International Telecommunication Union


IoT Is Here Now – and Growing!



Download 4,86 Mb.
bet2/2
Sana20.07.2022
Hajmi4,86 Mb.
#828871
1   2
Bog'liq
S1P3 Mikhail Kader

IoT Is Here Now – and Growing!

  • 7.2
  • 6.8
  • 7.6
  • 50
  • Billion
  • “Smart Objects”
  • 50
  • 2010
  • 2015
  • 2020
  • 0
  • 40
  • 30
  • 20
  • 10
  • BILLIONS OF DEVICES
  • 25
  • 12.5
  • Inflection Point
  • TIMELINE
  • Source: Cisco IBSG, 2011
  • World Population

IoT Delivers Extraordinary Benefits

Connected Rail Operations

  • Cost savings, improved safety, superior service
  • PASSENGER SECURITY
    • In-station and onboard safety
    • Visibility into key events
  • ROUTE OPTIMIZATION
  • CRITICAL SENSING
    • Transform “data” to “actionable intelligence”
    • Proactive maintenance
    • Accident avoidance

Smart City

  • Safety, financial, and environmental benefits
  • CONNECTED TRAFFIC SIGNALS
    • Reduced congestion
    • Improved emergency services response times
    • Lower fuel usage
  • CITY SERVICES
    • Efficient service delivery
    • Increased revenues
    • Enhanced environmental monitoring capabilities

The Connected Car

  • Actionable intelligence, enhanced comfort, unprecedented convenience
  • WIRELESS ROUTER
    • Online entertainment
    • Mapping, dynamic re-routing, safety and security
  • CONNECTED SENSORS
    • Transform “data” to “actionable intelligence”
    • Enable proactive maintenance
    • Collision avoidance
    • Fuel efficiency
  • URBAN CONNECTIVITY
    • Reduced congestion
    • Increased efficiency
    • Safety (hazard avoidance)

… But It Also Adds Complexity

  • Application Interfaces
  • Infrastructure Interfaces
  • New Business Models
  • Applications
  • Unified Platform
  • Infrastructure
  • APPLICATION ENABLEMENT PLATFORM
  • APPLICATION CENTRIC INFRASTRUCTURE
  • Big Data
  • Analytics
  • Control Systems
  • Application Integration

What Comprises IoT Networks?

The Flip Side: Major Security Challenges

IoT Expands Security Needs

  • Converged, Managed Network
  • Resilience at Scale
  • Security
  • Application Enablement
  • Distributed Intelligence
  • Increased Attack Surface
  • Threat Diversity
  • Impact and Risk
  • Remediation
  • Protocols
  • Compliance and Regulation

What Can Breach IoT Networks?

  • What can’t?
    • Billions of connected devices
    • Secure and insecure locations
    • Security may or may not be built in
    • Not owned or controlled by IT … but data flows through the network
  • Any node on your network can potentially provide access to the core

Smart City

  • Potential impact to services and public safety
  • REMOTE ACCESS
    • Increased traffic congestion
    • Creation of unsafe conditions
  • SYSTEM CONTROL
    • Device manipulation
    • Remote monitoring
    • Creation of unsafe conditions
  • SERVICE MANIPULATION
    • Environmental degradation
    • System shutdown
    • Lost revenue

IT Breach via OT Network

  • Breached via Stolen Credentials from HVAC Vendor
  • 40 Million Credit And Debit Cards Stolen
  • PII Stolen From 70 Million Customers
  • Reputation Damage*
    • 46% drop in year-over-year profit
    • 5.3% drop in year-over-year revenue
    • 2.5% drop in stock price
  • CEO Fired
  • * Source: KrebsonSecurity, May 2014

Unintended Security Exposures*

  • Farm Feeding System in the U.S.
  • Mine Ventilation System in Romania
  • Hydroelectric Plant in the U.S.
  • * Source: Wired, November 2013

Delivering Security Across the Extended Network

The Secure IoT Architecture – IT Plus OT!

  • Services
  • Application Interfaces
  • Infrastructure Interfaces
  • New Business Models
  • Partner Ecosystem
  • Applications
  • Application Enablement Platform
  • Application Centric Infrastructure
  • Security
  • Data Integration
  • Big Data
  • Analytics
  • Control Systems
  • Application Integration
  • Network and Perimeter Security
  • Physical Security
  • Device-level Security /
  • Anti-tampering
  • Cloud-based Threat Analysis / Protection
  • End-to-End Data Encryption
  • Services

IT and OT are Inherently Different

  • IT
  • OT
  • Connectivity: “Any-to-Any”
  • Network Posture: Confidentiality, Integrity, Availability (CIA)
  • Security Solutions: Cybersecurity; Data Protection
  • Response to Attacks: Quarantine/Shutdown to Mitigate
  • Connectivity: Hierarchical
  • Network Posture: Availability, Integrity, Confidentiality (AIC)
  • Security Solutions: Physical Access Control; Safety
  • Response to Attacks: Non-stop Operations/Mission Critical – Never Stop, Even if Breached

IT/OT Converged Security Model

  • IT
  • DMZ
  • OT
  • Enterprise Network
  • Supervisory
  • Demilitarized Zone
  • Automation & Control
  • Identity Services
  • Cloud
  • Network Security
  • Secure Access
  • Application Control
  • Config Mgmt

Conclusion: Securely Embrace IoT!

  • New challenges require new thinking!
    • avoid operational siloes
    • networking and convergence are key
    • a sound security solution is integrated throughout
    • build for the future
  • Security must be pervasive
    • inside and outside the network
    • device- and data-agnostic
    • proactive and intelligent
  • Intelligence, not data
    • convergence, plus analytics
    • speed is essential for real-time decisions
  • Geneva, Switzerland, 15-16 September 2014
  • Mikhail Kader,
  • DSE, Cisco
  • mkader@cisco.com

Download 4,86 Mb.

Do'stlaringiz bilan baham:
1   2




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish