• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust and Reliability, Helped By Cross Boarder Corporation
 

[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust and Reliability, Helped By Cross Boarder Corporation

on

  • 229 views

 

Statistics

Views

Total Views
229
Views on SlideShare
215
Embed Views
14

Actions

Likes
0
Downloads
0
Comments
0

1 Embed 14

http://assespro.org.br 14

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    [GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust and Reliability, Helped By Cross Boarder Corporation [GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust and Reliability, Helped By Cross Boarder Corporation Presentation Transcript

    • CYBER IMMUNE SYSTEMS THAT HELPS TRUST AND RELIABILITY, HELPED BY CROSS BOARDER CORPORATION Sao Paulo, Brazil November 12, 2013 Dr. Makoto (Mac) Yokozawa Nomura Research Institute, Ltd.(Japan) Visiting Professor at Kyoto University JISA, Japan Information Service Industry Association, Public Policy Subcommittee Chair 11820047(08 ) 0
    • 1
    • ISSUES AROUND THE ICT C O P Y R I G H T M . Y O K O ZAW A 2
    • CYBER IMMUNE TECHNOLOGIES Figure 2 Key Elements of a Simplified Immune System Artificial Immune Systems for Intrusion Detection, James McCaffrey, “Microsoft MSDN Test Run” Heuristics Based Antivirus Protection Software (Commercial) 3
    • WHAT’S NEW AND WHAT’S OLD Cyber Security Cyber Immunity  Protection before incidents  Resilience after incidents  “In vitro” observation  “In vivo” observation  Rules and Patterns Based  Heuristics and Knowledge Based Filtering and Collaboration Filtering and Collaboration  Quick Response  Reorganizing the Ecosystem  Artificial  Organic 4
    • WHY IMMUNE SYSTEM?  Maturity in Cyber Security to some extent,  New Fashion in Countermeasures for Cyber security Incidents  Increasing Number of Unknown Threats  Weak Literacy and Zero Literacy Nodes (IOT,M2M)  BYOD  Moving from Governance by Legislation to Governance by Market-base Principles and Architecture  Reasons for Immunity  Do not re-install the Windows, Repair and Reuse without Shutting down your Service  Targeted Attack and Advanced Persistent Attack will never end in a day, with a single pattern  Backdoors everywhere - Embedding Spy Chips in Everyday Household Gadgets and Appliances  Data Sovereignty and Data Ownership 5
    • HOW DO WE COLLABORATE IN CYBER IMMUNITY?  Sharing Immunity  Forensics  Heuristics in Detection  Heuristics in Immunity  Meta Knowledge  New Network Structure and Technologies  IPv6  non-IP New Network Protocol  Resilient Structure  Redundant and Modular Network Connection  Privacy and Security Tradeoff Study  Security Improves Privacy Protection in many situation  Sometimes Privacy have to be sacrificed in order to improve Security  Security BY Design and Privacy BY Design --- need to Change the Architecture  Identity Management and Trust Framework 6
    • 7
    • WHAT YOU SEE ON THE TABLE 8
    • Proposal from US-Japan Business to US-Japan Governments 2012 (1) Privacy a. Balancing Protection and Utilization b. OECD Guideline on the Protection of Privacy and Cross boarder Flows of Personal Data c. Public-Private Partnership in Privacy Protection, 3rd Country Issues, Activities in International Institutes d. Regulatory Structure and Vitality in Cloud Business e. EU Data Protection Rules and APEC Cross Boarder Privacy Rules (2) Information Security a. “Security as a Service”, “Security in Cloud Services”, Trust and Cost b. Cloud Services and Devices, their New Aspects and New Threats in Information Security c. Maturity and Immaturity in Security Awareness d. Security related Areas of Collaboration between US and Japan • Developments of Security Enhancing Technology • Organizational Design in Operation • Organizational Management and Internal/External Communication • Education and Awareness Development • Quick Response and Resilience • Desktop Exercise and Evaluation of Maturity in Information Security 9
    • ID Federation Business is blooming in Japan (based on NRI’s track record in 2011) More than 200 million IDs Yahoo! Japan: Active User: 25 mil. Yahoo! Premium member:7.6 mil. Membership-based site Insurance NIKKEI AD Tech NIKKEI Career College Nonlife Insurance Credit Card Gmail Account170 mil. News Media NIKKEI ID 1 mil. Real Estate Member: over 20 mil. Housing Rental 30 mil. in Japan (estimated) Publishing 9 mil. in Japan (estimated) Air Career 2 mil. members JAL Milage Bank 20 mil. 56 mil. subscriber EC Beverage 25 mil. subscriber Travel Agent 32mil subscribers Telecom Affiliated Contents provider Affiliated Net shop Telecom 67 mil. Active:43 mil.
    • Trust Framework should be the platform for the National Identification System in Japan As-Is Establishing Trust Framework in Japan To-Be Link U.S. Japan U.S. ver. of Link Trust Framework ID ID ID U.S. E.U. Link E.U. ver. of Trust Framework ID ID ID ID ID ID Japan E.U. U.S. ver. of Link Japan ver. Of Link E.U. ver. of Trust Trust Trust Framework Framework Framework ID ID ID ID ID ID ID ID ID NII Due to the absence of Trust Framework (OITF) in Japan, NII (National Institute of Informatics) needs to get certified by an assessor working for U.S. national identification system. Copyright(C) Nomura Research Institute, Ltd. All rights reserved. Establishing Trust Framework (OITF) in Japan, Japanese e-government can be accessed by a private sectors ID. Furthermore, it will enable Japanese people to connect to the global services. 11