Trust by Design: The Internet of Things

Slides:



Advertisements
Similar presentations
Net Neutrality a regulator’s vision February 27 th, 2012 Guillaume Mellier.
Advertisements

Andrew J Haire. Agenda  Let us define Terms…  What do we know so far  How did we get here  What are Implications to Policy Makers  What will this.
Internet of Things: The way to Smart Sustainable Cities Cristina Bueti Adviser (ITU) 1.
IST and Tourism cross fertilisation Information Society Technologies for Tourism Brussels, 9th July 2001.
The need for global approach to child online protection Dr. Mona Al-achkar Jabbour Pan Arab Observatory for cyber security October.
ICTs Tackling Climate Changes Dr. Amr Badawi Executive President NTRA.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Challenge 6: Mobility, Environmental sustainability and energy efficiency Includes as driving objective: “Sustainable growth and environmental sustainability”
Security Awareness – Essential Part of Security Management Ilze Murane.
IoT Primer Stephen Bates | Energy Huntsville: Tues 15 Dec
Best practices to ensure delivery of QoS and QoE.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
IoT Trust Framework leading to self regulation code of conduct and certification models Craig Spiezle Executive Director & President Online.
1 IoT for Smart Cities Where we are at and where we could be Olga Cavalli CCAT LAT Argentina Forum on "Powering Smart Sustainable Cities With the Internet.
International Telecommunication Union Committed to connecting the world Shaping tomorrow’s smart sustainable cities today Nasser Saleh Al Marzouqi Chairman,
Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.
IoT R&I on IoT integration and platforms INTERNET OF THINGS
Andrew J Haire. Agenda  Let us define Terms…  What do we know so far  How did we get here  What are Implications to Policy Makers  What will this.
EUB Brazil: IoT Pilots HORIZON 2020 WP EUB Brazil: IoT Pilots DG CONNECT European Commission.
Alberto Paradisi- Vice-President - CPqD in IoT Week Belgrado - Innovation day Brazil Session: IoT Panorama and Collaboration.
Smart Law in Digital India - Legal, Regulatory & Governance Challenges July 24, 2016 Sajai Singh Partner J. Sagar Associates advocates & solicitors Ahmedabad.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved IoT in Manufacturing Market grow at 20% CAGR from 2017 to 2024: Global.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved IoT Infrastructure Market Price, Trends, Industry Outlook & Forecast
THE DIGITAL JOURNEY What IP means for technology enabled care
A policy framework for an open and trusted Internet
Remarks by Dr Mawaki Chango Kara University DigiLexis Consulting
Cyber Security – An Existential Threat? (IIC, Singapore)
Internet of Things (IoT)
فایل ارائه حاضر توسط مرکز تحقیقات فناوری «اینترنتی از اشیاء »
E-Safety Briefing
5 OCTOBER 2015 MANILA, PHILIPPINES
Information Technology Sector
Researcher and Lecturer Assistant at FCI Assiut University
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
ASSET - Automotive Software cyber SEcuriTy
OTA & IoT A Shared & Collaborative Responsibility 24 October 2017
Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.
Dr Paul Lewis Chief Technology Officer
National Mining University
Building Efficiency Accelerator
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
Internet of Things
Objectives Overview Explain why computer literacy is vital to success in today's world Describe the five components of a computer Discuss the advantages.
Cloud Testing Shilpi Chugh.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 IoT Device Management Market.
National Cyber Strategy Preparedness: 8 Preparatory Questions
Mobile Commerce and the Internet of Things
COLLABORATIVE SECURITY An approach to tackling Internet
Internet Interconnection
NRENs and IoT Security: Challenges and Opportunities
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
IoT – Retail O.P Khanduja.
“Smart City: Future Perspectives”
Presentation for information days Units involved:
IoT Security and Privacy
Opportunities in Horizon2020 in Cybersecurity call for proposals
Opportunities for Cybersecurity and Privacy clusters
A Shared and Collaborative Responsibility
The Impact of Digitization on Global Alignment of Product Safety Regulations ICPHSO International Symposium November 12, 2018.
Internet of Things (IoT) for Industrial Development and Automation
We secure the communication
Huge latent demand for housing in India
Session 26 INST 346 Technologies, Infrastructure and Architecture
Technology leadership Manufacturing competence
Global megatrends (relevant for our business)
Internet of Things (IoT)
The Internet of Things (IoT)
Protection of Privacy Online CAIGF2017-Dushanbe, Tajikistan
IoT: Privacy and Security
IoT and Supply Chain Risk Management
Presentation transcript:

Trust by Design: The Internet of Things Chapters Workshop Addis Ababa, 2019 Trust by Design: The Internet of Things Security and privacy of smart-home devices and services Dr. Dawit Bekele ISOC

What is the Internet of Things The Internet of Things refers to new types of devices that are increasingly being connected to the Internet Traditionally, the Internet was a network of computers, switches and routers all linked together to share knowledge and communicate With the Internet of Things, day to day devices like televisions, refrigerators, lights, sensors and cameras are increasingly being connected to the Internet Google Glass1 Smartwatch2 1https://www.theglimpse.com/interesting-facts-about-google-glass 2https://www.gearbest.com/smart-watches/pp_800036.html

Some examples of IoT Wearable Tech: like smart watches, smart shoes, smart glasses Smart Cars: cars that can use the Internet to navigate or send information to other cars on the road Smart Cities: use of IoT to improve traffic flows, measure water, measure electricity use, monitor and protect citizens Smart manufacturing – use of IoT devices to improve the efficiency of manufacturing and cut costs Research – use of IoT to measure air and water quality

The number of IoT devices and systems connected to the Internet will be more than 5x the global population by 2022 (IHS).

As more and more devices are connected, privacy and security risks increase. And most consumers don’t even know it.

New devices, new vulnerabilities The Internet Society 7/19/2019 New devices, new vulnerabilities The attributes of many IoT devices present new and unique security challenges compared to traditional computing systems. Device Cost/Size/Functionality Volume of identical devices (homogeneity) Long service life (often extending far beyond supported lifetime) No or limited upgradability or patching Physical security vulnerabilities Access Limited user interfaces (UI) Limited visibility into, or control over, internal workings Embedded devices Unintended uses BYOIoT Industry is not adequately addressing fundamental security, privacy and life-safety issues. Many manufacturers are new to the networking and Internet arena, and lack experience. There are STRONG competitive pressures for speed to market and cost reduction. Security and privacy cost money, require specialized skills, and slow down the development process. The proliferation of devices, and corresponding interactions with other devices, increase the “surface” available for cyberattack. Poorly secured devices affect the security of the Internet and other devices globally, not just locally.

What type of risks? Unlocking doors, turning on cameras, shutting down critical systems and theft of personal property. People’s safety or the safety of their family might even be at risk. Large IoT-based attacks, such as the Mirai botnet in 2016, have crippled global access to high-profile Internet services for several hours. 2

The challenges we face A connected world offers the promise of convenience, efficiency and insight, but creates a platform for shared risk. Many of today’s IoT devices are rushed to market with little consideration for basic security and privacy protections.

Challenges Manufacturer s Services Consumers Cost/size New uses Cost/convenience Functionality Massive volume Naïve users Time to market Naïve players DIY approach Future-proofing Limited insight Flying “blind”

Who is responsible? Developers and users of IoT devices and systems have a collective obligation to ensure they do not expose others and the Internet itself to potential harm. We need a collective approach, addressing security challenges on all fronts.

The Internet Society is working for a better Internet. We want manufacturers and suppliers of consumer IoT devices and services to adopt security and privacy guidelines to protect the Internet and consumers from cyber threats. We want to educate users on the importance of secure IoT devices and work with stakeholders involved in technology and security to better inform their communities on IoT. There is a Role for everyone to play in Securing the Internet of Things

Role of Industry/Service Providers/Retail Commit to Framework principles Push back through supply chain Curate offerings – only carry products that ”clear the bar”

Role of Consumer Organizations Prioritize security and privacy in reviews Educate consumers to make smart choices Announced partnership with Consumers International

IoT Security and Policy Makers

Work with Policymakers We want policymakers to create a policy environment that favors strong security and privacy features in IoT products and services. We need smart regulation that strengthens trust and enables innovation. ISOC can help in this process 2

Actions for Policymakers Strengthen accountability and stimulate security and privacy best practice adoption Support industry adoption of the best practice principles from the IoT Trust framework Foster technology & vendor neutral solutions Make smart use of regulatory tools through well-defined responsibilities and clear consequences

Data Gathering: IoT in the African Region We are working via ISOC Chapters and other partners in the region to gather information on IoT development, IoT related policies and use in the region This info will help us coordinate efforts in IoT and know what types of IoT devices are being developed in the region and Policies that are working in our environment. This will allow us to better advise policy makers, users and ISPs on IoT security If you are aware of any IoT research/development IoT Policy development in the region, please let us know through our chapters or ISOC staff

Bekele@isoc.org