things Supervised by: Dr. Nouh Sabry Presented by: Ahmed Mohamed Sayed.
Threats to I.T Internet security By Cameron Mundy.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Troubleshooting Windows Vista Security Chapter 4.
EDT 661 Kelly Maurer. (((DS))) (((WIRELESS PRINTER))) ((( NETBOOK ))) DESKTOP ROUTER MODEM INTERNET /DLS (FROM WALL)
Encryption and Hacking By Steph Garrihy. What is Encryption? Encryption is when data is scrambled by software using a preset key so that anyone viewing.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction to Networking. What is a Network? Discuss in groups.
ADVOCATE DIGITAL MEDIA Digitally-Focused Full Service Marketing Firm.
SECURE DATA TRANSFER Melvin Freeman The Next Step Public Charter School.
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
November 14, 2016 bit.ly/nercomp_defendingyourdata16
The Internet of Things.
2017 Security Predictions from FortiGuard Labs
Unit 3 Virtualization.
Remarks by Dr Mawaki Chango Kara University DigiLexis Consulting
What they are and how to protect against them
Firmware threat Dhaval Chauhan MIS 534.
Port Knocking Benjamin DiYanni.
Instructor Materials Chapter 6 Building a Home Network
Securing Things RIPE-74 Eliot Lear.
Identities and the internet of things
IT Security Goes Organic
IoT devices as an attack vector
Security and Smart Home Devices: How Safe Is Your Home?
Ways to protect yourself against hackers
Securing A Wireless Network
Information Technology Deanship
Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.
GCSE ICT Revision Topic 2: Connectivity.
Answer the questions to reveal the blocks and guess the picture.
Introduction to Networking
Steps to Fix the Roku 3 Issues:
National Mining University
Unit 9 Network Fundamentals
Wireless Fidelity (15881A0515).
مقدمة في الحاسب الآلي T. Arwa Alsarami.
© EIT, Author Gay Robertson, 2017
Internet of Things
D-Link Router Customer Care Number. A D-link router is a basic necessity these days with so much technology around us in offices or homes. We can connect.
The security and vulnerabilities of IoT devices
Content Management lifecycle
Cybersecurity Concepts for Engineers
Network Security: IP Spoofing and Firewall
Internet of Things (IoT)
Internet of Things Vulnerabilities
Topic 5: Communication and the Internet
Chapter 6 Networks Communicating and Sharing Resources
The Internet of Unsecure Things
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Level 2 Diploma Unit 11 IT Security
Data security in iot devices
Web Servers / Deployment
IoT Security Focus: A New Class of Security Exploits
IPv6 For IoT Mahyar Tajdini, DUT, Dec 2016.
Let’s download your textbook
Cloud and Database Security
Trust by Design: The Internet of Things
Let’s download your textbook
Cracker Barrel On IT Fun Stuff
INTERNET OF THINGS BY S DEVA PRIYA. WHAT IS IOT?  The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital.
Cleaning Up the Internet of Evil Things
Presentation transcript:

Internet of Things (IoT) Security Threats Matthew Murray

Description The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

Types of devices Routers Refrigerators Thermostats Security Cameras Home Assistants (Amazon Eco, Google Home) Wearable Technology/Implanted Devices (Apple Watch) Lights Locks Automobiles

Security Issues Many IOT devices are severely lacking in the security department. Most lack basic security, and many utilize outdated firmware. Human Error (use of default usernames and passwords). Allows hackers to quickly and easily gain access to system.

Threats DDoS Attacks Physical/Real World Ransomeware DDoS attack on DYN caused internet outages across the country. Physical/Real World Ransomeware

DDoS Attacks October 21, 2016 a large scale DDoS attack on DYN servers cause large internet outages across the United States. Many of the devices in the botnet were IOT devices such as home routers and security cameras Access was gained through the use of default login credentials.

Physical Real World Home Invasions Medical Devices By hacking IOT devices an individual could easily shut down security cameras, open door locks, and deactivate any other internet based home security features. This allows them to easily gain access to your house, car, etc. Medical Devices Some medical implant devices, such as pacemakers, have the ability to connect to Wi- Fi.

Ransomware Hackers use the classic approach when it comes to utilizing ransomware attacks on IOT devices (I.E. Locking the device and requiring payment to unlock). For many devices this isn’t a big issue because IOT data is usually stored in the cloud and devices can easily be reset. This can become an issue with medical IOT devices such as drug pumps and pacemakers. Will typically be used for timed attacks when devices cannot be easily reset.

How to be better protected Don’t use default login credentials Update firmware often. Don’t connect devices to the internet that don’t need to be connected (Personal Opinion)

Sources http://internetofthingsagenda.techtarget.com/blog/IoT-Agenda/Security-risks-from-the-internet-of-things http://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT http://www.darkreading.com/endpoint/7-imminent-iot-threats/d/d-id/1327233?image_number=1 https://iotsecurityfoundation.org/the-iot-ransomware-threat-is-more-serious-than-you-think/ http://www.zdnet.com/article/iot-devices-can-be-hacked-in-minuteswarn-researchers/ http://www.pcworld.com/article/3134056/hacking/an-iot-botnet-is-partly-behind-fridays-massive-ddos-attack.html