NRENs and IoT Security: Challenges and Opportunities

Slides:



Advertisements
Similar presentations
OpenStand and Collaborative Communities For innovation, solutions and market growth Kantara Initiative 3 June 2014 Summit Karen McCabe Senior Director,
Advertisements

OpenStand Principles for the modern paradigm for standards development.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Malcolm Crompton APEC Information Privacy Framework: review, impact, & progress APEC Symposium on Information Privacy Protection in E Government & E Commerce.
IoT Trust Framework leading to self regulation code of conduct and certification models Craig Spiezle Executive Director & President Online.
1 IoT for Smart Cities Where we are at and where we could be Olga Cavalli CCAT LAT Argentina Forum on "Powering Smart Sustainable Cities With the Internet.
Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.
Information Technology Planning
Survey-Data Collection Methods
COMPLIMENTARY TEACHING MATERIALS
CS457 Introduction to Information Security Systems
A policy framework for an open and trusted Internet
Remarks by Dr Mawaki Chango Kara University DigiLexis Consulting
Cyber Security – An Existential Threat? (IIC, Singapore)
CHALLENGES AND IMPLEMENTATION OF KNOWLEDGE BASED ECONOMY IN ESTONIA
MGMT 452 Corporate Social Responsibility
2016 NC Teacher Working Conditions Survey Results
Chapter 1- Introduction
Challenges and opportunities for the CFO
Update from the Faster Payments Task Force
Combating Botnets Botnets are a complex and continuously evolving challenge to user confidence and security on the Internet. Introduction Botnets are.
Stakeholder consultations
Security of In-Vehicle Software
Attention CFOs How to tighten your belt and still survive May 18, 2017.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Information Technology Sector
Higher Education’s Role in the Identity Ecosystem
The importance of SMEs for ITU
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Control system network security issues and recommendations
OTA & IoT A Shared & Collaborative Responsibility 24 October 2017
Dr. Konstantinos Komaitis
A BIG DATA WORLD Smaller and smaller and smarter devices
HEALTH IN POLICIES TRAINING
IEEE Initiatives in Artificial Intelligence and Autonomous Systems
BRIDGING DIVIDES: towards digital dividends for all
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
Technology Standards for Interoperability: Islands or Bridges?
INTER-Iot kick-off meeting
A Better Internet for Kids through Industry collaboration Pat Manson –Inclusion, Skills & Youth Directorate General Communications Networks, Content.
Why the Multistakeholder Approach Works
presentation to the ICC Commission on the Digital Economy
COLLABORATIVE SECURITY An approach to tackling Internet
Internet Interconnection
Organization for the Advancement of Structured Information Standards
Thank you for this opportunity.
The SWA Collaborative Behaviors
Standards for the Internet of Things
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Web Services Interoperability Organization
Child Online Protection in Egypt’s National ICT Strategy
IEEE EAB Strategy 19 June 2011 New Brunswick, NJ.
Sameer Sharma, ITU 7 August, 2018 Dhaka, Bangladesh.
IoT Security and Privacy
SACF Comments on the ECA Amendment Bill B
Performance Achievement a quick reference guide to
Community Integration and Development USP Conference May 2013
A Shared and Collaborative Responsibility
The Impact of Digitization on Global Alignment of Product Safety Regulations ICPHSO International Symposium November 12, 2018.
IEEE Initiatives in Artificial Intelligence and Autonomous Systems
The SAFERtec project on V2I security assurance: concept and vision
ICT Policy سياسات تكنولوجيا المعلومات والاتصالات
Reinhard Scholl, GTSC-7 Chairman
Corporate Program Update
The Internet of Things (IoT)
Protection of Privacy Online CAIGF2017-Dushanbe, Tajikistan
New Approaches to Governance
Trust by Design: The Internet of Things
IoT: Privacy and Security
Collaborative regulation in the digital economy
Presentation transcript:

NRENs and IoT Security: Challenges and Opportunities The Internet Society 11/22/2018 NRENs and IoT Security: Challenges and Opportunities Karen O’Donoghue TNC18 Trondheim 11 June 2018

The number of IoT devices and systems connected to the Internet will be more than 2.5x the global population by 2020 (Gartner).

As more and more devices are connected, privacy and security risks increase. Used with permission. http://www.geekculture.com/joyoftech/joyarchives/2340.html

New devices, new vulnerabilities The Internet Society 11/22/2018 New devices, new vulnerabilities The attributes of many IoT devices present new and unique security challenges compared to traditional computing systems. Device Cost/Size/Functionality Volume of identical devices (homogeneity) Long service life (often extending far beyond supported lifetime) No or limited upgradability or patching Physical security vulnerabilities Access Limited user interfaces (UI) Limited visibility into, or control over, internal workings Embedded devices Unintended uses Bring Your Own Industry is not adequately addressing fundamental security, privacy and life-safety issues. Many manufacturers are new to the networking and Internet arena, and lack experience. There are STRONG competitive pressures for speed to market and cost reduction. Security and privacy cost money, require specialized skills, and slow down the development process. The proliferation of devices, and corresponding interactions with other devices, increase the “surface” available for cyberattack. Poorly secured devices affect the security of the Internet and other devices globally, not just locally.

There are two ways to view IoT Security Inward Security Focus on potential harms to the health, safety, and privacy of device users and their property stemming from compromised IoT devices and systems Outward Security Focus on potential harms that compromised devices and systems can inflict on the Internet and other users Example of outward risk: A home appliance may continue to function well as far as the direct user is concerned, and s/he may be unaware that it is part of a botnet participating in a DDoS attack Toaster example: - Someone may use it against you, and remotely decide to burn your hands our even your house (inward security related issue) Your toaster works ok but is being used for a major DDOS attack (outward) At ISOC,  our focus is on the impact that IoT security and privacy has on the Internet and other users.

How do we improve things? The Internet Society 11/22/2018 How do we improve things? Research and Innovation Open Standards Frameworks and Best Practices Certifications and Trustmarks Policy and Regulation (new technologies, better user interfaces, better development tools)

Internet Invariants 7 The Internet Society 11/22/2018 General Purpose Interoperable Building Blocks No Permanent Favorites Global Reach & Integrity Interoperability & mutual agreement We need to take a moment to remember what makes the Internet what it is and by extension what makes IoT possible. Permissionless Innovation Collaboration Accessible 7

Current standards efforts The Internet Society 11/22/2018 Current standards efforts IETF IEEE ITU W3C OASIS ISO/IEC Various consortium Etc… Right now we have a lot of standards organizations working on a lot of standards. https://xkcd.com/927/

Online Trust Alliance IoT Security & Privacy Trust Framework Measureable principles vs. standards development Consumer grade devices (home, office and wearables) Address known vulnerabilities and IoT threats Actionable and vendor neutral June 2015 kick off, consensus driven process with input from industry and policy-makers Multi-stakeholder working group – 100 plus participants Face-To-Face meetings / Public Call for Comments Ongoing refinement Working Group Focus https://otalliance.org/iot/

Online Trust Alliance IoT Security & Privacy Trust Framework The Internet Society 11/22/2018 Online Trust Alliance IoT Security & Privacy Trust Framework Four Key Areas: Security Principles (1-12) User Access & Credentials (13-17) Privacy, Disclosures & Transparency (18-33) Notifications & Related Best Practices (34- 40) June 2015 kick off, consensus driven process with input from industry and policy-makers Multi-stakeholder working group – 100 plus participants Face-To-Face meetings / Public Call for Comments Ongoing refinement Working Group Focus Perfection the enemy of good Measureable principles vs. standards development Consumer grade devices (home, office and wearables) Address known vulnerabilities and IoT threats Actionable and vendor neutral https://otalliance.org/iot/ https://otalliance.org/system/files/files/initiative/documents/iot_trust_framework6-22.pdf

Enterprise IoT Security Checklist Set of Best Practices for Enterprises be proactive and fully consider the possible risks introduced by these devices; understand that IoT devices are likely more vulnerable than traditional IT devices; educate users on IoT device risks; and strike a balance between controlling IoT devices vs creating “shadow IoT.” https://otalliance.org/system/files/files/initiative/d ocuments/enterprise_iot_checklist.pdf

Who is responsible? Developers and users of IoT devices and systems have a collective obligation to ensure they do not expose others and the Internet itself to potential harm To scale up we need a collective approach, addressing security challenges on all fronts.

Where does the NREN community fit into this picture? NRENs have historically led the way in innovation for the Internet. NRENs are: Consumers Operators Policy makers Developers Technical Leaders

Possible NREN Roles and Actions Consumers Exercise procurement power

Possible NREN Roles and Actions Consumers Exercise procurement power Operators Build smartly

Possible NREN Roles and Actions Consumers Exercise procurement power Operators Build smartly Policy makers Rule wisely

Possible NREN Roles and Actions Consumers Exercise procurement power Operators Build smartly Policy makers Rule wisely Developers Implement cautiously

Possible NREN Roles and Actions Consumers Exercise procurement power Operators Build smartly Policy makers Rule wisely Developers Implement cautiously Technical Leaders Participate

Enhancing Privacy in IoT The Internet Society 11/22/2018 Enhancing Privacy in IoT Strategies need to be developed that respect individual privacy choices across a broad spectrum of expectations, while still fostering innovation in new technologies and services. Traditional online privacy models may not fit Challenges in adapting or adopting basic privacy principles, such as: Transparency/Openness Meaningful Choice Data Minimization Use Limitation Opportunities to opt out

The Internet Society 11/22/2018 Hot off the presses… Clearly Opaque Privacy Risks of the Internet of Things Hot off the presses 151 pages (yikes), but the executive summary is Coming soon from the Internet Society: IoT Privacy for Policymakers Authors: Dr. Gilad Rosner and Erin Kenneally, J.D. https://www.iotprivacyforum.org/clearlyopaqu e/

Privacy Rules and Regulations Policies and Regulations may be needed. Let’s help to ensure these rules and regulations are correct, necessary and sufficient. https://www.internetsociety.org/resources/2018/iot -security-for-policymakers/

Additional Internet Society IoT Resources The Internet Society 11/22/2018 Additional Internet Society IoT Resources https://www.internetsociety.org/iot

Final thoughts… The Internet of Things is here and growing (be wary but not afraid). NRENs are uniquely positioned to help lead the way forward to a healthy Internet ecosystem. Use your NREN super powers wisely to: Buy, Build, Rule, Implement, and Participate in the emerging IoT Ecosystem

Thank You! Acknowledgements Steve Olshansky Robin Wilton Jeff Wilbur (and the whole OTA team) … and a cast of thousands Thank You!

Questions? http://www.dailymail.co.uk/news/article-2284287/Youre-going-wrong-way-Moment- confused-fish-tried-swim-opposite-direction-hundreds-companions-enormous-shoal.html

Thank You The Internet Society 11/22/2018 Karen O’Donoghue odonoghue@isoc.org www.internetsociety.org/IoT