Securing Things RIPE-74 Eliot Lear.

Slides:



Advertisements
Similar presentations
EMERGING TOPICS IN DATA, APPLICATION AND INFRASTRUCTURE PROTECTION Taher Elgamal ITU
Advertisements

 Cloud computing is one of the more recent technologies that many businesses, individuals and other industry organizations believe to by one of the keys.
Bill Gates’ RSA 2006 Keynote presentation Questions and answers.
Chapter 3 Introduction to Computing Chapter 3 Structures in Computing William Johnson Julia Benson-Slaughter
For more notes and topics visit:
What do you know about your network Or maybe you don’t know who’s really there.
CREDIBLE SOURCES Don’t Listen to the Village Idiot.
1. What does the text say? After actively reading the article and talking to the text, you are ready to tackle the 4 square. The first box is asking for.
May 21 st 2011 R.V. Raman Global Embedded Conference India 2011.
Thank you/Appreciate time Intro me- Manage channel last 2 years
Cyber Info Gathering Techniques
Technology Audit Brandon Hall.
Information Technology Acceptable Use An Overview
Remarks by Dr Mawaki Chango Kara University DigiLexis Consulting
Online Canon Printer Support & Customer Services
3 Do you monitor for unauthorized intrusion activity?
Internet of Things (IoT)
3.6 Fundamentals of cyber security
Office 365 is cloud-based productivity, hosted by Microsoft.
GENUS Virtualisation Service for GÉANT and European NRENs
Cisco 2017 Security Annual Report
Cloud adoption NECOOST Advisory | June 2017.
Chapter 4 Enterprise Systems
Prepared by: Assistant prof. Aslamzai
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Gateway Discussion.
Crystal Lake Public Library Gadget Group Training August 2016
Dan Bieler, Principal Analyst
Accessibility to the internet
Therry van der Burgt, M.Sc.
Uptime Made Easy SIMPLE STABLE TRUSTED AVAILABLE.
IoT Diagram Template IBM Cloud Architecture Center
7A Newscast Warm-up Vocabulary Welcome a 4-day official visit
Lesson 2-9 AP Computer Science Principles
SMART GRID IRELAND.
How java is better than other languages according to history and uses.
Office 365 Enterprise Value
YES useful priority Sponsored Measurable Actionable
Module 3 Selling Security
What All Is Included In Network Services?. Network Service is a platform on which the business runs Provides fast & dependable data, voice, and video.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Industrial Control Systems Security Market to reach $7bn by 2024: Global.
Norton customer support Number
Call AVG Antivirus Support | Fix Your PC
Cyber-security and IEC International Standards
Lesson #7 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 7 Configuring Devices and Updates.
Bell Ringer Open your student workbook and turn to page 49.
Transform your school with the power of the cloud
“That’s P-a-r-l-a-y not P-a-r-l-e-z!” Richard Kett BT ACE
Feedback for Group Discussions
Windows 10 Enterprise E3 for Small and Medium Business
Introduction to Servers
API Management Diagram Icons
How to address security, cost, IT and migration concerns
Automating Profitable Growth™
Cyber security and Computer Misuse
The MobileIron® Threat Detection difference:
Case Study for Information Management 資訊管理個案
Smart Home Technology State AT Program Leadership Symposium
3 Do you monitor for unauthorized intrusion activity?
Security Diagram Template
Done by:Thikra abdullah
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Hybrid Integration Diagram Template
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Enterprise Networking Market Size to Exceed $90 bn by 2025 Growing at CAGR.
Web Application Diagram Template
OCI – VPN Connect Internet Customer Premises
Cybersecurity Simplified: Phishing
3 Do you monitor for unauthorized intrusion activity?
Chapter 3 Software.
Presentation transcript:

Securing Things RIPE-74 Eliot Lear

What do we wish to avoid

The REAL Problem: Number of Types of Things If we simply talk about 50bn things, we are missing the point. Apple has 1bn things and knows how to manage them. So does Google. Our problem is the number of types of things. We don’t even know how to count types of things. $ $

Who are the actors? Consumers / Enterprises Manufacturers Use the things and connect them to the their networks Manufacturers Build the things May run services the things use Provide updates to things (hopefully) Network vendors Provide infrastructure to consumers and service providers Service Providers Connect consumers and enterprises to the Internet Governments Provide regulatory frameworks ???

What makes things different? Single or small number of uses Thermostat Sling Box Lightbulb Door lock HVAC Thing Manufacturers are experts in their domains, and not networking.

A common design pattern: the cloud Clouds offer- A rendezvous point Substantial processing power Cloud capabilities will continue to expand.

General Threats To Defend Against Attacker causes device to not perform its function or to malfunction Attacker uses device to attack other systems By AMIR MARINE (Wikimedia) - Own work, CC BY-SA 3.0,

Who do we ask questions of? Consumers are not in a good position to determine what access a Thing needs Never ask someone a question if you have no reason to believe they know the answer Manufacturers know the answer to the question We need to ask them How to present this back to the consumer?

Questions What role do service providers want to play? What role can service providers play? What do we need from manufacturers? What is the role of governments?

Discussion