IoT Security Lecture 1 PDF

Summary

This document provides a lecture on the Internet of Things (IoT) security, including its growth, challenges, and use cases. It covers the growth of IoT devices, security challenges, and different use cases such as smart homes, healthcare, and personal fitness. The summary focuses on providing an overview of IoT security and common use cases.

Full Transcript

ELEC S348F IoT Security Lecture 1: The IoT Under Attack Lecturer Tabitha Tao Chapter 1 - Sections & Objectives ▪ 1.0 The Growth of IoT Devices ▪ 1.2 IoT Security Use Cases What is the IoT IoT in the smart home Benefits of IoT Devices...

ELEC S348F IoT Security Lecture 1: The IoT Under Attack Lecturer Tabitha Tao Chapter 1 - Sections & Objectives ▪ 1.0 The Growth of IoT Devices ▪ 1.2 IoT Security Use Cases What is the IoT IoT in the smart home Benefits of IoT Devices IoT in healthcare How are IoT Devices Connected to the Network Ethical Hacker ▪ 1.1 IoT Security Challenges Unsecured Connected Things Anatomy of an IoT Attack Research IoT attack IoT Security Model 1.0 Growth of IoT Devices The Growth of IoT Devices What is the IoT? ▪ Internet of Things (IoT) The connection of millions of smart devices and sensors connected to the internet. collect and share data for use and evaluation by businesses, cities, governments, hospitals and individuals. The Growth of IoT Devices How IoT became possible? ▪ Cheap processors & Wireless networks Eg. doorknobs or light bulbs > equipped with an intelligent sensor > can collect and transfer data to a network 38.6 billion IoT devices connected to the internet in 2025 50 billion by 2030. 190 million new connected devices every month 1/3 will be computers, smartphones, tablets, and smart TVs 2/3 will be sensors, actuators, and newly invented intelligent devices smart doorbells, garage doors, thermostats, sports wearables, pacemakers, traffic lights, parking spots, and many others The Growth of IoT Devices Benefits of Connecting Devices ▪ Organizations benefitting from IoT Governments Businesses monitor environmental issues, target funding for more information > streamline production, target social issues, and have informed control of power marketing and advertising to specific areas or output. audiences Cities Retailers control traffic patterns based on time of day or more target marketing, reduce losses, manage major events, monitor and control garbage and types of in-store products. recycling. Manufacturing Individuals improves efficiency, productivity of manufacturing improved fitness and health benefits, better home processes and operations and family security, and reduced costs… The Growth of IoT Devices How IoT Devices Connected to the Network ▪ Sensor: connected to a network via wired Ethernet connection/wireless connection to a controller. (Bluetooth LE, Zigbee, or LoRa) ▪ Controller: collecting data from sensors and providing network or internet connectivity ▪ Actuators: take electrical input and transform the input into physical action. Eg. 1. a sensor detects excess heat in a room Sample IoT Topology 2. sends the temperature reading to the controller 3. controller send the data to an actuator 4. actuator turn on the air conditioner. 1.1 IoT Security Challenges IoT Security Challenges The Promise of IoT (Video) Do you have a smart phone and a laptop? Do you also have a tablet? Do you wear a device to track your fitness? Do you own one or more gaming consoles? Does your home have a connected system for remotely controlling your thermostat? Is your refrigerator connected? IoT Security Challenges Anatomy of an IoT Attack (Video) ▪ IoT has expanded the opportunities for threat actors to act against our networks. ▪ IoT devices are increasingly being compromised. ▪ IoT devices are used in a wide variety of attacks because they lack critical device protections such as strong passwords, up- to-date operating systems, and segmented networks. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 IoT Security Challenges Anatomy of an IoT Attack (Video) Watch video Oder the steps: a. Gain access; b. Gather information; c. Deliver attack; d. Maintain access; e. Delete Evidence; f. Scan for vulnerability IoT Security Challenges Research IoT attack Use the Internet to research the year and location of the described attacks 2014 Germany 2008 Poland 2018 Global 2015 Ukraine 2017 Global 2000 Australia 2016 U.S. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 2010 Iran IoT Security Challenges DDoS attack with botnet – Mirai Botnet ▪ Mirai is malware that targets IoT devices configured with default login information. ▪ Closed-circuit television (CCTV) cameras make up the majority of Mirai’s targets. ▪ Using a brute force dictionary attack, Mirai runs through a list of default username/passwords. root/default root/1111 root/54321 …… IoT Security Challenges DDoS attack with botnet – Mirai Botnet Watch video with questions: ▪ 1. Which attack mentioned in the video? ▪ 2. What is Mirai botnet? ▪ 3. What's the function of scan? ▪ 4. Why running tcpdump? ▪ 5. What's the meaning of 8000 and 100000? ▪ 6. Why clean up the cache? ▪ 7. What's the meaning of ‘sudo kill -9 20160′ ? IoT Security Challenges IT and OT in the Manufacturing Sector ▪ Two distinct networking domains in organizations: Information Technology (IT) – Includes devices in the data center, in the cloud, bring your own device (BYOD), and thousands of sensors and actuators connected in the field. Operational Technology (OT) – Includes industrial control systems, supervisory control and data acquisition systems, and all the devices that connect to these systems. ▪ Historically, OT kept the plant running smoothly and IT managed business applications from the front office. ▪ World of manufacturing is changing: IT and OT operations managers use IT tools to sift through the reams of operational data and make real-time decisions. IT and OT Convergence (Video) IT teams can also use this data to do innovative things such as improving the supply chain and reducing downtime. IoT Security Challenges Consumer Technology ▪ CT includes connected devices in the home, wearable technology, smart cars, and more. ▪ Increased number of devices used to communicate. ▪ In 2016, Internet traffic from CT devices was 61% of all IP traffic. Of all the CT traffic, 81% of it was video traffic. IoT Security Challenges IoT Security Model ▪ Whether the IoT device belongs to IT, OT, CT, or some combination of the three, strong security is required. ▪ Service providers are organizations that connect our devices to the Internet. They are in a position to offer services to address the IoT security needs of their clients. Class activities: IT, OT or CT? Scenario IT OT CT Servers used to monitor and regulate values at a water treatment facility are being used to mine bitcoin. Your home temperature sensor has been compromised causing your home to be uncomfortably hot. Hackers have caused damage to critical manufacturing equipment by inserting malware in controller systems. A student has plugged a laptop into the campus network. Hackers remotely take over a Jeep Cherokee. Your refrigerator has become part of a botnet attacking businesses. An SQL injection has compromised a database. The company is receiving an unusual amount of phishing emails. 1.2 IoT Security Use Cases © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 IoT Use Case: Smart Home Explore the Smart Home ▪ A smart home is an example of how the IoT is transforming the way we live, work, and play. ▪ Smart home devices: lights, thermostats, security systems, smoke and fire detection, appliances, TVs, doors, windows, anything can be remotely monitored and controlled. Smart Home Security Measure Software upgrade firmware must be updated regularly to project against newly discovered vulnerabilities. Encryption protects the confidentiality and integrity of data that is potentially intercepted by threat actors. WPA2 currently the best WIFI security protocol for authenticating wireless network access and encrypting data traffic. Authentication identified the security measure that addresses the threat scenario. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 IoT Use Case: Healthcare IoT Use Case: Healthcare Li X, Tao B, Dai H N, et al. Is blockchain for Internet of Medical Things a panacea for COVID-19 pandemic?[J]. Pervasive and Mobile Computing, 2021, 75: 101434. IoT Use Case: Healthcare IoT Use Case: Healthcare ▪ Real-time remote patient monitoring (RPM) ▪ Devices worn by the patient and connected to the internet ▪ Gateway combines signals from the sensor ▪ Submits the monitoring data securely over the internet to cloud application IoT Use Case: Healthcare IoT Healthcare Monitoring ▪ Healthcare Monitoring is one function of IoT devices: It involves the collection and evaluation of patient data over a period of time. Its real-time remote patient monitoring (RPM) has been enabled by IoT. Patients can be monitored at home. Monitoring devices worn by a patient and connected to the Internet. Gateway combines signals from the sensors and securely submits the data to the cloud. An RPM system is shown. A patient is wearing sensors that form a body sensor network (BSN). IoT Use Case: Healthcare Personal Fitness Devices ▪ Fitness devices are among the most popular commercial IoT products: Communicate with a cloud application. Bluetooth connection to a phone and a cellular data / Wi-Fi connection to the internet and cloud. such as a wrist watch, headband, helmet, or head phones. sensor - detect heart rate accelerometer - detects motion in the form of steps cloud application - enables storage of personal fitness data, an analysis dashboard, and a wide range of configuration settings. IoT Use Case: Healthcare IoT in the Hospital ▪ As many as 20 medical devices can be found in a single hospital room. ▪ IoT provides various functionalities to connected medical devices. Monitoring Track location and monitor device operation Therapeutic devices use actuators that are controlled by software to regulate the administration of drugs, fluids, and oxygen. Efficiency to operations also adds challenges for IT departments and data security professionals. IoT Use Case: Healthcare Hacking a Pacemaker ▪ Security vulnerabilities -drug infusion and insulin pumps, Bluetooth-enabled defibrillators, refrigeration units that are used to store drugs and blood, and many other devices. ▪ August 2017 - US government Food and Drug Administration (FDA) approved a software update that patched a security flaw in radio frequency-enabled implantable cardiac pacemakers. Pacemakers include an embedded microprocessor and firmware that is vulnerable to remote attacks over radio frequency (RF). Firmware update could be made over RF without requiring removal or replacement of the device. Estimated that 465,000 devices were affected. IoT Use Case: Healthcare Vulnerabilities ▪ weak or nonexistent authentication ▪ unsecured embedded server processes ▪ unnecessarily vulnerable applications vulnerable to the same attacks as any computer ▪ run old and unpatched operating systems. ▪ Medical devices are poorly regulated and frequently ▪ not designed according to hardware and software security standards. IoT Use Case: Healthcare Risks ▪ be manipulated, interrupted, or disabled -->resulting in patient injury or death. ▪ Poor device security - threat actor to access data, or the device can provide access to data stored on the network. ▪ Personally-identifiable information (PII) about patients can be stolen or manipulated. ▪ Government regulations regarding the handling of PII - severe penalties to healthcare organizations. IoT Use Case: Healthcare Mitigation ▪ Device manufacturers: design and build their devices with security in mind throughout the development lifecycle. ▪ Healthcare administrators: Ensure the devices purchased are secure and been adequately configured. ▪ IT personnel: Provide a reliable means for updating and patching network- attached devices. ▪ Network architectures: Isolate data and control networks ▪ Healthcare personnel: Training to build security awareness and create institutional values that embrace security. IoT Use Case: Healthcare Architecture of Blockchain-enabled IoMT !!!Insert a pic!!! Ethical Hacker © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 Hacker A hacker is a person who breaks into a computer system. The reasons for hacking can be many: installing malware, stealing or destroying data, disrupting service, and more. Hacking can also be done for ethical reasons, such as trying to find software vulnerabilities so they can be fixed. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 Ethical Hacker Ethical hackers are legally permitted to break into certain computer systems to find flaws. Businesses and government organizations often hire ethical hackers to uncover software vulnerabilities or other security weaknesses so they can be fixed before they are exploited by malicious hackers. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 True or False 1. During the course, I can attack any computer for learning purpose. 1. During the course, I can attack any computer in the University for learning purpose. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35 1.3 Chapter Summary © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36 Chapter Summary Summary ▪ 1.0 The Growth of IoT Devices What is the IoT Benefits of IoT Devices How are IoT Devices Connected to the Network ▪ 1.1 IoT Security Challenges Unsecured Connected Things Anatomy of an IoT Attack Research IoT attack IoT Security Model ▪ 1.2 IoT Security Use Cases IoT in the smart home IoT in healthcare Unsecured Connected Things Lab – Shodan Search

Use Quizgecko on...
Browser
Browser