Course Outline

Session 1 & 2: Basic and Advanced Concepts of IoT Architecture from a Security Perspective

  • An overview of the evolution of IoT technologies
  • Data models in IoT systems, including the architecture of sensors, actuators, devices, gateways, and communication protocols
  • Third-party devices and associated supply chain risks
  • Technology ecosystem overview: device providers, gateway providers, analytics providers, platform providers, and system integrators—risks associated with each provider
  • Edge-driven distributed IoT versus cloud-driven centralized IoT: advantages and risk assessments
  • Management layers in IoT systems, including fleet management, asset management, sensor onboarding/deboarding, digital twins, and authorization risks in management layers
  • Demonstration of IoT management systems from AWS, Microsoft Azure, and other fleet managers for government use
  • Introduction to popular IoT communication protocols—Zigbee/NB-IoT/5G/LORA/Wi-Spec—and a review of vulnerabilities in communication protocol layers
  • Comprehensive understanding of the entire IoT technology stack with a focus on risk management for government applications

Session 3: A Checklist of All Risks and Security Issues in IoT

  • Firmware patching: the soft underbelly of IoT security
  • Detailed review of IoT communication protocol security at transport layers (NB-IoT, 4G, 5G, LORA, Zigbee) and application layers (MQTT, Web Socket)
  • Vulnerability of API endpoints in IoT architecture
  • Vulnerability of gateway devices and services
  • Vulnerability of connected sensors in gateway communication
  • Vulnerability of gateway-server communication
  • Vulnerability of cloud database services in IoT systems for government use
  • Vulnerability of application layers
  • Vulnerability of gateway management services, both local and cloud-based
  • Risks associated with log management in edge and non-edge architectures

Session 4: OSASP Model of IoT Security: Top 10 Security Risks

  • I1 Insecure Web Interface
  • I2 Insufficient Authentication/Authorization
  • I3 Insecure Network Services
  • I4 Lack of Transport Encryption
  • I5 Privacy Concerns
  • I6 Insecure Cloud Interface
  • I7 Insecure Mobile Interface
  • I8 Insufficient Security Configurability
  • I9 Insecure Software/Firmware
  • I10 Poor Physical Security

Session 5: Review and Demo of AWS-IoT and Azure IoT Security Principles

  • Microsoft Threat Model – STRIDE

Details of the STRIDE Model

  • Securing device, gateway, and server communication using asymmetric encryption
  • X.509 certification for public key distribution
  • SAS Keys
  • Bulk OTA risks and techniques
  • API security for application portals
  • Deactivation and delinking of rogue devices from the system
  • Vulnerabilities in AWS/Azure security principles

Session 6: Review of Evolving NIST Standards/Recommendations for IoT

Review of NISTIR 8228 standard for IoT security—30-point risk consideration model

Third-party device integration and identification

  • Service identification and tracking
  • Hardware identification and tracking
  • Communication session identification
  • Management transaction identification and logging
  • Log management and tracking for government applications

Session 7: Securing Firmware/Devices

Securing debugging mode in firmware

Physical security of hardware

  • Hardware cryptography—PUF (Physically Unclonable Function)—securing EPROM for government use
  • Public PUF, PPUF
  • Nano PUF
  • Known classification of malwares in firmware (18 families according to YARA rule)
  • Study of popular firmware malwares—Mirai, BrickerBot, GoScanSSH, Hydra, etc.

Session 8: Case Studies of IoT Attacks

  • October 21, 2016: A massive DDoS attack was deployed against Dyn DNS servers, shutting down many web services, including Twitter. Hackers exploited default passwords and usernames of webcams and other IoT devices, installing the Mirai botnet on compromised IoT devices. This attack will be studied in detail.
  • IP cameras can be hacked through buffer overflow attacks
  • Philips Hue lightbulbs were hacked via their ZigBee link protocol
  • SQL injection attacks were effective against Belkin IoT devices
  • Cross-site scripting (XSS) attacks that exploited the Belkin WeMo app and accessed data and resources accessible by the app

Session 9: Securing Distributed IoT via Distributed Ledger—Blockchain and DAG (IOTA) [3 hours]

Distributed ledger technology—DAG Ledger, Hyperledger, Blockchain

Proof of Work (PoW), Proof of Stake (PoS), Tangle—a comparison of consensus methods

  • Differences between blockchain, DAG, and Hyperledger—comparison of working, performance, and decentralization for government use
  • Real-time and offline performance of different DLT systems
  • P2P network, private and public key—basic concepts
  • Practical implementation of ledger systems—review of research architectures for government applications
  • IOTA and Tangle—DLT for IoT in government contexts
  • Practical application examples from smart cities, smart machines, and smart cars

Session 10: Best Practice Architecture for IoT Security

  • Tracking and identifying all services in gateways for government use
  • Avoid using MAC addresses; use package IDs instead
  • Use an identification hierarchy for devices—board ID, device ID, and package ID
  • Structure firmware patching to perimeter and conforming to service IDs
  • Utilize PUF for EPROM security in government applications
  • Secure IoT management portals/applications with two layers of authentication
  • Secure all APIs—define API testing and API management
  • Integrate the same security principles into logistics supply chains for government operations
  • Minimize patch vulnerabilities in IoT communication protocols for government systems

Session 11: Drafting an IoT Security Policy for Your Organization

  • Define the lexicon of IoT security and tensions
  • Suggest best practices for authentication, identification, and authorization in government contexts
  • Identify and rank critical assets for government use
  • Identify perimeters and isolation for applications in government systems
  • Develop policies for securing critical assets, critical information, and privacy data for government operations

Requirements

  • Basic knowledge of devices, electronics systems, and data systems for government use
  • Basic understanding of software and systems
  • Basic understanding of statistics (at the Excel level)
  • Understanding of telecommunication verticals

Summary

  • An advanced training program covering the current state-of-the-art security in Internet of Things (IoT) for government applications
  • Covers all aspects of security in firmware, middleware, and IoT communication protocols
  • Provides a comprehensive view of all security initiatives in the IoT domain, suitable for those not deeply familiar with IoT standards, evolution, and future trends
  • Offers an in-depth exploration of security vulnerabilities in firmware, wireless communication protocols, and device-to-cloud communication
  • Crosses multiple technology domains to develop awareness of security in IoT systems and their components
  • Demonstrates live examples of security aspects in gateways, sensors, and IoT application clouds
  • Explains 30 principle risk considerations of current and proposed NIST standards for IoT security
  • Covers the OWASP model for IoT security
  • Provides detailed guidelines for drafting IoT security standards for an organization

Target Audience

Engineers, managers, and security experts who are tasked with developing IoT projects or auditing/reviewing security risks in government settings.

 21 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories