Академический Документы
Профессиональный Документы
Культура Документы
Abstract
More things are being connected to address a growing
range of business needs. In fact, by 2020, more than 50
billion things will connect to the Internetseven times our
human population. Examples are wearable health and
performance monitors, connected vehicles, smart grids,
connected oilrigs, and connected manufacturing. This
Internet of Things (IoT) will revolutionize the way we work,
live, play, and learn.
Inadequate security will be a critical barrier to large-scale
deployment of IoT systems and broad customer adoption of
IoT applications. Simply extending existing IT security
architectures to the IoT will not be sufficient. The IoT world
requires new security approaches, creating fertile ground
for innovative and disruptive thinking and solutions.
Agenda
Introduction
Extraordinary Benefits
Major Security Challenges
Delivering Security Across the
Extended Network
Process
Connecting People in
More Relevant, Valuable
Ways
IoE
Data
Things
30
20
BILLIONS OF DEVICES
40
50
Billion
Smart Objects
Rapid
Adoption
Rate of Digital
Infrastructure:
5X Faster Than
Electricity and
Telephony
25
Inflection
Point
12.5
10
6.8
7.6
TIMELIN
E
2010
7.2
World
Population
2015
2020
ROUTE OPTIMIZATION
CRITICAL SENSING
Smart City
CONNECTED TRAFFIC SIGNALS
Reduced congestion
Improved emergency services response times
Lower fuel usage
Increased efficiency
Power and cost savings
New revenue opportunities
CITY SERVICES
Online entertainment
Mapping, dynamic re-routing, safety and
security
CONNECTED SENSORS
URBAN CONNECTIVITY
Reduced congestion
Increased efficiency
Safety (hazard avoidance)
Data
Integration
Big Data
Partner Ecosystem
Analytics
Applications
Applications
Control
Systems
Application
Integration
Application Interfaces
Unified
Platform
APPLICATION
ENABLEMENT
Unified
Platform PLATFORM
APPLICATION
ENABLEMENT
PLATFORM
Infrastructure Interfaces
APPLICATION
CENTRIC
APPLICATION Infrastructure
CENTRIC INFRASTRUCTURE
INFRASTRUCTURE
Infrastructure
Converged,
Managed Network
Resilience at
Scale
Security
Security
Distributed
Intelligence
Application
Enablement
Any node on your network can potentially provide access to the core
Smart City
REMOTE ACCESS
SYSTEM CONTROL
Device manipulation
Remote monitoring
Creation of unsafe conditions
SERVICE MANIPULATION
Environmental degradation
System shutdown
Lost revenue
Hydroelectric Plant in
the U.S.
Data
Data
Integrati
Integrati
on
on
Big
Big Data
Data
Partner Ecosystem
Analytics
Applications
Analytics
Applications
Control
Control
Systems
Systems
Applicati
Applicati
on
on
Integrati
Integrati
on
on
Application Interfaces
Services
Application
Application Enablement
Enablement Platform
Platform
Cloud-based
Threat Analysis
/ Protection
Network and
Perimeter
Security
Security
Security
Physical
Security
Infrastructure Interfaces
Application
Application Centric
Centric Infrastructure
Infrastructure
Device-level
Security /
Anti-tampering
End-to-End
Data
Encryption
IT
Connectivity: Any-to-Any
OT
Connectivity: Hierarchical
Network Posture:
Confidentiality, Integrity,
Availability (CIA)
Network Posture:
Availability, Integrity,
Confidentiality (AIC)
Security Solutions:
Cybersecurity; Data
Protection
Security Solutions:
Physical Access Control;
Safety
Response to Attacks:
Quarantine/Shutdown to
Mitigate
Config Mgmt
Supervisory
Secure Access
OT
Identity Services
Demilitarized Zone
Application Control
DMZ
Network Security
Enterprise Network
Cloud
IT
Mikhail Kader,
DSE, Cisco
mkader@cisco.com