Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.

Презентация:



Advertisements
Похожие презентации
Using Information Technology Chapter 1 Introduction to Information Technology.
Advertisements

Welcome to Ciklum Welcome to Ciklum SERVICES Remote System Administration.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Managing Your Network Environment Discovering Neighbors on the Network.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Securing the Perimeter Disabling Unused Cisco Router Network Services and Interfaces.
Lets look at some interesting and popular devices which have touchscreens.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Managing Your Network Environment Managing Cisco Devices.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA Lesson 3 Cisco PIX Firewall Technology and Features.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Module Summary CSA MC enables you to configure groups, to ease host management and security.
Payment Card Industry (PCI ) - Data Security Standard (DSS): Introduction and Best Practices Michael Jacobs Development Architect - OpenEdge Session 119.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Module Summary The Cisco Discovery Protocol is an information-gathering tool used by network.
Designing Security Services © 2004 Cisco Systems, Inc. All rights reserved. Evaluating Network Security Policies ARCH v
© 2003, Cisco Systems, Inc. All rights reserved. CSPFA Chapter 9 Routing.
© 2006 Cisco Systems, Inc. All rights reserved.SNRS v Adaptive Threat Defense Examining Cisco IOS Firewall.
«MODERN IT TRENDS IN THE PROFESSIONAL SPHERE». What is information? The word "information" is used in many different ways. Originally, it comes from a.
EMEA Techshare 2009 The Future Begins Technical Operations & Enablement Peter Polizzi Sr. Director, Worldwide Channel Technical Operations.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Securing LAN and WLAN Devices Applying Security Policies to Network Switches.
Introducing Cisco Network Service Architectures © 2004 Cisco Systems, Inc. All rights reserved. Introducing the Network Design Methodology ARCH v
Designing Enterprise Edge Connectivity © 2004 Cisco Systems, Inc. All rights reserved. Designing the Remote Access Module ARCH v
Computer security.. Computer security - protecting information on a computer is always current. It applies not only to computer security when you're online,
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Building a Simple Serial Network Exploring the Functions of Networking.
Транксрипт:

Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet of Things (IoT) Security Considerations for Higher Education

What is IoT? The Internet of Things (IoT) is the network of physical objectsdevices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivitythat enables these objects to collect and exchange data. Education – Partnership – Solutions Information Security Office of Budget and Finance

Various Names, One Concept M2M (Machine to Machine) Internet of Everything (Cisco Systems) World Size Web (Bruce Schneier) Skynet (Terminator movie) Education – Partnership – Solutions Information Security Office of Budget and Finance

Where is IoT? Education – Partnership – Solutions Information Security Office of Budget and Finance Its everywhere!

Smart Appliances Healthcare Education – Partnership – Solutions Information Security Office of Budget and Finance Wearable Tech

Education – Partnership – Solutions Information Security Office of Budget and Finance

The IoT Market As of 2013, 9.1 billion IoT units Expected to grow to 28.1 billion IoT devices by 2020 Revenue growth from $1.9 trillion in 2013 to $7.1 trillion in 2020 Education – Partnership – Solutions Information Security Office of Budget and Finance

Why be concerned about IoT? Its just another computer, right? All of the same issues we have with access control, vulnerability management, patching, monitoring, etc. Imagine your network with 1,000,000 more devices Any compromised device is a foothold on the network Education – Partnership – Solutions Information Security Office of Budget and Finance

Attacking IoT Default, weak, and hardcoded credentials Difficult to update firmware and OS Lack of vendor support for repairing vulnerabilities Vulnerable web interfaces (SQL injection, XSS) Coding errors (buffer overflow) Clear text protocols and unnecessary open ports DoS / DDoS Physical theft and tampering Education – Partnership – Solutions Information Security Office of Budget and Finance

Thank you for your attention Education – Partnership – Solutions Information Security Office of Budget and Finance