1 27 02 2020 2 cellular connectivity anywhere in the world
play

1 27/02/2020 2 Cellular Connectivity Anywhere In The World (2G, - PowerPoint PPT Presentation

1 27/02/2020 2 Cellular Connectivity Anywhere In The World (2G, 3G, 4G, LTE-M, soon NB-IoT) 180+ countries 540+ networks We are where you are In the Cloud Intra-Cloud Peering Connectivity Meta- Global Reliable and Secure for Device Data


  1. 1

  2. 27/02/2020 2

  3. Cellular Connectivity Anywhere In The World (2G, 3G, 4G, LTE-M, soon NB-IoT) 180+ countries 540+ networks

  4. We are where you are In the Cloud Intra-Cloud Peering Connectivity Meta- Global Reliable and Secure for Device Data delivered to Distributed Infrastructure Remote Access Cloud Service

  5. Our Customers – IoT Solutions Smart Home Smart City Health Retail Agriculture Alarm & Surveillance Parking Meter Fall Detection Inventory Mgmt Crop yield & storage Pest Control Traffic Control Health Monitoring Payment (PoS) Soil/nutrient Smart Metering Waste Management Remote Diagnosis Digital store Fences mon. Leak Detection Public Safety Medication Mgmt Customer Satisfaction Livestock surveillance Asset Mmgmt Manufacturing Transportation Environment Fleet Mgmt Air/water quality Stock inventory Mgmt Vehicle Diagnostics Animal tracking Noise Radiation Predictive Maintenance Connected Car Container tracking Flooding Safety Monitoring Rail monitoring Good temperature Solar & Air Energy Machine monitoring Art & Relic Preservation • B2B2B and B2C • Selling Connectivity as part of their services 6

  6. What is the motivation for cybercriminals? Individuals Government Moral – Religious – Criminal and Industry Political Groups Business Fame / Revenge Intelligence Purpose Money / Revenue

  7. Why are IoT devices in the focus of attackers?

  8. How do cybercriminals make money with IoT devices? Denial-of-Service Attack as a Service Ransomware Crypto Currency Mining (with less success)

  9. What does a common IoT attack look like? Mirai/Chalubo/Liquorbot • Attackers scan the public internet for IoT devices and utilize remote access ports to login (using brute force passwords) • Once control over the device execute a DDoS attack on a victim Stuxnet • Utilize exploits of windows machines and then spreads to Siemens SCADA PLCs in the same network – executing commands on the PLC • damaged e.g. Iranian atomic program Brickerbot Simplified Mirai attack scheme • Similar to Mirai – remote access / public internet and then making device unusable (brick)

  10. Top 5 cellular features for IoT device security 25+ Best Practices and cellular features to secure IoT devices and applications. Download here https://www.emnify.com/guide-for-cellular-iot-security

  11. Top 1: Secure Remote Access Mirai attack vector: Remote Access via public reachable address Static / Dynamic IP Private / Public IP address address of device Private IP - takes device off public Internet - Certificate based Static IP - allows remote access without dynamic DNS service authentication - Private key encryption Remote Access via VPN, by authenticating with cellular connectivity provider to get access to the device

  12. Top 2: Closing the Internet Gap Attack vector: Data Transmission over Public Internet Data secured in the network operator infrastructure using SIM authentication & data encryption Security Gap – between Mobile network and Application Infrastructure

  13. Top 2: Closing the Internet Gap Traditional - Private APN with IPsec Secure Intra-Cloud Connect APN • Private APNs - public IP addresses used • Intra-cloud connect (no public IPs) to establish secure tunnel • Setup in minutes • Devices and application can use private IP • Complete cloud service model addresses to communicate (no NAT) • Device and application in same VPC – • Data encrypted from infrastructure to cloud secure data transport and remote access • Secure remote access • ~x weeks to setup

  14. Top 3: Cellular Data Firewall Mirai attack vector: Infected Device can be controlled by attacker and attack victim (illegitimate traffic destinations)

  15. Top 4: Voice and SMS Service Firewall SMS attacks Voice Fraud • In case an attacker gets control of devices – via Data, SMS and make • Use SMS to trigger action on Fall 2019 premium calls SIM applet (S@T and Wireless 28 billion $ SIMjacker Internet Browser) • International Revenue Shared fraud in And 2019 fraud - company providing the • Actions: send location, make WIB attack premium number and the one an SMS, make a call renting sharing revenues A2P SMS Voice Internal SMS External SMS ON OFF MT/MO SMS

  16. Top 5: Connectivity Monitoring via Real-Time Datastreamer • Connectivity Data needs to be part of anomaly detection – requires 360° view on system • User Error vs. Attack • Real-Time requirements • Operational Service Dashboard

  17. Summary: Cellular Security Benefits Prevents Mirai Own private Central Control Cellular is a attacks - Central Monitoring network between of connectivity separate network Remote access, for anomaly all devices and security per device (Stuxnet) Closing the gap, detection applications or group Firewall 25+ Best Practices and cellular features to secure IoT devices and applications. With utilizing cellular connectivity features – the most common IoT attacks are prevented. Download here https://www.emnify.com/guide-for-cellular-iot-security

  18. 19

Recommend


More recommend