SlideShare a Scribd company logo
1 of 12
Download to read offline
INFOSEC LANDSCAPE &
  RESEARCH TRENDS

     GOPI KURUP


     February 2010
Extol MSC
   Extol Corp
       25th year in business
       grown from a general PC and IT trading house to a leading ICT Security solution provider
   R&D successes
       AROUR 1st Malaysian AV software – bi-directional technology transfer to Norman (1994), 1.5M
        copies bought by U.S. Dept of Defense, Dept of Energy, official AV for Kuala Lumpur XVI
        Commonwealth Games (1998)
       OpenVoice – voice attendant & mail module bundled with Toshiba PABX systems (1997)
       1st Malaysian RACE ADSL modem – developed by subsidiary, Cronos Systems (2001)
   Human capital
       ~70% staff strength with technical background
       ~ 25% full-time R&D staff (inc mathematicians, physicists and engineers), contract staff from global
        talent pool
       CMMI L3 compliant, ISO27001:2005, ISO9001:2000, CDP Software Testing Capability
   Selected products
       Managed Security Services, AI-Authentication Systems, Mobile Applications, Professional Services
Landscape Snapshot

                                Policies
      Monitoring             Controls, Audits
   Threat Validation               AV
      Mitigation                Training



      Global Threats          Insider Threats




        SCADA

Exploiting Vulnerabilities   Emerging Threats
General Trends

  Attackers are proactive

  Defenders are reactive

  Attack mechanisms getting cheaper

  Defense mechanisms getting more expensive

  Attacks can be measured; defense mechanisms?

  Limitations of rule-based solutions

  Revisiting self learning mechanisms

  Scalable solutions
Current Solutions



Problem      Analysis &   Platform &                                    Problem
Definition    Design                      Coding                        solved!
                          Language

                                                   Pre-defined set of
                                                      instructions



                              Reliable
                              Efficient
                              Robust
                              Portable
Problem Statement




            Give Me A
   ??        Break!
Artificial Intelligence Systems



                              Mathematical Models → Software Systems
                             Solves Complex, Dynamic & Non-linear Problems

                                                                                 and many more
Can be applied to...                                                              applications..




    Face            Signature     Computer Virus   Surveillance    Business
  Recognition                                                                     Biological Virus
                   Verification     Detection       Platforms     Intelligence     Identification
Existing AI Solutions - Problems
   AI technologies & techniques
       Tightly coupled to vertical applications
        −   Face Recognition AI API cannot be reused for Virus Detection although they
            may share many similar underlying mechanisms
        −   not scalable, flexible
       Delayed software prototyping process
        −   developers lack AI knowledge/skills (mathematical problem, not IT)
        −   current NN training process inefficient for commercial applications
        −   new data preprocessing and algorithms for each application (not reusable)
       Limited commercial Application Programming Interfaces (APIs)
        −   expensive
        −   not comprehensive for a multitude of applications
        −   protected for military applications (technology export/sale restrictions)
Research Areas

Comprehensive AI
framework &
techniques within
each layer

Algorithm design
for specific
techniques to suit
applications



Optimization for
individual AI-APIs

Maximize AI
training capability
and efficiency
Making Sense

    Data collection
    
        Physical or geo-spatial
    
        Biometric information
    
        Electronic

    Correlation

    Heuristics
Authorized
       Credentials
                          One Time Password
       Authentication
                            (2 Authorities)
                                Person
                                Purpose

       Access
       Presencebased     Mantrap
       Location
      services
                          
                          Tailgating

       IT provisioning       Credentials
                              Authentication




Signature Verification
Thank You

More Related Content

What's hot

11th International Conference on Digital Image Processing and Pattern Recogni...
11th International Conference on Digital Image Processing and Pattern Recogni...11th International Conference on Digital Image Processing and Pattern Recogni...
11th International Conference on Digital Image Processing and Pattern Recogni...ijcga
 
Pervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & ChallengesPervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & Challengesiosrjce
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceFaction XYZ
 
Software Architecture: Design Decisions
Software Architecture: Design DecisionsSoftware Architecture: Design Decisions
Software Architecture: Design DecisionsHenry Muccini
 
Call for Papers - 11th International Conference on Digital Image Processing a...
Call for Papers - 11th International Conference on Digital Image Processing a...Call for Papers - 11th International Conference on Digital Image Processing a...
Call for Papers - 11th International Conference on Digital Image Processing a...ijcga
 
Call for papers - 8th International Conference on Signal and Image Processing...
Call for papers - 8th International Conference on Signal and Image Processing...Call for papers - 8th International Conference on Signal and Image Processing...
Call for papers - 8th International Conference on Signal and Image Processing...sipij
 
Core Mobile Remittance
Core Mobile Remittance Core Mobile Remittance
Core Mobile Remittance abisek123
 

What's hot (7)

11th International Conference on Digital Image Processing and Pattern Recogni...
11th International Conference on Digital Image Processing and Pattern Recogni...11th International Conference on Digital Image Processing and Pattern Recogni...
11th International Conference on Digital Image Processing and Pattern Recogni...
 
Pervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & ChallengesPervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & Challenges
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
Software Architecture: Design Decisions
Software Architecture: Design DecisionsSoftware Architecture: Design Decisions
Software Architecture: Design Decisions
 
Call for Papers - 11th International Conference on Digital Image Processing a...
Call for Papers - 11th International Conference on Digital Image Processing a...Call for Papers - 11th International Conference on Digital Image Processing a...
Call for Papers - 11th International Conference on Digital Image Processing a...
 
Call for papers - 8th International Conference on Signal and Image Processing...
Call for papers - 8th International Conference on Signal and Image Processing...Call for papers - 8th International Conference on Signal and Image Processing...
Call for papers - 8th International Conference on Signal and Image Processing...
 
Core Mobile Remittance
Core Mobile Remittance Core Mobile Remittance
Core Mobile Remittance
 

Similar to INFOSEC LANDSCAPE AND RESEARCH TRENDS

My PC Mistook Me For A Hat
My PC Mistook Me For A HatMy PC Mistook Me For A Hat
My PC Mistook Me For A Hatgopikurup
 
Sell it in it industry i gip
Sell it in it industry i gipSell it in it industry i gip
Sell it in it industry i gipmaggie4667
 
ICC-Education Profile
ICC-Education ProfileICC-Education Profile
ICC-Education Profileicceducation
 
Transform your operations through smart, connected manufacturing for slideshare
Transform your operations through smart, connected manufacturing for slideshareTransform your operations through smart, connected manufacturing for slideshare
Transform your operations through smart, connected manufacturing for slideshareDebbie Williams
 
ServSolid - An Overview
ServSolid - An OverviewServSolid - An Overview
ServSolid - An Overviewjmathur
 
Dossier corporativo en inglés
Dossier corporativo en inglésDossier corporativo en inglés
Dossier corporativo en inglésGrupo Arelance
 
Mobile Services & E-Services Case Study By Osama Abushaban
Mobile Services & E-Services Case Study By Osama AbushabanMobile Services & E-Services Case Study By Osama Abushaban
Mobile Services & E-Services Case Study By Osama AbushabanOsama Abushaban
 
Clextra tablet applications
Clextra tablet applicationsClextra tablet applications
Clextra tablet applicationsEdgevalue
 
NGSoft General Overview
NGSoft General OverviewNGSoft General Overview
NGSoft General OverviewMichael Starr
 
Aksa Bss 2009(Bangkok Thailand)
Aksa Bss 2009(Bangkok Thailand)Aksa Bss 2009(Bangkok Thailand)
Aksa Bss 2009(Bangkok Thailand)guestd6c0f
 

Similar to INFOSEC LANDSCAPE AND RESEARCH TRENDS (20)

My PC Mistook Me For A Hat
My PC Mistook Me For A HatMy PC Mistook Me For A Hat
My PC Mistook Me For A Hat
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 
Corporate overview 1.2
Corporate overview 1.2Corporate overview 1.2
Corporate overview 1.2
 
Sell it in it industry i gip
Sell it in it industry i gipSell it in it industry i gip
Sell it in it industry i gip
 
Automotive Services from Calsoftlabs
Automotive Services from CalsoftlabsAutomotive Services from Calsoftlabs
Automotive Services from Calsoftlabs
 
Digital Pen En 2008
Digital Pen En 2008Digital Pen En 2008
Digital Pen En 2008
 
ICC-Education Profile
ICC-Education ProfileICC-Education Profile
ICC-Education Profile
 
Corporate overview 2.0
Corporate overview 2.0Corporate overview 2.0
Corporate overview 2.0
 
Transform your operations through smart, connected manufacturing for slideshare
Transform your operations through smart, connected manufacturing for slideshareTransform your operations through smart, connected manufacturing for slideshare
Transform your operations through smart, connected manufacturing for slideshare
 
ServSolid - An Overview
ServSolid - An OverviewServSolid - An Overview
ServSolid - An Overview
 
Dossier corporativo en inglés
Dossier corporativo en inglésDossier corporativo en inglés
Dossier corporativo en inglés
 
KNOWLEDGE KONSULTANTS PROFILE
KNOWLEDGE KONSULTANTS PROFILEKNOWLEDGE KONSULTANTS PROFILE
KNOWLEDGE KONSULTANTS PROFILE
 
SmartConnect-Mobility
SmartConnect-MobilitySmartConnect-Mobility
SmartConnect-Mobility
 
Mobile Services & E-Services Case Study By Osama Abushaban
Mobile Services & E-Services Case Study By Osama AbushabanMobile Services & E-Services Case Study By Osama Abushaban
Mobile Services & E-Services Case Study By Osama Abushaban
 
Clextra tablet applications
Clextra tablet applicationsClextra tablet applications
Clextra tablet applications
 
NGSoft General Overview
NGSoft General OverviewNGSoft General Overview
NGSoft General Overview
 
Corporate overview 2.0
Corporate overview 2.0Corporate overview 2.0
Corporate overview 2.0
 
Aksa Bss 2009(Bangkok Thailand)
Aksa Bss 2009(Bangkok Thailand)Aksa Bss 2009(Bangkok Thailand)
Aksa Bss 2009(Bangkok Thailand)
 
OSS Business models
OSS Business modelsOSS Business models
OSS Business models
 

Recently uploaded

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

INFOSEC LANDSCAPE AND RESEARCH TRENDS

  • 1. INFOSEC LANDSCAPE & RESEARCH TRENDS GOPI KURUP February 2010
  • 2. Extol MSC  Extol Corp  25th year in business  grown from a general PC and IT trading house to a leading ICT Security solution provider  R&D successes  AROUR 1st Malaysian AV software – bi-directional technology transfer to Norman (1994), 1.5M copies bought by U.S. Dept of Defense, Dept of Energy, official AV for Kuala Lumpur XVI Commonwealth Games (1998)  OpenVoice – voice attendant & mail module bundled with Toshiba PABX systems (1997)  1st Malaysian RACE ADSL modem – developed by subsidiary, Cronos Systems (2001)  Human capital  ~70% staff strength with technical background  ~ 25% full-time R&D staff (inc mathematicians, physicists and engineers), contract staff from global talent pool  CMMI L3 compliant, ISO27001:2005, ISO9001:2000, CDP Software Testing Capability  Selected products  Managed Security Services, AI-Authentication Systems, Mobile Applications, Professional Services
  • 3. Landscape Snapshot Policies Monitoring Controls, Audits Threat Validation AV Mitigation Training Global Threats Insider Threats SCADA Exploiting Vulnerabilities Emerging Threats
  • 4. General Trends  Attackers are proactive  Defenders are reactive  Attack mechanisms getting cheaper  Defense mechanisms getting more expensive  Attacks can be measured; defense mechanisms?  Limitations of rule-based solutions  Revisiting self learning mechanisms  Scalable solutions
  • 5. Current Solutions Problem Analysis & Platform & Problem Definition Design Coding solved! Language Pre-defined set of instructions Reliable Efficient Robust Portable
  • 6. Problem Statement Give Me A ?? Break!
  • 7. Artificial Intelligence Systems Mathematical Models → Software Systems Solves Complex, Dynamic & Non-linear Problems and many more Can be applied to... applications.. Face Signature Computer Virus Surveillance Business Recognition Biological Virus Verification Detection Platforms Intelligence Identification
  • 8. Existing AI Solutions - Problems  AI technologies & techniques  Tightly coupled to vertical applications − Face Recognition AI API cannot be reused for Virus Detection although they may share many similar underlying mechanisms − not scalable, flexible  Delayed software prototyping process − developers lack AI knowledge/skills (mathematical problem, not IT) − current NN training process inefficient for commercial applications − new data preprocessing and algorithms for each application (not reusable)  Limited commercial Application Programming Interfaces (APIs) − expensive − not comprehensive for a multitude of applications − protected for military applications (technology export/sale restrictions)
  • 9. Research Areas Comprehensive AI framework & techniques within each layer Algorithm design for specific techniques to suit applications Optimization for individual AI-APIs Maximize AI training capability and efficiency
  • 10. Making Sense  Data collection  Physical or geo-spatial  Biometric information  Electronic  Correlation  Heuristics
  • 11. Authorized Credentials One Time Password Authentication (2 Authorities)  Person  Purpose  Access  Presencebased Mantrap  Location services  Tailgating  IT provisioning Credentials Authentication Signature Verification