SlideShare a Scribd company logo
1 of 26
Download to read offline
Scenarios for the age of everything on line
Mobile and Social Everything
Smart to Smart Everything
The Internet of Things
Clouds of Things
IntelligentThings
Repurposing
Recycling
ReusePeter Cochrane
cochrane.org.uk
ca-global.biz
From Identity to Ownership Theft
A  looming  threat  
Everything of value is the next target
wnership theft
Ownership
Maintenance
Usage
Updates
Production
++++
LogsComing  soon  aN  IoT/CoT  Future  
Everything produced tagged, tracked, on-line
• material sourcing
• manufacturing history
• distribution and supply chain
• purchase and ownership details
• application, usage, maintenance, repair
• repurposing, reuse, recycling sequence
• +++
Ownership
Maintenance
Usage
Updates
Production
++++
Logs
securing  all  logs  vital  
No solutions engineered so far !
• illegal access has to be prevented
• safety and sustainability at stake
• market damage a certainty
• value and validity in danger
• eForgery a real prospect
• ownership is at risk
• +++
Log Access Authority ?
• Producers
• Suppliers
• Repairer
• Maintainer
• Purchaser
• Government
• Agencies
• +++
Log Security ?
• Public Key
• Multi-Layer
• Governance
• +++
Ownership
Maintenance
Usage
Updates
Production
++++
Logs
log(s)  Protection  
Ye t t o b e e n g i n e e r e d !
• cached / distributed master logs ?
• uniform or speciated solution(s) ?
• embedded public key variants ?
• common or variable formats ?
• global standards authority ?
• multiple key authorities ?
• diverse OS and apps ?
• diverse hardware ?
• diverse protocols ?
• evolutionary ?
• +++
Primary Security ?
• Access mechanisms
• Malware protection
• Timely adaptation
• Embedded AI
• Networks
• Protocols
• Ports
• ISPs
• +++
networked  Protection  
New levels of proactive thinking
• design security into the IoT / CoT now
• adopt collaboration as a primary tool
• do not continue on the back foot
• anticipate/plan for worse cases
• embed security at every level
• create a global security plan
• consolidate resources
• share all experiences
• detect and react fast
• automate with AI
• +++
Exploit the new degrees of freedom offered by Clouds
Do not stumble blindly into the IoT / CoT future naked
there  are  no  silver  bullets  
O n l y a g row i n g ra n ge o f t e c h n i q u e s
• staying ahead of developing threats is vital
• use all the old tried and tested solutions
• plus a growing range of new an novel
• this is an evolving space not static
• continual adaptation is key
• multiple solutions only
• concatenation/layered
• real time sharing
• +++
Security  history  
A retroactive patchwork
Growing commercial disruption
A patchwork of measures
Huge damage potential
No proactive thinking
Accelerating threat
Divided resources
Underinvested
Rogue states
Global Scale
Rising costs
MAD
Hackers
Criminals
Rogue states
N o s t r a t e g y
what  we  understand  
Given our experiences to date
Attacking is more fun than defence
Malware protection is not enough
The threats are always adapting
More attackers than defenders
Networking increases the threat
The risks are always growing
More devices sees more risk
People are the weakest link
There is always a threat
Firewalls do not work
A
New
Strategy
Imperative
what  we  understand  
Given our experiences to date
This is extremely weak & insufficient
Multi-factor variants only a temp fix
We need far more sophistication
We need something easier
Subliminal factors work well
Full integration required
Dongles are impractical
What we know is hidden
Who we are is implicit
What we do habitual
Broader
Thinking
Imperative
what  we  understand  
Given our experiences to date
Device designers have to rethink
Service provides have to rethink
Everyone has to be proactive
Devices have to be proactive
Individuals need protecting
Devices need protecting
Adaptation is fundamental
Early detection a necessity
Sharing is fundamental
Proactivity is vital
M o r e
Resources
R e q u i r e d
what  we  understand  
Given our experiences to date
A good attacker makes a good defender
Habituality is a shared weakness
Thinking like the enemy is vital
Cross platform attacks the new norm
Cross app exposure now common
Early detection and action are key
War gaming is necessary
Dedicated teams needed
AI engagement needed
More
Investment
E s s e n t i a l
THE  ATTACK  SURFACE  
I s a b o u t t o b e w a r p e d
Thousands of Cloud Species
More connectivity modes
More mobile than fixed
New working practices
More on-line than off
The internet of things
Clouds of things
Distributed storage
WiFi domination
Apps on line Greater
Variability
in Everything
Identity  theft    
I t i s s o v e r y e a s y !
Lax security protocols and procedures
Spoof bank calls and paperwork
Big Data, Meta Data analysis
Bogus call centres/services
Spoof eMails, TXT, IMs
Government records
Institutional records
Face to face surveys
Social networking
Company pages
On-line surveys
Home pages
Data mining
Broader
Protection
N e c e s s a r y
ownership  theft    
C o u l d b e e v e n e a s i e r !
Lax security protocols and procedures
Old technologies mixed with the new
Crack one item gives access to all ?
Crack one item to acces the network
Change/control all ownerships
Use ownership as collateral
Ownership affords validity
Viral step and repeat
Creates new crimes
Things as hostages
eBlackmail
+++
Broader
Protection
N e c e s s a r y
Axiomatic  for  sure    
I t i s t i m e t o t h i n k a g a i n !
If we do nothing new things will get worse
Non stop learning & adaptation required
Acting in isolation guarantees failure
Continual monitoring necessary
Machines action trumps humans
Networking and sharing are key
Early detection and action vital
Integrated security is a must
Localised quarantene vital
Every level to be protected
Every device proactive
All networks proactive
A New
Era For
Security
an  obvious  analogy    
T h e e x i s t e n c e t h e o r e m !
A ubiquitous/universal auto-immune system
Initially engineered to meet known threats
Augmented by ‘timely code inoculation'
Continually learning & adapting
Deployed at every network level
Globally applied and adopted
Many variants/contributions
Industry wide adoption
Full integration a must
Device cooperation A New
Form of
Securit y
the  practicality    
B e y o n d a c o n c e p t !
Hard malware traps on every chip and card
And on every device, card, shelf, suit, floor
Also all network elements/components
Soft malware traps in all code everywhere
Automatic experience/solution sharing
Fully automated response/reporting
Resource sharing and adaptation
Many variants & contributions
Evolution dominates design
Industry wide adoption
Full integration
Behaviour
Emmeregent
& Unpredictable
complexity  status  
A mix of clean and infected
Broadcasting
Malware
Responding
with updated
protection Wider
Network
Updated
Latest
Solution
Update
Dynamic isolation of infected
devices and components
leading to repair
a  multiplicity  of  channels  
Attack exposure/thwarting via access diversity
BlueTooth
Short Range
Device to Device
Device to Cloud
Attacks seldom isolated or indeed single sourced
Attacks not restricted to a single channel
Defence opportunities in channel diversity
A plurality of channel protection
Real time channel collaboration
Diverse support access
Distributed info sharing
Dynamic access hopping
Secure attack isolation
WiFi/WiMax
Medium Range
WLAN/Cloud
3, 4, 5, 6 G
Long Range
Device to Net
Device to Cloud
SatCom
Broadcast
Integrated and intelligent
security systems embedded
into product and all components
protocols,  techniques,  AI  
Being considered but still in the making
Interfaces ?
Encryption ?
Strategies ?
Collaborations ?
Hardware ?
Protocols?
Standards?
Software ?
Systems ?
Players ?
Groups?
Nets ?
Clouds? ?
?
?
?
?
A lot to be done in
a very short time !
Lone Hacker
$1Bn
$100M
$10M
$1M
$100k
$10k
Organised Crime
Hacker Groups
Companies
Relative
Spending/
Resources
Rogue States
Gov Agencies
Institutions
Distribution  of  resources  
The misguided, good, bad, and the rogues !
Lone Hacker
$1Bn
$100M
$10M
$1M
$100k
$10k
Organised Crime
Hacker Groups
Companies
Relative
Spending/
Resources
Rogue States
Gov Agencies
Institutions
Relative  weight  of  resources  
How many, how capable, aggregated capabilities
~1000s
~100s
~10,000s
~1000s
~1000s
~10s
~100s
Good
Relative  resources  
The ratio of aggregated good to bad
Bad
> 3:1
Sufficient for good to prevail over bad !
But ‘bad’ shares resources and knowledge
Whilst ‘good’ operates by ‘need to know’
Sharing knowledge and resources is vital
to assure success !
Best estimate assuming equally
good people and technical
resources on both side of the line:
we  have  to  get  this  right  
Fa i l u r e c o u l d b e c a t a s t r o p h i c !
Getting it all right on the night is impossible
Rapid evolution is the obvious answer
Fast response and adaptation wins
Keeping ahead of the enemy
Integration of all resources
Investing appropriately
Thinking well ahead
Acting well in time
No relaxation
Thank You
cochrane.org.uk
ca-global.biz
????

More Related Content

What's hot

Diy (Health) Care
Diy (Health) CareDiy (Health) Care
Diy (Health) Care
University of Hertfordshire
 
A STATE OF MIND - Technology, Change, and Wellbeing
A STATE OF MIND - Technology, Change, and WellbeingA STATE OF MIND - Technology, Change, and Wellbeing
A STATE OF MIND - Technology, Change, and Wellbeing
University of Hertfordshire
 
Big data to big understanding
Big data to big understandingBig data to big understanding
Big data to big understanding
University of Hertfordshire
 
Connect, communicate, collaborate
Connect, communicate, collaborateConnect, communicate, collaborate
Connect, communicate, collaborate
University of Hertfordshire
 
Talks submitted
Talks submittedTalks submitted
Talks submitted
Kim Minh
 
The Ethics of Engineering and Business
The Ethics of Engineering and BusinessThe Ethics of Engineering and Business
The Ethics of Engineering and Business
University of Hertfordshire
 

What's hot (20)

Networks for An Infinite Service Future
Networks for An Infinite Service FutureNetworks for An Infinite Service Future
Networks for An Infinite Service Future
 
Diy (Health) Care
Diy (Health) CareDiy (Health) Care
Diy (Health) Care
 
Future of work.compressed
Future of work.compressedFuture of work.compressed
Future of work.compressed
 
A STATE OF MIND - Technology, Change, and Wellbeing
A STATE OF MIND - Technology, Change, and WellbeingA STATE OF MIND - Technology, Change, and Wellbeing
A STATE OF MIND - Technology, Change, and Wellbeing
 
Big data to big understanding
Big data to big understandingBig data to big understanding
Big data to big understanding
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Privacy for Mobile Sensing Systems
Privacy for Mobile Sensing SystemsPrivacy for Mobile Sensing Systems
Privacy for Mobile Sensing Systems
 
Connect, communicate, collaborate
Connect, communicate, collaborateConnect, communicate, collaborate
Connect, communicate, collaborate
 
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
 
Talks submitted
Talks submittedTalks submitted
Talks submitted
 
The Ethics of Engineering and Business
The Ethics of Engineering and BusinessThe Ethics of Engineering and Business
The Ethics of Engineering and Business
 
Aux slide for session 1
Aux slide for session 1Aux slide for session 1
Aux slide for session 1
 
Privacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsPrivacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of Things
 
Cim 4.0 7 nuggets of wisdom
Cim 4.0   7 nuggets of wisdomCim 4.0   7 nuggets of wisdom
Cim 4.0 7 nuggets of wisdom
 
4 ir explained correctly
4 ir explained correctly4 ir explained correctly
4 ir explained correctly
 
How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?
 
Career implications for the Business Analyst in the age of digital disruption
Career implications for the Business Analyst in the age of digital disruptionCareer implications for the Business Analyst in the age of digital disruption
Career implications for the Business Analyst in the age of digital disruption
 
Rogers Connected Workplace report 2013
Rogers Connected Workplace report 2013Rogers Connected Workplace report 2013
Rogers Connected Workplace report 2013
 
Lifted by the Cloud
Lifted by the CloudLifted by the Cloud
Lifted by the Cloud
 
Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspace
 

Viewers also liked

The infinite Security of Clouds (Madeira Networks 2014 Keynote)
The infinite Security of Clouds (Madeira Networks 2014 Keynote)The infinite Security of Clouds (Madeira Networks 2014 Keynote)
The infinite Security of Clouds (Madeira Networks 2014 Keynote)
University of Hertfordshire
 
Fibre broadband futures
Fibre broadband futuresFibre broadband futures
Fibre broadband futures
University of Hertfordshire
 
5G The Big Game Changer ?
5G The Big Game Changer ?5G The Big Game Changer ?
5G The Big Game Changer ?
University of Hertfordshire
 
Power point alzheimer (1)
Power point alzheimer (1)Power point alzheimer (1)
Power point alzheimer (1)
Cristina romero
 
Trastornos específicos del lenguaje
Trastornos específicos del lenguajeTrastornos específicos del lenguaje
Trastornos específicos del lenguaje
Tami.Marimar
 
Que es un guerrillero - Moral y Disciplina de los Combatientes Revolucionarios
Que es un guerrillero  - Moral y Disciplina de los Combatientes RevolucionariosQue es un guerrillero  - Moral y Disciplina de los Combatientes Revolucionarios
Que es un guerrillero - Moral y Disciplina de los Combatientes Revolucionarios
alfredozitarrosa
 
present trans
present transpresent trans
present trans
PTF
 

Viewers also liked (18)

Small data big impact
Small data big impactSmall data big impact
Small data big impact
 
Why the cloud ?
Why the cloud ?Why the cloud ?
Why the cloud ?
 
Why isn't my lap top intelligent ?
Why isn't my lap top intelligent ?Why isn't my lap top intelligent ?
Why isn't my lap top intelligent ?
 
Data, meta data, knowledge & intelligence
Data, meta data, knowledge & intelligenceData, meta data, knowledge & intelligence
Data, meta data, knowledge & intelligence
 
The infinite Security of Clouds (Madeira Networks 2014 Keynote)
The infinite Security of Clouds (Madeira Networks 2014 Keynote)The infinite Security of Clouds (Madeira Networks 2014 Keynote)
The infinite Security of Clouds (Madeira Networks 2014 Keynote)
 
Fibre broadband futures
Fibre broadband futuresFibre broadband futures
Fibre broadband futures
 
5G The Big Game Changer ?
5G The Big Game Changer ?5G The Big Game Changer ?
5G The Big Game Changer ?
 
Block Chain Basics
Block Chain BasicsBlock Chain Basics
Block Chain Basics
 
Power point alzheimer (1)
Power point alzheimer (1)Power point alzheimer (1)
Power point alzheimer (1)
 
Proyecto
ProyectoProyecto
Proyecto
 
FIWARE accelerator projects 2015
FIWARE accelerator projects 2015FIWARE accelerator projects 2015
FIWARE accelerator projects 2015
 
AMOP MONO K
AMOP MONO K AMOP MONO K
AMOP MONO K
 
Diplomado
DiplomadoDiplomado
Diplomado
 
Lean Thinking
Lean ThinkingLean Thinking
Lean Thinking
 
Trastornos específicos del lenguaje
Trastornos específicos del lenguajeTrastornos específicos del lenguaje
Trastornos específicos del lenguaje
 
Necesito Un Abrazo.
Necesito Un Abrazo.Necesito Un Abrazo.
Necesito Un Abrazo.
 
Que es un guerrillero - Moral y Disciplina de los Combatientes Revolucionarios
Que es un guerrillero  - Moral y Disciplina de los Combatientes RevolucionariosQue es un guerrillero  - Moral y Disciplina de los Combatientes Revolucionarios
Que es un guerrillero - Moral y Disciplina de los Combatientes Revolucionarios
 
present trans
present transpresent trans
present trans
 

Similar to From Identity to Ownership Theft

What is Cybersecurity and career paths.
What is Cybersecurity and career paths.What is Cybersecurity and career paths.
What is Cybersecurity and career paths.
The Whole World News
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 

Similar to From Identity to Ownership Theft (20)

Cybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join NowCybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join Now
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
IoT security
IoT securityIoT security
IoT security
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
 
Sophos
SophosSophos
Sophos
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
What is Cybersecurity and career paths.
What is Cybersecurity and career paths.What is Cybersecurity and career paths.
What is Cybersecurity and career paths.
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
How to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USMHow to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USM
 

More from University of Hertfordshire

The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
University of Hertfordshire
 
Thermodynamics - Laws Embracing Our Universe
Thermodynamics -  Laws Embracing Our UniverseThermodynamics -  Laws Embracing Our Universe
Thermodynamics - Laws Embracing Our Universe
University of Hertfordshire
 
Applied Science - Engineering Systems
Applied Science - Engineering SystemsApplied Science - Engineering Systems
Applied Science - Engineering Systems
University of Hertfordshire
 
IoT Yet to Come
IoT Yet to ComeIoT Yet to Come
Resurgence of Technology Driven Change
Resurgence of Technology Driven ChangeResurgence of Technology Driven Change
Resurgence of Technology Driven Change
University of Hertfordshire
 
Cyber Portents and Precursors
Cyber Portents and PrecursorsCyber Portents and Precursors
Cyber Portents and Precursors
University of Hertfordshire
 
THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS
University of Hertfordshire
 
Quantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence MathematicallyQuantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence Mathematically
University of Hertfordshire
 
Cyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The EnemyCyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The Enemy
University of Hertfordshire
 
Society 5.0 Redefined
Society 5.0 RedefinedSociety 5.0 Redefined
Society 5.0 Redefined
University of Hertfordshire
 
The Future WorkScape
The Future WorkScapeThe Future WorkScape
The Future WorkScape
University of Hertfordshire
 
Engineering Reliability and Resilience
Engineering Reliability and ResilienceEngineering Reliability and Resilience
Engineering Reliability and Resilience
University of Hertfordshire
 
TRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESSTRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESS
University of Hertfordshire
 

More from University of Hertfordshire (20)

The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Future Telecoms Challenges & Opportunities
Future Telecoms Challenges & OpportunitiesFuture Telecoms Challenges & Opportunities
Future Telecoms Challenges & Opportunities
 
Thermodynamics - Laws Embracing Our Universe
Thermodynamics -  Laws Embracing Our UniverseThermodynamics -  Laws Embracing Our Universe
Thermodynamics - Laws Embracing Our Universe
 
Applied Science - Engineering Systems
Applied Science - Engineering SystemsApplied Science - Engineering Systems
Applied Science - Engineering Systems
 
IoT Yet to Come
IoT Yet to ComeIoT Yet to Come
IoT Yet to Come
 
The Scientific Meme
The Scientific Meme The Scientific Meme
The Scientific Meme
 
Uncanny Valley and Human Destiny
Uncanny Valley and Human DestinyUncanny Valley and Human Destiny
Uncanny Valley and Human Destiny
 
Resurgence of Technology Driven Change
Resurgence of Technology Driven ChangeResurgence of Technology Driven Change
Resurgence of Technology Driven Change
 
Society 5.0: A Vital Symbiosis
Society 5.0: A Vital SymbiosisSociety 5.0: A Vital Symbiosis
Society 5.0: A Vital Symbiosis
 
Cyber Portents and Precursors
Cyber Portents and PrecursorsCyber Portents and Precursors
Cyber Portents and Precursors
 
Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?
 
THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS
 
Quantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence MathematicallyQuantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence Mathematically
 
Technologies That Will Change Everything
Technologies That Will Change EverythingTechnologies That Will Change Everything
Technologies That Will Change Everything
 
Cyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The EnemyCyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The Enemy
 
Society 5.0 Redefined
Society 5.0 RedefinedSociety 5.0 Redefined
Society 5.0 Redefined
 
The Future WorkScape
The Future WorkScapeThe Future WorkScape
The Future WorkScape
 
Engineering Reliability and Resilience
Engineering Reliability and ResilienceEngineering Reliability and Resilience
Engineering Reliability and Resilience
 
Smart Materials and Structures
Smart Materials and StructuresSmart Materials and Structures
Smart Materials and Structures
 
TRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESSTRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESS
 

From Identity to Ownership Theft

  • 1. Scenarios for the age of everything on line Mobile and Social Everything Smart to Smart Everything The Internet of Things Clouds of Things IntelligentThings Repurposing Recycling ReusePeter Cochrane cochrane.org.uk ca-global.biz From Identity to Ownership Theft
  • 2. A  looming  threat   Everything of value is the next target wnership theft
  • 3. Ownership Maintenance Usage Updates Production ++++ LogsComing  soon  aN  IoT/CoT  Future   Everything produced tagged, tracked, on-line • material sourcing • manufacturing history • distribution and supply chain • purchase and ownership details • application, usage, maintenance, repair • repurposing, reuse, recycling sequence • +++
  • 4. Ownership Maintenance Usage Updates Production ++++ Logs securing  all  logs  vital   No solutions engineered so far ! • illegal access has to be prevented • safety and sustainability at stake • market damage a certainty • value and validity in danger • eForgery a real prospect • ownership is at risk • +++ Log Access Authority ? • Producers • Suppliers • Repairer • Maintainer • Purchaser • Government • Agencies • +++ Log Security ? • Public Key • Multi-Layer • Governance • +++
  • 5. Ownership Maintenance Usage Updates Production ++++ Logs log(s)  Protection   Ye t t o b e e n g i n e e r e d ! • cached / distributed master logs ? • uniform or speciated solution(s) ? • embedded public key variants ? • common or variable formats ? • global standards authority ? • multiple key authorities ? • diverse OS and apps ? • diverse hardware ? • diverse protocols ? • evolutionary ? • +++ Primary Security ? • Access mechanisms • Malware protection • Timely adaptation • Embedded AI • Networks • Protocols • Ports • ISPs • +++
  • 6. networked  Protection   New levels of proactive thinking • design security into the IoT / CoT now • adopt collaboration as a primary tool • do not continue on the back foot • anticipate/plan for worse cases • embed security at every level • create a global security plan • consolidate resources • share all experiences • detect and react fast • automate with AI • +++ Exploit the new degrees of freedom offered by Clouds Do not stumble blindly into the IoT / CoT future naked
  • 7. there  are  no  silver  bullets   O n l y a g row i n g ra n ge o f t e c h n i q u e s • staying ahead of developing threats is vital • use all the old tried and tested solutions • plus a growing range of new an novel • this is an evolving space not static • continual adaptation is key • multiple solutions only • concatenation/layered • real time sharing • +++
  • 8. Security  history   A retroactive patchwork Growing commercial disruption A patchwork of measures Huge damage potential No proactive thinking Accelerating threat Divided resources Underinvested Rogue states Global Scale Rising costs MAD Hackers Criminals Rogue states N o s t r a t e g y
  • 9. what  we  understand   Given our experiences to date Attacking is more fun than defence Malware protection is not enough The threats are always adapting More attackers than defenders Networking increases the threat The risks are always growing More devices sees more risk People are the weakest link There is always a threat Firewalls do not work A New Strategy Imperative
  • 10. what  we  understand   Given our experiences to date This is extremely weak & insufficient Multi-factor variants only a temp fix We need far more sophistication We need something easier Subliminal factors work well Full integration required Dongles are impractical What we know is hidden Who we are is implicit What we do habitual Broader Thinking Imperative
  • 11. what  we  understand   Given our experiences to date Device designers have to rethink Service provides have to rethink Everyone has to be proactive Devices have to be proactive Individuals need protecting Devices need protecting Adaptation is fundamental Early detection a necessity Sharing is fundamental Proactivity is vital M o r e Resources R e q u i r e d
  • 12. what  we  understand   Given our experiences to date A good attacker makes a good defender Habituality is a shared weakness Thinking like the enemy is vital Cross platform attacks the new norm Cross app exposure now common Early detection and action are key War gaming is necessary Dedicated teams needed AI engagement needed More Investment E s s e n t i a l
  • 13. THE  ATTACK  SURFACE   I s a b o u t t o b e w a r p e d Thousands of Cloud Species More connectivity modes More mobile than fixed New working practices More on-line than off The internet of things Clouds of things Distributed storage WiFi domination Apps on line Greater Variability in Everything
  • 14. Identity  theft     I t i s s o v e r y e a s y ! Lax security protocols and procedures Spoof bank calls and paperwork Big Data, Meta Data analysis Bogus call centres/services Spoof eMails, TXT, IMs Government records Institutional records Face to face surveys Social networking Company pages On-line surveys Home pages Data mining Broader Protection N e c e s s a r y
  • 15. ownership  theft     C o u l d b e e v e n e a s i e r ! Lax security protocols and procedures Old technologies mixed with the new Crack one item gives access to all ? Crack one item to acces the network Change/control all ownerships Use ownership as collateral Ownership affords validity Viral step and repeat Creates new crimes Things as hostages eBlackmail +++ Broader Protection N e c e s s a r y
  • 16. Axiomatic  for  sure     I t i s t i m e t o t h i n k a g a i n ! If we do nothing new things will get worse Non stop learning & adaptation required Acting in isolation guarantees failure Continual monitoring necessary Machines action trumps humans Networking and sharing are key Early detection and action vital Integrated security is a must Localised quarantene vital Every level to be protected Every device proactive All networks proactive A New Era For Security
  • 17. an  obvious  analogy     T h e e x i s t e n c e t h e o r e m ! A ubiquitous/universal auto-immune system Initially engineered to meet known threats Augmented by ‘timely code inoculation' Continually learning & adapting Deployed at every network level Globally applied and adopted Many variants/contributions Industry wide adoption Full integration a must Device cooperation A New Form of Securit y
  • 18. the  practicality     B e y o n d a c o n c e p t ! Hard malware traps on every chip and card And on every device, card, shelf, suit, floor Also all network elements/components Soft malware traps in all code everywhere Automatic experience/solution sharing Fully automated response/reporting Resource sharing and adaptation Many variants & contributions Evolution dominates design Industry wide adoption Full integration Behaviour Emmeregent & Unpredictable
  • 19. complexity  status   A mix of clean and infected Broadcasting Malware Responding with updated protection Wider Network Updated Latest Solution Update Dynamic isolation of infected devices and components leading to repair
  • 20. a  multiplicity  of  channels   Attack exposure/thwarting via access diversity BlueTooth Short Range Device to Device Device to Cloud Attacks seldom isolated or indeed single sourced Attacks not restricted to a single channel Defence opportunities in channel diversity A plurality of channel protection Real time channel collaboration Diverse support access Distributed info sharing Dynamic access hopping Secure attack isolation WiFi/WiMax Medium Range WLAN/Cloud 3, 4, 5, 6 G Long Range Device to Net Device to Cloud SatCom Broadcast Integrated and intelligent security systems embedded into product and all components
  • 21. protocols,  techniques,  AI   Being considered but still in the making Interfaces ? Encryption ? Strategies ? Collaborations ? Hardware ? Protocols? Standards? Software ? Systems ? Players ? Groups? Nets ? Clouds? ? ? ? ? ? A lot to be done in a very short time !
  • 22. Lone Hacker $1Bn $100M $10M $1M $100k $10k Organised Crime Hacker Groups Companies Relative Spending/ Resources Rogue States Gov Agencies Institutions Distribution  of  resources   The misguided, good, bad, and the rogues !
  • 23. Lone Hacker $1Bn $100M $10M $1M $100k $10k Organised Crime Hacker Groups Companies Relative Spending/ Resources Rogue States Gov Agencies Institutions Relative  weight  of  resources   How many, how capable, aggregated capabilities ~1000s ~100s ~10,000s ~1000s ~1000s ~10s ~100s
  • 24. Good Relative  resources   The ratio of aggregated good to bad Bad > 3:1 Sufficient for good to prevail over bad ! But ‘bad’ shares resources and knowledge Whilst ‘good’ operates by ‘need to know’ Sharing knowledge and resources is vital to assure success ! Best estimate assuming equally good people and technical resources on both side of the line:
  • 25. we  have  to  get  this  right   Fa i l u r e c o u l d b e c a t a s t r o p h i c ! Getting it all right on the night is impossible Rapid evolution is the obvious answer Fast response and adaptation wins Keeping ahead of the enemy Integration of all resources Investing appropriately Thinking well ahead Acting well in time No relaxation