SlideShare ist ein Scribd-Unternehmen logo
1 von 70
Downloaden Sie, um offline zu lesen
WEBINAR
AUTHENTICATING “THINGS”
THE PITFALLS AND PROMISES
OF AUTHENTICATION IN THE CONSUMER IoT
JUNE 2016
MICHAEL THELANDER
2
3
AGENDA
1
2
3
WHAT’S SO
REVOLUTIONARY?
Industrial vs. Consumer IoT
Unexpected risks and rewards
AUTHENTICATION IN THE IoT
Authentication standards & guidelines
“Three from Three” Guidance
IF AUTHENTICATION FAILS
New and frightening hacks
What’s next?
4 YOU ARE YOUR DEVICE Your device as your proxy
WHAT’S SO
REVOLUTIONARY…
ABOUT THE INTERNET OF THINGS?
5
A MERCANTIL E REVOL UTION
Guns, cloth, iron
and beer
Slaves, gold, spices
Slaves, raw sugar,
and molasses
Whale oil, lumber, cotton,
rum and tobacco
The crown
orchestrated a
complex
global dance
that leveraged
the best
knowledge
and the most
favorable
terms
anywhere in
the world.
6
A MERCANTIL E REVOL UTION
At the top of the
pyramid, Great Britain
used these imports to
manufacture and
distribute complex
products that created
vast wealth and
power.
7
A MERCANTIL E REVOL UTION
Closer to the raw materials needed for production
Respond immediately to change
Intimate understanding ofall parts of a complex process
Organize and manage their own markets
8
That’s a bit like what’s happening
in the industrial IoT today.
9
MIC H A E L T H E LA N DE R
P R O D U C T M A R K E T I N G M A N A G E R , A U T H E N T I C A T I O N
n Manages go-to-market, launch and customer education activities for
iovation’s authentication products.
n 20 years in VP- and director-level product management and
marketing roles for technology and information security companies.
10
11
12
13
14
15
16
17
18
What about the consumer IoT?
19
TWO F ACES OF THE Io T
K E Y D I F F E R E N C E S B E T W E E N I N D U S T R I A L A N D C O N S U M E R I o T
• Security and privacy standards
and guidelines are an inherent
part of the picture
• Device lifespan can be
measured in decades
• Criticality of RTOS
• Continuity of data is a major
consideration
INDUSTRIAL IoT
• Minimal attention to security
standards and guidelines,
consumers blasé about privacy
• Device lifespan can be
measured in months
• Less-than-critical infrastructure in
most current cases
• Expected gaps in data flow
CONSUMER IoT
20
21
22
23
24
25
“The smartphone
will become the
foundational banking
tool.”
26
27
28
29
Security. Privacy.
30
“B IG DATA” B ECOMES PERSONAL
INTERNET-CONNECTED DEVICES
4.9 B in 2015
20.8 B in 2020
450%
10,000 EB in 2015
400%
40,000 EB in 2020
STORAGE REQUIRED FOR THE DATA
(One exabyte can hold 500 to 1000 times
the entire content of the Library of Congress.)
31
“B IG DATA” B ECOMES PERSONAL
10,000 EB in 2015
40,000 EB in 2020
STORAGE REQUIRED FOR THE DATA
(One exabyte can hold 500 to 1000 times
the entire content of the Library of Congress.)
= 20,800 GB
400%
32
AUTHENTICATION
IN THE IoT
34
Authentication.
35
“Hello.
It’s me”.
36
“Hello.
It’s me”.
37
“Hello.
It’s me”.
38
“Hello.
It’s me”.
39
“Hello.
It’s me”.
40
“Hello.
It’s me”.
41
42
“These technical guidelines cover remote digital authentication of human users to IT systems
over a network… However do not specifically address machine-to-machine
(such as router-to-router) authentication, or establish specific requirements for issuing
authentication credentials and authenticators to machines and servers when
they are used in authentication protocols with people.”
However do not specifically address machine-to-machine
(such as router-to-router) authentication, or establish specific requirements for issuing
authentication credentials and authenticators to machines and servers when
they are used in authentication protocols with people.”
New
v 63-3
Due
Soon
43
44
THREE F ROM THREE
G U I D A N C E F R O M T H R E E P I E C E S O F R E C E N T R E S E A R C H
45
“Others have pointed to the need to research
methods that provide context-based authentication
as a new factor in an authentication process. .”
46
1. Identity Relationship Management (IRM) replaces IAM
n Consumers and things over employees
n Internet-scale over Enterprise-scale
n Borderless over perimeter
2. Use of smartphones as a primary means of authentication in the IoT
n Context-based authentication over MFA
n Enterprise-level local authentication to IoT devices
n Single sensor for multiple authentication methods:
THREE F ROM THREE: CSA
C L O U D S E C U R I T Y A L L I A N C E – I R M A N D S M A R T P H O N E S
47
3. Leverage the security controls built into standards-based IoT protocols
THREE F ROM THREE: CSA
I o T S E C U R I T Y F O R C O N S U M E R D E V I C E S
Protocol M2M Auth Options
MQTT Username / password
CoAP
preShared Key
rawPublicKey
XMPP Multiple options
DDS
x.509 Certificates (PKI)
Tokens
Protocol M2M Auth Options
Zigbee Pre-shared keys
Bluetooth Shared key
Bluetooth LE
Connection signature
resolving key
HTTP/REST TLS or OAUTH 2
48
3. Leverage the security controls built into standards-based IoT protocols
THREE F ROM THREE: CSA
C L O U D S E C U R I T Y A L L I A N C E S U M M A R S Y G U I D A N C E O N I o T
• Low memory: works on micro-
controllers was low as 10 KiB of RAM
• Default choice of DTLS parameters
is equivalent to 3072-bit RSA keys
• CoAP integrates with XML, JSON,
CBOR, or data format of choice
• REST model integrates with typical
sites and applications
49
“No single method for peer authentication and end-to-
end data protection meets the Internet of Things (IoT)
device security and operational requirements.”
50
1. Mobile devices can be
gateways, consumers, or
IoT nodes
THREE F ROM THREE: GARTNER
I T ’ S N O T J U S T A P H O N E
51
2. Understand domains, classes of
devices, and “delegation of trust”
n Class 1: Simple sensors or actuators
n Class 2: Can perform storage or analysis,
e.g. hubs, concentrator, gateways
n Class 3: Complex devices, servers than
can act as aggregators, e.g. security
analytics
THREE F ROM THREE: GARTNER
N O T A L L D E V I C E S A R E C R E A T E D E Q U A L
52
3. Building a trust model based
on “hops”
n No hop: trust is achieved by device
authenticating to local gateway
n Single hop: Device authenticates to
gateway, and gateway to an IoT service
or application
n Multihop: Trust achieved by devices
authenticating to trust anchors
(gateways), and then the trust anchors
federate trust across all required
domains and trust models
THREE F ROM THREE: GARTNER
T R U S T M O D E L S M A T T E R
53
“Authentication is the process of verification that an
individual, entity or website is who it claims to be.”
54
1. The only guidance using three different perspectives:
n Manufacturer IoT Guidance: The goal of this section is help
manufacturers build more secure products in the Internet of Things
space.
n Developer IoT Guidance: The goal of this section is help developers
build more secure applications in the Internet of Things space.
n Consumer IoT Guidance: The goal of this section is help consumers
purchase secure products in the Internet of Things space.
THREE F ROM THREE: OWASP
I o T S E C U R I T Y G U I D A N C E I N T H R E E C A T E G O R I E S
55
2. A comprehensive framework:
n 1 IoT Framework Security
Considerations: Definitions
n 2 Edge: Framework Considerations
for Edge Component
n 3 Gateway: Framework
Considerations for Gateway
Component
n 4 Cloud: Framework Considerations
for Cloud Component
n 5 Mobile: Framework Considerations
for Mobile Component
THREE F ROM THREE: OWASP
M U L T I - P A R T S E C U R I T Y A N D P R I V A C Y F R A M E W O R K
• Communications encryption
• Storage encryption
• Strong logging
• Auto updates / versioning
• Update verification
• Cryptographic ID capabilities
• No default passwords
• Offline security features
• Configurable root trust store
• Device and owner
authentication
• Transitive ownership
capabilities
• Defensive capabilities
• Plugin or ext. verify, report,
update
• Secure M2M
• Secure Web interface
• Utilize established protocols
• Latest, updated 3rd
-party
components
• Use of hardware device
• Support MFA
• Temporal and spacial
authentication
• Tracks data from insecure
sources
• Features disabled by default
• Written in programming
languages that possess
security countermeasures
• Device monitoring and
management capabilities
2 Edge: Framework Considerations
for Edge Component
56
3. Provides a unique focus on authentication testing
THREE F ROM THREE: OWASP
F O C U S O N T E S T I N G
n Assess the solution for the use of
strong passwords where authentication
is needed
n Assess the solution for multi-user
environments and ensure it includes
functionality for role separation
n Assess the solution for Implementation
two-factor authentication where
possible
n Assess password recovery mechanisms
n Assess password recovery mechanisms
n Assess the solution for the option to
require strong passwords
n Assess the solution for the option to
force password expiration after a
specific period
n Assess the solution for the option to
change the default username and
password
57
9
1. Identity relationship
management – not
IAM – is key
2. Smartphones will be
the primary means
of authentication in
the IoT
3. Leverage built-in
security controls
4. Mobile devices will
fill multiple roles in
the IoT scheme
5. Domains & classes
drive delegation of
trust models
6. Build your trust
model based on
“hops”
7. Multiple perspectives
matter
8. Provides a
comprehensive
framework
9. Provides a unique
authentication
focus
SUMMARIZING THE “THREE F ROM THREE”
AUTHENTICATION FAIL
INTRIGUING HACKS IN THE IoT
59
60
61
YOU ARE YOUR DEVICE
YOUR TRUSTWORTHY PROXY?
63
“Hello.
It’s me”.
64
“Hello.
It’s me”.
65
66
BIOMETRICS
IP ADDRESS JAILBROKEN
OR ROOTED
GEO LOCATION
ASSOCIATIONSSECURITY RISK
67
n MD5 Hash of the full font list
n Random sample of 15 fonts
n Flash SharedObjects not writable
n Flash socket 843 based ip (real IP)
n Boolean indicator: flash took longer
than expected to execute
n Accepted Char Sets in HTTP header
n Accepted languages in HTTP header
n Browser user agent comment string
n Browser name / OS / Ver / language
n Cookie writes excluded
n Boolean indicator, javascript enabled
n Count of fonts in the full list
n Flash 3-part version (16.0.0)
n Flash 4-part version (16.0.0.305)
n List of browser plugins
n JavaScript screen resolution
n Simbar toolbar GUID from HTTP hdr
n Timezone offset in minutes
n ... and more
n WiFi (or Bluetooth) MAC Address
n Network configuration
n iOS Device Model
n Battery level / AC mode
n Device orientation
n File system size
n Physical memory
n CPU Type / Count /Speed
n Number attached accessories
n Has proximity sensor?
n Screen brightness and resolution
n System uptime
n iOS Device Name (MD5 Hash)
n OS Name and/or version
n Device advertising UUID
n Kernel version
n iCloud Ubiquity Token
n Application Vendor UUID /name/vers
n Locale language / currency code
n … and 100s more
n Model and Device Model
n Build.DEVICE & Build.HARDWARE
n Build.HOST & Build.ID
n Manufacturer
n Build.PRODUCT & Build.TIME
n Network Operator ID & Name
n Sim Operator ID & Country
n System Uptime in Seconds
n Is the device plugged in
n CPU Type
n Physical memory
n Unique build fingerprint of app
n Android SDK Level
n Android Build Number (DISPLAY)
n Android Device System Version
n Detected attempt at hiding root detect
n Kernel Version (was AKV)
n Android Locale Country Code
n Desktop Wallpaper Hash
n … and 100s more
DEVICE-BASED AUTHENTICATION
THE USER’S DEVICE AS A ROBUST, INVISIBLE SECOND FACTOR
Web Device Print iOS SDK Android SDK
68
Q&A
CONTACT US
www.iovation.com
twitter.com/iovation

Weitere ähnliche Inhalte

Was ist angesagt?

IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9Arvind Tiwary
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and ChallengesOWASP Delhi
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain ProxyIRJET Journal
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalFrank Siepmann
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 Tonex
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityTutun Juhana
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmIJSRED
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016David Glover
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay KumarOWASP Delhi
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 

Was ist angesagt? (20)

IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay Kumar
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 

Andere mochten auch

Delegation-based Authentication and Authorization for the IP-based IoT
Delegation-based Authentication and Authorization for the IP-based IoTDelegation-based Authentication and Authorization for the IP-based IoT
Delegation-based Authentication and Authorization for the IP-based IoTJoon Young Park
 
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...Real-Time Innovations (RTI)
 
40 IOT Innovations which are changing life
40 IOT Innovations which are changing life40 IOT Innovations which are changing life
40 IOT Innovations which are changing lifeRam N Kumar
 
Intro Lora - Makers.ID Meetup
Intro Lora - Makers.ID MeetupIntro Lora - Makers.ID Meetup
Intro Lora - Makers.ID MeetupMif Masterz
 
PEM1: Device Authentication in IIOT ( Predix Transform 2016)
PEM1:  Device Authentication in IIOT ( Predix Transform 2016)PEM1:  Device Authentication in IIOT ( Predix Transform 2016)
PEM1: Device Authentication in IIOT ( Predix Transform 2016)Predix
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 pptMhae Lyn
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsVala Afshar
 

Andere mochten auch (10)

Delegation-based Authentication and Authorization for the IP-based IoT
Delegation-based Authentication and Authorization for the IP-based IoTDelegation-based Authentication and Authorization for the IP-based IoT
Delegation-based Authentication and Authorization for the IP-based IoT
 
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
 
40 IOT Innovations which are changing life
40 IOT Innovations which are changing life40 IOT Innovations which are changing life
40 IOT Innovations which are changing life
 
IoT: LoRa and Java on the PI
IoT: LoRa and Java on the PIIoT: LoRa and Java on the PI
IoT: LoRa and Java on the PI
 
Intro Lora - Makers.ID Meetup
Intro Lora - Makers.ID MeetupIntro Lora - Makers.ID Meetup
Intro Lora - Makers.ID Meetup
 
PEM1: Device Authentication in IIOT ( Predix Transform 2016)
PEM1:  Device Authentication in IIOT ( Predix Transform 2016)PEM1:  Device Authentication in IIOT ( Predix Transform 2016)
PEM1: Device Authentication in IIOT ( Predix Transform 2016)
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
LoRa and NB-IoT
LoRa and NB-IoT LoRa and NB-IoT
LoRa and NB-IoT
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Ähnlich wie AuthentiThings: The Pitfalls and Promises of Authentication in the IoT

Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
IoT-market-estimative
IoT-market-estimativeIoT-market-estimative
IoT-market-estimativeCleber Gomes
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Davide Cioccia
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsBeyondTrust
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyBlock Armour
 
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014Brian Knopf
 
Rebooting the IOT - ACC Conference
Rebooting the IOT - ACC ConferenceRebooting the IOT - ACC Conference
Rebooting the IOT - ACC ConferenceRob Van Den Dam
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)TI Safe
 
Chariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsChariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsVandana Verma
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSource Code Control Limited
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT SuccessElectric Imp
 
IoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation TrackIoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation TrackPriyanka Aash
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsWHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsSymantec
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of ThingsIRJET Journal
 

Ähnlich wie AuthentiThings: The Pitfalls and Promises of Authentication in the IoT (20)

Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
IoT-market-estimative
IoT-market-estimativeIoT-market-estimative
IoT-market-estimative
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
 
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Rebooting the IOT - ACC Conference
Rebooting the IOT - ACC ConferenceRebooting the IOT - ACC Conference
Rebooting the IOT - ACC Conference
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
 
Chariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsChariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_Infosecgirls
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
Internet of Things (IoT
Internet of Things (IoTInternet of Things (IoT
Internet of Things (IoT
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
IoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation TrackIoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation Track
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsWHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of Things
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of Things
 

Mehr von TransUnion

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...TransUnion
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesTransUnion
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipTransUnion
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar TransUnion
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4TransUnion
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayTransUnion
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedTransUnion
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalTransUnion
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingTransUnion
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...TransUnion
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemTransUnion
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropeTransUnion
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsTransUnion
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report HighlightsTransUnion
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityTransUnion
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...TransUnion
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...TransUnion
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...TransUnion
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...TransUnion
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...TransUnion
 

Mehr von TransUnion (20)

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data Strategies
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data Stewardship
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
 

Kürzlich hochgeladen

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

AuthentiThings: The Pitfalls and Promises of Authentication in the IoT

  • 1. WEBINAR AUTHENTICATING “THINGS” THE PITFALLS AND PROMISES OF AUTHENTICATION IN THE CONSUMER IoT JUNE 2016 MICHAEL THELANDER
  • 2. 2
  • 3. 3 AGENDA 1 2 3 WHAT’S SO REVOLUTIONARY? Industrial vs. Consumer IoT Unexpected risks and rewards AUTHENTICATION IN THE IoT Authentication standards & guidelines “Three from Three” Guidance IF AUTHENTICATION FAILS New and frightening hacks What’s next? 4 YOU ARE YOUR DEVICE Your device as your proxy
  • 5. 5 A MERCANTIL E REVOL UTION Guns, cloth, iron and beer Slaves, gold, spices Slaves, raw sugar, and molasses Whale oil, lumber, cotton, rum and tobacco The crown orchestrated a complex global dance that leveraged the best knowledge and the most favorable terms anywhere in the world.
  • 6. 6 A MERCANTIL E REVOL UTION At the top of the pyramid, Great Britain used these imports to manufacture and distribute complex products that created vast wealth and power.
  • 7. 7 A MERCANTIL E REVOL UTION Closer to the raw materials needed for production Respond immediately to change Intimate understanding ofall parts of a complex process Organize and manage their own markets
  • 8. 8 That’s a bit like what’s happening in the industrial IoT today.
  • 9. 9 MIC H A E L T H E LA N DE R P R O D U C T M A R K E T I N G M A N A G E R , A U T H E N T I C A T I O N n Manages go-to-market, launch and customer education activities for iovation’s authentication products. n 20 years in VP- and director-level product management and marketing roles for technology and information security companies.
  • 10. 10
  • 11. 11
  • 12. 12
  • 13. 13
  • 14. 14
  • 15. 15
  • 16. 16
  • 17. 17
  • 18. 18 What about the consumer IoT?
  • 19. 19 TWO F ACES OF THE Io T K E Y D I F F E R E N C E S B E T W E E N I N D U S T R I A L A N D C O N S U M E R I o T • Security and privacy standards and guidelines are an inherent part of the picture • Device lifespan can be measured in decades • Criticality of RTOS • Continuity of data is a major consideration INDUSTRIAL IoT • Minimal attention to security standards and guidelines, consumers blasé about privacy • Device lifespan can be measured in months • Less-than-critical infrastructure in most current cases • Expected gaps in data flow CONSUMER IoT
  • 20. 20
  • 21. 21
  • 22. 22
  • 23. 23
  • 24. 24
  • 25. 25 “The smartphone will become the foundational banking tool.”
  • 26. 26
  • 27. 27
  • 28. 28
  • 30. 30 “B IG DATA” B ECOMES PERSONAL INTERNET-CONNECTED DEVICES 4.9 B in 2015 20.8 B in 2020 450% 10,000 EB in 2015 400% 40,000 EB in 2020 STORAGE REQUIRED FOR THE DATA (One exabyte can hold 500 to 1000 times the entire content of the Library of Congress.)
  • 31. 31 “B IG DATA” B ECOMES PERSONAL 10,000 EB in 2015 40,000 EB in 2020 STORAGE REQUIRED FOR THE DATA (One exabyte can hold 500 to 1000 times the entire content of the Library of Congress.) = 20,800 GB 400%
  • 32. 32
  • 41. 41
  • 42. 42 “These technical guidelines cover remote digital authentication of human users to IT systems over a network… However do not specifically address machine-to-machine (such as router-to-router) authentication, or establish specific requirements for issuing authentication credentials and authenticators to machines and servers when they are used in authentication protocols with people.” However do not specifically address machine-to-machine (such as router-to-router) authentication, or establish specific requirements for issuing authentication credentials and authenticators to machines and servers when they are used in authentication protocols with people.” New v 63-3 Due Soon
  • 43. 43
  • 44. 44 THREE F ROM THREE G U I D A N C E F R O M T H R E E P I E C E S O F R E C E N T R E S E A R C H
  • 45. 45 “Others have pointed to the need to research methods that provide context-based authentication as a new factor in an authentication process. .”
  • 46. 46 1. Identity Relationship Management (IRM) replaces IAM n Consumers and things over employees n Internet-scale over Enterprise-scale n Borderless over perimeter 2. Use of smartphones as a primary means of authentication in the IoT n Context-based authentication over MFA n Enterprise-level local authentication to IoT devices n Single sensor for multiple authentication methods: THREE F ROM THREE: CSA C L O U D S E C U R I T Y A L L I A N C E – I R M A N D S M A R T P H O N E S
  • 47. 47 3. Leverage the security controls built into standards-based IoT protocols THREE F ROM THREE: CSA I o T S E C U R I T Y F O R C O N S U M E R D E V I C E S Protocol M2M Auth Options MQTT Username / password CoAP preShared Key rawPublicKey XMPP Multiple options DDS x.509 Certificates (PKI) Tokens Protocol M2M Auth Options Zigbee Pre-shared keys Bluetooth Shared key Bluetooth LE Connection signature resolving key HTTP/REST TLS or OAUTH 2
  • 48. 48 3. Leverage the security controls built into standards-based IoT protocols THREE F ROM THREE: CSA C L O U D S E C U R I T Y A L L I A N C E S U M M A R S Y G U I D A N C E O N I o T • Low memory: works on micro- controllers was low as 10 KiB of RAM • Default choice of DTLS parameters is equivalent to 3072-bit RSA keys • CoAP integrates with XML, JSON, CBOR, or data format of choice • REST model integrates with typical sites and applications
  • 49. 49 “No single method for peer authentication and end-to- end data protection meets the Internet of Things (IoT) device security and operational requirements.”
  • 50. 50 1. Mobile devices can be gateways, consumers, or IoT nodes THREE F ROM THREE: GARTNER I T ’ S N O T J U S T A P H O N E
  • 51. 51 2. Understand domains, classes of devices, and “delegation of trust” n Class 1: Simple sensors or actuators n Class 2: Can perform storage or analysis, e.g. hubs, concentrator, gateways n Class 3: Complex devices, servers than can act as aggregators, e.g. security analytics THREE F ROM THREE: GARTNER N O T A L L D E V I C E S A R E C R E A T E D E Q U A L
  • 52. 52 3. Building a trust model based on “hops” n No hop: trust is achieved by device authenticating to local gateway n Single hop: Device authenticates to gateway, and gateway to an IoT service or application n Multihop: Trust achieved by devices authenticating to trust anchors (gateways), and then the trust anchors federate trust across all required domains and trust models THREE F ROM THREE: GARTNER T R U S T M O D E L S M A T T E R
  • 53. 53 “Authentication is the process of verification that an individual, entity or website is who it claims to be.”
  • 54. 54 1. The only guidance using three different perspectives: n Manufacturer IoT Guidance: The goal of this section is help manufacturers build more secure products in the Internet of Things space. n Developer IoT Guidance: The goal of this section is help developers build more secure applications in the Internet of Things space. n Consumer IoT Guidance: The goal of this section is help consumers purchase secure products in the Internet of Things space. THREE F ROM THREE: OWASP I o T S E C U R I T Y G U I D A N C E I N T H R E E C A T E G O R I E S
  • 55. 55 2. A comprehensive framework: n 1 IoT Framework Security Considerations: Definitions n 2 Edge: Framework Considerations for Edge Component n 3 Gateway: Framework Considerations for Gateway Component n 4 Cloud: Framework Considerations for Cloud Component n 5 Mobile: Framework Considerations for Mobile Component THREE F ROM THREE: OWASP M U L T I - P A R T S E C U R I T Y A N D P R I V A C Y F R A M E W O R K • Communications encryption • Storage encryption • Strong logging • Auto updates / versioning • Update verification • Cryptographic ID capabilities • No default passwords • Offline security features • Configurable root trust store • Device and owner authentication • Transitive ownership capabilities • Defensive capabilities • Plugin or ext. verify, report, update • Secure M2M • Secure Web interface • Utilize established protocols • Latest, updated 3rd -party components • Use of hardware device • Support MFA • Temporal and spacial authentication • Tracks data from insecure sources • Features disabled by default • Written in programming languages that possess security countermeasures • Device monitoring and management capabilities 2 Edge: Framework Considerations for Edge Component
  • 56. 56 3. Provides a unique focus on authentication testing THREE F ROM THREE: OWASP F O C U S O N T E S T I N G n Assess the solution for the use of strong passwords where authentication is needed n Assess the solution for multi-user environments and ensure it includes functionality for role separation n Assess the solution for Implementation two-factor authentication where possible n Assess password recovery mechanisms n Assess password recovery mechanisms n Assess the solution for the option to require strong passwords n Assess the solution for the option to force password expiration after a specific period n Assess the solution for the option to change the default username and password
  • 57. 57 9 1. Identity relationship management – not IAM – is key 2. Smartphones will be the primary means of authentication in the IoT 3. Leverage built-in security controls 4. Mobile devices will fill multiple roles in the IoT scheme 5. Domains & classes drive delegation of trust models 6. Build your trust model based on “hops” 7. Multiple perspectives matter 8. Provides a comprehensive framework 9. Provides a unique authentication focus SUMMARIZING THE “THREE F ROM THREE”
  • 59. 59
  • 60. 60
  • 61. 61
  • 62. YOU ARE YOUR DEVICE YOUR TRUSTWORTHY PROXY?
  • 65. 65
  • 66. 66 BIOMETRICS IP ADDRESS JAILBROKEN OR ROOTED GEO LOCATION ASSOCIATIONSSECURITY RISK
  • 67. 67 n MD5 Hash of the full font list n Random sample of 15 fonts n Flash SharedObjects not writable n Flash socket 843 based ip (real IP) n Boolean indicator: flash took longer than expected to execute n Accepted Char Sets in HTTP header n Accepted languages in HTTP header n Browser user agent comment string n Browser name / OS / Ver / language n Cookie writes excluded n Boolean indicator, javascript enabled n Count of fonts in the full list n Flash 3-part version (16.0.0) n Flash 4-part version (16.0.0.305) n List of browser plugins n JavaScript screen resolution n Simbar toolbar GUID from HTTP hdr n Timezone offset in minutes n ... and more n WiFi (or Bluetooth) MAC Address n Network configuration n iOS Device Model n Battery level / AC mode n Device orientation n File system size n Physical memory n CPU Type / Count /Speed n Number attached accessories n Has proximity sensor? n Screen brightness and resolution n System uptime n iOS Device Name (MD5 Hash) n OS Name and/or version n Device advertising UUID n Kernel version n iCloud Ubiquity Token n Application Vendor UUID /name/vers n Locale language / currency code n … and 100s more n Model and Device Model n Build.DEVICE & Build.HARDWARE n Build.HOST & Build.ID n Manufacturer n Build.PRODUCT & Build.TIME n Network Operator ID & Name n Sim Operator ID & Country n System Uptime in Seconds n Is the device plugged in n CPU Type n Physical memory n Unique build fingerprint of app n Android SDK Level n Android Build Number (DISPLAY) n Android Device System Version n Detected attempt at hiding root detect n Kernel Version (was AKV) n Android Locale Country Code n Desktop Wallpaper Hash n … and 100s more DEVICE-BASED AUTHENTICATION THE USER’S DEVICE AS A ROBUST, INVISIBLE SECOND FACTOR Web Device Print iOS SDK Android SDK
  • 68. 68
  • 69. Q&A