SlideShare a Scribd company logo
1 © Copyright 2010 UNIKEN Inc. All rights reserved
Innovation Center
ProductBy
The Core Problem
What’s exactly wrong with the
internet?
2© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
So what’s wrong with it!! Nothing!!!
• It’s cheap
• Anyone can use it (no permissions required for accessing it!)
• It’s available and pervasive (almost everywhere now)
• Anyone can create any website, put any content, on a server, with an IP
address with absolutely NO GOVERNMENT CONTROL!
• Its freedom and democracy at its best!
w w w. u n i k e n . c o m
3© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
The Internet Classification
www.uniken.com
Resources that
REQUIRE
Access Control
[Online Banking]
[www.bankofamerica.com]
Resources that DO
NOT require Access
Control
[News]
[www.cnn.com]
Users who want
privacy and identity
protection
Users who DO NOT
want privacy and
identity protection
Needs
Secure
Private
Communication
Does not need
Secure
Private
Communication
4© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
5© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
THE CORE PROBLEM
THE CURRENT INTERNET INFRASTRUCTURE CANNOT
GUARANTEE THAT THE USER IS CONNECTING TO THE
DESIRED AUTHENTIC SERVER AND THE SERVER IS TALKING
TO AN AUTHENTIC PRIVELEGED USER
IT AT BEST PROVIDES ENCRYPTION WITH NO GUARANTEE
ON IDENTITY OF PARTIES INVOLVED IN THE
COMMUNICATION!!!
6© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Internet Evolution – A simplified view
[ARPANET]
TCP/IP
DNSRouters
TLS/SSL
BrowsersHTML
UDP
Web2.0
IPSEC
DNSSEC
Evolution
Digital
Certificates Tokens (OTP)
Site-Key
7© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Customer PC
hosts
INTERNET
ISP DNS
Server
ISP
INTERNET
Certificate
Authority
Fraudster’s
MachineFraudster’s
Machine
Fraudster’s
Machine
Man-in-the-middle
Session Hijacking
Replay Attacks
Phishing
Pharming
Bank
Datacenter
Domain
Registrar
Registrar /
Other
DNS Server
Man-in-the-browser
Man-on-the-machine
Modem
The Result!
8© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
The Internet is being used for something that it was NOT
designed for in the first place (Online Banking, Online Share
trading, Enterprise Web-Applications, Mobile Internet
Banking! )
Its’ designers never claimed the Internet (i.e. the packet
switched network – TCP/IP/UDP) was meant for secure private
communications!!
9© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
The current application services delivery
model is inherently vulnerable from a security
standpoint [Download Browser (from any
source) -> Type URL -> Give Password -> Hope
for the best!]
10© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
URL (domain name) (and corresponding DNS
infrastructure) CANNOT be used as identity
elements (identity look-up stores)(!)
11© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
SSL/Digital Certificate based Identity/Trust
Model is broken and has failed to deliver on
its original promise (of providing identity to
enterprises) – since it is based on a flawed
trust model
12© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Available end-user identity technologies are
not geared up to tackle the current attack
vectors (OTP 2FA /Biometric became obsolete
with the advent of MITM kind of attack
vectors)
13© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
The current Mutual Authentication based
protocols like IPSEC and the corresponding
applications IPSEC/VPN are not scalable (e.g.
Bank and Customers - Million end-points??)
14© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
End-Point Computing Environment is the new
threat frontier - What can AV do if the
processor cannot differentiate between an
authorized and unauthorized machine code(!)
15© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
WHAT IS A PRIVATE
(INTERNET)
APPLICATION
ECOSYSTEM?
16© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
SIMPLIFY AND
SECURE
APPLICATION
ECOSYSTEM
CREATE A TECHNOLOGY ENABLED
SECURE SERVICE DELIVERY
PLATFORM TO ENABLE FASTER TIME
TO MARKET AND INCREASED COST
EFFICIENCIES
Device Channel Applications
EnterpriseEnd-User
On Premise
On Cloud
Desktop/Laptop
Smart Phone
Tablet
Internet/Intranet
Employees
Customers
Partners
ECOSYSTEM CONTEXT
17© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
PUBLIC (mobile) APP ECOSYSTEMS
Apple (iOS)
Blackberry
They are consumer centric and focus ONLY on
mobile devices and mobile Apps
While Apple and Blackberry ecosystems are
closed (controlled store and proprietary
devices) the rest are open
Enterprises obviously cant use these consumer
centric, platform dependent ecosystems for
distribution, access, control and security for
enterprise applications
[App Store +
(Proprietary) Devices]
Google (Android)
Windows
[App Store + OS]
18© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Private Internet Circuits
18
Bank
Users
Bank
Users Bank
Users
Users
merchant
Users
eMail
Users
Social Networking
Users
merchant
Online Bank and its customers
Online Merchant and its customers
Online Collaboration tools (email, chat etc) and its
users
Social Networking Websites and its users
Online News Websites and its readers
Enterprises, their employees, their customers
and vendors
Online Government Services and its citizens
19© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Features of a Private Internet Circuit
• Safety
– Before any communication begins between entities in a PIC, their respective identities are verified by
both entities
– All communication is confidential and tamper proof (encrypted)
• Privileged and Exclusive
– An entity (user, software etc) not having the PIC identity relative to a given online service and the PIC
access system on his/her device will not be able to access the Online Service in the PIC
• Moderated and Controlled
– A central PIC server will control and enable the online services available to all the users of the PIC
ecosystem
– The PIC Server will provision and broker identity relationships in real-time
• Open and Extensible
– Developers can create PIC compatible Online Services and register it with the Central PIC server for
distribution to the users of the PIC ecosystem
19
20© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Private Internet (and Application) Ecosystem
Application Store
[Manage, Distribute]
User
Device Manager
[Manage, Control]
User Device Protection
Technology
Authentication
Infrastructure
Channel Security
Infrastructure
[Internet/Intranet]
Secure Application
Viewer
[Application Renderer]
Data Security
Technology
[Control, Protect]
Access Management
Technology
[Closed, Private]
PUBLIC INTERNET SERVICES (B2C)
ENTERPRISE APPLICATION SERVICES (B2B or B2E)
End-Point Container
Technology
[Security, Control]
21© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
PRIVATE [CLOSED] INTERNET
ECOSYSTEM
Private
Internet
Ecosystem
Identity
Device
Security
Data
Security
Channel
Security
Access
Management
Device
Management
App
Management
Identity Protection
Personal Online Identity is secured and protected
Closed and Private
Should not be accessible/visible from outside of the ecosystem
Platform, Device and Application Type Independent
Support Multiple OS’s, Laptops/Desktops/Mobiles/Tablets,
Web-Apps and Mobile Apps
Device, Application and Data Security
Application and Device Management
22© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
END-USER
REQUIREMENTS
23© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
How do I ?
Protect my login credentials of various critical websites (e.g. Online
Banking, Share Trading)
Protect from MITM/PHISHING and other sophisticated attacks
Protect my credit card/debit card information while doing ecommerce
transactions
Manage and Secure my personal Mobile Devices (e.g. Smart Phones,
Tablets and Latops)
Protect my personal data (e.g. contacts, files)
24© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Multiple Platforms
Windows, iOS, Android,
Blackberry
Plethora of
Devices
Desktops, Laptops, Mobile
Phones, Tablets
Identity Clutter
Too Many Passwords
Sophisticated
Attacks
MITM/PHISHING/PHARMING
Sensitive Data
Personal Contacts, Financial data
Secure
Communication
Chat/File Transfer
eMoney Safety
Credit Card/Debit Card
Ecommerce Transaction Safety
25© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
CIO CHALLENGES
26© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
How do I ?
Protect Enterprise Data from leaking out
Quickly deploy and rapidly roll-out new enterprise application services
Manage and Secure Mobile Devices
Manage Enterprise Web-Apps and Mobile Apps
Provide Secure Remote Access to Enterprise Applications to partners and customers and not just employees
Protect enterprise information/applications from MITM/PHISHING and other sophisticated attacks
Protect Online and Offline Content
Provide Authentication to End-Users [2FA and 3FA]
Provide remote support to enterprise devices
Reduce the total cost of application infrastructure
And many more such critical security and application management requirements..
27© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Multiple Platforms
Windows, iOS, Android,
Blackberry
Multiple User Types
Customers, Partners, Executive
Management, Employees
Plethora of
Devices
Desktops, Laptops, Mobile
Phones, Tablets
Identity Clutter
Too Many Passwords
Complex Enterprise
Application Landscape
On-Premise Web-Apps, Mobile Apps,
Hosted/Cloud Based Apps
Multiple Network
Types
Intranet and Internet
Shorter Cycles
Quick Development and Launch,
increasing business speed and
decreasing budgets!
28© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
THE REL-ID WIDGET
 Simple Client Side Software
that you download from
The REL-ID GATE on your
desktop/Laptop/Mobile
Phones/Tablets
 Configure your web-sites
on the REL-ID widget and
enter your private secure
internet world!
 The REL-ID Widget connects
to your configured web-
sites through the REL-ID
GATE (a cloud or on-
premise based Private
Internet Infrastructure)
Gate MyData
Connect MyCard
Settings Exit
29© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
VISUALS
(LAPTOPS/DESKTOPS)
30© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
31© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
32© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Enter previously set Device
Pin
33© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
34© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
IB User Id will get
prepopulated
35© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
VISUALS
(MOBILE PHONES AND TABLETS)
36© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
37© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
38© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
39© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
REL-ID
Secure Client
App
Containers
Web-Apps are visible and
accessible only if they are
provisioned in REL-ID
GATETM
Desktop/Laptop REL-ID Widget
REL-ID Web App Viewer
(Micro-Web-Apps)
REL-ID Mobile APP Container
REL-ID Widget
securely connects to the
Web-Apps via R-PCC
REL-ID Web App-Viewer
40© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
REL-ID
GATE
REL-ID
GATE
App Management
Identity Management
Device Management
Authentication
(2FA/3FA)
Access Management
R-PCC* Over Intranet R-PCC* Over Internet
Secure
Channel
Enterprise Web-Apps
[Virtual Image]
Enterprise Mobile Apps
3rd Party Web-Apps
[Virtual Image]
3rd Party
Mobile Apps
Command Center
Secure
Channel
Employee
Partner
Customer
REL-ID Widget
(Secure Client
App Container)
Mobile Phones,
Tablets,
Desktops and
Laptops
*R-PCC:
REL-ID Private Communication Channel (Encrypted)
THE REL-ID ECOTM
Internet
Private
Data
Center
41© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Network
REL-ID Private Communication Channel (R-PCC)
Mutually Authenticated Communication Handshake (MITM
Proof)
Encrypted Communication (optional), High-Speed and
Concurrent
Horizontally Scalable (Millions of End-Points)
Assets behind R-PCC are not visible to the Internet
and hence protected from various attacks
Requires zero admin privileges on end-user devices
Is created ON-DEMAND
Is agnostic to the underlying NETWORK (Internet or
Intranet)
RPCC Agent can be embedded in any third party application
stack (both software and firmware)
Application Application
REL-ID PCC
Agent
R-PCC (REL-ID Mutually Authenticated
and Encrypted Channel)
Internet or Intranet
42© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Network
End-User Device
Laptop
Mobile Phone
Tablet
Desktop
REL-ID Secure Container
(Safe Zone)
REL-ID Secure (encrypted)
Data Zone
3rd Party
Browser
REL-ID Web-App
Viewer
Enterprise Apps
Desktop/Laptop/Mobile
REL-ID
Multi-Factor
Authentication
2FA/3FA
R-PCC Agent
R-PCC
REL-ID Secure Container Technology (R-SCT)
REL-ID Device Fingerprinting and
Binding
REL-ID
Device
Management
And Control
Module

More Related Content

Similar to What is wrong with the Internet? [On the foundations of internet security, fundamental flaws, and the way forward]| Turing100@Persistent

Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
OracleIDM
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
Ping Identity
 
Check Point: Securing Web 2.0
Check Point: Securing Web 2.0 Check Point: Securing Web 2.0
Check Point: Securing Web 2.0
Group of company MUK
 
Trends in IRM: Internet of Things
Trends in IRM: Internet of ThingsTrends in IRM: Internet of Things
Trends in IRM: Internet of Things
ForgeRock
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
SsendiSamuel
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředí
MarketingArrowECS_CZ
 
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John BlossomBrowsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
John Blossom
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
IBM Security
 
Check Point Mobile Security
Check Point Mobile SecurityCheck Point Mobile Security
Check Point Mobile Security
Group of company MUK
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CloudIDSummit
 
Authshield integration with mails
Authshield integration with mailsAuthshield integration with mails
Authshield integration with mails
AuthShield Labs
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Cyren, Inc
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
IBM Security
 
BYOD and Security Trends
BYOD and Security TrendsBYOD and Security Trends
BYOD and Security Trends
Cisco Russia
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
Michael Davis
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity Services
CloudIDSummit
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Security Innovation
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applications
Julien Ott
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
Authentic8
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
ITDogadjaji.com
 

Similar to What is wrong with the Internet? [On the foundations of internet security, fundamental flaws, and the way forward]| Turing100@Persistent (20)

Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Check Point: Securing Web 2.0
Check Point: Securing Web 2.0 Check Point: Securing Web 2.0
Check Point: Securing Web 2.0
 
Trends in IRM: Internet of Things
Trends in IRM: Internet of ThingsTrends in IRM: Internet of Things
Trends in IRM: Internet of Things
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředí
 
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John BlossomBrowsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Check Point Mobile Security
Check Point Mobile SecurityCheck Point Mobile Security
Check Point Mobile Security
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Authshield integration with mails
Authshield integration with mailsAuthshield integration with mails
Authshield integration with mails
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
 
BYOD and Security Trends
BYOD and Security TrendsBYOD and Security Trends
BYOD and Security Trends
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity Services
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applications
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 

Recently uploaded

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

What is wrong with the Internet? [On the foundations of internet security, fundamental flaws, and the way forward]| Turing100@Persistent

  • 1. 1 © Copyright 2010 UNIKEN Inc. All rights reserved Innovation Center ProductBy The Core Problem What’s exactly wrong with the internet?
  • 2. 2© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com So what’s wrong with it!! Nothing!!! • It’s cheap • Anyone can use it (no permissions required for accessing it!) • It’s available and pervasive (almost everywhere now) • Anyone can create any website, put any content, on a server, with an IP address with absolutely NO GOVERNMENT CONTROL! • Its freedom and democracy at its best! w w w. u n i k e n . c o m
  • 3. 3© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com The Internet Classification www.uniken.com Resources that REQUIRE Access Control [Online Banking] [www.bankofamerica.com] Resources that DO NOT require Access Control [News] [www.cnn.com] Users who want privacy and identity protection Users who DO NOT want privacy and identity protection Needs Secure Private Communication Does not need Secure Private Communication
  • 4. 4© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com
  • 5. 5© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com THE CORE PROBLEM THE CURRENT INTERNET INFRASTRUCTURE CANNOT GUARANTEE THAT THE USER IS CONNECTING TO THE DESIRED AUTHENTIC SERVER AND THE SERVER IS TALKING TO AN AUTHENTIC PRIVELEGED USER IT AT BEST PROVIDES ENCRYPTION WITH NO GUARANTEE ON IDENTITY OF PARTIES INVOLVED IN THE COMMUNICATION!!!
  • 6. 6© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Internet Evolution – A simplified view [ARPANET] TCP/IP DNSRouters TLS/SSL BrowsersHTML UDP Web2.0 IPSEC DNSSEC Evolution Digital Certificates Tokens (OTP) Site-Key
  • 7. 7© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Customer PC hosts INTERNET ISP DNS Server ISP INTERNET Certificate Authority Fraudster’s MachineFraudster’s Machine Fraudster’s Machine Man-in-the-middle Session Hijacking Replay Attacks Phishing Pharming Bank Datacenter Domain Registrar Registrar / Other DNS Server Man-in-the-browser Man-on-the-machine Modem The Result!
  • 8. 8© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com The Internet is being used for something that it was NOT designed for in the first place (Online Banking, Online Share trading, Enterprise Web-Applications, Mobile Internet Banking! ) Its’ designers never claimed the Internet (i.e. the packet switched network – TCP/IP/UDP) was meant for secure private communications!!
  • 9. 9© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com The current application services delivery model is inherently vulnerable from a security standpoint [Download Browser (from any source) -> Type URL -> Give Password -> Hope for the best!]
  • 10. 10© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com URL (domain name) (and corresponding DNS infrastructure) CANNOT be used as identity elements (identity look-up stores)(!)
  • 11. 11© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com SSL/Digital Certificate based Identity/Trust Model is broken and has failed to deliver on its original promise (of providing identity to enterprises) – since it is based on a flawed trust model
  • 12. 12© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Available end-user identity technologies are not geared up to tackle the current attack vectors (OTP 2FA /Biometric became obsolete with the advent of MITM kind of attack vectors)
  • 13. 13© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com The current Mutual Authentication based protocols like IPSEC and the corresponding applications IPSEC/VPN are not scalable (e.g. Bank and Customers - Million end-points??)
  • 14. 14© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com End-Point Computing Environment is the new threat frontier - What can AV do if the processor cannot differentiate between an authorized and unauthorized machine code(!)
  • 15. 15© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com WHAT IS A PRIVATE (INTERNET) APPLICATION ECOSYSTEM?
  • 16. 16© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com SIMPLIFY AND SECURE APPLICATION ECOSYSTEM CREATE A TECHNOLOGY ENABLED SECURE SERVICE DELIVERY PLATFORM TO ENABLE FASTER TIME TO MARKET AND INCREASED COST EFFICIENCIES Device Channel Applications EnterpriseEnd-User On Premise On Cloud Desktop/Laptop Smart Phone Tablet Internet/Intranet Employees Customers Partners ECOSYSTEM CONTEXT
  • 17. 17© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com PUBLIC (mobile) APP ECOSYSTEMS Apple (iOS) Blackberry They are consumer centric and focus ONLY on mobile devices and mobile Apps While Apple and Blackberry ecosystems are closed (controlled store and proprietary devices) the rest are open Enterprises obviously cant use these consumer centric, platform dependent ecosystems for distribution, access, control and security for enterprise applications [App Store + (Proprietary) Devices] Google (Android) Windows [App Store + OS]
  • 18. 18© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Private Internet Circuits 18 Bank Users Bank Users Bank Users Users merchant Users eMail Users Social Networking Users merchant Online Bank and its customers Online Merchant and its customers Online Collaboration tools (email, chat etc) and its users Social Networking Websites and its users Online News Websites and its readers Enterprises, their employees, their customers and vendors Online Government Services and its citizens
  • 19. 19© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Features of a Private Internet Circuit • Safety – Before any communication begins between entities in a PIC, their respective identities are verified by both entities – All communication is confidential and tamper proof (encrypted) • Privileged and Exclusive – An entity (user, software etc) not having the PIC identity relative to a given online service and the PIC access system on his/her device will not be able to access the Online Service in the PIC • Moderated and Controlled – A central PIC server will control and enable the online services available to all the users of the PIC ecosystem – The PIC Server will provision and broker identity relationships in real-time • Open and Extensible – Developers can create PIC compatible Online Services and register it with the Central PIC server for distribution to the users of the PIC ecosystem 19
  • 20. 20© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Private Internet (and Application) Ecosystem Application Store [Manage, Distribute] User Device Manager [Manage, Control] User Device Protection Technology Authentication Infrastructure Channel Security Infrastructure [Internet/Intranet] Secure Application Viewer [Application Renderer] Data Security Technology [Control, Protect] Access Management Technology [Closed, Private] PUBLIC INTERNET SERVICES (B2C) ENTERPRISE APPLICATION SERVICES (B2B or B2E) End-Point Container Technology [Security, Control]
  • 21. 21© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com PRIVATE [CLOSED] INTERNET ECOSYSTEM Private Internet Ecosystem Identity Device Security Data Security Channel Security Access Management Device Management App Management Identity Protection Personal Online Identity is secured and protected Closed and Private Should not be accessible/visible from outside of the ecosystem Platform, Device and Application Type Independent Support Multiple OS’s, Laptops/Desktops/Mobiles/Tablets, Web-Apps and Mobile Apps Device, Application and Data Security Application and Device Management
  • 22. 22© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com END-USER REQUIREMENTS
  • 23. 23© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com How do I ? Protect my login credentials of various critical websites (e.g. Online Banking, Share Trading) Protect from MITM/PHISHING and other sophisticated attacks Protect my credit card/debit card information while doing ecommerce transactions Manage and Secure my personal Mobile Devices (e.g. Smart Phones, Tablets and Latops) Protect my personal data (e.g. contacts, files)
  • 24. 24© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Multiple Platforms Windows, iOS, Android, Blackberry Plethora of Devices Desktops, Laptops, Mobile Phones, Tablets Identity Clutter Too Many Passwords Sophisticated Attacks MITM/PHISHING/PHARMING Sensitive Data Personal Contacts, Financial data Secure Communication Chat/File Transfer eMoney Safety Credit Card/Debit Card Ecommerce Transaction Safety
  • 25. 25© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com CIO CHALLENGES
  • 26. 26© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com How do I ? Protect Enterprise Data from leaking out Quickly deploy and rapidly roll-out new enterprise application services Manage and Secure Mobile Devices Manage Enterprise Web-Apps and Mobile Apps Provide Secure Remote Access to Enterprise Applications to partners and customers and not just employees Protect enterprise information/applications from MITM/PHISHING and other sophisticated attacks Protect Online and Offline Content Provide Authentication to End-Users [2FA and 3FA] Provide remote support to enterprise devices Reduce the total cost of application infrastructure And many more such critical security and application management requirements..
  • 27. 27© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Multiple Platforms Windows, iOS, Android, Blackberry Multiple User Types Customers, Partners, Executive Management, Employees Plethora of Devices Desktops, Laptops, Mobile Phones, Tablets Identity Clutter Too Many Passwords Complex Enterprise Application Landscape On-Premise Web-Apps, Mobile Apps, Hosted/Cloud Based Apps Multiple Network Types Intranet and Internet Shorter Cycles Quick Development and Launch, increasing business speed and decreasing budgets!
  • 28. 28© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com THE REL-ID WIDGET  Simple Client Side Software that you download from The REL-ID GATE on your desktop/Laptop/Mobile Phones/Tablets  Configure your web-sites on the REL-ID widget and enter your private secure internet world!  The REL-ID Widget connects to your configured web- sites through the REL-ID GATE (a cloud or on- premise based Private Internet Infrastructure) Gate MyData Connect MyCard Settings Exit
  • 29. 29© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com VISUALS (LAPTOPS/DESKTOPS)
  • 30. 30© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com
  • 31. 31© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com
  • 32. 32© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Enter previously set Device Pin
  • 33. 33© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com
  • 34. 34© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com IB User Id will get prepopulated
  • 35. 35© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com VISUALS (MOBILE PHONES AND TABLETS)
  • 36. 36© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com
  • 37. 37© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com
  • 38. 38© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com
  • 39. 39© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com REL-ID Secure Client App Containers Web-Apps are visible and accessible only if they are provisioned in REL-ID GATETM Desktop/Laptop REL-ID Widget REL-ID Web App Viewer (Micro-Web-Apps) REL-ID Mobile APP Container REL-ID Widget securely connects to the Web-Apps via R-PCC REL-ID Web App-Viewer
  • 40. 40© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com REL-ID GATE REL-ID GATE App Management Identity Management Device Management Authentication (2FA/3FA) Access Management R-PCC* Over Intranet R-PCC* Over Internet Secure Channel Enterprise Web-Apps [Virtual Image] Enterprise Mobile Apps 3rd Party Web-Apps [Virtual Image] 3rd Party Mobile Apps Command Center Secure Channel Employee Partner Customer REL-ID Widget (Secure Client App Container) Mobile Phones, Tablets, Desktops and Laptops *R-PCC: REL-ID Private Communication Channel (Encrypted) THE REL-ID ECOTM Internet Private Data Center
  • 41. 41© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Network REL-ID Private Communication Channel (R-PCC) Mutually Authenticated Communication Handshake (MITM Proof) Encrypted Communication (optional), High-Speed and Concurrent Horizontally Scalable (Millions of End-Points) Assets behind R-PCC are not visible to the Internet and hence protected from various attacks Requires zero admin privileges on end-user devices Is created ON-DEMAND Is agnostic to the underlying NETWORK (Internet or Intranet) RPCC Agent can be embedded in any third party application stack (both software and firmware) Application Application REL-ID PCC Agent R-PCC (REL-ID Mutually Authenticated and Encrypted Channel) Internet or Intranet
  • 42. 42© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Network End-User Device Laptop Mobile Phone Tablet Desktop REL-ID Secure Container (Safe Zone) REL-ID Secure (encrypted) Data Zone 3rd Party Browser REL-ID Web-App Viewer Enterprise Apps Desktop/Laptop/Mobile REL-ID Multi-Factor Authentication 2FA/3FA R-PCC Agent R-PCC REL-ID Secure Container Technology (R-SCT) REL-ID Device Fingerprinting and Binding REL-ID Device Management And Control Module