SlideShare a Scribd company logo
CITIZEN CENTRIC DIGITAL AND
MOBILE-IDENTITY, PERSONAL
DATA ECOSYSTEMS AND THE
INTERNET OF THINGS:
ASSESSING THE NATURE OF
OPERATIONAL SECURITY ISSUES

Dr Rachel O’Connell
RSA Conference 2013, Europe
WHO AM I?
 PhD online criminal activity: implications for investigative strategies
 Chief Security Officer Bebo, VP AOL
 Research Consultant
 Oxford Internet Institute:
 Effective Age Verification Techniques: Lessons to be Learnt from the Online
Gambling Industry
 Ctrl_Shift
 A market analyst and consulting: changing personal data landscape.
 Member of OIX and the GSMA’s UK Assured legal working group
 Advisor to commercial organisations on both the policy requirements and
business opportunities associated with digital and mobile ID
 Co-founder of GroovyFuture.com.
NASCENT INTEROPERABLE
ECOSYSTEMS:

I
DATA DRIVEN ECONOMY
CISCO’S PREDICTIONS: IoT
DATA GENERATED BY IoT
ELECTRONIC AND MOBILE ID
 NSTIC
 STORK
 IdAP
 GSMA Mobile ID
 Proposed regulation
PERSONAL INTERNET OF
THINGS

• Multi-tenancy cloud
based personal data
stores
• Targeted attacks,
• Cryptolocker virus
PATH TO ROI
Gigya's series
'Path to ROI',
focuses on the
different
technologies
and tools that
businesses can
leverage to
generate
valuable ROI
from their
marketing
efforts
IoT TRUSTED CREDENTAILS
 Education
 Assert trusted credentials (LoA)
 Recognise trusted intermediaries
(accreditation)
 Quantified self - Databetes
 Convenience, security
 Active participants
IoT SECURITY AND TRUST
 Inofsec properties of the IoT are often hidden in
pervasive systems and small devices manufactured
by a large number of vendors.

 uTRUSTit enables system manufacturers and system
integrators to express the underlying security
concepts to users in a comprehensible way, allowing
them to make valid judgments on the trustworthiness
of such systems.
 How security conscious is the average user of IoT
devices?
 Data mining
 End-to-end security telemetry – automated scripts,
correlating data points from multiple machines across
multiple sectors
M2M VISION
MARKET EVOLUTION
FOR TELCO IN M2M
PDETS TRUST FRAMEWORKS
 Forging new social contracts
 The Respect Trust Framework is designed to give individuals
control over the sharing of their personal data on the Internet.
 Mydex, the personal data store and trusted identity provider,
has also had its “Mydex Trust Framework” listed by the Open
Identity Exchange.

 Connet.me has had its Trust Model and Business Model for
Personal Data listed by OIX
 The Personal Network: A New Trust Model and Business Model
for Personal Data
 Access to data that companies make available and
authoritative personal data sources – university exam results
 Penetration testing, SEIM, ISO27001,
GOVERNANCE AS A
SOFTWARE SERVICE
 ID³ believes, governance principles should be expressed as
software that is then able to evolve to incorporate advances in
technology and to support changing market and societal
requirements.

 Using these tools, people will be able to ensure the privacy of
their personal information, leverage the power of networked
data, and create new forms of online coordination, exchange
and self-governance.

 Forge new “social contracts” and participate in new types of
legal and regulatory systems for managing organizations,
markets and their social and civic lives. These systems will
conform to both international legal standards and to the
specific social norms and priorities of its members.
LEGAL FRAMEWORK
 European Network and Information Security Agency (ENISA)
comprehensive duties and responsibilities, which are inter
alia motivated by the protection of critical infrastructures
 Cert (Computer Emergency Response Teams)
 Directive and working paper
 Proposal for a Directive of the EU Parliament and of the
Council concerning measures to ensure a high level of
network and information security across the Union
 Cyber-security Strategy of the European Union: An open,
Safe and Secure Cyberspace
INCREASE IN NUMBER OF
THREATS VECTORS
 Structured and unstructured data

 Information security management systems – threat intelligence
 Security Information and Event Management (SIEM)  Access management – lessons from enterprise solution providers

 Data access, control, leakage, revocation, audits,
 Social engineering
 Scale of attacks
 Complex crypto based attacks, e.g. flame
 Vulnerabilities of inter-operable trust frameworks
 LoA’s associated with different ecosystems
NEW APPROACHES
 Existing solutions – each ecosystem is an island
 Security incident and management systems – usually utilised in
a single system (SIEM)
 Stephen Trilling, Symantec, keynote speaker: Massive cloud
based security - SIEM on steroids – apps that run on security
telemetry data
 New era of operational security
 New attacks – automatically looking for anomalous behaviours
 Forensic graph for Attack ID
 Security system with a world view – looks across ecosystems,
industries and geographies …
 Proportionate, self fulfilling prophecies, balance
 Security in critical infrastructures – Future pre-condition for
operating license?
POINTS FOR DISCUSSION
 Will the convergence between e-identity, Mobile ID
and personal data ecosystems in concert with the
Internet of Things, foster new and diverse commercial
opportunities, whilst pushing legal, security, policy
and regulatory debates into new terrain?
 From a security perspective, what are the nature,
scale and extent of the threat vectors we can
expect to be associated with these nascent
ecosystems that are evolving at different rates?
 Ubiquitous connectedness opens up pathways for
attacks however, a siloed approach to development
and oversight creates a perception issue, how can
this best be addressed?
 Operational Security Assurance?
POINTS FOR DISCUSSION
 Where should concerns lie – unsecured M2M or citizen
centric facing, or interactions between these
ecosystems?
 Scale: Destructive attacks, cybercrimes, erosion of
privacy, trust
 Will the operation of the IoT in concert with e.g. critical
infrastructure necessitate new sets of international
rules that address cyber security threats and govern
cyber warfare?
 What can the security community do to address these
issues?
Thank you
 Rachel O’Connell
 rachel@technologist.com
 Twitter: @racheloconnell

More Related Content

What's hot

Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
Research On Global Markets
 
Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...
Andrea Mennillo
 
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)Angel Rodriguez
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
Christopher Wang
 
Security economics
Security economicsSecurity economics
Security economics
Yansi Keim
 
Information Security
Information SecurityInformation Security
Information Securitysteffiann88
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
Confederation of Indian Industry
 
Report on Network Security And Privacy
Report on Network Security And PrivacyReport on Network Security And Privacy
Report on Network Security And Privacy
Manan Gadhiya
 
A survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsA survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systems
Vishwesh Nagamalla
 
Ist curriculum
Ist curriculumIst curriculum
Ist curriculum
Melissa Hicks
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
Karel Van Isacker
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
accenture
 
Cyber security trends 2018
Cyber security trends 2018Cyber security trends 2018
Cyber security trends 2018
Ruchi Vishwakarma
 
Io t whitepaper_5_15_17
Io t whitepaper_5_15_17Io t whitepaper_5_15_17
Io t whitepaper_5_15_17
Aravindharamanan S
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
Insights success media and technology pvt ltd
 
Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016Mohan C. de SILVA
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Chuck Brooks
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
University of Geneva
 
IoT Reference Architecture and Case Studies
IoT Reference Architecture and Case StudiesIoT Reference Architecture and Case Studies
IoT Reference Architecture and Case StudiesSerhiy (Serge) Haziyev
 

What's hot (20)

Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...
 
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
Security economics
Security economicsSecurity economics
Security economics
 
Information Security
Information SecurityInformation Security
Information Security
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
Report on Network Security And Privacy
Report on Network Security And PrivacyReport on Network Security And Privacy
Report on Network Security And Privacy
 
ITTCourseDesc
ITTCourseDescITTCourseDesc
ITTCourseDesc
 
A survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsA survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systems
 
Ist curriculum
Ist curriculumIst curriculum
Ist curriculum
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Cyber security trends 2018
Cyber security trends 2018Cyber security trends 2018
Cyber security trends 2018
 
Io t whitepaper_5_15_17
Io t whitepaper_5_15_17Io t whitepaper_5_15_17
Io t whitepaper_5_15_17
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 
IoT Reference Architecture and Case Studies
IoT Reference Architecture and Case StudiesIoT Reference Architecture and Case Studies
IoT Reference Architecture and Case Studies
 

Viewers also liked

Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
i_scienceEU
 
Caspar Bowden EINS Summer School
Caspar Bowden EINS Summer SchoolCaspar Bowden EINS Summer School
Caspar Bowden EINS Summer School
i_scienceEU
 
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
i_scienceEU
 
Enterprise resource planning (erp) systems
Enterprise resource planning (erp) systemsEnterprise resource planning (erp) systems
Enterprise resource planning (erp) systems
Stefi Merin
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Arpan Patel
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
Nikunj_Agrawal
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
Honeyson Joseph
 

Viewers also liked (8)

Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
 
Caspar Bowden EINS Summer School
Caspar Bowden EINS Summer SchoolCaspar Bowden EINS Summer School
Caspar Bowden EINS Summer School
 
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
 
Enterprise resource planning (erp) systems
Enterprise resource planning (erp) systemsEnterprise resource planning (erp) systems
Enterprise resource planning (erp) systems
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 

Similar to Citizen centric digital and mobile-identity, personal data ecosystems and the internet of things: Assessing the nature of operational security issues

Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
todd521
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
RahimMakhani2
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
Cisco Service Provider Mobility
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
ebuc
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
ChristopherTHyatt
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
eletseditorial
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
amitkhanna2070
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
Ulf Mattsson
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
Ken Flott
 
C018131821
C018131821C018131821
C018131821
IOSR Journals
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
DIGITALCONFEX
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
Matthew Rosenquist
 
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
IJNSA Journal
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
Icomm Technologies
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
IJNSA Journal
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
Andris Soroka
 
Online Paper Submission - International Journal of Network Security & Its App...
Online Paper Submission - International Journal of Network Security & Its App...Online Paper Submission - International Journal of Network Security & Its App...
Online Paper Submission - International Journal of Network Security & Its App...
IJNSA Journal
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
accenture
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
Accenture Technology
 

Similar to Citizen centric digital and mobile-identity, personal data ecosystems and the internet of things: Assessing the nature of operational security issues (20)

Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
C018131821
C018131821C018131821
C018131821
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Online Paper Submission - International Journal of Network Security & Its App...
Online Paper Submission - International Journal of Network Security & Its App...Online Paper Submission - International Journal of Network Security & Its App...
Online Paper Submission - International Journal of Network Security & Its App...
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 

More from Dr Rachel O'Connell

Online Age Checking: The Time Has Come .... Infographic
Online Age Checking: The Time Has Come .... InfographicOnline Age Checking: The Time Has Come .... Infographic
Online Age Checking: The Time Has Come .... Infographic
Dr Rachel O'Connell
 
Online age checking, good business practice and digital citizenship
Online age checking, good business practice and digital citizenshipOnline age checking, good business practice and digital citizenship
Online age checking, good business practice and digital citizenship
Dr Rachel O'Connell
 
Online Age Checking - Proof of Concept
Online Age Checking  - Proof of ConceptOnline Age Checking  - Proof of Concept
Online Age Checking - Proof of Concept
Dr Rachel O'Connell
 
Online Age Checking: The Time Has Come.. symposium brochure
Online Age Checking: The Time Has Come.. symposium brochureOnline Age Checking: The Time Has Come.. symposium brochure
Online Age Checking: The Time Has Come.. symposium brochure
Dr Rachel O'Connell
 
5 nov gsma_eema
5 nov gsma_eema5 nov gsma_eema
5 nov gsma_eema
Dr Rachel O'Connell
 
Age Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping PointAge Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping Point
Dr Rachel O'Connell
 

More from Dr Rachel O'Connell (6)

Online Age Checking: The Time Has Come .... Infographic
Online Age Checking: The Time Has Come .... InfographicOnline Age Checking: The Time Has Come .... Infographic
Online Age Checking: The Time Has Come .... Infographic
 
Online age checking, good business practice and digital citizenship
Online age checking, good business practice and digital citizenshipOnline age checking, good business practice and digital citizenship
Online age checking, good business practice and digital citizenship
 
Online Age Checking - Proof of Concept
Online Age Checking  - Proof of ConceptOnline Age Checking  - Proof of Concept
Online Age Checking - Proof of Concept
 
Online Age Checking: The Time Has Come.. symposium brochure
Online Age Checking: The Time Has Come.. symposium brochureOnline Age Checking: The Time Has Come.. symposium brochure
Online Age Checking: The Time Has Come.. symposium brochure
 
5 nov gsma_eema
5 nov gsma_eema5 nov gsma_eema
5 nov gsma_eema
 
Age Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping PointAge Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping Point
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 

Citizen centric digital and mobile-identity, personal data ecosystems and the internet of things: Assessing the nature of operational security issues

  • 1. CITIZEN CENTRIC DIGITAL AND MOBILE-IDENTITY, PERSONAL DATA ECOSYSTEMS AND THE INTERNET OF THINGS: ASSESSING THE NATURE OF OPERATIONAL SECURITY ISSUES Dr Rachel O’Connell RSA Conference 2013, Europe
  • 2. WHO AM I?  PhD online criminal activity: implications for investigative strategies  Chief Security Officer Bebo, VP AOL  Research Consultant  Oxford Internet Institute:  Effective Age Verification Techniques: Lessons to be Learnt from the Online Gambling Industry  Ctrl_Shift  A market analyst and consulting: changing personal data landscape.  Member of OIX and the GSMA’s UK Assured legal working group  Advisor to commercial organisations on both the policy requirements and business opportunities associated with digital and mobile ID  Co-founder of GroovyFuture.com.
  • 7. ELECTRONIC AND MOBILE ID  NSTIC  STORK  IdAP  GSMA Mobile ID  Proposed regulation
  • 8. PERSONAL INTERNET OF THINGS • Multi-tenancy cloud based personal data stores • Targeted attacks, • Cryptolocker virus
  • 9. PATH TO ROI Gigya's series 'Path to ROI', focuses on the different technologies and tools that businesses can leverage to generate valuable ROI from their marketing efforts
  • 10. IoT TRUSTED CREDENTAILS  Education  Assert trusted credentials (LoA)  Recognise trusted intermediaries (accreditation)  Quantified self - Databetes  Convenience, security  Active participants
  • 11. IoT SECURITY AND TRUST  Inofsec properties of the IoT are often hidden in pervasive systems and small devices manufactured by a large number of vendors.  uTRUSTit enables system manufacturers and system integrators to express the underlying security concepts to users in a comprehensible way, allowing them to make valid judgments on the trustworthiness of such systems.  How security conscious is the average user of IoT devices?  Data mining  End-to-end security telemetry – automated scripts, correlating data points from multiple machines across multiple sectors
  • 14. PDETS TRUST FRAMEWORKS  Forging new social contracts  The Respect Trust Framework is designed to give individuals control over the sharing of their personal data on the Internet.  Mydex, the personal data store and trusted identity provider, has also had its “Mydex Trust Framework” listed by the Open Identity Exchange.  Connet.me has had its Trust Model and Business Model for Personal Data listed by OIX  The Personal Network: A New Trust Model and Business Model for Personal Data  Access to data that companies make available and authoritative personal data sources – university exam results  Penetration testing, SEIM, ISO27001,
  • 15. GOVERNANCE AS A SOFTWARE SERVICE  ID³ believes, governance principles should be expressed as software that is then able to evolve to incorporate advances in technology and to support changing market and societal requirements.  Using these tools, people will be able to ensure the privacy of their personal information, leverage the power of networked data, and create new forms of online coordination, exchange and self-governance.  Forge new “social contracts” and participate in new types of legal and regulatory systems for managing organizations, markets and their social and civic lives. These systems will conform to both international legal standards and to the specific social norms and priorities of its members.
  • 16. LEGAL FRAMEWORK  European Network and Information Security Agency (ENISA) comprehensive duties and responsibilities, which are inter alia motivated by the protection of critical infrastructures  Cert (Computer Emergency Response Teams)  Directive and working paper  Proposal for a Directive of the EU Parliament and of the Council concerning measures to ensure a high level of network and information security across the Union  Cyber-security Strategy of the European Union: An open, Safe and Secure Cyberspace
  • 17. INCREASE IN NUMBER OF THREATS VECTORS  Structured and unstructured data  Information security management systems – threat intelligence  Security Information and Event Management (SIEM)  Access management – lessons from enterprise solution providers  Data access, control, leakage, revocation, audits,  Social engineering  Scale of attacks  Complex crypto based attacks, e.g. flame  Vulnerabilities of inter-operable trust frameworks  LoA’s associated with different ecosystems
  • 18. NEW APPROACHES  Existing solutions – each ecosystem is an island  Security incident and management systems – usually utilised in a single system (SIEM)  Stephen Trilling, Symantec, keynote speaker: Massive cloud based security - SIEM on steroids – apps that run on security telemetry data  New era of operational security  New attacks – automatically looking for anomalous behaviours  Forensic graph for Attack ID  Security system with a world view – looks across ecosystems, industries and geographies …  Proportionate, self fulfilling prophecies, balance  Security in critical infrastructures – Future pre-condition for operating license?
  • 19. POINTS FOR DISCUSSION  Will the convergence between e-identity, Mobile ID and personal data ecosystems in concert with the Internet of Things, foster new and diverse commercial opportunities, whilst pushing legal, security, policy and regulatory debates into new terrain?  From a security perspective, what are the nature, scale and extent of the threat vectors we can expect to be associated with these nascent ecosystems that are evolving at different rates?  Ubiquitous connectedness opens up pathways for attacks however, a siloed approach to development and oversight creates a perception issue, how can this best be addressed?  Operational Security Assurance?
  • 20. POINTS FOR DISCUSSION  Where should concerns lie – unsecured M2M or citizen centric facing, or interactions between these ecosystems?  Scale: Destructive attacks, cybercrimes, erosion of privacy, trust  Will the operation of the IoT in concert with e.g. critical infrastructure necessitate new sets of international rules that address cyber security threats and govern cyber warfare?  What can the security community do to address these issues?
  • 21. Thank you  Rachel O’Connell  rachel@technologist.com  Twitter: @racheloconnell

Editor's Notes

  1. More things are connecting to the Internet than people — over 12.5 billion devices in 2010 alone. Cisco’s Internet Business Solutions Group (IBSG) predicts some 25 billion devices will be connected by 2015, and 50 billion by 2020. How will having lots of things connected change everything?
  2. Affordable sensorsObject taggingWireless communicationBroadband
  3. Trust is central to the operation of a data driven economy. In order to both provide and benefit from digital services, companies, public administrations and consumers need to distinguish between trusted and non-trusted counterparts online; they also need to be recognised as trusted parties themselves. At an operational level, trust frameworks can reduce the need to negotiate a multitude of individual commercial contracts.