SlideShare une entreprise Scribd logo
1  sur  21
CITIZEN CENTRIC DIGITAL AND
MOBILE-IDENTITY, PERSONAL
DATA ECOSYSTEMS AND THE
INTERNET OF THINGS:
ASSESSING THE NATURE OF
OPERATIONAL SECURITY ISSUES

Dr Rachel O’Connell
RSA Conference 2013, Europe
WHO AM I?
 PhD online criminal activity: implications for investigative strategies
 Chief Security Officer Bebo, VP AOL
 Research Consultant
 Oxford Internet Institute:
 Effective Age Verification Techniques: Lessons to be Learnt from the Online
Gambling Industry
 Ctrl_Shift
 A market analyst and consulting: changing personal data landscape.
 Member of OIX and the GSMA’s UK Assured legal working group
 Advisor to commercial organisations on both the policy requirements and
business opportunities associated with digital and mobile ID
 Co-founder of GroovyFuture.com.
NASCENT INTEROPERABLE
ECOSYSTEMS:

I
DATA DRIVEN ECONOMY
CISCO’S PREDICTIONS: IoT
DATA GENERATED BY IoT
ELECTRONIC AND MOBILE ID
 NSTIC
 STORK
 IdAP
 GSMA Mobile ID
 Proposed regulation
PERSONAL INTERNET OF
THINGS

• Multi-tenancy cloud
based personal data
stores
• Targeted attacks,
• Cryptolocker virus
PATH TO ROI
Gigya's series
'Path to ROI',
focuses on the
different
technologies
and tools that
businesses can
leverage to
generate
valuable ROI
from their
marketing
efforts
IoT TRUSTED CREDENTAILS
 Education
 Assert trusted credentials (LoA)
 Recognise trusted intermediaries
(accreditation)
 Quantified self - Databetes
 Convenience, security
 Active participants
IoT SECURITY AND TRUST
 Inofsec properties of the IoT are often hidden in
pervasive systems and small devices manufactured
by a large number of vendors.

 uTRUSTit enables system manufacturers and system
integrators to express the underlying security
concepts to users in a comprehensible way, allowing
them to make valid judgments on the trustworthiness
of such systems.
 How security conscious is the average user of IoT
devices?
 Data mining
 End-to-end security telemetry – automated scripts,
correlating data points from multiple machines across
multiple sectors
M2M VISION
MARKET EVOLUTION
FOR TELCO IN M2M
PDETS TRUST FRAMEWORKS
 Forging new social contracts
 The Respect Trust Framework is designed to give individuals
control over the sharing of their personal data on the Internet.
 Mydex, the personal data store and trusted identity provider,
has also had its “Mydex Trust Framework” listed by the Open
Identity Exchange.

 Connet.me has had its Trust Model and Business Model for
Personal Data listed by OIX
 The Personal Network: A New Trust Model and Business Model
for Personal Data
 Access to data that companies make available and
authoritative personal data sources – university exam results
 Penetration testing, SEIM, ISO27001,
GOVERNANCE AS A
SOFTWARE SERVICE
 ID³ believes, governance principles should be expressed as
software that is then able to evolve to incorporate advances in
technology and to support changing market and societal
requirements.

 Using these tools, people will be able to ensure the privacy of
their personal information, leverage the power of networked
data, and create new forms of online coordination, exchange
and self-governance.

 Forge new “social contracts” and participate in new types of
legal and regulatory systems for managing organizations,
markets and their social and civic lives. These systems will
conform to both international legal standards and to the
specific social norms and priorities of its members.
LEGAL FRAMEWORK
 European Network and Information Security Agency (ENISA)
comprehensive duties and responsibilities, which are inter
alia motivated by the protection of critical infrastructures
 Cert (Computer Emergency Response Teams)
 Directive and working paper
 Proposal for a Directive of the EU Parliament and of the
Council concerning measures to ensure a high level of
network and information security across the Union
 Cyber-security Strategy of the European Union: An open,
Safe and Secure Cyberspace
INCREASE IN NUMBER OF
THREATS VECTORS
 Structured and unstructured data

 Information security management systems – threat intelligence
 Security Information and Event Management (SIEM)  Access management – lessons from enterprise solution providers

 Data access, control, leakage, revocation, audits,
 Social engineering
 Scale of attacks
 Complex crypto based attacks, e.g. flame
 Vulnerabilities of inter-operable trust frameworks
 LoA’s associated with different ecosystems
NEW APPROACHES
 Existing solutions – each ecosystem is an island
 Security incident and management systems – usually utilised in
a single system (SIEM)
 Stephen Trilling, Symantec, keynote speaker: Massive cloud
based security - SIEM on steroids – apps that run on security
telemetry data
 New era of operational security
 New attacks – automatically looking for anomalous behaviours
 Forensic graph for Attack ID
 Security system with a world view – looks across ecosystems,
industries and geographies …
 Proportionate, self fulfilling prophecies, balance
 Security in critical infrastructures – Future pre-condition for
operating license?
POINTS FOR DISCUSSION
 Will the convergence between e-identity, Mobile ID
and personal data ecosystems in concert with the
Internet of Things, foster new and diverse commercial
opportunities, whilst pushing legal, security, policy
and regulatory debates into new terrain?
 From a security perspective, what are the nature,
scale and extent of the threat vectors we can
expect to be associated with these nascent
ecosystems that are evolving at different rates?
 Ubiquitous connectedness opens up pathways for
attacks however, a siloed approach to development
and oversight creates a perception issue, how can
this best be addressed?
 Operational Security Assurance?
POINTS FOR DISCUSSION
 Where should concerns lie – unsecured M2M or citizen
centric facing, or interactions between these
ecosystems?
 Scale: Destructive attacks, cybercrimes, erosion of
privacy, trust
 Will the operation of the IoT in concert with e.g. critical
infrastructure necessitate new sets of international
rules that address cyber security threats and govern
cyber warfare?
 What can the security community do to address these
issues?
Thank you
 Rachel O’Connell
 rachel@technologist.com
 Twitter: @racheloconnell

Contenu connexe

Tendances

Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Angel Rodriguez
 
Information Security
Information SecurityInformation Security
Information Security
steffiann88
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
Confederation of Indian Industry
 
A survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsA survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systems
Vishwesh Nagamalla
 
Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016
Mohan C. de SILVA
 
IoT Reference Architecture and Case Studies
IoT Reference Architecture and Case StudiesIoT Reference Architecture and Case Studies
IoT Reference Architecture and Case Studies
Serhiy (Serge) Haziyev
 

Tendances (20)

Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...
 
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
Security economics
Security economicsSecurity economics
Security economics
 
Information Security
Information SecurityInformation Security
Information Security
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
Report on Network Security And Privacy
Report on Network Security And PrivacyReport on Network Security And Privacy
Report on Network Security And Privacy
 
ITTCourseDesc
ITTCourseDescITTCourseDesc
ITTCourseDesc
 
A survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsA survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systems
 
Ist curriculum
Ist curriculumIst curriculum
Ist curriculum
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Cyber security trends 2018
Cyber security trends 2018Cyber security trends 2018
Cyber security trends 2018
 
Io t whitepaper_5_15_17
Io t whitepaper_5_15_17Io t whitepaper_5_15_17
Io t whitepaper_5_15_17
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 
IoT Reference Architecture and Case Studies
IoT Reference Architecture and Case StudiesIoT Reference Architecture and Case Studies
IoT Reference Architecture and Case Studies
 

En vedette

Enterprise resource planning (erp) systems
Enterprise resource planning (erp) systemsEnterprise resource planning (erp) systems
Enterprise resource planning (erp) systems
Stefi Merin
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
Arpan Patel
 

En vedette (8)

Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
 
Caspar Bowden EINS Summer School
Caspar Bowden EINS Summer SchoolCaspar Bowden EINS Summer School
Caspar Bowden EINS Summer School
 
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
 
Enterprise resource planning (erp) systems
Enterprise resource planning (erp) systemsEnterprise resource planning (erp) systems
Enterprise resource planning (erp) systems
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 

Similaire à Citizen centric digital and mobile-identity, personal data ecosystems and the internet of things: Assessing the nature of operational security issues

Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
todd521
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
amitkhanna2070
 

Similaire à Citizen centric digital and mobile-identity, personal data ecosystems and the internet of things: Assessing the nature of operational security issues (20)

Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
C018131821
C018131821C018131821
C018131821
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
Online Paper Submission - International Journal of Network Security & Its App...
Online Paper Submission - International Journal of Network Security & Its App...Online Paper Submission - International Journal of Network Security & Its App...
Online Paper Submission - International Journal of Network Security & Its App...
 

Plus de Dr Rachel O'Connell (6)

Online Age Checking: The Time Has Come .... Infographic
Online Age Checking: The Time Has Come .... InfographicOnline Age Checking: The Time Has Come .... Infographic
Online Age Checking: The Time Has Come .... Infographic
 
Online age checking, good business practice and digital citizenship
Online age checking, good business practice and digital citizenshipOnline age checking, good business practice and digital citizenship
Online age checking, good business practice and digital citizenship
 
Online Age Checking - Proof of Concept
Online Age Checking  - Proof of ConceptOnline Age Checking  - Proof of Concept
Online Age Checking - Proof of Concept
 
Online Age Checking: The Time Has Come.. symposium brochure
Online Age Checking: The Time Has Come.. symposium brochureOnline Age Checking: The Time Has Come.. symposium brochure
Online Age Checking: The Time Has Come.. symposium brochure
 
5 nov gsma_eema
5 nov gsma_eema5 nov gsma_eema
5 nov gsma_eema
 
Age Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping PointAge Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping Point
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Citizen centric digital and mobile-identity, personal data ecosystems and the internet of things: Assessing the nature of operational security issues

  • 1. CITIZEN CENTRIC DIGITAL AND MOBILE-IDENTITY, PERSONAL DATA ECOSYSTEMS AND THE INTERNET OF THINGS: ASSESSING THE NATURE OF OPERATIONAL SECURITY ISSUES Dr Rachel O’Connell RSA Conference 2013, Europe
  • 2. WHO AM I?  PhD online criminal activity: implications for investigative strategies  Chief Security Officer Bebo, VP AOL  Research Consultant  Oxford Internet Institute:  Effective Age Verification Techniques: Lessons to be Learnt from the Online Gambling Industry  Ctrl_Shift  A market analyst and consulting: changing personal data landscape.  Member of OIX and the GSMA’s UK Assured legal working group  Advisor to commercial organisations on both the policy requirements and business opportunities associated with digital and mobile ID  Co-founder of GroovyFuture.com.
  • 7. ELECTRONIC AND MOBILE ID  NSTIC  STORK  IdAP  GSMA Mobile ID  Proposed regulation
  • 8. PERSONAL INTERNET OF THINGS • Multi-tenancy cloud based personal data stores • Targeted attacks, • Cryptolocker virus
  • 9. PATH TO ROI Gigya's series 'Path to ROI', focuses on the different technologies and tools that businesses can leverage to generate valuable ROI from their marketing efforts
  • 10. IoT TRUSTED CREDENTAILS  Education  Assert trusted credentials (LoA)  Recognise trusted intermediaries (accreditation)  Quantified self - Databetes  Convenience, security  Active participants
  • 11. IoT SECURITY AND TRUST  Inofsec properties of the IoT are often hidden in pervasive systems and small devices manufactured by a large number of vendors.  uTRUSTit enables system manufacturers and system integrators to express the underlying security concepts to users in a comprehensible way, allowing them to make valid judgments on the trustworthiness of such systems.  How security conscious is the average user of IoT devices?  Data mining  End-to-end security telemetry – automated scripts, correlating data points from multiple machines across multiple sectors
  • 14. PDETS TRUST FRAMEWORKS  Forging new social contracts  The Respect Trust Framework is designed to give individuals control over the sharing of their personal data on the Internet.  Mydex, the personal data store and trusted identity provider, has also had its “Mydex Trust Framework” listed by the Open Identity Exchange.  Connet.me has had its Trust Model and Business Model for Personal Data listed by OIX  The Personal Network: A New Trust Model and Business Model for Personal Data  Access to data that companies make available and authoritative personal data sources – university exam results  Penetration testing, SEIM, ISO27001,
  • 15. GOVERNANCE AS A SOFTWARE SERVICE  ID³ believes, governance principles should be expressed as software that is then able to evolve to incorporate advances in technology and to support changing market and societal requirements.  Using these tools, people will be able to ensure the privacy of their personal information, leverage the power of networked data, and create new forms of online coordination, exchange and self-governance.  Forge new “social contracts” and participate in new types of legal and regulatory systems for managing organizations, markets and their social and civic lives. These systems will conform to both international legal standards and to the specific social norms and priorities of its members.
  • 16. LEGAL FRAMEWORK  European Network and Information Security Agency (ENISA) comprehensive duties and responsibilities, which are inter alia motivated by the protection of critical infrastructures  Cert (Computer Emergency Response Teams)  Directive and working paper  Proposal for a Directive of the EU Parliament and of the Council concerning measures to ensure a high level of network and information security across the Union  Cyber-security Strategy of the European Union: An open, Safe and Secure Cyberspace
  • 17. INCREASE IN NUMBER OF THREATS VECTORS  Structured and unstructured data  Information security management systems – threat intelligence  Security Information and Event Management (SIEM)  Access management – lessons from enterprise solution providers  Data access, control, leakage, revocation, audits,  Social engineering  Scale of attacks  Complex crypto based attacks, e.g. flame  Vulnerabilities of inter-operable trust frameworks  LoA’s associated with different ecosystems
  • 18. NEW APPROACHES  Existing solutions – each ecosystem is an island  Security incident and management systems – usually utilised in a single system (SIEM)  Stephen Trilling, Symantec, keynote speaker: Massive cloud based security - SIEM on steroids – apps that run on security telemetry data  New era of operational security  New attacks – automatically looking for anomalous behaviours  Forensic graph for Attack ID  Security system with a world view – looks across ecosystems, industries and geographies …  Proportionate, self fulfilling prophecies, balance  Security in critical infrastructures – Future pre-condition for operating license?
  • 19. POINTS FOR DISCUSSION  Will the convergence between e-identity, Mobile ID and personal data ecosystems in concert with the Internet of Things, foster new and diverse commercial opportunities, whilst pushing legal, security, policy and regulatory debates into new terrain?  From a security perspective, what are the nature, scale and extent of the threat vectors we can expect to be associated with these nascent ecosystems that are evolving at different rates?  Ubiquitous connectedness opens up pathways for attacks however, a siloed approach to development and oversight creates a perception issue, how can this best be addressed?  Operational Security Assurance?
  • 20. POINTS FOR DISCUSSION  Where should concerns lie – unsecured M2M or citizen centric facing, or interactions between these ecosystems?  Scale: Destructive attacks, cybercrimes, erosion of privacy, trust  Will the operation of the IoT in concert with e.g. critical infrastructure necessitate new sets of international rules that address cyber security threats and govern cyber warfare?  What can the security community do to address these issues?
  • 21. Thank you  Rachel O’Connell  rachel@technologist.com  Twitter: @racheloconnell

Notes de l'éditeur

  1. More things are connecting to the Internet than people — over 12.5 billion devices in 2010 alone. Cisco’s Internet Business Solutions Group (IBSG) predicts some 25 billion devices will be connected by 2015, and 50 billion by 2020. How will having lots of things connected change everything?
  2. Affordable sensorsObject taggingWireless communicationBroadband
  3. Trust is central to the operation of a data driven economy. In order to both provide and benefit from digital services, companies, public administrations and consumers need to distinguish between trusted and non-trusted counterparts online; they also need to be recognised as trusted parties themselves. At an operational level, trust frameworks can reduce the need to negotiate a multitude of individual commercial contracts.