Your SlideShare is downloading. ×
[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust and Reliability, Helped By Cross Boarder Corporation
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust and Reliability, Helped By Cross Boarder Corporation

1,102
views

Published on

Published in: Technology, Business

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,102
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. CYBER IMMUNE SYSTEMS THAT HELPS TRUST AND RELIABILITY, HELPED BY CROSS BOARDER CORPORATION Sao Paulo, Brazil November 12, 2013 Dr. Makoto (Mac) Yokozawa Nomura Research Institute, Ltd.(Japan) Visiting Professor at Kyoto University JISA, Japan Information Service Industry Association, Public Policy Subcommittee Chair 11820047(08 ) 0
  • 2. 1
  • 3. ISSUES AROUND THE ICT C O P Y R I G H T M . Y O K O ZAW A 2
  • 4. CYBER IMMUNE TECHNOLOGIES Figure 2 Key Elements of a Simplified Immune System Artificial Immune Systems for Intrusion Detection, James McCaffrey, “Microsoft MSDN Test Run” Heuristics Based Antivirus Protection Software (Commercial) 3
  • 5. WHAT’S NEW AND WHAT’S OLD Cyber Security Cyber Immunity  Protection before incidents  Resilience after incidents  “In vitro” observation  “In vivo” observation  Rules and Patterns Based  Heuristics and Knowledge Based Filtering and Collaboration Filtering and Collaboration  Quick Response  Reorganizing the Ecosystem  Artificial  Organic 4
  • 6. WHY IMMUNE SYSTEM?  Maturity in Cyber Security to some extent,  New Fashion in Countermeasures for Cyber security Incidents  Increasing Number of Unknown Threats  Weak Literacy and Zero Literacy Nodes (IOT,M2M)  BYOD  Moving from Governance by Legislation to Governance by Market-base Principles and Architecture  Reasons for Immunity  Do not re-install the Windows, Repair and Reuse without Shutting down your Service  Targeted Attack and Advanced Persistent Attack will never end in a day, with a single pattern  Backdoors everywhere - Embedding Spy Chips in Everyday Household Gadgets and Appliances  Data Sovereignty and Data Ownership 5
  • 7. HOW DO WE COLLABORATE IN CYBER IMMUNITY?  Sharing Immunity  Forensics  Heuristics in Detection  Heuristics in Immunity  Meta Knowledge  New Network Structure and Technologies  IPv6  non-IP New Network Protocol  Resilient Structure  Redundant and Modular Network Connection  Privacy and Security Tradeoff Study  Security Improves Privacy Protection in many situation  Sometimes Privacy have to be sacrificed in order to improve Security  Security BY Design and Privacy BY Design --- need to Change the Architecture  Identity Management and Trust Framework 6
  • 8. 7
  • 9. WHAT YOU SEE ON THE TABLE 8
  • 10. Proposal from US-Japan Business to US-Japan Governments 2012 (1) Privacy a. Balancing Protection and Utilization b. OECD Guideline on the Protection of Privacy and Cross boarder Flows of Personal Data c. Public-Private Partnership in Privacy Protection, 3rd Country Issues, Activities in International Institutes d. Regulatory Structure and Vitality in Cloud Business e. EU Data Protection Rules and APEC Cross Boarder Privacy Rules (2) Information Security a. “Security as a Service”, “Security in Cloud Services”, Trust and Cost b. Cloud Services and Devices, their New Aspects and New Threats in Information Security c. Maturity and Immaturity in Security Awareness d. Security related Areas of Collaboration between US and Japan • Developments of Security Enhancing Technology • Organizational Design in Operation • Organizational Management and Internal/External Communication • Education and Awareness Development • Quick Response and Resilience • Desktop Exercise and Evaluation of Maturity in Information Security 9
  • 11. ID Federation Business is blooming in Japan (based on NRI’s track record in 2011) More than 200 million IDs Yahoo! Japan: Active User: 25 mil. Yahoo! Premium member:7.6 mil. Membership-based site Insurance NIKKEI AD Tech NIKKEI Career College Nonlife Insurance Credit Card Gmail Account170 mil. News Media NIKKEI ID 1 mil. Real Estate Member: over 20 mil. Housing Rental 30 mil. in Japan (estimated) Publishing 9 mil. in Japan (estimated) Air Career 2 mil. members JAL Milage Bank 20 mil. 56 mil. subscriber EC Beverage 25 mil. subscriber Travel Agent 32mil subscribers Telecom Affiliated Contents provider Affiliated Net shop Telecom 67 mil. Active:43 mil.
  • 12. Trust Framework should be the platform for the National Identification System in Japan As-Is Establishing Trust Framework in Japan To-Be Link U.S. Japan U.S. ver. of Link Trust Framework ID ID ID U.S. E.U. Link E.U. ver. of Trust Framework ID ID ID ID ID ID Japan E.U. U.S. ver. of Link Japan ver. Of Link E.U. ver. of Trust Trust Trust Framework Framework Framework ID ID ID ID ID ID ID ID ID NII Due to the absence of Trust Framework (OITF) in Japan, NII (National Institute of Informatics) needs to get certified by an assessor working for U.S. national identification system. Copyright(C) Nomura Research Institute, Ltd. All rights reserved. Establishing Trust Framework (OITF) in Japan, Japanese e-government can be accessed by a private sectors ID. Furthermore, it will enable Japanese people to connect to the global services. 11