Internet of Things Top Ten. Agenda -Introduction -Misconception -Considerations -The OWASP Internet of Things Top 10 Project -The Top 10 Walkthrough.

Slides:



Advertisements
Similar presentations
Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely.
Advertisements

SEC835 OWASP Top Ten Project.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
System and Network Security Practices COEN 351 E-Commerce Security.
Chapter 7 HARDENING SERVERS.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Introduction To Windows NT ® Server And Internet Information Server.
Jonas Thomsen, Ph.d. student Computer Science University of Aarhus Best Practices and Techniques for Building Secure Microsoft.
Dec 13 th CS555 presentation1 Yiwen Wang --“Securing the DB may be the single biggest action an organization can take to protect its assets” David C. Knox.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
Glass Box Testing: Thinking Inside the Box Omri Weisman Manager, Security Research Group IBM Rational.
OWASP Mobile Top 10 Why They Matter and What We Can Do
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
OWASP Zed Attack Proxy Project Lead
VPN AND SECURITY FLAWS Rajesh Perumal Clemson University.
Security Management prepared by Dean Hipwell, CISSP
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Configuring Electronic Health Records Privacy and Security in the US Lecture f This material (Comp11_Unit7f) was developed by Oregon Health & Science University,
Cyber Security & Fraud – The impact on small businesses.
Data Security Assessment and Prevention AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Engineering Essential Characteristics Security Engineering Process Overview.
The attacks ● XSS – type 1: non-persistent – type 2: persistent – Advanced: other keywords (, prompt()) or other technologies such as Flash.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
G CITRIXHACKIN. Citrix Presentation Server 4.5 New version is called XenApp/Server Common Deployments Nfuse classic CSG – Citrix Secure Gateway Citrix.
OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
TCOM Information Assurance Management System Hacking.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
TCOM Information Assurance Management Software Hacking.
Module 7: Implementing Security Using Group Policy.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
Mr. Justin “JET” Turner CSCI 3000 – Fall 2015 CRN Section A – TR 9:30-10:45 CRN – Section B – TR 5:30-6:45.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.
Do not try any of the techniques discussed in this presentation on a system you do not own. It is illegal and you will get caught.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SECURE DEVELOPMENT. SEI CERT TOP 10 SECURE CODING PRACTICES Validate input Use strict compiler settings and resolve warnings Architect and design for.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
A Survey of IoT Security & Mitigation Tactics
Web Application Vulnerabilities
Working at a Small-to-Medium Business or ISP – Chapter 8
Canberra OWASP Chapter meeting
OWASP CONSUMER TOP TEN SAFE WEB HABITS
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
The Journey to the Internet Of Things
OWASP IoT Project The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues.
Web-Technology Lecture 11.
An Introduction to Web Application Security
An Introduction to Cloud Computing
Operating System Security
Securing Windows 7 Lesson 10.
IS4680 Security Auditing for Compliance
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Presentation transcript:

Internet of Things Top Ten

Agenda -Introduction -Misconception -Considerations -The OWASP Internet of Things Top 10 Project -The Top 10 Walkthrough

26 Billion by fold increase from 2009 in Internet of Things install base - Revenue exceeding $300 billion in $1.9 trillion in global economic impact *Gartner Internet of Things Report 2013

Misconception | It’s all about the device It’s not just about the device, or the network, or the clients There are MANY surface areas involved Each of these need to be evaluated

Considerations | A holistic approach is required All elements need to be considered The Internet of Things Device The Cloud The Mobile Application The Network Interfaces The Software Use of Encryption Use of Authentication Physical Security USB ports Enter the OWASP Internet of Things Top Ten Project

Internet of Things Top Ten Project | A complete IoT Review Review all aspects of Internet of Things Top Ten Categories Covers the entire device Without comprehensive coverage like this it would be like getting your physical but only checking one arm We must cover all surface area to get a good assessment of overall security

I1 | Insecure Web Interface

I1 | Insecure Web Interface | Testing Account Enumeration Weak Default Credentials Credentials Exposed in Network Traffic Cross-site Scripting (XSS) SQL-Injection Session Management Account Lockout

I1 | Insecure Web Interface | Make It Secure

I2 | Insufficient Authentication/Authorization

I2 | Insufficient Authentication/Authorization | Testing Lack of Password Complexity Poorly Protected Credentials Lack of Two Factor Authentication Insecure Password Recovery Privilege Escalation Lack of Role Based Access Control

I2 | Insufficient Authentication/Authorization | Make It Secure

I3 | Insecure Network Services

I3 | Insecure Network Services | Testing Vulnerable Services Buffer Overflow Open Ports via UPnP Exploitable UDP Services Denial-of-Service DoS via Network Device Fuzzing

I3 | Insecure Network Services | Make It Secure

I4 | Lack of Transport Encryption

I4 | Lack of Transport Encryption | Testing Unencrypted Services via the Internet Unencrypted Services via the Local Network Poorly Implemented SSL/TLS Misconfigured SSL/TLS

I4 | Lack of Transport Encryption | Make It Secure

I5 | Privacy Concerns

I5 | Privacy Concerns | Testing Collection of Unnecessary Personal Information

I5 | Privacy Concerns | Make It Secure

I6 | Insecure Cloud Interface

I6 | Insecure Cloud Interface | Testing Account Enumeration No Account Lockout Credentials Exposed in Network Traffic

I6 | Insecure Cloud Interface | Make It Secure

I7 | Insecure Mobile Interface

I7 | Insecure Mobile Interface | Testing Account Enumeration No Account Lockout Credentials Exposed in Network Traffic

I7 | Insecure Mobile Interface | Make It Secure

I8 | Insufficient Security Configurability

I8 | Insufficient Security Configurability | Testing Lack of Granular Permission Model Lack of Password Security Options No Security Monitoring No Security Logging

I8 | Insufficient Security Configurability | Make It Secure

I9 | Insecure Software/Firmware

I9 | Insecure Software/Firmware | Testing Encryption Not Used to Fetch Updates Update File not Encrypted Update Not Verified before Upload Firmware Contains Sensitive Information No Obvious Update Functionality

I9 | Insecure Software/Firmware | Make It Secure

I10 | Poor Physical Security

I10 | Poor Physical Security | Testing Access to Software via USB Ports Removal of Storage Media

I10 | Poor Physical Security | Make It Secure

Resources OWASP Internet of Things Top Ten List