Download presentation
Presentation is loading. Please wait.
1
Cybersecurity Concepts for Engineers
James Kritikos Michelle le
2
What - Context Internet of things devices becoming more popular
More devices, more opportunities for hackers Mirai Botnet: Hacked IOT devices Hacking of cars Security must be a priority in the design, not an afterthought
3
WHO Engineering Students of all disciplines
Designers of systems that involve software Should understand most common problems
4
Why? Privacy Risks Safety Risks More IOT sensors, more cloud data
Financial Information Health Information Safety Risks Critical products depend on software Stoves, Ovens Cars Medical Devices
5
Why Again? PEO: Duty to public welfare is paramount
Engineers should understand their role in the security design
6
How? (OWASP) Open Web Application Security Project OWASP Top 10
OWASP Top 10 Understand most common vulnerabilities
7
Untrusted Input Mishandling user submitted data
Never use untrusted data as-is Enter a temperature: _____ “dog” Is “dog” > -40 ? Error Unexpected behavior can lead to exploitation
8
BEWARE OF DEFAULTS Designing an electronic door lock
Off the shelf products: Raspberry Pi Linux OS Is Wi-Fi on by default? FTP? Printer Services? Firewall Enabled? Remove unnecessary pieces, reduce attack surface Make conscious decisions about settings
9
Logging and Alerts Many IOT devices have server-side components
E.g. Smart thermostat allowing remote control Detect abnormal behavior quickly In 2016, identifying a breach took an average of 191 days (Ponemon Institute, 2017) If hacking attempts are not detected, the likelihood of a successful attack approaches 100%. (OWASP, 2017) [1]: Cost of Data Breach Study. Ponemon Institue and IBM Security. (2017). Retrieved from [2]: The OWASP Foundation OWASP Top 10 – 2017, The Ten Most Critical Web Application Security Risks. (2017). Retrieved from
10
Conclusion Non-software products are running software
Engineers across disciplines are dealing with software Engineers must have knowledge of security and best practices
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.