Brief introduction to yourself and the KTNs, and what they do
We need to provide a UK-wide focus to address challenges holistically; identifying the gaps in the work already being undertaken across the community and planning how to bridge themWe achieve this by:collaboratively identify universal challenges and develop effective responsesinfluence UK investment strategy and government policyaccelerate innovation and educationharness and promote UK capability internationally help improve the UK security baseline
Three KTNs came together to form DS KTN, reflected converging issues and need for a more holistic approach
Programmes can deal with individual sectors e.g. CS specific issues, or whole KTN can cover broader issues.
Intelligent transport involves using information and communications technology to manage travel routes, loads and vehicles, in order to improve safety and reduce congestion, emissions, vehicle wear, transport time and fuel consumption.It is a complex area which seeks to bring together expertise in such diverse areas as distributed sensor networks, data-mining, new communications systems and modelling and simulation technology.ExampleA local council wants to implement a system of to help reduce pollution and congestion. It wants to help drivers drive more efficiently and apply charges, on a sliding scale, to those who contribute to the problem.Vehicles and drivers are increasingly equipped with sensing devices, which can interact with roadside technology to help drivers plan the most efficient route. Additionally, it creates potential for charging based on distance travelled, vehicle size, emissions, journey purpose and congestion levels.Implementation of such technology needs to be properly planned if it is to be successful. It must incorporate accurate location and timing technologies designed specifically to the task, alongside complex data analysis. Gathering of information on individuals and their movements must be handled securely and responsibly. In order to address cyber security concerns it should be done with the minimum data necessary and the appropriate confidentiality, integrity and availability provided. It must also be implemented in a way that is compatible with other systems across the world.The Digital Systems KTN is working to ensure that experts and investors in these areas are connected to their counterparts in other relevant areas, to ensure the technology is successfully developed and commercialised in a practical and scalable way. This will help meet the challenges of congestion, emissions and road safety, as well as allowing industry to operate more efficiently.
Modern life runs on digital systems and new technological innovations increasingly rely on the transfer of information and acquiring dataTransfer of information is commonplace is used to great effect in developing new technologies. Sensors monitor everything from traffic flow to natural disasters. Devices used to record and analyse information are increasingly mobile. We are soon to have a system in the UK where all homes are fitted with networked smart sensors to monitor and control energy usage.Organisations face data losses as a result of the same hacks, scams and errorsPeople still falling for phising attacks, downloading malware, etcOpportunities are being missed, work duplicated, and invaluable knowledge hidden because of a lack of collaborationTalking openly about shared problems is the most effective way to develop solutions. A huge amount of useful knowledge and experience exists within each sector. If companies can learn from the mistakes and successes of others then the whole of that industry can improve its security.Furthermore being more open about security draws attention to its importance with the knock on effect that people start to be more demanding about security.
Security is seen as a technical problem requiring a technical solution. But often technical solution already exists but the problem is not understood. Better understanding and shared knowledge means we are better able to use technology effectively to address threatsCompanies, governments and other organisations who keep personal or financial data need to share information and learn from each others experienceExampleIf one company detects a malware, they can block or remove the code from their system. If they share this knowledge, it can be removed from the millions of computers cit has infected.Security professionals can “reverse engineer” the attack to learn how it works, how it exploits the system, and how to identify variants. Weaknesses can be patched and appropriate security measures designed. In some cases, it may be possible to identify the source and prevent future attacks.Google and Adobe should be praised for coming clean over recent attacks. It only takes one organisation to break the silence, and a common response can be applied.This is a global problem and requires a collaborative solution which goes beyond individual IT departments.
New innovations rely on the transfer of information and acquisition of dataSecurity not considers sufficiently Security professionals need to be involved from the startThey need to meet the people designing these systems and the policy makers supporting the projects.Example: smart metersNetworked for monitoring and billingUK government committed to nationwide roll-outVery little thought given to security in this planIf not considered during the design we risk creating a national system that is completely unsecurable
Despite prevalence of technology People don’t know about and basic security practices and precautionsI am shocked by how often I still hear about people falling for phishing email requests to supply their passwords. We need to get people outside the CS community to understand the importance of taking security seriouslyTechnology is being developed with functionality, not security in mind If we don’t do something now, this will cause serious security problems down the line.Example: Mobile phones Ripe for exploitation as they converge to smart devicesand are used to run third party applications and remotely access data. We will be faced with complex security procedures because this wasn’t addressed in the first placeAnd no doubt various embarrassing and costly data loss stories
Give a brief overview of a couple of these eventse.g. Privacy AFB – a major event bringing together security experts, business decision makers and policymakers to discuss the latest security concerns within both a technological, business and ethical context. By providing forums to share knowledge, we can collaboratively identify routes forward that help industries across the world.
The Cyber Security programme was appointed in 2008 as an agent for EPSRC CASE Awards. It allocates two awards per year to universities that partner with SMEs to run business focused doctoral level projects.
Industry consultationMembership organisation – membership base of experts to draw on to identify issues of concern and solutionsForge links with key industry playersIdentify issues for SIGs, events and working groups through listening to industry concernsSharing KnowledgeMedia – KTN runs a successful media programme to share our experience of key issues with the community and encourage collaboration to address solutions (e.g. of Julie contacting you about CSC after seeing article in Computer Weekly)Guides - E-crime guide - What Your Business Needs to Know
1<br />Fostering Collaboration in a Digital Society<br />Tony Dyhouse, Cyber Security Director, Digital Systems KTN<br />
The Knowledge Transfer Networks (KTNs) <br />Set up by the Technology Strategy Board to: <br /><ul><li> Provide focal point for UK expertise in important future industries
Mobile data access</li></li></ul><li>Example: smart transport systems <br />Vehicles and drivers increasingly have devices that can interact with roadside technology<br /><ul><li> Helps drivers plan most efficient routes
Allows variable charging</li></ul>Implementation of this technology needs to be planned. This means:<br /><ul><li> Accurate location and timing technologies
Compatibility with other systems across the world</li></li></ul><li>Collaboration is key to addressing challenges in a digital society<br />The experience of the KTNs can be built upon in other countries <br />to tackle national cyber security issues<br />and form international networks to address the problem globally<br /> The KTN as an international model<br />
Why do we need KTNs?<br />The silo mentality and the challenges of a digital society<br />
Challenges<br /><ul><li> Modern life runs on digital systems
Many innovations rely on transfer of information and acquisition of data
Organisations face data loss due to the same hacks, scams and errors
They are not sharing their knowledge and experience
Opportunities are being missed, work duplicated, and knowledge hidden because of a lack of collaboration </li></li></ul><li>Challenge 1: Sharing knowledge<br /><ul><li>Often technical solutions already exists but the problem is not understood
Better understanding and shared knowledge means we are better able to use existing technology effectively to address threats</li></ul>Example: By sharing the discovery of malware:<br /><ul><li> Can be removed from the millions of computers
If not considered during the design we risk creating a national system that is completely unsecurable</li></li></ul><li>Challenge 3: Sharing understanding<br /><ul><li>People don’t know about and basic security practices
Technology is being developed with functionality, not security in mind
Ripe for exploitation as they converge to smart devices
We will be faced with complex security procedures because this wasn’t addressed in the first place</li></li></ul><li>Overcoming challenges through collaboration<br />The KTN was set up to foster collaboration. It achieves this by:<br /><ul><li> Running events
Sharing knowledge</li></li></ul><li>Events<br />The KTN hosts events on key social and economic issues where IT is a key issue<br />Examples:<br /><ul><li> A Fine Balance 2010: Privacy in the digital society
SMART technologies for health, energy and transport
Broader experience contributes to overall knowledge in society</li></li></ul><li>Special Interest Groups<br />SIGs are created to address specific challenges in cyber security where collaboration is required:<br /><ul><li> Created and supported by KTN