5th ITU Green Standards Week Jointly organized by ITU, UN-Habitat, UNESCO & UNEP The Bahamas 14-18 December 2015 IoT & Smart Cities: Balancing Risks &

Slides:



Advertisements
Similar presentations
Session 3: Safer Services in a Digital Society Security with RFID Gérald Santucci European Commission Head of Unit DG INFSO/D4.
Advertisements

Feeney Wireless Machine to Machine/Internet of Things
David Grochocki et al.  Lures Potential attackers  Smartmeters do two way communication  Millions of Meters has to be replaced  Serious damages just.
Smart Grid City: A blueprint for a connected, intelligent grid community Dennis Stephens Director, Utility Innovations and Smart Grid Investments OSI.
© 2009 IBM Corporation BRINGING A SMARTER PLANET….to life ! March 2009.
Fuel Cells & Hydrogen Joint Undertaking Stakeholders General Assembly, October 27, 2009 SmartGrids A key step in the third industrial revolution Ronnie.
Cyber Security and the Smart Grid George W. Arnold, Eng.Sc.D. National Institute of Standards and Technology (NIST) U.S. Department of Commerce
Top of Content Box Line Subtitle Line Title Line Right Margin Line Wearables: Panacea or Pandora’s Box – A Security Perspective Gary Davis | Chief Consumer.
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
UNEP 1 Sustainable Building and Construction: Building a Sustainable Future Dr Steve Halls Director International Environmental Technology Centre.
[GP1] Guiding Principles
Discovering Computers 2010
Wayne Ward Vice President, Emerging Solutions Group Sprint Nextel February 2, 2012 M2M: Catalyst for Change and Growth 2.
IOT5_ GISFI # 05, June 20 – 22, 2011, Hyderabad, India 1 Privacy Requirements of User Data in Smart Grids Jaydip Sen Tata Consultancy Services Ltd.
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
Digital Catapult Paul Galwas #DigitalCatapult. Who are we? A national centre to rapidly advance the UK’s best digital ideas.
1 ● Plant Automation Security Review of Cyber Security Attack at Maroochy Water Services ● Bradley Yager ● National Business Development Manager – Telemetry.
Cyber crime & Security Prepared by : Rughani Zarana.
INTERNET2 COLLABORATIVE INNOVATION PROGRAM DEVELOPMENT Florence D. Hudson Senior Vice President and Chief Innovation.
© 2009 IBM Corporation Let’s Build a Smarter Planet Thongchai Watanasoponwong – Country Manager Power Systems, STG September 15 th, 2009 Green IT เทคโนโลยีสีเขียวเพื่อสิ่งแวดล้อม.
Dell Connected Security Solutions Simplify & unify.
1 Identity and Transparency ( Bridging the GAPS of Governance Bridging the GAPS of Governance in eGov Initiatives in eGov Initiatives )‏ Badri Sriraman.
An Overview of the Smart Grid David K. Owens Chair, AABE Legislative Issues and Public Policy Committee AABE Smart Grid Working Group Webinar September.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
Grid-based Future Internet with Wireless sensor network By Mohammad Mehedi Hassan Student ID:
Network security Product Group 2 McAfee Network Security Platform.
Identity Assurance Emory University Security Conference March 26, 2008.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Forum on Internet of Things: Empowering the New Urban Agenda Geneva, Switzerland, 19 October 2015 The Role of Regulators and Governments in realizing the.
Internet of Things (Ref: Slideshare)
PRIVACY BY DESIGN FOR PUBLIC / PRIVATE PARTNERSHIPS FOR SECURITY EU FP7 TACTICS CCR Summit 2015, September 30t h 2015.
5 th ITU Green Standards Week Nassau, The Bahamas December 2015 DESIGNING A NATIONWIDE SMART CITY FRAMEWORK Ivan Castano, Adviser to the Deputy Director.
1 IoT for Smart Cities Where we are at and where we could be Olga Cavalli CCAT LAT Argentina Forum on "Powering Smart Sustainable Cities With the Internet.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
5 th ITU Green Standards Week Nassau, The Bahamas December 2015 Taming The IoT Security & Privacy Beast Craig Spiezle, Executive Director, Online.
Alberto Zilio, Director – Public Affairs, AT&T Europe The Connected Cities.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
A Smart Metering Scenario Jorge Cuellar, Jan Stijohann, Santiago Suppan Siemens AG.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
A Layered Solution to Cybersecurity Dr. Erfan Ibrahim Cyber-Physical Systems Security & Resilience Center National Renewable Energy Laboratory.
Internet of Things, Are You Ready?. Contents ●Introduction ●IoT Examples? ●IoT Benefits ○For Industries ○The Internet of Things In Organizations ○The.
1 Enabling Smart Cities/Campuses to Serve the Internet of People Florence Hudson Senior Vice President & Chief Innovation Officer Internet2 TNC16 June.
Andrew J Haire. Agenda  Let us define Terms…  What do we know so far  How did we get here  What are Implications to Policy Makers  What will this.
Innovative ICT Building a Better Smart City. Agenda 1. Why focus on Smart City 2. What is a Smart City 3. References.
Protecting Data, Sharing Information Graham Wakerley: Director
INDUSTRY 4.0: FROM THINGS TO OUTCOMES
A policy framework for an open and trusted Internet
Director, Energy and Sustainability Laboratory
Remarks by Dr Mawaki Chango Kara University DigiLexis Consulting
A connected home solution
The Connected Smart City
Prof John Davies, BT Future Cities: The role of IoT and Semantic Technology Transforming Data into Value: Data Interoperability & Open Data Platforms.
Lecture 14: Business Information Systems - ICT Security
How Smart Networks are Changing Corporate Networks
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Shaping smarter and more sustainable cities from WSIS to Habitat III
Topic 6: Issues Press F5 to view!
Shaping Smart Sustainable Cities
How Technology Is (R)evolutionizing Communities
How Technology Is (R)evolutionizing Communities
Internet of Things Vulnerabilities
Prof John Davies, BT Future Cities: The role of IoT and Semantic Technology Transforming Data into Value: Data Interoperability & Open Data Platforms.
Hacking the Human Body? Cyber-Bio Crossover: Implantable Medical Device (IMD) Hacking Rebecca Earnhardt, Researcher / Project Manager UMD START-Unconventional.
Home Internet Vulnerabilities
Making Our Cities Smarter and More Sustainable
Global megatrends (relevant for our business)
Internet of Things (IoT)
Presentation transcript:

5th ITU Green Standards Week Jointly organized by ITU, UN-Habitat, UNESCO & UNEP The Bahamas December 2015 IoT & Smart Cities: Balancing Risks & Rewards. What are the risks and what to do about them? Ankush Johar, Director, Wireless Federation

Index 1.The compelling need for Smart Cities 2.A Pragmatic approach to achieving Smart Cities 3.Why is mitigating security risks important?: Case Examples 4.Consumer Trust: #1 Priority. Key Challenges to building trust 5.Four pillars of success

Need for Smart Cities Urban Population is booming: – % – % – % – % It was 746 million in 1950 to 3.9 billion in The world’s urban population is expected to surpass 6 billion by 2045 There is no choice but to have Smart Cities!

Pragmatic Approach to Smart Cities ENERGY TELECOM WATER TRANSPORT SOCIAL SVCS ENVIRO SVCS WASTE EDUCATION POLICING ECONOMY HOUSING HEALTH Closed & Un-connected vertical silos of functionally- oriented service providers FROM ENERGY TELECOM WATER TRANSPORT SOCIAL SVCS ENVIRO SVCS WASTE EDUCATION POLICING ECONOMY HOUSING HEALTH SERVICE MANAGEMENT BUSINESS MANAGEMENT TECH. & DIGITAL ASSET MGMT. Innovative and Collaborative new models that connect these vertical silos. TO Nurture ‘Open Data’ platforms, that utilise ‘Smart Data’ as an asset in its own right, to create citizen centric innovations, driven & managed by ‘Smart City Stakeholder Groups’ can best address any city’s challenges and opportunities. WHAT TO DO? 1.Visionary 2.Citizen focussed 3.Digital 4.Open 5.Collaborative GUIDING PRINCIPLES

Why is mitigation of risk important? 1. US Biometric Passports with RFID – US Govt issued biometric passports with an RFID chip – This chip could be read from 30 feet away with devices available easily online. – US acknowledged this and put an aluminum mesh in the covers to protect against such reading. – A state department official later stated that keeping the passport in a radio- opaque attenuation sleeve is safer still. – Even with the sleeve, the RFID chip is readable when the passport is opened. 2. Attack on Smart City Utilities is real – US Dept of Energy demonstrated in an experiment called the “ Aurora Generator Test” that it was possible to hack into a Power Plant Control System and completely disable a connected large 1 MW diesel electric generator. This vulnerability was later patched. BUT showcased that these vulnerabilities are real. – Dec 2012, an Asian hacking group was caught attempting to infiltrate a US Water Control System research project. It was caught because of a Decoy (or a Honeypot) being in place. Evidence showed that over a dozen of these honeypots spread across eight countries were subjected to over 70 malicious attacks, some of which successfully took control of the decoy systems.

Why is mitigation of risk important? 3. Attacks on Connected Health Devices – In 2012, a famous security researcher took control of an Insulin pump 300 feet away – He showed how he was in a position to exploit it by dispensing a fatal dose of insulin remotely. – He showcased how this exploit could be used on any wirelessly connected health device including pace makers. – In Oct 2013, US Vice president Dick Cheney stated in a televised interview that the wireless capability of his heart implant had been disabled to ward off against a possible hacking assassination attempt. 4. Malicious access to Smart devices – Jan 2014, A security company reported a phishing and spam cyber attack powered by disparate smart devices – Approx 100,000 connected household appliances including Smart TVs, connected home hubs, home network routers and at least one smart refrigerator were among those compromised. – 750,000 malicious s were sent – WHY is this serious? No more than 10 s were sent per device therefore making this kind of attack extremely hard to block! – Imagine the scale of the issue with 25 Bn connected devices.

Consumer Trust: #1 Priority IoT poses key challenges to consumer security & privacy 1.Volume: Extensive & Ubiquitous data generation & collection 2.Misuse: Potential for misuse of generated & collected data & Misuse of sensors & controllers 3.Multi-point intrusion: Increase in security risk from additional intrusion points due to the connected nature 4.Ownership & Rights: Who owns the data that is generated? Can it be passed on to third parties? 5.Storage: Where and how the information that is created is transferred and stored? Data sovereignity & Residency 6.Security Level: What level of security is required to maintain privacy?

IoT success depends on these 4 pillars 1.Data Security: a.Secure By Design: Include security at the design level, through to engineering rather than after the product is engineered. b.Thorough testing before product launch c.Use smart defaults in the customer experience d.Incorporate encryption e.Support products throughout their lifecycle to patch vulnerabilities as they get revealed 2.Minimization Of Data: Collect only whats necessary. 3.Privacy By Design: Anonymise data as much as the model allows feasibly + Establish access and authorisation rights to data as it is collected, and communicate these rights when data sets are moved or stored. 4.Consent + Opt-In/Out options: Data collection enables functionality, BUT will the data be shared with others? The consumer must be informed and specific consent must be seeked. (Example: Apple Apps seek spcific consent each time location or other sensitive information is shared with the app.)

Thank You Ankush Johar, Director, Wireless Federation