SlideShare une entreprise Scribd logo
1  sur  28
www.internetsociety.orgwww.internetsociety.org
Collaborative Security
Reflections about Security and the Open Internet
ION 2016
Olaf Kolkman
奥拉夫 科尔克门
kolkman@isoc.org
@Kolkman
Collaborative Security | ION July 2016
http://www.internetsociety.org/get-involved/individuals
2
www.internetsociety.orgwww.internetsociety.org
The Open Internet
What was that about again?
Collaborative Security | ION July 2016Collaborative Security | ION July 20164
Collaborative Security | ION July 2016Collaborative Security | ION July 20165
https://www.flickr.com/photos/worldbank/4725033296/in/album-72157634090168746/
Collaborative Security | ION July 20166
Collaborative Security | ION July 20167
Security, stupid
Collaborative Security | ION July 2016Collaborative Security | ION July 20168
Collaborative Security | ION July 2016Collaborative Security | ION July 20169
Collaborative Security | ION July 201610
Collaborative Security | ION July 201611
Collaborative Security | ION July 2016Collaborative Security | ION July 2016
Where the rubber meets the road.
12
Collaborative Security | ION July 2016
Researchers
13
Development
OPS
Devops
SDOs
Orgs
Collaborative Security | ION July 201614
Advertisement, skip in: 0:100:090:080:070:060:050:040:030:020:010:00
12 August 2016, 11:59 PM EDT (UTC-4:00): Paper titles and abstracts due
16 August 2016, 11:59 PM EDT (UTC-4:00): Full submissions for technical papers and panels due
NDSS 2017 Call for Papers
Collaborative Security | ION July 201615
Mutually Agreed Norms
for
Routing Security (MANRS)
Stimulate visible improvements in security and resilience of
Internet Routing by changing towards a culture of collective responsibility
Collaborative Security | ION July 2016
common problems to be addressed
16
1 The organization (ISP/network operator) recognizes the interdependent
nature of the global routing system and its own role in contributing to a
secure and resilient Internet.
2 The organization integrates best current practices related to routing
security and resilience in its network management processes in line with
the Actions.
3 The organization is committed to preventing, detecting and mitigating
routing incidents through collaboration and coordination with peers and
other ISPs in line with the Actions.
4 The organization encourages its customers and peers to adopt these
Principles and Actions.
Principles
Collaborative Security | ION July 201617
Prevent propagation of incorrect routing information.
Prevent traffic with spoofed source IP addresses.
Facilitate global operational communication and coordination
between network operators.
Facilitate validation of routing information on a global scale.
Collaborative Security | ION July 201618
http://www.routingmanifesto.org/
http://manrs.org/
or
Collaborative Security | ION July 201619
Collaborative Security | ION July 201620
http://www.internetsociety.org/iot/
Collaborative Security | ION July 201621
Living in a World of Decentralized Data
Dr. Burt Kaliski, Jr.
Senior Vice President and CTO, Verisign
NDSS Workshop on Security of Emerging Networking
Technologies (SENT)
February 8, 2015
Collaborative Security | ION July 201622
Collaborative Security | ION July 201623
Areas of Responsibility
Courtesy: Tschofenig et al, IETF 92 Technical Plenary
Deployment
Implementation
Protocol Specifications and
Architecture
Cryptographic Primitives
Improved algorithms for
integer factorization, too small
key size.
No end-to-end security,
complexity in specifications,
insecure authentication
protocols
Buffer overflow attacks, poor
UI or other usability problems,
poor choice of hardware
Enabled debug ports, missing
deployment of security
mechanisms
Examples of Problems
Understanding the distributed nature of the development process is essential for tackling security problems.
23
Collaborative Security | ION July 201624
6/11/1524
Collaborative Security | ION July 201625
Can you do responsible security on a € 0.04 margin device?
Collaborative Security | ION July 201626
6/11/1526
Collaborative Security | ION July 2016 6/11/1527
Foster Confidence and Protect
Opportunities
Collective Responsibility
Evolution and Consensus
Fundamental Properties and Values
Think Globally, Act Locally
Smart Connected Objects
These objects will have a profound impact on our lives.
Important Security Questions have not been answered while
we deploy.
The Collaborative Security Approach has properties that will
help to make a positive impact
www.internetsociety.orgwww.internetsociety.org
Kolkman@isoc.org
twitter: @kolkman
Chief Internet Technology
Officer
Olaf M. Kolkman

Contenu connexe

Tendances

ION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRSION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRSDeploy360 Programme (Internet Society)
 
ION Trinidad and Tobago - IPv6 Global Connectivity Three Years After World IP...
ION Trinidad and Tobago - IPv6 Global Connectivity Three Years After World IP...ION Trinidad and Tobago - IPv6 Global Connectivity Three Years After World IP...
ION Trinidad and Tobago - IPv6 Global Connectivity Three Years After World IP...Deploy360 Programme (Internet Society)
 
The Internet: Communities,Collaborations & Concepts
The Internet: Communities,Collaborations & ConceptsThe Internet: Communities,Collaborations & Concepts
The Internet: Communities,Collaborations & ConceptsEdwin A. Opare
 

Tendances (20)

ION Malta - MANRS Introduction
ION Malta - MANRS IntroductionION Malta - MANRS Introduction
ION Malta - MANRS Introduction
 
ION Malta - IETF Update
ION Malta - IETF UpdateION Malta - IETF Update
ION Malta - IETF Update
 
ION Bangladesh - ISOC Dhaka Chapter Welcome
ION Bangladesh - ISOC Dhaka Chapter WelcomeION Bangladesh - ISOC Dhaka Chapter Welcome
ION Bangladesh - ISOC Dhaka Chapter Welcome
 
ION Malta - IPv6 Case Study: Finland
ION Malta - IPv6 Case Study: FinlandION Malta - IPv6 Case Study: Finland
ION Malta - IPv6 Case Study: Finland
 
ION Bangladesh - IETF Update
ION Bangladesh - IETF UpdateION Bangladesh - IETF Update
ION Bangladesh - IETF Update
 
ION Malta - IANA Transition Roles & Accountability
ION Malta - IANA Transition Roles & AccountabilityION Malta - IANA Transition Roles & Accountability
ION Malta - IANA Transition Roles & Accountability
 
ION Sri Lanka - Opening Slides
ION Sri Lanka - Opening SlidesION Sri Lanka - Opening Slides
ION Sri Lanka - Opening Slides
 
ION Durban - MANRS Introduction
ION Durban - MANRS IntroductionION Durban - MANRS Introduction
ION Durban - MANRS Introduction
 
ION Cape Town - Opening Remarks
ION Cape Town - Opening RemarksION Cape Town - Opening Remarks
ION Cape Town - Opening Remarks
 
ION Durban - Closing Slides
ION Durban - Closing SlidesION Durban - Closing Slides
ION Durban - Closing Slides
 
ION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLSION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLS
 
ION Durban - What's Happening at the IETF?
ION Durban - What's Happening at the IETF?ION Durban - What's Happening at the IETF?
ION Durban - What's Happening at the IETF?
 
ION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRSION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRS
 
ION Belgrade - IETF Update
ION Belgrade - IETF UpdateION Belgrade - IETF Update
ION Belgrade - IETF Update
 
Mind Your MANRS - Mutually Agreed Norms for Routing Security
Mind Your MANRS - Mutually Agreed Norms for Routing SecurityMind Your MANRS - Mutually Agreed Norms for Routing Security
Mind Your MANRS - Mutually Agreed Norms for Routing Security
 
ION Belgrade - Opening Slides
ION Belgrade - Opening SlidesION Belgrade - Opening Slides
ION Belgrade - Opening Slides
 
ION Trinidad and Tobago - IPv6 Global Connectivity Three Years After World IP...
ION Trinidad and Tobago - IPv6 Global Connectivity Three Years After World IP...ION Trinidad and Tobago - IPv6 Global Connectivity Three Years After World IP...
ION Trinidad and Tobago - IPv6 Global Connectivity Three Years After World IP...
 
ION Cape Town - Closing Remarks
ION Cape Town - Closing RemarksION Cape Town - Closing Remarks
ION Cape Town - Closing Remarks
 
The Internet: Communities,Collaborations & Concepts
The Internet: Communities,Collaborations & ConceptsThe Internet: Communities,Collaborations & Concepts
The Internet: Communities,Collaborations & Concepts
 
ION Cape Town - Welcome from ISOC Gauteng Chapter
ION Cape Town - Welcome from ISOC Gauteng ChapterION Cape Town - Welcome from ISOC Gauteng Chapter
ION Cape Town - Welcome from ISOC Gauteng Chapter
 

En vedette (6)

ION Hangzhou - RPKI At CNNIC
ION Hangzhou - RPKI At CNNICION Hangzhou - RPKI At CNNIC
ION Hangzhou - RPKI At CNNIC
 
ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?
 
ION Hangzhou - MANRS Presentation
ION Hangzhou - MANRS PresentationION Hangzhou - MANRS Presentation
ION Hangzhou - MANRS Presentation
 
ION Hangzhou - IPv6 in Asia: Laggards and Trends
ION Hangzhou - IPv6 in Asia: Laggards and TrendsION Hangzhou - IPv6 in Asia: Laggards and Trends
ION Hangzhou - IPv6 in Asia: Laggards and Trends
 
ION Hangzhou - How to Deploy DNSSEC
ION Hangzhou - How to Deploy DNSSECION Hangzhou - How to Deploy DNSSEC
ION Hangzhou - How to Deploy DNSSEC
 
ION Hangzhou - The Prospect of the Alibaba Next Generation Internet
ION Hangzhou - The Prospect of the Alibaba Next Generation InternetION Hangzhou - The Prospect of the Alibaba Next Generation Internet
ION Hangzhou - The Prospect of the Alibaba Next Generation Internet
 

Similaire à ION Hangzhou - Keynote: Collaborative Security and an Open Internet

Smart Factories Redefine Security Paradigms
Smart Factories Redefine Security ParadigmsSmart Factories Redefine Security Paradigms
Smart Factories Redefine Security Paradigmsteam-WIBU
 
Business and IoT Economic Alchemy or Another Anticlimax - March 2016 - OSGi A...
Business and IoT Economic Alchemy or Another Anticlimax - March 2016 - OSGi A...Business and IoT Economic Alchemy or Another Anticlimax - March 2016 - OSGi A...
Business and IoT Economic Alchemy or Another Anticlimax - March 2016 - OSGi A...mfrancis
 
Meeting with the sponsors (Nov 25th, 2016) - status
Meeting with the sponsors (Nov 25th, 2016) - statusMeeting with the sponsors (Nov 25th, 2016) - status
Meeting with the sponsors (Nov 25th, 2016) - statusEuroPrivacy
 
IoT Developer Survey 2016
IoT Developer Survey 2016IoT Developer Survey 2016
IoT Developer Survey 2016Eclipse IoT
 
IoT Breakfast Briefing
IoT Breakfast BriefingIoT Breakfast Briefing
IoT Breakfast BriefingSomo
 
Matteo meucci Software Security - Napoli 10112016
Matteo meucci   Software Security - Napoli 10112016Matteo meucci   Software Security - Napoli 10112016
Matteo meucci Software Security - Napoli 10112016Minded Security
 
Autonomous webinar final deck
Autonomous webinar final deckAutonomous webinar final deck
Autonomous webinar final deckLora Cecere
 
OWASP, the life and the universe
OWASP, the life and the universeOWASP, the life and the universe
OWASP, the life and the universeSébastien GIORIA
 
IoT Developer Survey 2016
IoT Developer Survey 2016IoT Developer Survey 2016
IoT Developer Survey 2016Ian Skerrett
 
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Decisions
 
Parallel session: IPv6
Parallel session: IPv6Parallel session: IPv6
Parallel session: IPv6Jisc
 
apidays LIVE New York 2021 - API Economy in Financial Services by Giovanni Le...
apidays LIVE New York 2021 - API Economy in Financial Services by Giovanni Le...apidays LIVE New York 2021 - API Economy in Financial Services by Giovanni Le...
apidays LIVE New York 2021 - API Economy in Financial Services by Giovanni Le...apidays
 
API Days 2016 Day 1: OpenID Financial API WG
API Days 2016 Day 1: OpenID Financial API WGAPI Days 2016 Day 1: OpenID Financial API WG
API Days 2016 Day 1: OpenID Financial API WGNat Sakimura
 
IPv6 readiness globally
IPv6 readiness globallyIPv6 readiness globally
IPv6 readiness globallyAPNIC
 
Key Elements of an Effective Anti-Bribery Management System Implementation
Key Elements of an Effective Anti-Bribery Management System ImplementationKey Elements of an Effective Anti-Bribery Management System Implementation
Key Elements of an Effective Anti-Bribery Management System ImplementationPECB
 
New Requirements of Fraud Prevention
New Requirements of Fraud PreventionNew Requirements of Fraud Prevention
New Requirements of Fraud PreventionGuardian Analytics
 

Similaire à ION Hangzhou - Keynote: Collaborative Security and an Open Internet (20)

Smart Factories Redefine Security Paradigms
Smart Factories Redefine Security ParadigmsSmart Factories Redefine Security Paradigms
Smart Factories Redefine Security Paradigms
 
The Internet of Things Security Foundation (IoTSF)
The Internet of Things Security Foundation (IoTSF)The Internet of Things Security Foundation (IoTSF)
The Internet of Things Security Foundation (IoTSF)
 
Business and IoT Economic Alchemy or Another Anticlimax - March 2016 - OSGi A...
Business and IoT Economic Alchemy or Another Anticlimax - March 2016 - OSGi A...Business and IoT Economic Alchemy or Another Anticlimax - March 2016 - OSGi A...
Business and IoT Economic Alchemy or Another Anticlimax - March 2016 - OSGi A...
 
Meeting with the sponsors (Nov 25th, 2016) - status
Meeting with the sponsors (Nov 25th, 2016) - statusMeeting with the sponsors (Nov 25th, 2016) - status
Meeting with the sponsors (Nov 25th, 2016) - status
 
IoT Developer Survey 2016
IoT Developer Survey 2016IoT Developer Survey 2016
IoT Developer Survey 2016
 
IoT Breakfast Briefing
IoT Breakfast BriefingIoT Breakfast Briefing
IoT Breakfast Briefing
 
CV | Michele Spagnuolo
CV | Michele SpagnuoloCV | Michele Spagnuolo
CV | Michele Spagnuolo
 
Matteo meucci Software Security - Napoli 10112016
Matteo meucci   Software Security - Napoli 10112016Matteo meucci   Software Security - Napoli 10112016
Matteo meucci Software Security - Napoli 10112016
 
Autonomous webinar final deck
Autonomous webinar final deckAutonomous webinar final deck
Autonomous webinar final deck
 
OWASP, the life and the universe
OWASP, the life and the universeOWASP, the life and the universe
OWASP, the life and the universe
 
IoT Developer Survey 2016
IoT Developer Survey 2016IoT Developer Survey 2016
IoT Developer Survey 2016
 
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
 
Parallel session: IPv6
Parallel session: IPv6Parallel session: IPv6
Parallel session: IPv6
 
apidays LIVE New York 2021 - API Economy in Financial Services by Giovanni Le...
apidays LIVE New York 2021 - API Economy in Financial Services by Giovanni Le...apidays LIVE New York 2021 - API Economy in Financial Services by Giovanni Le...
apidays LIVE New York 2021 - API Economy in Financial Services by Giovanni Le...
 
API Days 2016 Day 1: OpenID Financial API WG
API Days 2016 Day 1: OpenID Financial API WGAPI Days 2016 Day 1: OpenID Financial API WG
API Days 2016 Day 1: OpenID Financial API WG
 
IPv6 readiness globally
IPv6 readiness globallyIPv6 readiness globally
IPv6 readiness globally
 
Key Elements of an Effective Anti-Bribery Management System Implementation
Key Elements of an Effective Anti-Bribery Management System ImplementationKey Elements of an Effective Anti-Bribery Management System Implementation
Key Elements of an Effective Anti-Bribery Management System Implementation
 
ION Belfast - Opening Slides - Chris Grundemann
ION Belfast - Opening Slides - Chris GrundemannION Belfast - Opening Slides - Chris Grundemann
ION Belfast - Opening Slides - Chris Grundemann
 
2014 09-04-pj
2014 09-04-pj2014 09-04-pj
2014 09-04-pj
 
New Requirements of Fraud Prevention
New Requirements of Fraud PreventionNew Requirements of Fraud Prevention
New Requirements of Fraud Prevention
 

Plus de Deploy360 Programme (Internet Society)

ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...Deploy360 Programme (Internet Society)
 

Plus de Deploy360 Programme (Internet Society) (18)

ION Belgrade - Jordi Palet Martinez IPv6 Success Stories
ION Belgrade - Jordi Palet Martinez IPv6 Success StoriesION Belgrade - Jordi Palet Martinez IPv6 Success Stories
ION Belgrade - Jordi Palet Martinez IPv6 Success Stories
 
ION Belgrade - ISOC Serbia Belgrade Chapter Presentation
ION Belgrade - ISOC Serbia Belgrade Chapter PresentationION Belgrade - ISOC Serbia Belgrade Chapter Presentation
ION Belgrade - ISOC Serbia Belgrade Chapter Presentation
 
ION Belgrade - MANRS by Serbian Open eXchange (SOX)
ION Belgrade - MANRS by Serbian Open eXchange (SOX)ION Belgrade - MANRS by Serbian Open eXchange (SOX)
ION Belgrade - MANRS by Serbian Open eXchange (SOX)
 
ION Belgrade - Closing Slides
ION Belgrade - Closing SlidesION Belgrade - Closing Slides
ION Belgrade - Closing Slides
 
AusNOG - Two Years of Good MANRS
AusNOG - Two Years of Good MANRSAusNOG - Two Years of Good MANRS
AusNOG - Two Years of Good MANRS
 
ION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSECION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSEC
 
ION Malta - Seeweb Thoughts on IPv6 Transition
ION Malta - Seeweb Thoughts on IPv6 TransitionION Malta - Seeweb Thoughts on IPv6 Transition
ION Malta - Seeweb Thoughts on IPv6 Transition
 
ION Malta - Seeweb Why MANRS is good for you
ION Malta - Seeweb Why MANRS is good for youION Malta - Seeweb Why MANRS is good for you
ION Malta - Seeweb Why MANRS is good for you
 
ION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internetION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internet
 
ION Durban - Introduction to ISOC Gauteng Chapter
ION Durban - Introduction to ISOC Gauteng ChapterION Durban - Introduction to ISOC Gauteng Chapter
ION Durban - Introduction to ISOC Gauteng Chapter
 
ION Durban - NAT64/DNS64 Experiments and the NAT64Check Tool
ION Durban - NAT64/DNS64 Experiments and the NAT64Check ToolION Durban - NAT64/DNS64 Experiments and the NAT64Check Tool
ION Durban - NAT64/DNS64 Experiments and the NAT64Check Tool
 
ION Durban - DNSSEC, and Why We Can't Avoid It
ION Durban - DNSSEC, and Why We Can't Avoid ItION Durban - DNSSEC, and Why We Can't Avoid It
ION Durban - DNSSEC, and Why We Can't Avoid It
 
ION Durban - IPv6 Case Study (Liquid Telecom)
ION Durban - IPv6 Case Study (Liquid Telecom)ION Durban - IPv6 Case Study (Liquid Telecom)
ION Durban - IPv6 Case Study (Liquid Telecom)
 
ION Durban - Opening Slides
ION Durban - Opening SlidesION Durban - Opening Slides
ION Durban - Opening Slides
 
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
 
ION Costa Rica - About the IETF and How to Get Involved
ION Costa Rica - About the IETF and How to Get InvolvedION Costa Rica - About the IETF and How to Get Involved
ION Costa Rica - About the IETF and How to Get Involved
 
ION Costa Rica - Closing Slides
ION Costa Rica - Closing SlidesION Costa Rica - Closing Slides
ION Costa Rica - Closing Slides
 
ION Costa Rica - Validacion en el origen
ION Costa Rica - Validacion en el origenION Costa Rica - Validacion en el origen
ION Costa Rica - Validacion en el origen
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Dernier (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

ION Hangzhou - Keynote: Collaborative Security and an Open Internet

  • 1. www.internetsociety.orgwww.internetsociety.org Collaborative Security Reflections about Security and the Open Internet ION 2016 Olaf Kolkman 奥拉夫 科尔克门 kolkman@isoc.org @Kolkman
  • 2. Collaborative Security | ION July 2016 http://www.internetsociety.org/get-involved/individuals 2
  • 4. Collaborative Security | ION July 2016Collaborative Security | ION July 20164
  • 5. Collaborative Security | ION July 2016Collaborative Security | ION July 20165 https://www.flickr.com/photos/worldbank/4725033296/in/album-72157634090168746/
  • 6. Collaborative Security | ION July 20166
  • 7. Collaborative Security | ION July 20167 Security, stupid
  • 8. Collaborative Security | ION July 2016Collaborative Security | ION July 20168
  • 9. Collaborative Security | ION July 2016Collaborative Security | ION July 20169
  • 10. Collaborative Security | ION July 201610
  • 11. Collaborative Security | ION July 201611
  • 12. Collaborative Security | ION July 2016Collaborative Security | ION July 2016 Where the rubber meets the road. 12
  • 13. Collaborative Security | ION July 2016 Researchers 13 Development OPS Devops SDOs Orgs
  • 14. Collaborative Security | ION July 201614 Advertisement, skip in: 0:100:090:080:070:060:050:040:030:020:010:00 12 August 2016, 11:59 PM EDT (UTC-4:00): Paper titles and abstracts due 16 August 2016, 11:59 PM EDT (UTC-4:00): Full submissions for technical papers and panels due NDSS 2017 Call for Papers
  • 15. Collaborative Security | ION July 201615 Mutually Agreed Norms for Routing Security (MANRS) Stimulate visible improvements in security and resilience of Internet Routing by changing towards a culture of collective responsibility
  • 16. Collaborative Security | ION July 2016 common problems to be addressed 16 1 The organization (ISP/network operator) recognizes the interdependent nature of the global routing system and its own role in contributing to a secure and resilient Internet. 2 The organization integrates best current practices related to routing security and resilience in its network management processes in line with the Actions. 3 The organization is committed to preventing, detecting and mitigating routing incidents through collaboration and coordination with peers and other ISPs in line with the Actions. 4 The organization encourages its customers and peers to adopt these Principles and Actions. Principles
  • 17. Collaborative Security | ION July 201617 Prevent propagation of incorrect routing information. Prevent traffic with spoofed source IP addresses. Facilitate global operational communication and coordination between network operators. Facilitate validation of routing information on a global scale.
  • 18. Collaborative Security | ION July 201618 http://www.routingmanifesto.org/ http://manrs.org/ or
  • 19. Collaborative Security | ION July 201619
  • 20. Collaborative Security | ION July 201620 http://www.internetsociety.org/iot/
  • 21. Collaborative Security | ION July 201621 Living in a World of Decentralized Data Dr. Burt Kaliski, Jr. Senior Vice President and CTO, Verisign NDSS Workshop on Security of Emerging Networking Technologies (SENT) February 8, 2015
  • 22. Collaborative Security | ION July 201622
  • 23. Collaborative Security | ION July 201623 Areas of Responsibility Courtesy: Tschofenig et al, IETF 92 Technical Plenary Deployment Implementation Protocol Specifications and Architecture Cryptographic Primitives Improved algorithms for integer factorization, too small key size. No end-to-end security, complexity in specifications, insecure authentication protocols Buffer overflow attacks, poor UI or other usability problems, poor choice of hardware Enabled debug ports, missing deployment of security mechanisms Examples of Problems Understanding the distributed nature of the development process is essential for tackling security problems. 23
  • 24. Collaborative Security | ION July 201624 6/11/1524
  • 25. Collaborative Security | ION July 201625 Can you do responsible security on a € 0.04 margin device?
  • 26. Collaborative Security | ION July 201626 6/11/1526
  • 27. Collaborative Security | ION July 2016 6/11/1527 Foster Confidence and Protect Opportunities Collective Responsibility Evolution and Consensus Fundamental Properties and Values Think Globally, Act Locally Smart Connected Objects These objects will have a profound impact on our lives. Important Security Questions have not been answered while we deploy. The Collaborative Security Approach has properties that will help to make a positive impact

Notes de l'éditeur

  1. First a few words about who we are, the Internet society….
  2. We usually think of the Internet as a complex network of networks, each operated by autonomous operators whereby the services are only loosely coupled to the offered transport networks that offers a best effort service. where application providers provide their applications
  3. When we talk about technology we have to remember that the technology is really an enabler for humans. The technology is primarily a driver for Socio economic capabilities. (Although this picture might make you wonder if we give up other social interactions … ) But.. back to the technology for a bit.
  4. Global reach, integrity: Any endpoint of the Internet can address any other endpoint, and the information received at one endpoint is as intended by the sender, wherever the receiver connects to the Internet. Implicit in this is the requirement of global, managed addressing and naming services. General purpose: The Internet is capable of supporting a wide range of demands for its use. While some networks within it may be optimized for certain traffic patterns or expected uses, the technology does not place inherent limitations on the applications or services that make use of it. Supports innovation without requiring permission (by anyone): Any person or organization can set up a new service, that abides by the existing standards and best practices, and make it available to the rest of the Internet, without requiring special permission. Accessible – it’s possible to connect to it, build new parts of it, and study it overall: Anyone can “get on” the Internet – not just to consume content from others, but also to contribute content on existing services, put up a server (Internet node), and attach new networks.  Based on interoperability and mutual agreement: The key to enabling inter-networking is to define the context for interoperation – through open standards for the technologies, and mutual agreements between operators of autonomous pieces of the Internet. Collaboration: Overall, a spirit of collaboration is required – beyond the initial basis of interoperation and bi-lateral agreements, the best solutions to new issues that arise stem from willing collaboration between stakeholders. Technology – reusable building blocks: Technologies have been built and deployed on the Internet for one purpose, only to be used at a later date to support some other important function. There are no permanent favourites: While some technologies, companies and regions have flourished, their continued success depends on continued relevance and utility, not strictly some favoured status.
  5. The economy, stupid — James Carville had coined as a campaign strategist of Bill Clinton's successful 1992 presidential campaign against sitting president George H. W. Bush. Security is like economy.
  6. Looking at these invariants to the security perspective. Policy measures that are premised on stopping bad things, rather than protecting what is valued, provide no guide as to how far those measures should go. If we are not careful, the spectre of cyber threats can be used as a vehicle for control of networks and how they are used, plus pervasive monitoring
  7. The Internet, with its high degree of interconnection and dependencies, brings another dimension to the management of risks. Security and resilience of the Internet depends not only on how well risks to you and your assets are managed, but also, importantly, on the management of risks that you (by your action or inaction) present to the Internet ecosystem – the “outward” risks. Additionally, some risks need to be managed by more than one actor. This is the notion of collective and shared risk management – a notion that is well aligned with the “public interest” nature of the Internet.   This latter aspect of risk management is not necessarily self-evident, especially since there is often no obviously identifiable immediate harm to the actors or their assets and, therefore, no direct business case that can be immediately associated with such effort. And, it also is human nature to seek outcomes that further our individual “self-interest”. However, such a narrow approach is counter-productive and, in the long-term, harmful to everyone’s interests – not only will it impact the security of the ecosystem, but it will also diminish the overall pool of social and economic potential that the Internet offers.
  8. Traditional approaches to security were principally concerned with external and internal threats, and the impact they may have on one’s own assets [in other words, threat-based and self-interested]. There is, however, a growing recognition that a security paradigm for the Internet ecosystem should be premised on protecting opportunities for economic and social prosperity, as opposed to a model that is based simply on preventing perceived harm.
  9. Fostering confidence and protecting opportunities: The objective of security is to foster confidence in the Internet and to ensure the continued success of the Internet as a driver for economic and social innovation. Collective Responsibility: Internet participants share a responsibility towards the system as a whole. Fundamental Properties and Values: Security solutions should be compatible with fundamental human rights and preserve the fundamental properties of the Internet — the Internet Invariants. Evolution and Consensus: Effective security relies on agile evolutionary steps based on the expertise of a broad set of stakeholders. Think Globally, act Locally: It is through voluntary bottom-up self-organization that the most impactful solutions are likely to reached.
  10. Enough conceptual talk.. lets see where that takes us.
  11. Collaborative security happens in may places, perhaps not even consciously. Anywhere where people get together and work towards improving trust of the Internet. No claim for completeness. Regional Registries: Maintaining Registries Regional Operators: Best Current Practices Industry organizations like MAAWG and first coordinating Programmers that try to do the right thing by sharing code, reviewing other people code Academic conferences that work on improving security etc…
  12. A key part of any smart object design is the problem of how to establish trust for a smart object. Typically, bootstrapping trust involves giving the device the credentials it needs to operate within a larger network of devices or services. Smart objects will, in many cases, be deployed in places where additional physical security is difficult or impossible. Designers should take into account that any such device can and will be compromised by an attacker with direct physical access. Thus, trust models should distinguish between devices susceptible to physical compromise and devices with some level of physical security. Physical attacks, such as timing, power analysis, and glitching, are commonly applied to extract secrets [PhysicalAttacks]. Smart objects will, in many cases, be deployed as collections of identical or near identical devices. Protocols should be designed so that a compromise of a single device does not result in compromise of the entire collection, especially since the compromise of a large number of devices can enable additional attacks such as a distributed denial of service. Sharing secret keys across an entire product family is, therefore, also problematic since compromise of a single device might leave all devices from that product family vulnerable. Smart objects will, in many cases, be deployed in ways that the designer never considered. Designers should either seek to minimize the impact of misuse of their systems and devices or implement controls to prevent such misuse where applicable. It is anticipated that smart objects will be deployed with a long (e.g., 5-40 years) life cycle. Any security mechanism chosen a the outset may not be "good enough" for the full lifespan of the device. Thus, long-lived devices should start with good security and provide a path to deploy new security mechanisms over the lifetime of the device. Security protocols often rely on random numbers, and offering randomness in embedded devices is challenging. For this reason, it is important to consider the use of hardware-based random number generators during early states of the design process.