SlideShare a Scribd company logo
The Future of Interaction & its Security Challenges
Dr. Sundeep Oberoi
Talked Delivered at CERC@IIIT-D
25th March 2014
April 2, 14
Evolving Communication Paradigms
1980s
Fax Machine
2000
Email
2010
Activity Streams
1960s
Telephone
• Always On
• Location aware
• Real-time
• Collaborative
- 2 -
April 2, 14
Interaction Paradigms of the Future
• The “Work Finds the Worker” paradigm
• The “Bits Meet Atoms” paradigm
3
April 2, 14
“WORK FINDS THE WORKER”
4
April 2, 14
Next Generation Operations
- 5 -
The Next Generation Workspace
April 2, 14
Applications are Collaborative
Conferencing	
  
Presence	
  and	
  
Messaging	
  
Voice	
  
Unified	
  Communica5on	
  
Collabora5on	
  
Consumer	
  Web	
  Applica5ons	
  
Mobility	
  	
  
Communica5on	
  Enabled	
  Processes	
  
April 2, 14
The Enterprise is Deperimeterised!
Virtualiza5on	
  
Cloud	
  
Conferencing	
  
Presence	
  and	
  
Messaging	
  
Voice	
  
Unified	
  Communica5on	
  
Collabora5on	
  
Consumer	
  Web	
  Applica5ons	
  
Mobility	
  	
  
Communica5on	
  Enabled	
  Processes	
  
Leveraging	
  IP	
  network	
  for	
  communica5on	
  
Enterprise	
  Applica5ons	
  
- 7 -
April 2, 14
Work Finds the Worker
Log-in
Retrieves
ERP
CRM
Workflow
Collaboration
Work Lists
Unified Communication Fabric
Work List Router
Unified Communication Fabric
Collaborative Mesh apps
Integrated Messaging
Voice Enablement Services
Multi-modal Conferencing
Pull
Push
April 2, 14
“BITS MEET ATOMS”
9
April 2, 14
Internet
Mobile Internet
Internet of Things
Smart Grid
Integrated Vehicle Management
Track and Trace
Browser Apps
Enablement of
Enterprise Apps
to Integrate with
“Things”
• Billions of devices & sensors coming online
• Real world entities being controlled and managed over the wire
The Cyber Physical Continuum
April 2, 14
THE SECURITY CHALLENGES
11
April 2, 14
Data Protection – Challenges
Insiders &
business partners
are responsible
for 43% of
security breaches
- 12
-
April 2, 14
Identity is the new perimeter
• Identity Management
– Interoperable identities
– Strong authentication
– Authentication of devices
– Authentication of data
• Authentication to mobile devices
• The mobile device as an authenticator
• National Identities
• The role of biometrics
• The role of Digital Signatures
13
April 2, 1414
Application Security Challenges
Next Gen App
Characteristics
• Agility to respond to
business changes
• Alignment with Business
Landscape
• Increased consumption
by addressing user
expectation
• Enhanced offline
operational capability
• Architectural Flexibility
• Enhanced user control on
Application Life cycle
Enhanced Security
Need
•  High Vulnerabilities
reported in Web
technologies increasing the
risk
• Sheer size and rate of
change requires
continuous monitoring of
application changes and
Security ingrained in
Application Delivery cycle
Technology
Landscape
•  Standard Web
technologies in Dominant
mode
• Enterprise Extensions ,
Mashups, Unified
Communication using
these technologies at the
backend through host of
emerging technologies
and custom built
Integration layers
•  Focus on delivering the
functionality rather on
Patching Security
Vulnerabilities
April 2, 14
Accountability – The Grand Challenge
People and organizations should not have to give up the benefits of using information
appropriately in powerful networked systems in order to avoid the harms that result
when the same information is used inappropriately. - Joan Feigenbaum
For too long, our approach to information protection policy has been to seek ways to
prevent information from escaping beyond appropriate boundaries, then wring our
hands when it inevitably does.
- “Information Accountability“ by Weitzner, Abelson, Berners-Lee, Feigenbaum, Hendler, and
Sussman
When information has been used, it should to possible to determine what happened, and
to pinpoint use that is inappropriate. - Daniel J. Weitzner
Transaction
Speed
Wide
Geographic
Spread
Ease of
Information
Flow
Identification
and
Authentication
Ease of
Tampering of
Electronic
Records
Limited
Capture of
Actions
Associating the
Physical Persona to the
Electronic Persona
Data Integrity
Mechanisms
Allowing only
authorised actions,
and associating the
Electronic Persona with
all important actions
Manageability
Even narrow
windows
exploitable
Data Protection
Thank You

More Related Content

What's hot

Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
Vince Verbeke
 
Internet of things
Internet of thingsInternet of things
Internet of things
swaradeep bachu
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Dodi Saputra
 
IoT
IoTIoT
IoT
Mphasis
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
ardexateam
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Pantech ProLabs India Pvt Ltd
 
Apps That Think for You
Apps That Think for YouApps That Think for You
Apps That Think for You
Copper Mobile, Inc.
 
Internet of Things - Lu, Ralph
Internet of Things - Lu, RalphInternet of Things - Lu, Ralph
Internet of Things - Lu, Ralph
ralphlu
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings
Symantec
 
Information technology
Information technologyInformation technology
Information technology
Omar Bashir
 
Iot ppt
Iot pptIot ppt
تعلم الانترنيت
تعلم الانترنيتتعلم الانترنيت
تعلم الانترنيت
jinanAlmousawy
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
Kamendu Panchal
 
Internet of Things Webinar
Internet of Things WebinarInternet of Things Webinar
Internet of Things Webinar
Alexandra Deschamps-Sonsino
 
Rise of a New Era: Advancing Towards 50B Connected Devices
Rise of a New Era: Advancing Towards 50B Connected DevicesRise of a New Era: Advancing Towards 50B Connected Devices
Rise of a New Era: Advancing Towards 50B Connected Devices
Mahbubul Alam
 
what is IoT
what is IoTwhat is IoT
what is IoT
syedfaiyaz73685
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Security
 
IoT
IoTIoT
IoT
Mphasis
 
Taking the Proactive Roles Through Smart Technologies
Taking the Proactive Roles Through Smart TechnologiesTaking the Proactive Roles Through Smart Technologies
Taking the Proactive Roles Through Smart Technologies
Dr. Mazlan Abbas
 
Internet of things
Internet of things Internet of things
Internet of things
DeepanshuMehra6
 

What's hot (20)

Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IoT
IoTIoT
IoT
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Apps That Think for You
Apps That Think for YouApps That Think for You
Apps That Think for You
 
Internet of Things - Lu, Ralph
Internet of Things - Lu, RalphInternet of Things - Lu, Ralph
Internet of Things - Lu, Ralph
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings
 
Information technology
Information technologyInformation technology
Information technology
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
تعلم الانترنيت
تعلم الانترنيتتعلم الانترنيت
تعلم الانترنيت
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
 
Internet of Things Webinar
Internet of Things WebinarInternet of Things Webinar
Internet of Things Webinar
 
Rise of a New Era: Advancing Towards 50B Connected Devices
Rise of a New Era: Advancing Towards 50B Connected DevicesRise of a New Era: Advancing Towards 50B Connected Devices
Rise of a New Era: Advancing Towards 50B Connected Devices
 
what is IoT
what is IoTwhat is IoT
what is IoT
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
IoT
IoTIoT
IoT
 
Taking the Proactive Roles Through Smart Technologies
Taking the Proactive Roles Through Smart TechnologiesTaking the Proactive Roles Through Smart Technologies
Taking the Proactive Roles Through Smart Technologies
 
Internet of things
Internet of things Internet of things
Internet of things
 

Viewers also liked

Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Cybersecurity Education and Research Centre
 
Clotho : Saving Programs from Malformed Strings and Incorrect
Clotho : Saving Programs from Malformed Strings and IncorrectClotho : Saving Programs from Malformed Strings and Incorrect
Clotho : Saving Programs from Malformed Strings and Incorrect
Cybersecurity Education and Research Centre
 
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
Broker Bots: Analyzing automated activity during High Impact Events on TwitterBroker Bots: Analyzing automated activity during High Impact Events on Twitter
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
Cybersecurity Education and Research Centre
 
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Cybersecurity Education and Research Centre
 
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Cybersecurity Education and Research Centre
 
TweetCred: Real-Time Credibility Assessment of 
 Content on Twitter @ Socinfo...
TweetCred: Real-Time Credibility Assessment of 
 Content on Twitter @ Socinfo...TweetCred: Real-Time Credibility Assessment of 
 Content on Twitter @ Socinfo...
TweetCred: Real-Time Credibility Assessment of 
 Content on Twitter @ Socinfo...
IIIT Hyderabad
 
TASVEER : Tomography of India’s Internet Infrastructure
TASVEER : Tomography of India’s Internet InfrastructureTASVEER : Tomography of India’s Internet Infrastructure
TASVEER : Tomography of India’s Internet Infrastructure
Cybersecurity Education and Research Centre
 
Automated Methods for Identity Resolution across Online Social Networks
Automated Methods for Identity Resolution across Online Social NetworksAutomated Methods for Identity Resolution across Online Social Networks
Automated Methods for Identity Resolution across Online Social Networks
Cybersecurity Education and Research Centre
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
Cybersecurity Education and Research Centre
 
Exploration of gaps in Bitly's spam detection and relevant countermeasures
Exploration of gaps in Bitly's spam detection and relevant countermeasuresExploration of gaps in Bitly's spam detection and relevant countermeasures
Exploration of gaps in Bitly's spam detection and relevant countermeasures
Cybersecurity Education and Research Centre
 
Designing and Evaluating Techniques to
 Mitigate Misinformation Spread on 
Mi...
Designing and Evaluating Techniques to
 Mitigate Misinformation Spread on 
Mi...Designing and Evaluating Techniques to
 Mitigate Misinformation Spread on 
Mi...
Designing and Evaluating Techniques to
 Mitigate Misinformation Spread on 
Mi...
IIIT Hyderabad
 
Securing the Digital Enterprise
Securing the Digital EnterpriseSecuring the Digital Enterprise
Securing the Digital Enterprise
Cybersecurity Education and Research Centre
 
Video Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical FlowVideo Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical Flow
Cybersecurity Education and Research Centre
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
Cybersecurity Education and Research Centre
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
Cybersecurity Education and Research Centre
 

Viewers also liked (15)

Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
 
Clotho : Saving Programs from Malformed Strings and Incorrect
Clotho : Saving Programs from Malformed Strings and IncorrectClotho : Saving Programs from Malformed Strings and Incorrect
Clotho : Saving Programs from Malformed Strings and Incorrect
 
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
Broker Bots: Analyzing automated activity during High Impact Events on TwitterBroker Bots: Analyzing automated activity during High Impact Events on Twitter
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
 
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
 
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
 
TweetCred: Real-Time Credibility Assessment of 
 Content on Twitter @ Socinfo...
TweetCred: Real-Time Credibility Assessment of 
 Content on Twitter @ Socinfo...TweetCred: Real-Time Credibility Assessment of 
 Content on Twitter @ Socinfo...
TweetCred: Real-Time Credibility Assessment of 
 Content on Twitter @ Socinfo...
 
TASVEER : Tomography of India’s Internet Infrastructure
TASVEER : Tomography of India’s Internet InfrastructureTASVEER : Tomography of India’s Internet Infrastructure
TASVEER : Tomography of India’s Internet Infrastructure
 
Automated Methods for Identity Resolution across Online Social Networks
Automated Methods for Identity Resolution across Online Social NetworksAutomated Methods for Identity Resolution across Online Social Networks
Automated Methods for Identity Resolution across Online Social Networks
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
Exploration of gaps in Bitly's spam detection and relevant countermeasures
Exploration of gaps in Bitly's spam detection and relevant countermeasuresExploration of gaps in Bitly's spam detection and relevant countermeasures
Exploration of gaps in Bitly's spam detection and relevant countermeasures
 
Designing and Evaluating Techniques to
 Mitigate Misinformation Spread on 
Mi...
Designing and Evaluating Techniques to
 Mitigate Misinformation Spread on 
Mi...Designing and Evaluating Techniques to
 Mitigate Misinformation Spread on 
Mi...
Designing and Evaluating Techniques to
 Mitigate Misinformation Spread on 
Mi...
 
Securing the Digital Enterprise
Securing the Digital EnterpriseSecuring the Digital Enterprise
Securing the Digital Enterprise
 
Video Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical FlowVideo Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical Flow
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
 

Similar to The future of interaction & its security challenges

Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...
Insight UK
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
Zernike College
 
Agile IT: Modern Architecture for Rapid Mobile App Development
Agile IT: Modern Architecture for Rapid Mobile App DevelopmentAgile IT: Modern Architecture for Rapid Mobile App Development
Agile IT: Modern Architecture for Rapid Mobile App Development
AnyPresence
 
Service Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan Turchin
Service Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan TurchinService Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan Turchin
Service Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan Turchin
PeopleReign, Inc.
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
marukanda
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
Chris Pepin
 
Leveraging Mobile Middleware for Enterprise Transformation
Leveraging Mobile Middleware for Enterprise TransformationLeveraging Mobile Middleware for Enterprise Transformation
Leveraging Mobile Middleware for Enterprise Transformation
Paul Tocatlian
 
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
NetMotion Wireless
 
Verivo and Forrester Mobile Strategies
Verivo and Forrester Mobile StrategiesVerivo and Forrester Mobile Strategies
Verivo and Forrester Mobile Strategies
VerivoSoftware
 
A Perspective from the intersection Data Science, Mobility, and Mobile Devices
A Perspective from the intersection Data Science, Mobility, and Mobile DevicesA Perspective from the intersection Data Science, Mobility, and Mobile Devices
A Perspective from the intersection Data Science, Mobility, and Mobile Devices
Yael Garten
 
State of the Art M2M /IoT Solutions
State of the Art M2M /IoT Solutions State of the Art M2M /IoT Solutions
State of the Art M2M /IoT Solutions
Eurotech
 
The Essentials of Mobile App Performance Testing and Monitoring
The Essentials of Mobile App Performance Testing and MonitoringThe Essentials of Mobile App Performance Testing and Monitoring
The Essentials of Mobile App Performance Testing and Monitoring
Correlsense
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising business
Sno Jutt
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks
 
IoT Use Cases
IoT Use CasesIoT Use Cases
IoT Use Cases
Bob Marcus
 
Secure Systems of Engagement
Secure Systems of EngagementSecure Systems of Engagement
Secure Systems of Engagement
John Palfreyman
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
tmbainjr131
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
EC-Council
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
Onwubiko Emmanuel
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
IJECEIAES
 

Similar to The future of interaction & its security challenges (20)

Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Agile IT: Modern Architecture for Rapid Mobile App Development
Agile IT: Modern Architecture for Rapid Mobile App DevelopmentAgile IT: Modern Architecture for Rapid Mobile App Development
Agile IT: Modern Architecture for Rapid Mobile App Development
 
Service Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan Turchin
Service Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan TurchinService Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan Turchin
Service Assurance for Modern Apps - BigPanda NA SNO - April 2015 - Dan Turchin
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Leveraging Mobile Middleware for Enterprise Transformation
Leveraging Mobile Middleware for Enterprise TransformationLeveraging Mobile Middleware for Enterprise Transformation
Leveraging Mobile Middleware for Enterprise Transformation
 
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
 
Verivo and Forrester Mobile Strategies
Verivo and Forrester Mobile StrategiesVerivo and Forrester Mobile Strategies
Verivo and Forrester Mobile Strategies
 
A Perspective from the intersection Data Science, Mobility, and Mobile Devices
A Perspective from the intersection Data Science, Mobility, and Mobile DevicesA Perspective from the intersection Data Science, Mobility, and Mobile Devices
A Perspective from the intersection Data Science, Mobility, and Mobile Devices
 
State of the Art M2M /IoT Solutions
State of the Art M2M /IoT Solutions State of the Art M2M /IoT Solutions
State of the Art M2M /IoT Solutions
 
The Essentials of Mobile App Performance Testing and Monitoring
The Essentials of Mobile App Performance Testing and MonitoringThe Essentials of Mobile App Performance Testing and Monitoring
The Essentials of Mobile App Performance Testing and Monitoring
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising business
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
 
IoT Use Cases
IoT Use CasesIoT Use Cases
IoT Use Cases
 
Secure Systems of Engagement
Secure Systems of EngagementSecure Systems of Engagement
Secure Systems of Engagement
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 

Recently uploaded

原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
bijceesjournal
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
architagupta876
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
Madan Karki
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
ramrag33
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 

Recently uploaded (20)

原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 

The future of interaction & its security challenges

  • 1. The Future of Interaction & its Security Challenges Dr. Sundeep Oberoi Talked Delivered at CERC@IIIT-D 25th March 2014
  • 2. April 2, 14 Evolving Communication Paradigms 1980s Fax Machine 2000 Email 2010 Activity Streams 1960s Telephone • Always On • Location aware • Real-time • Collaborative - 2 -
  • 3. April 2, 14 Interaction Paradigms of the Future • The “Work Finds the Worker” paradigm • The “Bits Meet Atoms” paradigm 3
  • 4. April 2, 14 “WORK FINDS THE WORKER” 4
  • 5. April 2, 14 Next Generation Operations - 5 - The Next Generation Workspace
  • 6. April 2, 14 Applications are Collaborative Conferencing   Presence  and   Messaging   Voice   Unified  Communica5on   Collabora5on   Consumer  Web  Applica5ons   Mobility     Communica5on  Enabled  Processes  
  • 7. April 2, 14 The Enterprise is Deperimeterised! Virtualiza5on   Cloud   Conferencing   Presence  and   Messaging   Voice   Unified  Communica5on   Collabora5on   Consumer  Web  Applica5ons   Mobility     Communica5on  Enabled  Processes   Leveraging  IP  network  for  communica5on   Enterprise  Applica5ons   - 7 -
  • 8. April 2, 14 Work Finds the Worker Log-in Retrieves ERP CRM Workflow Collaboration Work Lists Unified Communication Fabric Work List Router Unified Communication Fabric Collaborative Mesh apps Integrated Messaging Voice Enablement Services Multi-modal Conferencing Pull Push
  • 9. April 2, 14 “BITS MEET ATOMS” 9
  • 10. April 2, 14 Internet Mobile Internet Internet of Things Smart Grid Integrated Vehicle Management Track and Trace Browser Apps Enablement of Enterprise Apps to Integrate with “Things” • Billions of devices & sensors coming online • Real world entities being controlled and managed over the wire The Cyber Physical Continuum
  • 11. April 2, 14 THE SECURITY CHALLENGES 11
  • 12. April 2, 14 Data Protection – Challenges Insiders & business partners are responsible for 43% of security breaches - 12 -
  • 13. April 2, 14 Identity is the new perimeter • Identity Management – Interoperable identities – Strong authentication – Authentication of devices – Authentication of data • Authentication to mobile devices • The mobile device as an authenticator • National Identities • The role of biometrics • The role of Digital Signatures 13
  • 14. April 2, 1414 Application Security Challenges Next Gen App Characteristics • Agility to respond to business changes • Alignment with Business Landscape • Increased consumption by addressing user expectation • Enhanced offline operational capability • Architectural Flexibility • Enhanced user control on Application Life cycle Enhanced Security Need •  High Vulnerabilities reported in Web technologies increasing the risk • Sheer size and rate of change requires continuous monitoring of application changes and Security ingrained in Application Delivery cycle Technology Landscape •  Standard Web technologies in Dominant mode • Enterprise Extensions , Mashups, Unified Communication using these technologies at the backend through host of emerging technologies and custom built Integration layers •  Focus on delivering the functionality rather on Patching Security Vulnerabilities
  • 15. April 2, 14 Accountability – The Grand Challenge People and organizations should not have to give up the benefits of using information appropriately in powerful networked systems in order to avoid the harms that result when the same information is used inappropriately. - Joan Feigenbaum For too long, our approach to information protection policy has been to seek ways to prevent information from escaping beyond appropriate boundaries, then wring our hands when it inevitably does. - “Information Accountability“ by Weitzner, Abelson, Berners-Lee, Feigenbaum, Hendler, and Sussman When information has been used, it should to possible to determine what happened, and to pinpoint use that is inappropriate. - Daniel J. Weitzner Transaction Speed Wide Geographic Spread Ease of Information Flow Identification and Authentication Ease of Tampering of Electronic Records Limited Capture of Actions Associating the Physical Persona to the Electronic Persona Data Integrity Mechanisms Allowing only authorised actions, and associating the Electronic Persona with all important actions Manageability Even narrow windows exploitable Data Protection