SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
Dr. Shawn P. Murray, C|CISO, CISSP, CRISC
The Internet of Things
New Challenges in Cyber Crime
ISSA Cyber Focus Day - 25 March 2015
Agenda
– Internet of Things (IoT) Defined
– Emerging Technologies
– 5-10 years
– 10-20 years
– Challenges
• Cyber Crime, Terrorism and Laws
– Balancing Technology with Security
– Cyber Security Professionals (short falls)
– Questions/Open Discussion
Internet of Things Defined
– The Internet of Things (IoT) is a scenario in which objects, animals or
people are provided with unique identifiers and the ability to transfer
data over a network without requiring human-to-human or human-to-
computer interaction.
– IoT has evolved from the convergence of wireless technologies, micro-
electromechanical systems (MEMS) and the Internet.
– A thing, in the Internet of Things, can be a person with a heart monitor
implant, a farm animal with a biochip transponder, an automobile that
has built-in sensors to alert the driver when tire pressure is low -- or any
other natural or man-made object that can be assigned an IP address
and provided with the ability to transfer data over a network.
Source: http://whatis.techtarget.com/definition/Internet-of-Things
IoT & IoE
“The Internet of Things (IoT/IoE) is here today in the devices,
sensors, cloud services and data your business uses. Begin with
what matters most to your company: the Internet of Your Things.
Making the seemingly impossible possible.” Microsoft
“The IoE is expanding our understanding and enriching our
experiences. Our goal is to connect the remaining everything. And
not just to connect, but to change everything for the better.” Cisco
“The Internet of Things (IoT) has enormous potential to drive
economic value and social change. But with 85% of things still
unconnected and security threats pervasive, the industry has yet
to tap IoT’s enormous potential.” Intel
We already have more devices
that connect to the internet than
we have people
IoT & IoE
Google’s Person Finder, or a Facebook application
– Could evolve into a system that, with permission,
• identifies all that information as connected, much like a digital
private detective,
• piecing it together to come to conclusions on behalf of human
“clients,” whether they be doctors, friends, or government
agencies.
The implications are that your digital footprint
would be used for positive things.
Source: http://techonomy.com/2013/04/everything-changes-with-the-internet-of-everything
Emerging Technologies
– New Heartbeat Detector May Save Lives After
Disasters
– Portable technology will help search and rescue
teams find people more quickly.
Source: http://news.nationalgeographic.com/news/2013/09/130925-heartbeat-finder-search-rescue-technology-science/
Researchers with the Jet Propulsion
Laboratory (JPL) in Pasadena, California, have
developed a device the size of a small carry-on
bag that uses microwaves to detect human
heartbeats in piles of rubble, which can bury
people following natural disasters such
as earthquakes.
Emerging Technologies
– In 10-15 Years, it is predicted that there will be no
more life expectancy due to medical technology
advances
– 3D Printing technology will allow doctors to print
human body parts
– Holographic technologies and imbedded bio-
transmitters will allow extended virtual environments
where people can manage anything
– Solar technology will help power and integrate global
communications in new ways
Emerging Technologies
– Now & 5-10 years
• Traffic Management Systems
• Parking Solutions – 30% of traffic congestion is caused
by people looking for a parking space
Solar Technology & Roadways
• Will integrate communications
• Provide power
• Connect everything….
– New ISP capabilities even for rural areas
There will be 11.8 million
driverless cars on the road
by 2035 and nearly all American
on-the-road vehicles will become
driverless by 2050.
Source: Inferse
– Emerging Technologies
– 10-20 years
• Space Travel
• Floating Cities
Space picture - the Virgin Galactic
spacecraft SpaceShipTwo in flight
Space Tourism by 2023?
Innovative spacecraft may be
ferrying tourists to and from space
within the next decade.
From an underwater "oceanscraper" to
floating apartments, these fantastical
green building designs could be immune
to sea level rise.
Source: http://science.nationalgeographic.com/science/innovation/the-future/
– Challenges
• Cyber Crime
• Terrorism
• Cyber Laws
• Cyber Security
• Cyber Security Professionals
– Hackers Can Take Over Cars and Drive Them
With a Nintendo Controller
A pair of security experts demonstrated to the BBC that some ordinary
models of cars can be overridden—despite whatever the driver is doing
behind the wheel—using a laptop, some software, and an old Nintendo
Entertainment System gamepad
Cyber Crime
• Hacked fridge sends out malicious emails in unprecedented
cyber attack
Internet of Things cyber attack has shown, our
appliances are being made to turn against us.
• According to the security firm Proofpoint, a number of so-
called smart appliances were compromised what they're
calling one of the first orchestrated Internet of Things cyber
attacks.
• Appliances included in the attack included smart TVs,
wireless speaker systems, connected multi-media centers,
home-networking routers — and at least one refrigerator.
Cyber Crime
Cyber crime: 1st online murder will happen by end of year, warns US firm
The rapidly evolving Internet of Everything will leave us more vulnerable to cyber criminals, according
to a worried Europol
• Governments are ill-prepared to combat the looming threat of "online murder" as cyber criminals
exploit internet technology to target victims, the European policing agency warned. In its most
alarming assessment of the physical danger posed by online crime, Europol said it expected a
rise in "injury and possible deaths" caused by computer attacks on critical safety equipment.
• The concept is behind the likely development of smart homes, cars and even cities, but police
warned that the failure to protect devices properly could see them open to being hacked by
outsiders to make money or to attack opponents.
• The former US vice-president Dick Cheney – who has a long history of heart problems – revealed
last year that the wireless function had been disabled on his implanted defibrillator because of
concerns that outsiders could hack the network and provoke a heart attack.
Scammers May Use Paris Terrorist Attack to Solicit Fraudulent Donations Tue, 10 Feb 2015
Business E-mail Compromise Thu, 22 Jan 2015
University Employee Payroll Scam Tue, 13 Jan 2015
New Twist to the Telephone Tech Support Scam Thu, 13 Nov 2014
Sources: http://www.independent.co.uk/life-style/gadgets-and-tech/news/first-online-murder-will-happen-by-end-of-year-warns-us-firm-9774955.html
1.New Twist to the Telephone Tech Support ScamThu, 13 Nov 2014
Cyber Terror - 100 Military Personnel on ISIS 'kill list‘
 ISISv"kill list" created by alleged sympathizers of the Islamic State group,
according to reports.
 The list, which was posted online and reported over the weekend, includes the
identities of 100 pilots, airmen, sailors and commanders involved in the U.S.-led
airstrikes against the group in Iraq and Syria, a Pentagon official told USA
TODAY on Monday.
 The group that posted the information identified itself as the Islamic State
Hacking Division. Its list features the photographs of service members along with
their names, rank and home addresses. That information, Warren said, was
publicly available and did not come from a data breach.
 In many cases, the troops' identities are on military web sites and social media
pages.
(Photo: Getty Images)
Challenges - FBI
• We are building our lives around our wired and wireless networks. The
question is, are we ready to work together to defend them?
• The FBI certainly is. We lead the national effort to investigate high-tech
crimes, including cyber-based terrorism, espionage, computer intrusions,
and major cyber fraud.
• To stay in front of current and emerging trends, we gather and share
information and intelligence with public and private sector partners
worldwide.
• Cases & Takedowns
- Operation Ghost Click
- Coreflood Botnet
- 2,100 ATMs Hit at Once
- Operation Phish Fry
- Dark Market
Sources: http://www.fbi.gov/about-us/investigate/cyber
Balancing Technology with Security
• Laws need to coincide with capabilities
• Holding developers accountable to specific standards
• Tougher sentences for those that commit serious cyber crime
• Ensuring consumers are using technologies securely
• Conveniences should not overcome security when the risk is to
great.
• Assessment criteria needs to be established to establish
security standards at an international level
• Connected devices should have various classifications
• Encryption standards should be mandatory for classification of
devices
Cyber Security Professionals (short falls)
• The numbers are startling: The U.S. Cyber Command seeks 5,000
cybersecurity pros.
• Federal government needs 10,000 cybersecurity experts in the near future.
• Department of Homeland Security's comparatively small yet urgent demand
for 600 new cybersecurity employees is dizzying once the logistics are
considered.
• Talk to any recruiter in the Washington region and they will tell you
cybersecurity jobs are among the most difficult for them to fill. Workers with
the right skills are relatively hard to come by, and in a labor market
dominated by the federal government and its contractors, they are in
especially high demand.
• Companies, universities and government entities are all focused on finding
ways to close the gap: Educational partnerships. Hackathon competitions.
Internal corporate training programs. A regional task force
Source: http://fcw.com/articles/2013/10/15/cybersecurity-workforce-crisis.aspx
Soufrce: http://www.washingtonpost.com/business/capitalbusiness/an-argument-that-the-shortage-of-cyber-workers-is-a-problem-that-will-solve-itself/2014/06/27/dbab364a-fe00-
11e3-8176-f2c941cf35f1_story.html
Cyber Security Professionals - Reaping the Benefits
Given that a significant portion of the up-and-coming workforce is less concerned about pay than other
things, here's a list of some of the most outrageous and awesome benefits that some IT companies
offer. The government probably can't match most of them, but a good federal job can mean a solid
foothold in industry later, and plentiful cyber pros with broad experience can benefit both the public
and private sectors.
* Cisco Systems: An on-site health care center offers a full suite of medical services that include
primary care, physical therapy, a pharmacy and more. Child-care services are also available.
* Google: Well-known as the big kahuna of perks, Google offers free food, bocce courts, bowling
alleys, gyms, an organic kitchen, on-site vehicle maintenance services and an indoor slide, among
other benefits.
* Microsoft: Employees enjoy generous paid maternity and paternity leave, with up to 10 weeks for
new moms. The Redmond, Wash., headquarters has an organic spa on site, and mentoring programs
are available as well.
* Yahoo: Despite a recent ban on telework, employees still enjoy discounts at ski resorts and
California theme parks, and up to 16 weeks of paid maternity leave and eight weeks of paid paternity
leave.
* Boeing: In addition to 12 paid holidays, employees also enjoy a winter recess between Christmas
and New Year's Day.
Source: http://fcw.com/articles/2013/10/15/cybersecurity-workforce-crisis.aspx
Cyber Security Professionals – Challenges
• Professional Skills
• Professional Attitude
• Qualified
– IT experience first
– Cyber security always
• Criminal and Background Checks
• Certifications vs education
• Mentorship
– Mentors
– Professional Organizations
– Peer accountability
References & Resources:
Microsoft
http://www.microsoft.com/en-us/server-cloud/internet-of-things.aspx#Fragment_Scenario1
Azure IoT suite will provide finished applications to speed deployment of common scenarios, such as remote
monitoring, asset management and predictive maintenance, while providing the ability to grow and scale solutions to
millions of “things.”
Cisco
http://www.cisco.com/web/offers/iot-solutions/lopez-iot-whitepaper/index.html
The Internet of Things (IoT) is increasing the connectedness of people and things on a scale that once was
unimaginable. Connected devices outnumber the world's population by 1.5 to 1.
Intel
http://www.intel.com/content/www/us/en/internet-of-things/overview.html?cid=sem132p41890g-
c&gclid=CjwKEAjwucmoBRDmysGsgbDr5j0SJAAxL9abqs1oZvWWs3ex4l_hM5Yv5bE2y5h6mQMaY7RRpBEkwhoCGAnw_wcB
The Internet of Things (IoT) is taking shape. Intel helps connect things to the cloud, integrate with existing infrastructure, and securely manage
data.
References & Resources:
More Resources
- DOJ Computer Crime & Intellectual Property Section
- National Strategy to Secure Cyberspace
- Secret Service Electronic Crimes Task Forces
- Stop.Think.Connect. Campaign
Questions?
Open Discussion

Mais conteúdo relacionado

Mais procurados

Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service AttackDhrumil Panchal
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsN.Jagadish Kumar
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authorityKrutiShah114
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics sunanditaAnand
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle AttackDeepak Upadhyay
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 

Mais procurados (20)

Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Common Gateway Interface
Common Gateway InterfaceCommon Gateway Interface
Common Gateway Interface
 
Electronic Commerce - Bascis
Electronic Commerce - Bascis Electronic Commerce - Bascis
Electronic Commerce - Bascis
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service Attack
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection tools
 
Enterprise, Architecture and IoT
Enterprise, Architecture and IoTEnterprise, Architecture and IoT
Enterprise, Architecture and IoT
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Types of Fraud.pptx
Types of Fraud.pptxTypes of Fraud.pptx
Types of Fraud.pptx
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cyber Forensics & Challenges
Cyber Forensics & ChallengesCyber Forensics & Challenges
Cyber Forensics & Challenges
 

Destaque

Internet :: Challenges with Kids Playing Unblocked Games at School
Internet :: Challenges with Kids Playing Unblocked Games at SchoolInternet :: Challenges with Kids Playing Unblocked Games at School
Internet :: Challenges with Kids Playing Unblocked Games at Schooltabooexpenditur64
 
Internet Crime Control Authority
Internet Crime Control AuthorityInternet Crime Control Authority
Internet Crime Control AuthorityDaily 10 Minutes
 
Investigating Cybercrime in the UK
Investigating Cybercrime in the UKInvestigating Cybercrime in the UK
Investigating Cybercrime in the UKNapier University
 
Mobile Internet in India - Opportunities & Challenges
Mobile Internet in India - Opportunities & ChallengesMobile Internet in India - Opportunities & Challenges
Mobile Internet in India - Opportunities & ChallengesRamesh Kumar
 
The Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionThe Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionSathvik N Prasad
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryWilliam McBorrough
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 

Destaque (8)

Internet :: Challenges with Kids Playing Unblocked Games at School
Internet :: Challenges with Kids Playing Unblocked Games at SchoolInternet :: Challenges with Kids Playing Unblocked Games at School
Internet :: Challenges with Kids Playing Unblocked Games at School
 
Internet Crime Control Authority
Internet Crime Control AuthorityInternet Crime Control Authority
Internet Crime Control Authority
 
Investigating Cybercrime in the UK
Investigating Cybercrime in the UKInvestigating Cybercrime in the UK
Investigating Cybercrime in the UK
 
Mobile Internet in India - Opportunities & Challenges
Mobile Internet in India - Opportunities & ChallengesMobile Internet in India - Opportunities & Challenges
Mobile Internet in India - Opportunities & Challenges
 
The Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionThe Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolution
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Semelhante a Internet of things, New Challenges in Cyber Crime

A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza Belayneh
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia LunaAviva Spectrum™
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019John D. Johnson
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2Shane Kite
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentJustin Grammens
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing BotBellaj Badr
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 

Semelhante a Internet of things, New Challenges in Cyber Crime (20)

Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
p9-riliskis
p9-riliskisp9-riliskis
p9-riliskis
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2
 
IoT.ppt
IoT.pptIoT.ppt
IoT.ppt
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is Different
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 

Mais de Murray Security Services (15)

Cybersecurity Maturity Model Certification
Cybersecurity Maturity Model CertificationCybersecurity Maturity Model Certification
Cybersecurity Maturity Model Certification
 
Accidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 VersionAccidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 Version
 
Manufacturing Hacks
Manufacturing HacksManufacturing Hacks
Manufacturing Hacks
 
Spectre & Meltdown
Spectre & MeltdownSpectre & Meltdown
Spectre & Meltdown
 
Global Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Global Shortage on Cyber Security Workforce - An Analysis of a Complex IssueGlobal Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Global Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
 
Cybersecurity for Small Business
Cybersecurity for Small BusinessCybersecurity for Small Business
Cybersecurity for Small Business
 
Barcode Metadata & Privacy - What is the risk really?
Barcode Metadata & Privacy - What is the risk really?Barcode Metadata & Privacy - What is the risk really?
Barcode Metadata & Privacy - What is the risk really?
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
How to Write Good Policies
How to Write Good PoliciesHow to Write Good Policies
How to Write Good Policies
 
IT Position of Trust Designation
IT Position of Trust DesignationIT Position of Trust Designation
IT Position of Trust Designation
 
ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
 

Último

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Último (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Internet of things, New Challenges in Cyber Crime

  • 1. Dr. Shawn P. Murray, C|CISO, CISSP, CRISC The Internet of Things New Challenges in Cyber Crime ISSA Cyber Focus Day - 25 March 2015
  • 2. Agenda – Internet of Things (IoT) Defined – Emerging Technologies – 5-10 years – 10-20 years – Challenges • Cyber Crime, Terrorism and Laws – Balancing Technology with Security – Cyber Security Professionals (short falls) – Questions/Open Discussion
  • 3. Internet of Things Defined – The Internet of Things (IoT) is a scenario in which objects, animals or people are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to- computer interaction. – IoT has evolved from the convergence of wireless technologies, micro- electromechanical systems (MEMS) and the Internet. – A thing, in the Internet of Things, can be a person with a heart monitor implant, a farm animal with a biochip transponder, an automobile that has built-in sensors to alert the driver when tire pressure is low -- or any other natural or man-made object that can be assigned an IP address and provided with the ability to transfer data over a network. Source: http://whatis.techtarget.com/definition/Internet-of-Things
  • 4. IoT & IoE “The Internet of Things (IoT/IoE) is here today in the devices, sensors, cloud services and data your business uses. Begin with what matters most to your company: the Internet of Your Things. Making the seemingly impossible possible.” Microsoft “The IoE is expanding our understanding and enriching our experiences. Our goal is to connect the remaining everything. And not just to connect, but to change everything for the better.” Cisco “The Internet of Things (IoT) has enormous potential to drive economic value and social change. But with 85% of things still unconnected and security threats pervasive, the industry has yet to tap IoT’s enormous potential.” Intel
  • 5.
  • 6. We already have more devices that connect to the internet than we have people
  • 7. IoT & IoE Google’s Person Finder, or a Facebook application – Could evolve into a system that, with permission, • identifies all that information as connected, much like a digital private detective, • piecing it together to come to conclusions on behalf of human “clients,” whether they be doctors, friends, or government agencies. The implications are that your digital footprint would be used for positive things. Source: http://techonomy.com/2013/04/everything-changes-with-the-internet-of-everything
  • 8. Emerging Technologies – New Heartbeat Detector May Save Lives After Disasters – Portable technology will help search and rescue teams find people more quickly. Source: http://news.nationalgeographic.com/news/2013/09/130925-heartbeat-finder-search-rescue-technology-science/ Researchers with the Jet Propulsion Laboratory (JPL) in Pasadena, California, have developed a device the size of a small carry-on bag that uses microwaves to detect human heartbeats in piles of rubble, which can bury people following natural disasters such as earthquakes.
  • 9. Emerging Technologies – In 10-15 Years, it is predicted that there will be no more life expectancy due to medical technology advances – 3D Printing technology will allow doctors to print human body parts – Holographic technologies and imbedded bio- transmitters will allow extended virtual environments where people can manage anything – Solar technology will help power and integrate global communications in new ways
  • 10. Emerging Technologies – Now & 5-10 years • Traffic Management Systems • Parking Solutions – 30% of traffic congestion is caused by people looking for a parking space
  • 11. Solar Technology & Roadways • Will integrate communications • Provide power • Connect everything…. – New ISP capabilities even for rural areas There will be 11.8 million driverless cars on the road by 2035 and nearly all American on-the-road vehicles will become driverless by 2050. Source: Inferse
  • 12. – Emerging Technologies – 10-20 years • Space Travel • Floating Cities Space picture - the Virgin Galactic spacecraft SpaceShipTwo in flight Space Tourism by 2023? Innovative spacecraft may be ferrying tourists to and from space within the next decade. From an underwater "oceanscraper" to floating apartments, these fantastical green building designs could be immune to sea level rise. Source: http://science.nationalgeographic.com/science/innovation/the-future/
  • 13. – Challenges • Cyber Crime • Terrorism • Cyber Laws • Cyber Security • Cyber Security Professionals
  • 14. – Hackers Can Take Over Cars and Drive Them With a Nintendo Controller A pair of security experts demonstrated to the BBC that some ordinary models of cars can be overridden—despite whatever the driver is doing behind the wheel—using a laptop, some software, and an old Nintendo Entertainment System gamepad
  • 15. Cyber Crime • Hacked fridge sends out malicious emails in unprecedented cyber attack Internet of Things cyber attack has shown, our appliances are being made to turn against us. • According to the security firm Proofpoint, a number of so- called smart appliances were compromised what they're calling one of the first orchestrated Internet of Things cyber attacks. • Appliances included in the attack included smart TVs, wireless speaker systems, connected multi-media centers, home-networking routers — and at least one refrigerator.
  • 16. Cyber Crime Cyber crime: 1st online murder will happen by end of year, warns US firm The rapidly evolving Internet of Everything will leave us more vulnerable to cyber criminals, according to a worried Europol • Governments are ill-prepared to combat the looming threat of "online murder" as cyber criminals exploit internet technology to target victims, the European policing agency warned. In its most alarming assessment of the physical danger posed by online crime, Europol said it expected a rise in "injury and possible deaths" caused by computer attacks on critical safety equipment. • The concept is behind the likely development of smart homes, cars and even cities, but police warned that the failure to protect devices properly could see them open to being hacked by outsiders to make money or to attack opponents. • The former US vice-president Dick Cheney – who has a long history of heart problems – revealed last year that the wireless function had been disabled on his implanted defibrillator because of concerns that outsiders could hack the network and provoke a heart attack. Scammers May Use Paris Terrorist Attack to Solicit Fraudulent Donations Tue, 10 Feb 2015 Business E-mail Compromise Thu, 22 Jan 2015 University Employee Payroll Scam Tue, 13 Jan 2015 New Twist to the Telephone Tech Support Scam Thu, 13 Nov 2014 Sources: http://www.independent.co.uk/life-style/gadgets-and-tech/news/first-online-murder-will-happen-by-end-of-year-warns-us-firm-9774955.html 1.New Twist to the Telephone Tech Support ScamThu, 13 Nov 2014
  • 17. Cyber Terror - 100 Military Personnel on ISIS 'kill list‘  ISISv"kill list" created by alleged sympathizers of the Islamic State group, according to reports.  The list, which was posted online and reported over the weekend, includes the identities of 100 pilots, airmen, sailors and commanders involved in the U.S.-led airstrikes against the group in Iraq and Syria, a Pentagon official told USA TODAY on Monday.  The group that posted the information identified itself as the Islamic State Hacking Division. Its list features the photographs of service members along with their names, rank and home addresses. That information, Warren said, was publicly available and did not come from a data breach.  In many cases, the troops' identities are on military web sites and social media pages. (Photo: Getty Images)
  • 18. Challenges - FBI • We are building our lives around our wired and wireless networks. The question is, are we ready to work together to defend them? • The FBI certainly is. We lead the national effort to investigate high-tech crimes, including cyber-based terrorism, espionage, computer intrusions, and major cyber fraud. • To stay in front of current and emerging trends, we gather and share information and intelligence with public and private sector partners worldwide. • Cases & Takedowns - Operation Ghost Click - Coreflood Botnet - 2,100 ATMs Hit at Once - Operation Phish Fry - Dark Market Sources: http://www.fbi.gov/about-us/investigate/cyber
  • 19. Balancing Technology with Security • Laws need to coincide with capabilities • Holding developers accountable to specific standards • Tougher sentences for those that commit serious cyber crime • Ensuring consumers are using technologies securely • Conveniences should not overcome security when the risk is to great. • Assessment criteria needs to be established to establish security standards at an international level • Connected devices should have various classifications • Encryption standards should be mandatory for classification of devices
  • 20. Cyber Security Professionals (short falls) • The numbers are startling: The U.S. Cyber Command seeks 5,000 cybersecurity pros. • Federal government needs 10,000 cybersecurity experts in the near future. • Department of Homeland Security's comparatively small yet urgent demand for 600 new cybersecurity employees is dizzying once the logistics are considered. • Talk to any recruiter in the Washington region and they will tell you cybersecurity jobs are among the most difficult for them to fill. Workers with the right skills are relatively hard to come by, and in a labor market dominated by the federal government and its contractors, they are in especially high demand. • Companies, universities and government entities are all focused on finding ways to close the gap: Educational partnerships. Hackathon competitions. Internal corporate training programs. A regional task force Source: http://fcw.com/articles/2013/10/15/cybersecurity-workforce-crisis.aspx Soufrce: http://www.washingtonpost.com/business/capitalbusiness/an-argument-that-the-shortage-of-cyber-workers-is-a-problem-that-will-solve-itself/2014/06/27/dbab364a-fe00- 11e3-8176-f2c941cf35f1_story.html
  • 21. Cyber Security Professionals - Reaping the Benefits Given that a significant portion of the up-and-coming workforce is less concerned about pay than other things, here's a list of some of the most outrageous and awesome benefits that some IT companies offer. The government probably can't match most of them, but a good federal job can mean a solid foothold in industry later, and plentiful cyber pros with broad experience can benefit both the public and private sectors. * Cisco Systems: An on-site health care center offers a full suite of medical services that include primary care, physical therapy, a pharmacy and more. Child-care services are also available. * Google: Well-known as the big kahuna of perks, Google offers free food, bocce courts, bowling alleys, gyms, an organic kitchen, on-site vehicle maintenance services and an indoor slide, among other benefits. * Microsoft: Employees enjoy generous paid maternity and paternity leave, with up to 10 weeks for new moms. The Redmond, Wash., headquarters has an organic spa on site, and mentoring programs are available as well. * Yahoo: Despite a recent ban on telework, employees still enjoy discounts at ski resorts and California theme parks, and up to 16 weeks of paid maternity leave and eight weeks of paid paternity leave. * Boeing: In addition to 12 paid holidays, employees also enjoy a winter recess between Christmas and New Year's Day. Source: http://fcw.com/articles/2013/10/15/cybersecurity-workforce-crisis.aspx
  • 22. Cyber Security Professionals – Challenges • Professional Skills • Professional Attitude • Qualified – IT experience first – Cyber security always • Criminal and Background Checks • Certifications vs education • Mentorship – Mentors – Professional Organizations – Peer accountability
  • 23. References & Resources: Microsoft http://www.microsoft.com/en-us/server-cloud/internet-of-things.aspx#Fragment_Scenario1 Azure IoT suite will provide finished applications to speed deployment of common scenarios, such as remote monitoring, asset management and predictive maintenance, while providing the ability to grow and scale solutions to millions of “things.” Cisco http://www.cisco.com/web/offers/iot-solutions/lopez-iot-whitepaper/index.html The Internet of Things (IoT) is increasing the connectedness of people and things on a scale that once was unimaginable. Connected devices outnumber the world's population by 1.5 to 1. Intel http://www.intel.com/content/www/us/en/internet-of-things/overview.html?cid=sem132p41890g- c&gclid=CjwKEAjwucmoBRDmysGsgbDr5j0SJAAxL9abqs1oZvWWs3ex4l_hM5Yv5bE2y5h6mQMaY7RRpBEkwhoCGAnw_wcB The Internet of Things (IoT) is taking shape. Intel helps connect things to the cloud, integrate with existing infrastructure, and securely manage data.
  • 24. References & Resources: More Resources - DOJ Computer Crime & Intellectual Property Section - National Strategy to Secure Cyberspace - Secret Service Electronic Crimes Task Forces - Stop.Think.Connect. Campaign