CYBER SECURITY & 3rd MILLENIUM CYBER WORLD

4 downloads 0 Views 4MB Size Report
Panelist Consultant Expert in Cyber Security & Computing. US National .... Humanoid Computing: Human to Computer Interaction and Integration. Research focus on: .... Adaptive Cruise Control, and Blind-spot Detection are already available.
CYBER SECURITY & 3rd MILLENNIUM CYBER PARADIGM Prof. Eduard Babulak D.Sc., Ph.D., MSc, C.Eng., CITP Panelist Consultant Expert in Cyber Security & Computing US National Science Foundation & EU Horizon 2020 E-mail: [email protected] ORCID: http://orcid.org/0000-0003-2450-090X LINKEDIN: https://www.linkedin.com/in/babulak RESEARCHGATE: https://www.researchgate.net/profile/Eduard_Babulak

https://www.e-zigurat.com/digital/

Agenda • •

Introduction Journey to 3rd Millennium Cyber Paradigm – 19th Century Industrial Revolution – 20th Century Technology – 21st Century Cyber • • • •



21st Century Computing Industry • • •



Smart Analytic Humanoid

– Computing Industry Trends Cyber Security – What-Where-Why & How •



Ubiquity Future Web COPE Internet Traffic Trends

7 Cyber scenarios to keep you awake at night

– Possible Risks Conclusions & Recommendations – –

Smart World (Health * Transport) Questions & Answers

Source: Cyber Industry (Google images) 2

JOURNEY TO THE 3RD MILLENIUM CYBER PARADIGM

19TH CENTURY INDUSTRIAL REVOLUTION • • • •

Manufacturing Industry Car Industry & Electricity Jobs & Urbanization Pollution

Source: 19th Century Technology (Google images) The Factory Age: https://www.youtube.com/watch?v=Vo2oLQl2NbM&list=PLB3B453DE4BC630BE&index=2 Industrial Revolution Overview: http://www.youtube.com/watch?v=d4joqYycnqM

4

19TH & 20TH CENTURY TECHNOLOGY KEYWORDS Physics & Math Electricity Mores Code Telephone Locomotive - Car Industry World’s Economic Crisis Electronics & Transistor Telephone Radio TVs Electric Drives Controlled Systems Microprocessor PC Computer Aided Engineering Internet Web 5

WIRELESS MARKET EVOLUTION CELLULAR Today

Today

3.9G/ OFDM 3G 2.5G/ 2.75G

2G 1G

Digital Cellular 

Analog Cellular



Voice  AMPS, TACS









Voice Pager 10kbps data GSM, TDMA CDMAOne

Wide-Band Digital Cellular

Digital Cellular     

 

 

Voice Email Photos Web ~100kbps data GPRS/EDGE CDMA 2000 1X 6

Credit: Dr. Rick Wietfeldt Texas Instruments

Wide-Band Digital Cellular

 





Video M-pixel cam. 3D 300kbps  14Mbps UMTS, WCDMA, HSDPA CDMA 1X EVDO

 





  

Video High-end gaming 100 Mbps, 10msec Flexible bandwidth Super 3G HSOPA MC-CDMA

Today

5G

4G Wide-Band Network 







Ubiquitous data Flexible Spectrum use Enhanced apps. 100Mbps – 1Gbps

http://standards.ieee.org/wireless/ http://www.wireless.com/

6

COMMUNICATION IS THE ECONOMY

Because communications – which in the end is what the digital technology and media are all about – is not just a sector of the economy. Communications is the economy. The new economy is about communications, deep and wide. ……………………………………………. Kevin Kelly in “New Rules for the New Economy”

7

INFORMATION AGE

8

MEDIA CONVERGENCE

Registrational

Personalization Me TV

Home Banking

Cyber Wallet

Home Shopping

ID Card

Mobility

Mobile Phone Hand-held PC

New Convergence Network

Interactivity

Conversational E-mail IM

LBS

i-Content

ContextAwareness

Broadband

Game Quiz

Conferencing Target Marketing

Transmissional

VOD

Value-added

Digital TV

Movie

EPG

Datacasting

Music

PVR Credit to KOREA TELECOM 9

TRANSITION FORM SPART PHONE TO SMART TV 2009

Credit to KOREA TELECOM

2011

2012

SNS: Social Networking Service N Screen: Multiple TV Screens

SMART SCHOOLS & SMART HOMES & SMART SOCIETY

21ST CENTURY DIGITAL PARADIGM

NEW DIGITAL PARADIGM DTV

Production

IPTV

MAM Media Asset Management

COPE

Information

3G Game Wireless

WiBro

Distribution

Entertainment

DBS DMB

VO D

Education

Cyber Nomad

Shopping VoIP GPS

Digital Nomad

Music

EMail Banking

Movie

Future IT Infrastructure

Convergence

Ubiquitous

Digital Home

Digital Nomand: someone who uses technology, especially a laptop and a wireless network, to work remotely from anywhere in the world Source: http://www.macmillandictionary.com/open-dictionary/entries/digital-nomad.htm

11 Credit to KOREA TELECOM

COPE: CREAT ONCE & PUBLISH EVERYWHERE

POP

Analog TV

DTV Broadband

CarPC

In Flight

Consumer

eTV

DMB

Internet G3 WAP

PDA

12 Credit to KOREA TELECOM

UBIQUITY

ANY DEVICE Mobile

Enterprise

ANY NETWORK

SEAMLESS CONNECTIVITY Any device, Any where, Any time, Any network

Home

ANY WHERE

ANY TIME Bringing together…

Credit: Dr. Rick Wietfeldt Texas Instruments

Communications and Entertainment 13

Prof. Eduard Babulak

The Future of Wireless – The Converged Device ANY DEVICE

SEAMLESS CONNECTIVITY

ANY NETWORK

Cellular UMTS

HSDPA HSUPA

EDGE GPRS GSM

802.16d

WMAN 802.11g

802.16e

A-GPS

®

Bluetooth

Galileo

ISDB-T FM

Credit: Dr. Rick Wietfeldt Texas Instruments

UWB DMB

Broadcast Radio HD

802.11a

WPAN 802.11n

Broadcast DTV DVB-H

4G

WLAN

Navigation

ANY WHERE

3.9G

802.11b

RFID

DRM DAB

ANY TIME

FUTURE WEB

Credit to: Jeff Jaffe

15

WIRELLES & MOBILE DATA TRAFFIC GROWTH

Credit to Prof. Fadi Kurdahi

16

INTERNET TRAFFIC TRENDS

Credit to: Roger Watt

17

21ST CENTURY COMPUTING INDUSTRY Three major technological areas • •



Smart: Intelligent Devices and Sensor Networks Analytics: Distributed Intelligence Humanoid Computing: Human to Computer Interaction and Integration

Research focus on: •

• •



Intelligent Device Integration: As devices gain in diversity, density and intelligence, so does the opportunity to gather knowledge. Analytics and Insight: Exploiting emerging data sources for high performance. Human Computer Interaction: The impact of emerging technologies and new business needs on workforce productivity and business performance. Systems Integration: Exploring tomorrow's enterprise ICT systems.

Computing Industry trends

• Miniaturization: • Everything has become smaller. • ENIAC’s old-fashioned radio-style vacuum tubes gave way after 1947 to the smaller, faster, more reliable transistor. • Speed: •

Due to enormous large volume of transaction and information processes the highest processing and communication speed is essential in all sectors.

• Affordability: • The cost is critical to all business worldwide.

Professor Eduard Babulak

18

WHAT IS CYBER SECURITY • Cyber security is a branch of computer security known as information security as applied to computers and networks worldwide; • When a computer or any computational device(s) connect to a network and establish communication channel with other computational device(s) in the Cyberspace, they are essentially subject to possible risks . • Cyber security involves the protection of integrity of a computer's Internet accounts and files from intrusion of an unknown user. • https://homeland.house.gov/hearing/cybersecurity-and-export-control/ • What Will Cybersecurity Look Like in the Next Decade?: https://www.youtube.com/watch?v=SA73OaUT5ew • Interdisciplinary Approaches and The Future of Cybersecurity: https://www.youtube.com/watch?v=B9MWppIGMzQ

Source: http://whatis.techtarget.com/definition/cybersecurity

19



The US Government agencies have struggled for years to keep pace with malicious hackers and insider threats, a challenge that came into focus after it was disclosed last year that more than 21 million individuals had their sensitive data pilfered during a breach at the Office of Personnel Management. •



The Canadian insurance industry ranked cyber security as third among the ten most important issues facing the property and casualty insurance industry at this time. •



https://www.reuters.com/article/us-usa-cybersecurity-rankings/u-s-government-worse-than-allmajor-industries-on-cyber-security-report-idUSKCN0XB27K

https://www.insuranceinstitute.ca/en/resources/insights-research/cyber-risks

The UK estimated market size of the total cyber security sector in 2017 is 3,489 million British pounds (GBP) • •

Cyber security exists because the threats and costs are great enough to warrant these measure. When considering the average annual cyber crime costs by industry sector it is necessary to have cyber security in place. • https://www.statista.com/statistics/289173/uk-cyber-security-private-enterprises-segmentsize/ 20 Professor Eduard Babulak

CYBER SECURITY THREADS HISTORY

Source: Korean CERT: http://www.krcert.or.kr/english_www/

21

MOTIVATION FOR CYBER SECURITY I The Joint Task Force (JTF) defines cybersecurity as: “computing-based discipline involving technology, people, information, and processes to enable assured operations. It involves the: • • • •

creation, operation, analysis, and testing of secure computer systems.

It is an interdisciplinary course of study, including aspects of: • • • • •

law, policy, human factors, ethics, and risk management in the context of adversaries.”

Source: https://cybered.hosting.acm.org/wp/

MOTIVATION FOR CYBER SECURITY II •

By all accounts, the world faces a current and growing workforce shortage of qualified cybersecurity professionals and practitioners.



In fact, both government and nongovernment sources project nearly 1.8 million cybersecurity-related positions going unfilled by 2021.



The workforce demand is acute, immediate, and growing.



In order to develop the required talent, academic departments across the spectrum of computing disciplines are launching initiatives to establish new cybersecurity programs or courses of study within existing programs.



Whether developing full new programs, defining new concentrations within existing programs, or augmenting existing course content, these institutions need curricular guidance based on: • a comprehensive view of the cybersecurity field, • the specific demands of the base discipline, • and the relationship between the curriculum and cybersecurity workforce frameworks.

Source: Chapter 1: Introduction to Cybersecurity Education, pg. 9., in Cybersecurity 2017 Version 1.0 Report CSEC2017 31 December 2017.

CYBERSECURITY RESEARCH TEAM I Promote working closely with colleagues from a range of complementary backgrounds from: • • • • •

criminologists, social scientists, psychologists, engineers and computer scientists

to provide a distinctive Cyber Security interdisciplinary team science approach most attractive.

The “Human Factor” is considered to be the “Weakest Link” in Cyber Security. To understand and develop best strategies on how to solve the "Human Factor" Cyber Security Challenges will require working closely with colleagues from a range of complementary backgrounds.

CYBER SECURITY RESEARCH TEAM II Promote creation of National and Global Multidisciplinary Teams to gather ideas on how to solve the Cyber Security Challenges. Proper Cyber Security is essential in Digital Transformation in particular Cyber Security Business Policies, Business Ethical and Professional Conduct Given the current and future Cyber Security Threads, I do believe that number of areas of: • engineering, • science, • applied informatics • •

Smart Cities Smart • • •

• •

Transport e-Government Digital Health

Smart Energy Grid plus

are closely related to Cyber Security.

SEVEN CYBER SCENARIOS THAT SHOULD KEEP YOU AWAKE AT NIGHT 1. 2. 3. 4. 5. 6. 7.

Collateral damage from cyberwar; Political protestors enlist social media to target attacks; An insider uses privileged access to steal customer data; Malicious software updates; Hardware backdoors; Insider abuse; State sponsored spying;

What does this mean? • It is hard to propose a Cyber Security scenario that has not already occurred somewhere in the world. • While doomsday scenarios of economic devastation and complete loss of critical infrastructure for extended periods is highly unlikely it is still important to be cognizant of past incidents and thus become better armed to think about how these scenarios could play out in your own organization. 26

POSSIBLE RISKS •

Hardware: • •



Software: • • •



Malware(s) and/or spam(s) Configuration Interoperability

Human factor: • • •



Connectivity Reliability

Terrorist driven attack(s) Politically and Economically driven attack(s) War(s), etc.

Natural disasters: • • •

Flooding Earthquake(s) Volcanic explosion(s), etc. 27

MOBILE SECURITY: WHO’S LISTENING

Source: Trend Micro Mobile Security

Credit to: Karen McDowell

Credit to: Aaron Isaki

28

US, JAPANESE & KOREAN CERTS

• US CERT: Why is Cyber Security a Problem?: http://www.uscert.gov/cas/tips/ST04-001.html • Japan Security Operation Centre: http://www.first.org/members/teams/jsoc • Korea National Computer Emergency Response Team: http://www.first.org/members/teams/kn-cert • Korean National Security Masterplan: http://eng.nis.go.kr/

29

QUESTIONS & ANSWERS

APPENDICES SMART HEALTH & TRANSPORT INTERESTING LINKS

Home Healthcare Scenario

31 t to: OBC Soft Co. LTD

Display Body information & result of analyzed data on the front of user

Analyze Health Care Server Save, Analyze (weight,body fat, urine)

Body Inform. (weight,body fat, urine)

DataBase

Measure user’s body Information (Invisible)

Weight Measure

Body Fat Measure Urine Measure

Credit to: OBC Soft Co. LTD

Health Chamber Pot

32

Prompt action for urgent event Patient Location

Analyze body Signal

Search nearest hospital, Send patient data

HealthEvent Care Urgent Server

Assign doctor, nurse, room

Prompt action at urgent event for treatment

Body Signal

Body Information

(Blood Sugar, Heart Status)

(breath,ECG,heart)

Urgent Event

Smart 33 Shirts Credit to: OBC Soft Co. LTD

Prompt patient transportation

Search hospital Send Patient Data

Assign doctor, nurse, rooms

Smart Watch

Patient Treatment use body inform.

Body Information (breath,ECG,heart)

Health Care Server

Suggest dietry life

Body inform.

doctor

Voice treatment (video, voice)

Advice health for patient constitution

Patient Status (video, voice)

Body Information (breath,ECG,heart)

patient health Video Information

Home Healthcare Service

34 pillow Intelligent

Intelligent bed

Credit to: OBC Soft Co. LTD

Send body information to remote doctor for home healthcare

21ST CENTURY TRANSPORT

35

21ST CENTURY TRANSPORT

• A state of the art system made by mostly sensors, radio frequencies, antennas, and advanced computer software systems. – Adaptive Cruise Control, and Blind-spot Detection are already available.

• Autonomous Vehicle – To make decisions on its own based on calculations, observations, and analyses of the environment surrounding the car – The vehicle’s autonomous secure and reliable choices

• The Car Computer System on board

36

SELF-DRIVEN CAR

http://www.youtube.com/watch?v=e32yeI1YSI0 37

CASUAL CAR

38

WEB-LINKS I •

What is Digital Transformation?: https://www.youtube.com/watch?v=8Rb6fSaHmjU



Digital transformation: are you ready for exponential change? Futurist Gerd Leonhard, TFAStudios: https://www.youtube.com/watch?v=ystdF6jN7hc



Terence McKenna - Our Cyberspiritual Future (Part 1&2): https://www.youtube.com/watch?v=ZanOnebJeRA



Terence McKenna - Our Cyberspiritual Future (Part 3&4): https://www.youtube.com/watch?v=uJNTWzy8WQ

39

WEB-LINKS II 1.

Next Future Terrifying Technology Will Blow Your Mind: http://www.youtube.com/watch?v=JbQeABIoO6A

2.

FUTURISTIC COMPUTER SYSTEM - ACCESSOFT VISUAL FX http://www.youtube.com/watch?v=yyNk0vH175I

3.

Awesome fully Automated BMW Car Factory Must Watch http://www.youtube.com/watch?v=VpwkT2zV9H0

4.

Manufacturing of Bugatti Veyron Part 1 http://www.youtube.com/watch?v=wdTQrPIKKFU

5.

2014 Breaking News Pentagon DARPA shows USA Secretary of Defense Chuck Hagel Humanoid robot http://www.youtube.com/watch?v=YhGdqZjjQZU

6.

(HD) Future Humanoid Robots Will Blow your Mind- 2014 full Documentary http://www.youtube.com/watch?v=LFm5avbuWWU 40

WEB-LINKS III Next Future Terrifying Technology #Mind Blow (Full Documentary) http://www.youtube.com/watch?v=Ubz4dcafNF8 Most Luxurious City in the World - Full Documentary http://www.youtube.com/watch?v=QutITM2KY-Y

Building an Internet for Robots: Gajan Mohanarajah at TEDxYouth@Adliswil http://www.youtube.com/watch?v=7JHbpdt8Av8 http://www.techeblog.com/index.php/tech-gadget/10-futuristic-computer-concepts http://www.pcworld.com/article/2369145/insane-future-tech-revealed-shadow-network-chips-hybrid-memory-cubes-and-hyperrealistic-androids.html http://www.theverge.com/2013/10/10/4824026/a-first-look-inside-googles-secretive-quantum-lab http://io9.com/10-mindblowingly-futuristic-technologies-that-will-appe-673136756

http://www.inquisitr.com/1277386/futuristic-quantum-computer-is-here-the-512-qubit-d-wave-two/ http://www.pewinternet.org/2014/04/17/us-views-of-technology-and-the-future/ http://research.microsoft.com/en-us/um/cambridge/projects/hci2020/downloads/beinghuman_a3.pdf

http://www.entrepreneurshipchallenge.org/ http://www.psfk.com/2014/04/pew-research-american-view-future-technologies.html 41