Academia.eduAcademia.edu

CYBER SECURITY & 3rd MILLENNIUM CYBER PARADIGM

CYBER SECURITY & 3rd MILLENNIUM CYBER PARADIGM Prof. Eduard Babulak D.Sc., Ph.D., MSc, C.Eng., CITP Panelist Consultant Expert in Cyber Security & Computing US National Science Foundation & EU Horizon 2020 E-mail: [email protected] ORCID: http://orcid.org/0000-0003-2450-090X LINKEDIN: https://www.linkedin.com/in/babulak RESEARCHGATE: https://www.researchgate.net/profile/Eduard_Babulak https://www.e-zigurat.com/digital/ Agenda • • Introduction Journey to 3rd Millennium Cyber Paradigm – 19th Century Industrial Revolution – 20th Century Technology – 21st Century Cyber • • • • • 21st Century Computing Industry • • • • Smart Analytic Humanoid – Computing Industry Trends Cyber Security – What-Where-Why & How • • Ubiquity Future Web COPE Internet Traffic Trends 7 Cyber scenarios to keep you awake at night – Possible Risks Conclusions & Recommendations – – Smart World (Health * Transport) Questions & Answers Source: Cyber Industry (Google images) 2 JOURNEY TO THE 3RD MILLENIUM CYBER PARADIGM 19TH CENTURY INDUSTRIAL REVOLUTION • • • • Manufacturing Industry Car Industry & Electricity Jobs & Urbanization Pollution Source: 19th Century Technology (Google images) The Factory Age: https://www.youtube.com/watch?v=Vo2oLQl2NbM&list=PLB3B453DE4BC630BE&index=2 Industrial Revolution Overview: http://www.youtube.com/watch?v=d4joqYycnqM 4 19TH & 20TH CENTURY TECHNOLOGY KEYWORDS Physics & Math Electricity Mores Code Telephone Locomotive - Car Industry World’s Economic Crisis Electronics & Transistor Telephone Radio TVs Electric Drives Controlled Systems Microprocessor PC Computer Aided Engineering Internet Web 5 WIRELESS MARKET EVOLUTION CELLULAR Today Today 3.9G/ OFDM 3G 2.5G/ 2.75G 2G 1G Digital Cellular  Analog Cellular  Voice  AMPS, TACS     Voice Pager 10kbps data GSM, TDMA CDMAOne Wide-Band Digital Cellular Digital Cellular          Voice Email Photos Web ~100kbps data GPRS/EDGE CDMA 2000 1X 6 Credit: Dr. Rick Wietfeldt Texas Instruments Wide-Band Digital Cellular     Video M-pixel cam. 3D 300kbps  14Mbps UMTS, WCDMA, HSDPA CDMA 1X EVDO        Video High-end gaming 100 Mbps, 10msec Flexible bandwidth Super 3G HSOPA MC-CDMA Today 5G 4G Wide-Band Network     Ubiquitous data Flexible Spectrum use Enhanced apps. 100Mbps – 1Gbps http://standards.ieee.org/wireless/ http://www.wireless.com/ 6 COMMUNICATION IS THE ECONOMY Because communications – which in the end is what the digital technology and media are all about – is not just a sector of the economy. Communications is the economy. The new economy is about communications, deep and wide. ……………………………………………. Kevin Kelly in “New Rules for the New Economy” 7 INFORMATION AGE 8 MEDIA CONVERGENCE Registrational Personalization Me TV Home Banking Cyber Wallet Home Shopping ID Card Mobility Mobile Phone Hand-held PC New Convergence Network Interactivity Conversational E-mail IM LBS i-Content ContextAwareness Broadband Game Quiz Conferencing Target Marketing Transmissional VOD Value-added Digital TV Movie EPG Datacasting Music PVR Credit to KOREA TELECOM 9 TRANSITION FORM SPART PHONE TO SMART TV 2009 Credit to KOREA TELECOM 2011 2012 SNS: Social Networking Service N Screen: Multiple TV Screens SMART SCHOOLS & SMART HOMES & SMART SOCIETY 21ST CENTURY DIGITAL PARADIGM NEW DIGITAL PARADIGM DTV Production IPTV MAM Media Asset Management COPE Information 3G Game Wireless WiBro Distribution Entertainment DBS DMB VO D Education Cyber Nomad Shopping VoIP GPS Digital Nomad Music EMail Banking Movie Future IT Infrastructure Convergence Ubiquitous Digital Home Digital Nomand: someone who uses technology, especially a laptop and a wireless network, to work remotely from anywhere in the world Source: http://www.macmillandictionary.com/open-dictionary/entries/digital-nomad.htm 11 Credit to KOREA TELECOM COPE: CREAT ONCE & PUBLISH EVERYWHERE POP Analog TV DTV Broadband CarPC In Flight Consumer eTV DMB Internet G3 WAP PDA 12 Credit to KOREA TELECOM UBIQUITY ANY NETWORK ANY DEVICE Mobile Enterprise SEAMLESS CONNECTIVITY Any device, Any where, Any time, Any network Home ANY WHERE ANY TIME Bringing together… Credit: Dr. Rick Wietfeldt Texas Instruments Communications and Entertainment 13 Prof. Eduard Babulak The Future of Wireless – The Converged Device ANY DEVICE SEAMLESS CONNECTIVITY ANY NETWORK Cellular UMTS HSDPA HSUPA EDGE 802.16d GPRS 3.9G 802.11b WMAN GSM 802.11g 802.16e WLAN Navigation A-GPS ® Bluetooth Galileo ISDB-T FM Credit: Dr. Rick Wietfeldt Texas Instruments UWB RFID DMB Broadcast Radio HD ANY WHERE 802.11a WPAN 802.11n Broadcast DTV DVB-H 4G DRM DAB ANY TIME FUTURE WEB Credit to: Jeff Jaffe 15 WIRELLES & MOBILE DATA TRAFFIC GROWTH Credit to Prof. Fadi Kurdahi 16 INTERNET TRAFFIC TRENDS Credit to: Roger Watt 17 21ST CENTURY COMPUTING INDUSTRY Three major technological areas • • • Smart: Intelligent Devices and Sensor Networks Analytics: Distributed Intelligence Humanoid Computing: Human to Computer Interaction and Integration Research focus on: • • • • Intelligent Device Integration: As devices gain in diversity, density and intelligence, so does the opportunity to gather knowledge. Analytics and Insight: Exploiting emerging data sources for high performance. Human Computer Interaction: The impact of emerging technologies and new business needs on workforce productivity and business performance. Systems Integration: Exploring tomorrow's enterprise ICT systems. Computing Industry trends • Miniaturization: • Everything has become smaller. • ENIAC’s old-fashioned radio-style vacuum tubes gave way after 1947 to the smaller, faster, more reliable transistor. • Speed: • Due to enormous large volume of transaction and information processes the highest processing and communication speed is essential in all sectors. • Affordability: • The cost is critical to all business worldwide. Professor Eduard Babulak 18 WHAT IS CYBER SECURITY • Cyber security is a branch of computer security known as information security as applied to computers and networks worldwide; • When a computer or any computational device(s) connect to a network and establish communication channel with other computational device(s) in the Cyberspace, they are essentially subject to possible risks . • Cyber security involves the protection of integrity of a computer's Internet accounts and files from intrusion of an unknown user. • https://homeland.house.gov/hearing/cybersecurity-and-export-control/ • What Will Cybersecurity Look Like in the Next Decade?: https://www.youtube.com/watch?v=SA73OaUT5ew • Interdisciplinary Approaches and The Future of Cybersecurity: https://www.youtube.com/watch?v=B9MWppIGMzQ Source: http://whatis.techtarget.com/definition/cybersecurity 19 • The US Government agencies have struggled for years to keep pace with malicious hackers and insider threats, a challenge that came into focus after it was disclosed last year that more than 21 million individuals had their sensitive data pilfered during a breach at the Office of Personnel Management. • • The Canadian insurance industry ranked cyber security as third among the ten most important issues facing the property and casualty insurance industry at this time. • • https://www.reuters.com/article/us-usa-cybersecurity-rankings/u-s-government-worse-than-allmajor-industries-on-cyber-security-report-idUSKCN0XB27K https://www.insuranceinstitute.ca/en/resources/insights-research/cyber-risks The UK estimated market size of the total cyber security sector in 2017 is 3,489 million British pounds (GBP) • • Cyber security exists because the threats and costs are great enough to warrant these measure. When considering the average annual cyber crime costs by industry sector it is necessary to have cyber security in place. https://www.statista.com/statistics/289173/uk-cyber-security-private-enterprises-segment• size/ 20 Professor Eduard Babulak CYBER SECURITY THREADS HISTORY Source: Korean CERT: http://www.krcert.or.kr/english_www/ 21 MOTIVATION FOR CYBER SECURITY I The Joint Task Force (JTF) defines cybersecurity as: “computing-based discipline involving technology, people, information, and processes to enable assured operations. It involves the: • • • • creation, operation, analysis, and testing of secure computer systems. It is an interdisciplinary course of study, including aspects of: • • • • • law, policy, human factors, ethics, and risk management in the context of adversaries.” Source: https://cybered.hosting.acm.org/wp/ MOTIVATION FOR CYBER SECURITY II • By all accounts, the world faces a current and growing workforce shortage of qualified cybersecurity professionals and practitioners. • In fact, both government and nongovernment sources project nearly 1.8 million cybersecurity-related positions going unfilled by 2021. • The workforce demand is acute, immediate, and growing. • In order to develop the required talent, academic departments across the spectrum of computing disciplines are launching initiatives to establish new cybersecurity programs or courses of study within existing programs. • Whether developing full new programs, defining new concentrations within existing programs, or augmenting existing course content, these institutions need curricular guidance based on: • a comprehensive view of the cybersecurity field, • the specific demands of the base discipline, • and the relationship between the curriculum and cybersecurity workforce frameworks. Source: Chapter 1: Introduction to Cybersecurity Education, pg. 9., in Cybersecurity 2017 Version 1.0 Report CSEC2017 31 December 2017. CYBERSECURITY RESEARCH TEAM I Promote working closely with colleagues from a range of complementary backgrounds from: • • • • • criminologists, social scientists, psychologists, engineers and computer scientists to provide a distinctive Cyber Security interdisciplinary team science approach most attractive. The “Human Factor” is considered to be the “Weakest Link” in Cyber Security. To understand and develop best strategies on how to solve the "Human Factor" Cyber Security Challenges will require working closely with colleagues from a range of complementary backgrounds. CYBER SECURITY RESEARCH TEAM II Promote creation of National and Global Multidisciplinary Teams to gather ideas on how to solve the Cyber Security Challenges. Proper Cyber Security is essential in Digital Transformation in particular Cyber Security Business Policies, Business Ethical and Professional Conduct Given the current and future Cyber Security Threads, I do believe that number of areas of: • engineering, • science, • applied informatics • • • • Smart Cities Smart • • • Transport e-Government Digital Health Smart Energy Grid plus are closely related to Cyber Security. SEVEN CYBER SCENARIOS THAT SHOULD KEEP YOU AWAKE AT NIGHT 1. 2. 3. 4. 5. 6. 7. Collateral damage from cyberwar; Political protestors enlist social media to target attacks; An insider uses privileged access to steal customer data; Malicious software updates; Hardware backdoors; Insider abuse; State sponsored spying; What does this mean? • It is hard to propose a Cyber Security scenario that has not already occurred somewhere in the world. • While doomsday scenarios of economic devastation and complete loss of critical infrastructure for extended periods is highly unlikely it is still important to be cognizant of past incidents and thus become better armed to think about how these scenarios could play out in your own organization. 26 POSSIBLE RISKS • Hardware: • • • Software: • • • • Malware(s) and/or spam(s) Configuration Interoperability Human factor: • • • • Connectivity Reliability Terrorist driven attack(s) Politically and Economically driven attack(s) War(s), etc. Natural disasters: • • • Flooding Earthquake(s) Volcanic explosion(s), etc. 27 MOBILE SECURITY: WHO’S LISTENING Source: Trend Micro Mobile Security Credit to: Karen McDowell Credit to: Aaron Isaki 28 US, JAPANESE & KOREAN CERTS • US CERT: Why is Cyber Security a Problem?: http://www.uscert.gov/cas/tips/ST04-001.html • Japan Security Operation Centre: http://www.first.org/members/teams/jsoc • Korea National Computer Emergency Response Team: http://www.first.org/members/teams/kn-cert • Korean National Security Masterplan: http://eng.nis.go.kr/ 29 QUESTIONS & ANSWERS APPENDICES SMART HEALTH & TRANSPORT INTERESTING LINKS Home Healthcare Scenario 31 t to: OBC Soft Co. LTD Display Body information & result of analyzed data on the front of user Analyze Health Care Server Save, Analyze Body Inform. (weight,body fat, urine) (weight,body fat, urine) DataBase Measure user’s body Information (Invisible) Weight Measure Body Fat Measure Urine Measure Credit to: OBC Soft Co. LTD Health Chamber Pot 32 Prompt action for urgent event Patient Location Analyze body Signal Search nearest hospital, Send patient data HealthEvent Care Urgent Server Assign doctor, nurse, room Prompt action at urgent event for treatment Body Signal Body Information Prompt patient transportation Search hospital Send Patient Data (Blood Sugar, Heart Status) (breath,ECG,heart) Urgent Event Smart 33 Shirts Credit to: OBC Soft Co. LTD Assign doctor, nurse, rooms Smart Watch Patient Treatment use body inform. Body Information (breath,ECG,heart) Health Care Server Suggest dietry life Body inform. doctor Voice treatment (video, voice) Advice health for patient constitution Patient Status (video, voice) Body Information (breath,ECG,heart) patient health Video Information Home Healthcare Service 34 pillow Intelligent Intelligent bed Credit to: OBC Soft Co. LTD Send body information to remote doctor for home healthcare 21ST CENTURY TRANSPORT 35 21ST CENTURY TRANSPORT • A state of the art system made by mostly sensors, radio frequencies, antennas, and advanced computer software systems. – Adaptive Cruise Control, and Blind-spot Detection are already available. • Autonomous Vehicle – To make decisions on its own based on calculations, observations, and analyses of the environment surrounding the car – The vehicle’s autonomous secure and reliable choices • The Car Computer System on board 36 SELF-DRIVEN CAR http://www.youtube.com/watch?v=e32yeI1YSI0 37 CASUAL CAR 38 WEB-LINKS I • What is Digital Transformation?: https://www.youtube.com/watch?v=8Rb6fSaHmjU • Digital transformation: are you ready for exponential change? Futurist Gerd Leonhard, TFAStudios: https://www.youtube.com/watch?v=ystdF6jN7hc • Terence McKenna - Our Cyberspiritual Future (Part 1&2): https://www.youtube.com/watch?v=ZanOnebJeRA • Terence McKenna - Our Cyberspiritual Future (Part 3&4): https://www.youtube.com/watch?v=uJNTWzy8WQ 39 WEB-LINKS II 1. Next Future Terrifying Technology Will Blow Your Mind: http://www.youtube.com/watch?v=JbQeABIoO6A 2. FUTURISTIC COMPUTER SYSTEM - ACCESSOFT VISUAL FX http://www.youtube.com/watch?v=yyNk0vH175I 3. Awesome fully Automated BMW Car Factory Must Watch http://www.youtube.com/watch?v=VpwkT2zV9H0 4. Manufacturing of Bugatti Veyron Part 1 http://www.youtube.com/watch?v=wdTQrPIKKFU 5. 2014 Breaking News Pentagon DARPA shows USA Secretary of Defense Chuck Hagel Humanoid robot http://www.youtube.com/watch?v=YhGdqZjjQZU 6. (HD) Future Humanoid Robots Will Blow your Mind- 2014 full Documentary http://www.youtube.com/watch?v=LFm5avbuWWU 40 WEB-LINKS III Next Future Terrifying Technology #Mind Blow (Full Documentary) http://www.youtube.com/watch?v=Ubz4dcafNF8 Most Luxurious City in the World - Full Documentary http://www.youtube.com/watch?v=QutITM2KY-Y Building an Internet for Robots: Gajan Mohanarajah at TEDxYouth@Adliswil http://www.youtube.com/watch?v=7JHbpdt8Av8 http://www.techeblog.com/index.php/tech-gadget/10-futuristic-computer-concepts http://www.pcworld.com/article/2369145/insane-future-tech-revealed-shadow-network-chips-hybrid-memory-cubes-and-hyperrealistic-androids.html http://www.theverge.com/2013/10/10/4824026/a-first-look-inside-googles-secretive-quantum-lab http://io9.com/10-mindblowingly-futuristic-technologies-that-will-appe-673136756 http://www.inquisitr.com/1277386/futuristic-quantum-computer-is-here-the-512-qubit-d-wave-two/ http://www.pewinternet.org/2014/04/17/us-views-of-technology-and-the-future/ http://research.microsoft.com/en-us/um/cambridge/projects/hci2020/downloads/beinghuman_a3.pdf http://www.entrepreneurshipchallenge.org/ http://www.psfk.com/2014/04/pew-research-american-view-future-technologies.html 41