This document discusses cyber immune systems and cross-border collaboration. It addresses the following key points:
1. Cyber immune technologies aim to build resilience after cyber incidents, observing systems "in vivo" rather than just protecting against threats. This involves heuristics-based filtering and collaboration rather than just rules-based approaches.
2. Cross-border collaboration on cyber immunity could include sharing immunity information, forensics data, detection heuristics, and meta knowledge. New network structures using technologies like IPv6 and non-IP protocols could improve resilience.
3. The document proposes areas for US-Japan collaboration, including security-enhancing technology development, operational design, management, education, response improvement, and security/
Decarbonising Commercial Real Estate: The Role of Operational Performance
[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust and Reliability, Helped By Cross Boarder Corporation
1. CYBER IMMUNE SYSTEMS THAT
HELPS TRUST AND RELIABILITY,
HELPED BY CROSS BOARDER
CORPORATION
Sao Paulo, Brazil
November 12, 2013
Dr. Makoto (Mac) Yokozawa
Nomura Research Institute, Ltd.(Japan)
Visiting Professor at Kyoto University
JISA, Japan Information Service Industry Association, Public Policy
Subcommittee Chair
11820047(08
)
0
4. CYBER IMMUNE TECHNOLOGIES
Figure 2 Key Elements of a Simplified Immune System
Artificial Immune Systems for Intrusion Detection, James McCaffrey,
“Microsoft MSDN Test Run”
Heuristics Based Antivirus Protection Software
(Commercial)
3
5. WHAT’S NEW AND WHAT’S OLD
Cyber Security
Cyber Immunity
Protection before incidents
Resilience after incidents
“In vitro” observation
“In vivo” observation
Rules and Patterns Based
Heuristics and Knowledge Based
Filtering and Collaboration
Filtering and Collaboration
Quick Response
Reorganizing the Ecosystem
Artificial
Organic
4
6. WHY IMMUNE SYSTEM?
Maturity in Cyber Security to some extent,
New Fashion in Countermeasures for Cyber security
Incidents
Increasing Number of Unknown Threats
Weak Literacy and Zero Literacy Nodes (IOT,M2M)
BYOD
Moving from Governance by Legislation to Governance by Market-base Principles and
Architecture
Reasons for Immunity
Do not re-install the Windows, Repair and Reuse without Shutting down your Service
Targeted Attack
and Advanced Persistent Attack will never end in a day, with a single
pattern
Backdoors everywhere - Embedding Spy Chips in Everyday Household Gadgets and
Appliances
Data Sovereignty and Data Ownership
5
7. HOW DO WE COLLABORATE IN CYBER
IMMUNITY?
Sharing Immunity
Forensics
Heuristics in Detection
Heuristics in Immunity
Meta Knowledge
New Network Structure and Technologies
IPv6
non-IP New Network Protocol
Resilient Structure
Redundant and Modular Network Connection
Privacy and Security Tradeoff Study
Security Improves Privacy Protection in many situation
Sometimes Privacy have to be sacrificed in order to improve Security
Security BY Design and Privacy BY Design --- need to Change the Architecture
Identity Management and Trust Framework
6
10. Proposal from US-Japan Business to US-Japan Governments 2012
(1) Privacy
a. Balancing Protection and Utilization
b. OECD Guideline on the Protection of Privacy and Cross boarder Flows of
Personal Data
c. Public-Private Partnership in Privacy Protection, 3rd Country Issues,
Activities in International Institutes
d. Regulatory Structure and Vitality in Cloud Business
e. EU Data Protection Rules and APEC Cross Boarder Privacy Rules
(2) Information Security
a. “Security as a Service”, “Security in Cloud Services”, Trust and Cost
b. Cloud Services and Devices, their New Aspects and New Threats in
Information Security
c. Maturity and Immaturity in Security Awareness
d. Security related Areas of Collaboration between US and Japan
• Developments of Security Enhancing Technology
• Organizational Design in Operation
• Organizational Management and Internal/External Communication
• Education and Awareness Development
• Quick Response and Resilience
• Desktop Exercise and Evaluation of Maturity in Information Security
9
11. ID Federation Business is blooming in Japan
(based on NRI’s track record in 2011)
More than
200 million IDs
Yahoo! Japan: Active User: 25 mil.
Yahoo! Premium member:7.6 mil.
Membership-based site
Insurance
NIKKEI
AD Tech
NIKKEI
Career College
Nonlife Insurance
Credit Card
Gmail Account170 mil.
News Media
NIKKEI ID 1 mil.
Real Estate
Member: over 20 mil.
Housing Rental
30 mil. in Japan
(estimated)
Publishing
9 mil. in Japan (estimated)
Air Career
2 mil. members
JAL Milage
Bank 20 mil.
56 mil. subscriber
EC
Beverage
25 mil. subscriber
Travel Agent
32mil subscribers
Telecom
Affiliated
Contents provider
Affiliated
Net shop
Telecom
67 mil.
Active:43 mil.
12. Trust Framework should be the platform for the National Identification System in
Japan
As-Is
Establishing Trust Framework in Japan
To-Be
Link
U.S.
Japan
U.S. ver. of Link
Trust
Framework
ID
ID
ID
U.S.
E.U.
Link E.U. ver. of
Trust
Framework
ID
ID
ID
ID
ID
ID
Japan
E.U.
U.S. ver. of Link Japan ver. Of Link E.U. ver. of
Trust
Trust
Trust
Framework
Framework
Framework
ID
ID
ID
ID
ID
ID
ID
ID
ID
NII
Due to the absence of Trust
Framework (OITF) in Japan, NII
(National Institute of Informatics) needs
to get certified by an assessor working
for U.S. national identification system.
Copyright(C) Nomura Research Institute, Ltd. All rights reserved.
Establishing Trust Framework (OITF)
in Japan, Japanese e-government can
be accessed by a private sectors ID.
Furthermore, it will enable Japanese
people to connect to the global
services.
11