[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust and Reliability, Helped By Cross Boarder Corporation
CYBER IMMUNE SYSTEMS THAT
HELPS TRUST AND RELIABILITY,
HELPED BY CROSS BOARDER
Sao Paulo, Brazil
November 12, 2013
Dr. Makoto (Mac) Yokozawa
Nomura Research Institute, Ltd.(Japan)
Visiting Professor at Kyoto University
JISA, Japan Information Service Industry Association, Public Policy
ISSUES AROUND THE ICT
C O P Y R I G H T M . Y O K O ZAW A
CYBER IMMUNE TECHNOLOGIES
Figure 2 Key Elements of a Simplified Immune System
Artificial Immune Systems for Intrusion Detection, James McCaffrey,
“Microsoft MSDN Test Run”
Heuristics Based Antivirus Protection Software
WHAT’S NEW AND WHAT’S OLD
Protection before incidents
Resilience after incidents
“In vitro” observation
“In vivo” observation
Rules and Patterns Based
Heuristics and Knowledge Based
Filtering and Collaboration
Filtering and Collaboration
Reorganizing the Ecosystem
WHY IMMUNE SYSTEM?
Maturity in Cyber Security to some extent,
New Fashion in Countermeasures for Cyber security
Increasing Number of Unknown Threats
Weak Literacy and Zero Literacy Nodes (IOT,M2M)
Moving from Governance by Legislation to Governance by Market-base Principles and
Reasons for Immunity
Do not re-install the Windows, Repair and Reuse without Shutting down your Service
and Advanced Persistent Attack will never end in a day, with a single
Backdoors everywhere - Embedding Spy Chips in Everyday Household Gadgets and
Data Sovereignty and Data Ownership
HOW DO WE COLLABORATE IN CYBER
Heuristics in Detection
Heuristics in Immunity
New Network Structure and Technologies
non-IP New Network Protocol
Redundant and Modular Network Connection
Privacy and Security Tradeoff Study
Security Improves Privacy Protection in many situation
Sometimes Privacy have to be sacrificed in order to improve Security
Security BY Design and Privacy BY Design --- need to Change the Architecture
Identity Management and Trust Framework
Proposal from US-Japan Business to US-Japan Governments 2012
a. Balancing Protection and Utilization
b. OECD Guideline on the Protection of Privacy and Cross boarder Flows of
c. Public-Private Partnership in Privacy Protection, 3rd Country Issues,
Activities in International Institutes
d. Regulatory Structure and Vitality in Cloud Business
e. EU Data Protection Rules and APEC Cross Boarder Privacy Rules
(2) Information Security
a. “Security as a Service”, “Security in Cloud Services”, Trust and Cost
b. Cloud Services and Devices, their New Aspects and New Threats in
c. Maturity and Immaturity in Security Awareness
d. Security related Areas of Collaboration between US and Japan
• Developments of Security Enhancing Technology
• Organizational Design in Operation
• Organizational Management and Internal/External Communication
• Education and Awareness Development
• Quick Response and Resilience
• Desktop Exercise and Evaluation of Maturity in Information Security
ID Federation Business is blooming in Japan
(based on NRI’s track record in 2011)
200 million IDs
Yahoo! Japan: Active User: 25 mil.
Yahoo! Premium member：7.6 mil.
Ｇｍａｉｌ Account170 mil.
ＮＩＫＫＥＩ ＩＤ 1 mil.
Member: over 20 mil.
30 mil. in Japan
9 mil. in Japan (estimated)
2 mil. members
Ｂａｎｋ 20 mil.
56 mil. subscriber
25 mil. subscriber
Trust Framework should be the platform for the National Identification System in
Establishing Trust Framework in Japan
U.S. ver. of Link
Link E.U. ver. of
U.S. ver. of Link Japan ver. Of Link E.U. ver. of
Due to the absence of Trust
Framework (OITF) in Japan, NII
(National Institute of Informatics) needs
to get certified by an assessor working
for U.S. national identification system.
Copyright（C） Nomura Research Institute, Ltd. All rights reserved.
Establishing Trust Framework (OITF)
in Japan, Japanese e-government can
be accessed by a private sectors ID.
Furthermore, it will enable Japanese
people to connect to the global
Gostou de algum slide específico?
Recortar slides é uma maneira fácil de colecionar informações para acessar mais tarde.