Informazioni personali

Cerca nel blog

Translate

Visualizzazione post con etichetta Art. Mostra tutti i post
Visualizzazione post con etichetta Art. Mostra tutti i post

venerdì 12 febbraio 2016

The IoT Files - intro and security

The IoT Files – intro and security

I will start a series of posts on the IoT (Internet o Things) since it seems me that most of the talking about IoT are missing some key aspects.

I will start with a general introduction, taken from a webinar I delivered recently.

There is a lot of rumors around IoT lately. It seems the new holy grail of the technology industry, the panacea that will solve every business pain and will drive us to the next point.

All those talking are interesting, but somehow a little bit apologetic, since there is a lot of things still to be evaluated in an IoT world, and some could give us some headache and concerns.

so let us start trying to understand what we are talking about when we talk about IoT.

IoT,internet of things is the extension of the consumerization of connected device, that will cover much more than we are used nowadays. the key target of the IoT is the User and its world.

This does not means that IoT is not about scada systems or industrial contol systems, or e-government or smart cities. is all about this and more, but the focus point will be the user, the new hyperconnectd guy: mr Guy Smart.

But aren’t we already hyperconnectd with our always present smartphones, tablets and now smartwatch?

What is the difference between us now and mr Smart?

The difference rely on the level of devicesystems connected that are related to the new user. Way more than the simple phone and watch; we can think of wearable devices, medical devices, glasses for augmented reality, smart shoes that tell us how we walk or belt that monitor pour waste and diet.

But My Smart is not only using those stuffs he wear, he is also living in a hyper connected world. driving a smart car (autonomous and more…) on smart roads, with intelligent traffic lights, in a smart city where he find its smart home.

All connected, all sharing information, all dynamically changing status upon the user request and the context.

A way to live quite different from our actually way of life, since everything can modify the behavior related to the heat of the moment.

All this look wonderful, a personalized environment that follow our needs and provide us a completely new experience. A new industrial revolution able to shape our needs and think and way of life.

But is this real? how far are we from this?

To understand what all this means we should start from the definition of Internet of Things. A good definition is the following:

The  Internet of Things ( IoT) refers to the ever-growing network of physical objects that feature an IP address for internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices and systems.

According to most of the analyst this is the main trend we should expect in the next years.

All analysts forecast billions of devices connected, a great hope for a growing business….

  • But is this coming without a price?
  • Is this so easy to achieve?
  • What are the consequences?

 

IoT is a great opportunity, but is also something should make us think about the consequence. as every thing there is always a price to pay, and we should understand what is this price.

I will try to give a short description of 5 aspects related to IoT we should take care of:

  1. Security
  2. Privacy
  3. Infrastructures
  4. Business Models
  5. Culture

IoT and Security

I know that security is on everyone mouth recently, the rising of cyber crime and the warfare has put security under everyone attention.

But yet we are far away from a real understanding of what security really is, and what means make security. We usually focus on particular aspect of the security domain, or on specific technologies, forgetting that make security is a complex affair that cope with behavioral science as well as technology. Is more a process than a product or service.

What should be put us on alert is that in a IoT world the dependency of our lifestyle and life from the devices will be so tight that security will assume a completely new meaning for the normal user. We are not talking about an annoying virus on our laptop, but something that can literally kills us as in the case for medical device or smart drive systems.

IoT bring a lot of security concerns, some quite easy to understand, other alas too often neglected. Let us try to name a few:

Hacking

This is something everyone knows, every years the knowledge about hacking rise up as well as hackers ability. Is a never ending run.  But can we try to imagine what would happen in a world where the number of hackable devices is in the range of billions?

This is something we should take into serious consideration, no OS is secure (sorry Linux, Unix and Mac guys) and we are talking of billions of objects that exchange data, transmit data, manipulate data, collect data through sensors. the attacking surface will become incredibly wider, and the result unpredictable.

The classical reactive approach of OS designer have to be radically modified, since this can be the door for a hell. A new security design approach is needed. And don’t think for a moment that IoT device will have few lines of code and therefore easy to be secured. Even the smallest simplest device will have its sensor and will have to communicate data and receive orders (otherwise wold not be SMART). so there is nothing like a simple OS here. beside the smaller the OS the herder can be to secure and patch it. in bigger environment it is a common operation to wrap the vulnerability into something that solve somehow the problem, will this be possible in the smaller IoT OS?

Cyber Criminals

And if the hacking surface will grow, we can expect also criminal activities to grow and find new way to monetize the risks.

For the ones who works in the Cyber Security arena, it is well known that Cyber criminality move more money than drug and weapon illegal market.  this can only grow, making cyber crime more important than ever. And when something is so important, corruption and collaboration between the underworld and the official ones is to be expected.

So IoT brings with him a great concerns from this point of view.

Cyber Warfare

But if it is not a criminal organization, can be a government. Do we really think that this will be an area where government will not play the part? Do we realize that IoT will be tied to our life, and our productive environment. So targeting the IoT could harm a country more than a conventional war, blocking its productive system.

Science Fiction? Try to remember stuxnet and may be we can agree that this is a plausible scenario: a country that attack the IoT infrastructure in order to harm another country.

And if it is not a state, a government can be a terrorist organization, activism …..

Geopolitical Issues

And if it is not on purpose, may be the system can be harmed by geopolitical issues. In an Hyperconnected world damage can be done even targeting something else.

Censorship

Let’s take censorship as an example. we can not realize that censorship can harm the functionality of a device, at the end we are not talking about nor twitter nor facebook, but…

Take your android phone and go to China, as an example, and you will see directly the effect of censorship on IoT. Your wonderful android functions and services will not work since Google has be banned for censorship reasons from china. (Sure you can use VPN, but please, try to see the picture here).

Errors and Incidents

And even if it is not on purpose, accident and errors can anyway harm the system. probably in ways at the moment we still don’t see, due the complex nature of the various interrelationships between the objects.

Compatibility

And if will be not error or incidents the harm can be done by compatibility issues. At the end you will like to change object or location from time to time. some IoT objects will travel with you, compatibility will become a great issue.

What if you change medical device provider and the new does not support vital data taken from the old one? or if you go in place that does not allow the same level of communication? (may be because encryption is not allowed there).

What More?

Many other scenarios can be recalled related to IoT and security, this is not an exhaustive list, but it is good to make the point. Security is a serious issue in an IoT world.

The classical approach that consider security an “Add ON” of IT and a business weight to avoid have to change dramatically. Security Must become part of normal thinking because the risk is higher than ever.

When consider IoT and security ask yourself:

  • Would you drive or feel safe in a easy to hack car, in a easy to hack road.
  • Would you like to depend on easy to hack medical device?
  • Would you like to count on a hackable safe city system?
  • ….

We have to realize that Security is important in all realms.

It is not just a product add on §(the antivirus….) but we will have to deal with new things like:

Operating System security

  • Vendor Security Approach
  • Service Provider Security System
  • Supply Chain Security

Authentication

Communication security:

  • Reliable
  • Protected

Compatibility

Open Sources vs legacy code

Vulnerability and Vulnerability Disclosure policy

Hacking accidents communication

Training and awareness

Reliability

alas we are still far form the arrival.

Next post I will talk about Privacy in the IoT

The IoT Files - intro and security

The IoT Files – intro and security

I will start a series of posts on the IoT (Internet o Things) since it seems me that most of the talking about IoT are missing some key aspects.

I will start with a general introduction, taken from a webinar I delivered recently.

There is a lot of rumors around IoT lately. It seems the new holy grail of the technology industry, the panacea that will solve every business pain and will drive us to the next point.

All those talking are interesting, but somehow a little bit apologetic, since there is a lot of things still to be evaluated in an IoT world, and some could give us some headache and concerns.

so let us start trying to understand what we are talking about when we talk about IoT.

IoT,internet of things is the extension of the consumerization of connected device, that will cover much more than we are used nowadays. the key target of the IoT is the User and its world.

This does not means that IoT is not about scada systems or industrial contol systems, or e-government or smart cities. is all about this and more, but the focus point will be the user, the new hyperconnectd guy: mr Guy Smart.

But aren’t we already hyperconnectd with our always present smartphones, tablets and now smartwatch?

What is the difference between us now and mr Smart?

The difference rely on the level of devicesystems connected that are related to the new user. Way more than the simple phone and watch; we can think of wearable devices, medical devices, glasses for augmented reality, smart shoes that tell us how we walk or belt that monitor pour waste and diet.

But My Smart is not only using those stuffs he wear, he is also living in a hyper connected world. driving a smart car (autonomous and more…) on smart roads, with intelligent traffic lights, in a smart city where he find its smart home.

All connected, all sharing information, all dynamically changing status upon the user request and the context.

A way to live quite different from our actually way of life, since everything can modify the behavior related to the heat of the moment.

All this look wonderful, a personalized environment that follow our needs and provide us a completely new experience. A new industrial revolution able to shape our needs and think and way of life.

But is this real? how far are we from this?

To understand what all this means we should start from the definition of Internet of Things. A good definition is the following:

The  Internet of Things ( IoT) refers to the ever-growing network of physical objects that feature an IP address for internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices and systems.

According to most of the analyst this is the main trend we should expect in the next years.

All analysts forecast billions of devices connected, a great hope for a growing business….

  • But is this coming without a price?
  • Is this so easy to achieve?
  • What are the consequences?

 

IoT is a great opportunity, but is also something should make us think about the consequence. as every thing there is always a price to pay, and we should understand what is this price.

I will try to give a short description of 5 aspects related to IoT we should take care of:

  1. Security
  2. Privacy
  3. Infrastructures
  4. Business Models
  5. Culture

IoT and Security

I know that security is on everyone mouth recently, the rising of cyber crime and the warfare has put security under everyone attention.

But yet we are far away from a real understanding of what security really is, and what means make security. We usually focus on particular aspect of the security domain, or on specific technologies, forgetting that make security is a complex affair that cope with behavioral science as well as technology. Is more a process than a product or service.

What should be put us on alert is that in a IoT world the dependency of our lifestyle and life from the devices will be so tight that security will assume a completely new meaning for the normal user. We are not talking about an annoying virus on our laptop, but something that can literally kills us as in the case for medical device or smart drive systems.

IoT bring a lot of security concerns, some quite easy to understand, other alas too often neglected. Let us try to name a few:

Hacking

This is something everyone knows, every years the knowledge about hacking rise up as well as hackers ability. Is a never ending run.  But can we try to imagine what would happen in a world where the number of hackable devices is in the range of billions?

This is something we should take into serious consideration, no OS is secure (sorry Linux, Unix and Mac guys) and we are talking of billions of objects that exchange data, transmit data, manipulate data, collect data through sensors. the attacking surface will become incredibly wider, and the result unpredictable.

The classical reactive approach of OS designer have to be radically modified, since this can be the door for a hell. A new security design approach is needed. And don’t think for a moment that IoT device will have few lines of code and therefore easy to be secured. Even the smallest simplest device will have its sensor and will have to communicate data and receive orders (otherwise wold not be SMART). so there is nothing like a simple OS here. beside the smaller the OS the herder can be to secure and patch it. in bigger environment it is a common operation to wrap the vulnerability into something that solve somehow the problem, will this be possible in the smaller IoT OS?

Cyber Criminals

And if the hacking surface will grow, we can expect also criminal activities to grow and find new way to monetize the risks.

For the ones who works in the Cyber Security arena, it is well known that Cyber criminality move more money than drug and weapon illegal market.  this can only grow, making cyber crime more important than ever. And when something is so important, corruption and collaboration between the underworld and the official ones is to be expected.

So IoT brings with him a great concerns from this point of view.

Cyber Warfare

But if it is not a criminal organization, can be a government. Do we really think that this will be an area where government will not play the part? Do we realize that IoT will be tied to our life, and our productive environment. So targeting the IoT could harm a country more than a conventional war, blocking its productive system.

Science Fiction? Try to remember stuxnet and may be we can agree that this is a plausible scenario: a country that attack the IoT infrastructure in order to harm another country.

And if it is not a state, a government can be a terrorist organization, activism …..

Geopolitical Issues

And if it is not on purpose, may be the system can be harmed by geopolitical issues. In an Hyperconnected world damage can be done even targeting something else.

Censorship

Let’s take censorship as an example. we can not realize that censorship can harm the functionality of a device, at the end we are not talking about nor twitter nor facebook, but…

Take your android phone and go to China, as an example, and you will see directly the effect of censorship on IoT. Your wonderful android functions and services will not work since Google has be banned for censorship reasons from china. (Sure you can use VPN, but please, try to see the picture here).

Errors and Incidents

And even if it is not on purpose, accident and errors can anyway harm the system. probably in ways at the moment we still don’t see, due the complex nature of the various interrelationships between the objects.

Compatibility

And if will be not error or incidents the harm can be done by compatibility issues. At the end you will like to change object or location from time to time. some IoT objects will travel with you, compatibility will become a great issue.

What if you change medical device provider and the new does not support vital data taken from the old one? or if you go in place that does not allow the same level of communication? (may be because encryption is not allowed there).

What More?

Many other scenarios can be recalled related to IoT and security, this is not an exhaustive list, but it is good to make the point. Security is a serious issue in an IoT world.

The classical approach that consider security an “Add ON” of IT and a business weight to avoid have to change dramatically. Security Must become part of normal thinking because the risk is higher than ever.

When consider IoT and security ask yourself:

  • Would you drive or feel safe in a easy to hack car, in a easy to hack road.
  • Would you like to depend on easy to hack medical device?
  • Would you like to count on a hackable safe city system?
  • ….

We have to realize that Security is important in all realms.

It is not just a product add on §(the antivirus….) but we will have to deal with new things like:

Operating System security

  • Vendor Security Approach
  • Service Provider Security System
  • Supply Chain Security

Authentication

Communication security:

  • Reliable
  • Protected

Compatibility

Open Sources vs legacy code

Vulnerability and Vulnerability Disclosure policy

Hacking accidents communication

Training and awareness

Reliability

alas we are still far form the arrival.

Next post I will talk about Privacy in the IoT

sabato 2 marzo 2013

Dilbert comic strip for 02/12/2012 from the official Dilbert comic strips archive.

Dilbert_Jan21.gif
Dilbert_Jan21.gif (Photo credit: mrapplegate)

Dilbert comic strip for 02/12/2012 from the official Dilbert comic strips archive.

Dilbert comic strip for 02/12/2012 from the official Dilbert comic strips archive.

Dilbert_Jan21.gif
Dilbert_Jan21.gif (Photo credit: mrapplegate)

Dilbert comic strip for 02/12/2012 from the official Dilbert comic strips archive.

lunedì 8 ottobre 2012

Help request for a personal survey (and first results)

Dear all

as many of you may remeber I’ve asked some time ago to fill a short survey about myself:

I want to thanks all that kindly answered, so now is my turn to return the favour sharing the results I’ve collected as of now.

May be I will make comment soon (mostly on point 8, that could mean I have to improve everything or i have not so big holes at the end )

Of course I would appreciate more result so please if you haven’t could you fill this survey?

Thanks in advance

360° Peer Evaluation Report

1

Overview: responses received


Antonio ierano
Security Consultant and Blogger
Milan Area, Italy

Responses:
received

Time Elapsed
7 days

About the 360° Peer Evaluation Report

This Report is a 360° profile of your personality, skills and impact at your workplace as seen by your colleagues and others in your network. It is a snapshot of your professional indicators. 360° reports are used by thousands of companies and millions of professionals around the world to get an objective, outside view of personal performance and progress. Others often tell you things more objectively than you can see for yourself. Use this report to see how you are seen professionally by others and to advance your career. This report is private and only visible to you.

We recommend at least 30 completed responses in order to get a statistically-valid picture of your professional standing.


2

Your Dominant Work Personality Type


Social

Co-operative, team player, best in group environments, helping hand.

Secondary Personality Types

  • Realistic: Likes to get things done, practical, stable, results-oriented.
  • Enterprising: Competitive, persuasive, energetic, works well outside-the-box.
  • Conventional: Precise, rule-oriented, orderly, works well in highly structured environments.
  • Investigative: Prefers strategy, thinking, organizing, analytical, curious.
  • Artistic: Imaginative, artistic, disorderly, emotional, original.
What is this?

Holland Occupational Themes (RIASEC), developed by the late psychologist John L. Holland, refers to a theory of careers and vocational choice based upon personality types. Each letter or code stands for a particular “type”: Realistic (Doers), Investigative (Thinkers), Artistic (Creators), Social (Helpers), Enterprising (Persuaders), and Conventional (Organizers). Holland’s research shows that personalities seek out and flourish in career environments they fit in. Holland also wrote of his theory that “the choice of a vocation is an expression of personality”. This helps you determine what personality others see you as, and what sort of professions or roles you may be naturally good at based on your type.

Scale:

There are 6 personality types under Holland Occupational Themes (RIASEC). There is no “good” or “bad”, or right or wrong answer. Every type is naturally better at certain roles than others. This does not you cannot succeed at other roles. It shows areas where you have a natural advantage.

  • Realistic: Likes to get things done, practical, stable, results-oriented.
  • Investigative: Prefers strategy, thinking, organizing, analytical, curious.
  • Artistic: Imaginative, artistic, disorderly, emotional, original.
  • Social:: Co-operative, team player, best in group environments, helping hand.
  • Enterprising: Competitive, persuasive, energetic, works well outside-the-box.
  • Conventional: Precise, rule-oriented, orderly, works well in highly structured environments.
Natural-Fit Roles

As ‘Social’, you are better-suited based on your personality type at the following roles:


3

Personality Matches



4

Your Net Promoter Score %


What is this?

Net Promoter Score is a research tool that can be used to gauge how likely people are to recommend you to their colleagues and friends. It was introduced by Reichheld in the 2003 Harvard Business Review. 1% = lowest, 100% = highest. It is used as an indicator for word-of-mouth marketing, repeat business and organic growth at a corporate level. At a personal level, it is used as an indicator for career advancement prospects. The higher your number, the more likely others are to help you advance your career by speaking of you positively, recommending you to their friends and otherwise being conducive to your growth.

Scale:

Red (0 to 50%): BAD.

Others are not likely to help advance your career. You are viewed mostly negatively by your network. You should attempt to connect better with others, foster deeper relationships and be positive. Treat them as you would like to be treated yourself. Being more visible or prominent at the workplace will also help.

Yellow (51% to 80%): OK

You are viewed as average by your network. Some people may help advance your career, while others will not. This is where 60% of the population falls. You should focus on identifying those individuals within your network that think very highly of you and forging deeper ties with them. Work more closely with those that think highly of you. Continue to be more useful to others, and more prominent at work. Ensure your efforts are noticed.

Green (81% to 100%): GREAT

You are viewed very positively by most of your network. Most people see you so favorably that they will help advance your career with glowing recommendations, introductions and connections. They speak of you well even when you are not there. Companies that achieve this score get new customers simply through word-of-mouth buzz. You will similarly get job offers, partnership requests or other new opportunities from your network from time to time. Keep doing what you are doing – your work network loves you and values you highly!

Who uses it?

NPS is used by thousands of companies including Apple, GE, Intuit, Charles Schwab and American Express. Companies use it to gauge customer satisfaction, as well as for employee feedback.

Accuracy

Net Promoter Score is one of the tools used in this report and contains a significant degree of error based on how many people have responded to your survey, as well as your profession. Some roles and professions are easier to rate than others. (eg. Sales exec vs. Fine Art). Take your NPS score in relation to all the other metrics on this report. NPS is also no more statistically significant or predictive than similar “How likely are you to…” questions, but is preferred due to its simplicity and widespread use.


5

Your Most Well-Known Traits


What is this?

These are your most-noticed characteristics by your professional network. These show your strengths. For career advancement and specialization, it is generally a good idea to take up roles and projects that play to your key strengths, also known as “swimming upstream”. This can also give you a more objective assessment of what you’re good at, since self-evaluations are usually highly biased.

Scale:

Respondents can pick from a large selection of traits, and can pick more than one. Traits that are reflective of your professional profile will get shown here.


6

How your network feels about your company’s prospects


What is this?

This is a measure of how your network sees your company’s growth and financial prospects in the next 12 months. It is an outsider’s opinion of how your company is doing. This is how people in the industry and your network see the place you work at.

Scale:

1=lowest 10=highest

Red (1 to 5): Bad. Expect the company to shrink or suffer significantly. Commercial losses. Layoffs. Re- structuring. Expect products to lose market share or fail. Possible bankruptcy, re-financing or shutdown down the road unless things change. The company requires significant outside help to improve or continue functioning. Might be time to start looking for another job.

Yellow (5.1 to 8): OK. Expect the company to grow modestly with limited successes. 70% of companies are in this zone. Company will continue to do well and win in some areas. Compares mostly favorably with competition. Modest hiring and expansion. Stable outlook. You can stay with this company for several years if you’d like.

Green (8.1 to 10): Great! Expect the company to grow fast, gain market share from competitors very quickly. Products are already doing superbly well. Winning key accounts. Great PR or well-recognized brand. Will out- perform the industry or market it is in. Your career will get a huge boost just by being at this company.


7

How your Network feels about Your Career prospects


What is this?

This is a measure of how your network sees your personal career prospects in the next 12 months. It is an outsider’s opinion of how skilled, valuable and useful you are compared to others in your role or profession. This rating may be influenced somewhat by prospects for your company or industry at large.

Scale:

1=lowest 10=highest

Red (1 to 5): Bad. Your skills, usefulness and value are less than similar professionals in your field. Your network thinks that you are lagging behind others, and over time, these differences will grow larger and you will fall behind. Focus on the basics and try to figure out where you are lagging and why. It’s never too late to start improving.

Yellow (5.1 to 8): OK. You are average or a little above-average compared to similar professionals in your field. Your network thinks you compare favorably to others and will enjoy modest successes in the next 12 months. Stable career advancement prospects. You are respected by your colleagues and valued for your contributions. Focus on your key strengths to continue improving.

Green (8.1 to 10): Great! You are well above-average compared to similar professionals in your field. Your colleagues think you will hit it out of the park and are a rockstar at what you do. You are very well-respected in your industry or profession, perhaps even holding celebrity-like status. Getting to the top is easier than staying at the top however, and you will need to keep working hard to stay where you are.


8

What can you most improve upon?


What is this?

Nobody is perfect, not even Bill Gates or Steve Jobs. These are areas where your colleagues feel you can improve. By focusing on some of these areas, you can significantly improve your life at work and your relationships with your colleagues. This will help you become more well-rounded and balanced, and address any “rough edges” that hamper your ability to work with others.

This work is licensed under a Creative Commons Attribution By license.