Presentation is loading. Please wait.

Presentation is loading. Please wait.

Geneva, Switzerland, 15-16 September 2014 IoT (Internet of Things) and Security Mikhail Kader, DSE, Cisco ITU Workshop on “ICT Security.

Similar presentations


Presentation on theme: "Geneva, Switzerland, 15-16 September 2014 IoT (Internet of Things) and Security Mikhail Kader, DSE, Cisco ITU Workshop on “ICT Security."— Presentation transcript:

1 Geneva, Switzerland, 15-16 September 2014 IoT (Internet of Things) and Security Mikhail Kader, DSE, Cisco mkader@cisco.com ITU Workshop on “ICT Security Standardization for Developing Countries” (Geneva, Switzerland, 15-16 September 2014)

2 Geneva, Switzerland, 15-16 September 2014 2 Abstract More things are being connected to address a growing range of business needs. In fact, by 2020, more than 50 billion things will connect to the Internet—seven times our human population. Examples are wearable health and performance monitors, connected vehicles, smart grids, connected oilrigs, and connected manufacturing. This Internet of Things (IoT) will revolutionize the way we work, live, play, and learn. Inadequate security will be a critical barrier to large-scale deployment of IoT systems and broad customer adoption of IoT applications. Simply extending existing IT security architectures to the IoT will not be sufficient. The IoT world requires new security approaches, creating fertile ground for innovative and disruptive thinking and solutions.

3 Agenda Introduction Extraordinary Benefits Major Security Challenges Delivering Security Across the Extended Network 3

4 What Is the Internet of Things? The Internet of Things is the intelligent connectivity of physical devices driving massive gains in efficiency, business growth, and quality of life” 4

5 Relationship to the Internet of Everything (IoE) Networked Connection of People, Process, Data, Things People Connecting People in More Relevant, Valuable Ways Process Delivering the Right Information to the Right Person (or Machine) at the Right Time Data Leveraging Data into More Useful Information for Decision Making Things Physical Devices and Objects Connected to the Internet and Each Other for Intelligent Decision Making IoE

6 7.2 6.8 7.6 IoT Is Here Now – and Growing! Rapid Adoption Rate of Digital Infrastructure: 5X Faster Than Electricity and Telephony 50Billion “Smart Objects” 50 2010 2015 2020 0 0 40 30 20 10 BILLIONS OF DEVICES 25 12.5 Inflection Point TIMELIN E Source: Cisco IBSG, 2011 World Population

7 IoT Delivers Extraordinary Benefits

8 Cost savings, improved safety, superior service Connected Rail Operations PASSENGER SECURITY  In-station and onboard safety  Visibility into key events ROUTE OPTIMIZATION  Enhanced Customer Service  Increased efficiency  Collision avoidance  Fuel savings CRITICAL SENSING  Transform “data” to “actionable intelligence”  Proactive maintenance  Accident avoidance

9 Smart City Safety, financial, and environmental benefits CONNECTED TRAFFIC SIGNALS  Reduced congestion  Improved emergency services response times  Lower fuel usage PARKING AND LIGHTING  Increased efficiency  Power and cost savings  New revenue opportunities CITY SERVICES  Efficient service delivery  Increased revenues  Enhanced environmental monitoring capabilities

10 The Connected Car Actionable intelligence, enhanced comfort, unprecedented convenience WIRELESS ROUTER  Online entertainment  Mapping, dynamic re-routing, safety and security CONNECTED SENSORS  Transform “data” to “actionable intelligence”  Enable proactive maintenance  Collision avoidance  Fuel efficiency URBAN CONNECTIVITY  Reduced congestion  Increased efficiency  Safety (hazard avoidance)

11 … But It Also Adds Complexity Application Interfaces Infrastructure Interfaces New Business ModelsPartner Ecosystem Applications Device and Sensor Innovation Unified Platform Infrastructure APPLICATION ENABLEMENT PLATFORM APPLICATION CENTRIC INFRASTRUCTURE APPLICATION AND BUSINESS INNOVATION Data Integration Big DataAnalytics Control Systems Application Integration

12 What Comprises IoT Networks? Information Technology (IT) Operational Technology (OT) Smart Objects

13 The Flip Side: Major Security Challenges

14 IoT Expands Security Needs Converged, Managed Network Resilience at Scale Security Application Enablement Distributed Intelligence Increased Attack Surface Threat Diversity Impact and Risk Remediation Protocols Compliance and Regulation

15 What Can Breach IoT Networks? What can’t? Billions of connected devices Secure and insecure locations Security may or may not be built in Not owned or controlled by IT … but data flows through the network Any node on your network can potentially provide access to the core

16 Smart City Potential impact to services and public safety REMOTE ACCESS  Increased traffic congestion  Creation of unsafe conditions SYSTEM CONTROL  Device manipulation  Remote monitoring  Creation of unsafe conditions SERVICE MANIPULATION  Environmental degradation  System shutdown  Lost revenue

17 IT Breach via OT Network Breached via Stolen Credentials from HVAC Vendor 40 Million Credit And Debit Cards Stolen PII Stolen From 70 Million Customers Reputation Damage* 46% drop in year-over-year profit 5.3% drop in year-over-year revenue 2.5% drop in stock price CEO Fired * Source: KrebsonSecurity, May 2014

18 Unintended Security Exposures* Farm Feeding System in the U.S. Mine Ventilation System in Romania Hydroelectric Plant in the U.S. * Source: Wired, November 2013

19 Delivering Security Across the Extended Network

20 The Secure IoT Architecture – IT Plus OT! Services Application Interfaces Infrastructure Interfaces New Business ModelsPartner Ecosystem Applications Device and Sensor Innovation Application Enablement Platform Application Centric Infrastructure Security APPLICATION AND BUSINESS INNOVATION Data Integrati on Big Data Analytics Control Systems Applicati on Integrati on Network and Perimeter Security Physical Security Device-level Security / Anti-tampering Cloud-based Threat Analysis / Protection End-to-End Data Encryption Services

21 IT and OT are Inherently Different ITOT Connectivity: “Any-to-Any” Network Posture: Confidentiality, Integrity, Availability (CIA) Security Solutions: Cybersecurity; Data Protection Response to Attacks: Quarantine/Shutdown to Mitigate Connectivity: Hierarchical Network Posture: Availability, Integrity, Confidentiality (AIC) Security Solutions: Physical Access Control; Safety Response to Attacks: Non- stop Operations/Mission Critical – Never Stop, Even if Breached

22 IT/OT Converged Security Model IT DMZ OT Enterprise Network Supervisory Demilitarized Zone Automation & Control Identity Services Cloud Network Security Secure Access Application Control Config Mgmt

23 Conclusion: Securely Embrace IoT! New challenges require new thinking! avoid operational siloes networking and convergence are key a sound security solution is integrated throughout build for the future Security must be pervasive inside and outside the network device- and data-agnostic proactive and intelligent Intelligence, not data convergence, plus analytics speed is essential for real-time decisions

24 Geneva, Switzerland, 15-16 September 2014 Mikhail Kader, DSE, Cisco mkader@cisco.com


Download ppt "Geneva, Switzerland, 15-16 September 2014 IoT (Internet of Things) and Security Mikhail Kader, DSE, Cisco ITU Workshop on “ICT Security."

Similar presentations


Ads by Google