SlideShare a Scribd company logo
1 of 38
Introduces
Internet security today:
Cybersecurity today.
ļƒ˜ Trojan horses
ļƒ˜ Keylogging
ļƒ˜ Phishing
ļƒ˜ Impersonation
ļƒ˜ Malware
ļƒ˜ Bots
ļƒ˜ Worms
ļƒ˜ Viruses
ļƒ˜ Rootkits
ļƒ˜ Spyware
Recent breaches.
ā€¢ Targetā€“ 70,000,000
ā€¢ Facebook ā€“ 6,000,000
ā€¢ Evernote ā€“ 50,000,000
ā€¢ Adobe ā€“ 38,000,000.
ā€¢ RSA ā€“ 660,000 to 1,000,000
ā€¢ Zappos ā€“ 24,000,000
Today, this observation is all too true:
ā€œA false sense of security is the only kind there is.ā€
-- Michael Meade
Costs of cybercrime.
Cost of cybercrime surges to $113 billion.
Costs have climbed by an average of 78%.
Time required to recover from a breach has increased 130%.
In the United States alone, the annual cybercrime cost seen by the 60
businesses studied ranged from $1.3 million to more than $58 million and
averaged $11.6 million per company ā€“ an increase of $2.6 million from
2012. The average cost of cleaning up after a single successful attack was
$1 million.
But the costs of correcting data breaches are no longer the only
cause for concern. The legal consequences, such as class-action
lawsuits on behalf of third parties affected by such cyber attacks, are
a growing worry of business owners.
Cybersecurity today.
Todayā€™s authentication scheme is 40 years old. It identifies its users from
one or a combination of the following elements:
1. Something the user has: computer, mobile phone or RSA key
2. Something the user knows: password, username, identification (PIN)
number etc.
Static authentication.
All authentication protocols currently in use have one common weakness:
They are static.
Static credentials are prone to manipulation and theft.
After several years of helping organizations investigate hundred of security
breaches around the world, Mandiant has found a constant:
100% of breaches involved stolen credentials.
And the average time until a breach is detected is 462 days.
Industry response.
ļƒ¼ Strong password
ļƒ¼ Two-factor authentication
ļƒ¼ Out-of-band verification. i.e. email, SMS, phone call follow-up
(very inconvenient and still only verifies initial login and doesnā€™t stop
Man-In-the-Middle intrusions)
ļƒ¼ Secure tunneling (SSL), disk or transparent encryption (AES)
Industry response is insufficient.
Reports of successful attacks on smartcard-based technology illustrate
that "true two-factor authentication is not possible without a physical
component that is not accessible digitally.ā€
-- Jaime Blasco, Director, AlienVault Labs
To overcome the limitation of static authentication ā€“ the weakness in digital
identity security ā€“ a new physical component is required.
But now thereā€™s
Guardog has four elements that no other system has (think of them as
Guardogā€™s four muscular legs).
1
Guardog gives a user a physical element: a Guardog key which the user
inserts into his/her computer. This non-digital element, integral to a userā€™s
session with the service provider, is beyond the reach of any intruder.
The Guardog key is also available as a Smartphone app.
2
When a user logs in to the service provider, to authenticate who he/she is,
Guardog has the service provider authenticate itself back to the user. Since
this is the reverse of LOGIN, we call it NIGOL.
Login/Nigol starts a mutual authentication that we call . . .
The patented Guardog invention:
3
Cothenticationā„¢ does not stop at login. Instead, it continues throughout
every session. Each time a user makes a request of the service provider ā€“
any monetary transaction or any transmission of information ā€“ Guardog
institutes another Cothentication. Guardog repeatedly verifies the userā€™s
and service providerā€™s identity.
4
Guardogā€™s Cothentication is dynamic, and based on 128 bit encryption
through randomly generated codes. Thus every exchange is different from
every previous exchange. This unpredictable characteristic defeats any and
every attempted intrusion.
1. The Guardog Key.
Guardog uses a unique and radically different approach to deliver the only
absolute solution for Internet transaction and communication security.
Guardog gives the user a physical element: the Guardog key, either as a
USB key or as a Smartphone app which works in conjunction with the
browser. By employing either of these physical elements, integral to a
userā€™s session with the service provider, Guardog puts the session beyond
the reach of any intruder.
1. The Guardog Key.
Simply put, the Guardog Key is a next-generation hardware security device.
It is designed to help all users achieve a higher level of digital security
simply and easily. The Guardog Key helps protect digital identity,
communications and transactions. It is a critical component in a state-of-
the-art closed loop security solution that leaves a would-be "Man In The
Browser" (MIB) and ā€œMan-In-the-Middleā€ (MITM)...a "Man Out In The Cold!"
(MOITC).
2. The Guardog Server.
Mutual. The Guardog server ā€œfacesā€ both ways ā€“ toward the service provider
and toward the user. Guardog is a mutually trusted party.
It creates and validates randomized, ā€œdestination-awareā€ secure
communications and transactions.
Zero knowledge. Just as a dog guarding a valuable installation has no
knowledge of whatā€™s inside, Guardog has zero knowledge of the Internet
transactions and communications whose security it protects.
3. The service provider (The Bank).
A service provider uses designated authentication servers to perform
special functions such as authenticating itself to the user and confirming
the userā€™s authentication back to the service provider.
16-step Cothentication process.
To begin a session with a service provider who has installed the
Guardog system, a user inserts his/her Guardog key in a USB port or
activates the Guardog Smartphone app in conjunction with his/her
computer browser. This sets in motion a 16-step Cothentication
process: the user authenticates himself/herself to the service provider
and the service provider authenticates itself to the user...all within
milliseconds. On step 14, Guardog "opens a gate" between the user
and the service provider. The gate stays open through step 15, then
closes on step 16...no time for a would-be intruder to get in.
16-step Cothentication process.
Once Guardog Cothentication is complete...
Only when these 16 authentication steps are complete does Guardog ā€œopen
a gateā€ or ā€œopen a windowā€ between the user and the service provider, for
the communication or transaction itself.
Within a session, whenever the user makes a new request, these steps are
repeated. Once they are completed, Guardog opens another gate or
window, for this new communication or transaction.
Guardog visualized.
Imagine you are standing in front of a huge blank wall.
All of a sudden a window opens somewhere in the wall and an anonymous
message passes through in a split second. Then the window disappears.
Then another window opens up in a totally different spot - and disappears.
It is never clear if and where another window will open.
Thatā€™s how Guardog works.
The message transfer cannot be spoofed, predicted or duplicated
because it is random, encrypted and dynamic.
This is Nuclear Launch Code Security.
AAF1267KL998MM6543)2
GHJ773121212KKJDCE34
AAF1267KL998MM6543)2
Competitive Analysis.
1. YubiKey
2. Safelock
3. Ironkey
4. iCloud Keychain
5. Smartcards
6. Public key/private key
Comparison.
Competitors Guardog
Strong password ļƒ¼ Non-transferable Dynamic Credential
2 Factor Authentication (RSA) ļƒ¼ Continuous Mutual Authentication
Out of Band Verification (email, SMS) ļƒ¼ Destination-aware Secure Messaging
SSL and transparent encryption (AES) ļƒ¼ Authenticated Encryption/Decryption
Encryption Key protected by password ļƒ¼ Encryption key protected by server and
client side keys
END RESULTS
Identity fraud reduction ļƒ¼ Prevents identity fraud
Increased barrier of attacks ļƒ¼ Eliminates an entire category of threats
ļƒ¼ Mitigates the risk of impersonations
ļƒ¼ Provides physical control over digital
xxxassets
ļƒ¼ Protects 100% of user accounts
Guardog API supports:
Operating System:
Windows Server 2008, 2008 R2, 2013, Linux
Web Servers:
Apache, IIS etc.
Database
MySQL, MSSQL etc.
Network Protocols:
TCP, HTTP, HTTPS
Development Languages:
PHP, Asp.net, C/C++, Java
In summary:
The old authentication
versus
the new authentication :
The existing Cybersecurity model:
ļ»æShe sat down at her computer and inserted her username and password
into her browser. Authenticated. She instructed her bank to move $150.00
from her checking to her savings account. She also sent a wire transfer to
her sister in California. She paid the bill for her American Express card and
instructed the bank to notify her of any payments over $200 as an
additional security measure.
Guardogā€™s Cybersecurity model:
ļ»æļ»æShe sat down at her computer and inserted Guardogā€™s patented
Guardog thumbdrive. She opened the browser for her bank Cothenticated
and Cothenticated instructed her bank to move $150.00 from her checking
Cothenticated to her savings account. Cothenticated She also sent a wire
transfer Cothenticated to her sister in California. Cothenticated She paid the
bill for her American Express card Cothenticated and instructed the bank to
notify her Cothenticated of any payments over $200 as an additional
security measure. Cothenticated
Protection of Intellectual Property.
Guardog technology is patented in the USA, Canada, China, Japan,
Australia and New Zealand.
In conclusion.
ļ»æļ»æCybersecurity has been solved.
The perpetual motion machine and cold fusion
are next on our list.
Thank you.
Internet transaction and communication security

More Related Content

What's hot

CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziNCCOMMS
Ā 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisCSCJournals
Ā 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET Journal
Ā 
iKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password SecurityiKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password Securityrambmohan
Ā 
iot hacking, smartlockpick
 iot hacking, smartlockpick iot hacking, smartlockpick
iot hacking, smartlockpickidsecconf
Ā 
CSF18 - Incident Response in the Cloud - Yuri Diogenes
CSF18 - Incident Response in the Cloud - Yuri DiogenesCSF18 - Incident Response in the Cloud - Yuri Diogenes
CSF18 - Incident Response in the Cloud - Yuri DiogenesNCCOMMS
Ā 
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"..."Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"...PROIDEA
Ā 
Security Fact & Fiction: Three Lessons from the Headlines
Security Fact & Fiction: Three Lessons from the HeadlinesSecurity Fact & Fiction: Three Lessons from the Headlines
Security Fact & Fiction: Three Lessons from the HeadlinesDuo Security
Ā 
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron ShrabergCODE BLUE
Ā 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]Hai Nguyen
Ā 
Toward Better Password Requirements
Toward Better Password RequirementsToward Better Password Requirements
Toward Better Password RequirementsJim Fenton
Ā 
[CB20] LogonTracer v1.5 + Elasticsearch = Real-time AD Log Analysis System by...
[CB20] LogonTracer v1.5 + Elasticsearch = Real-time AD Log Analysis System by...[CB20] LogonTracer v1.5 + Elasticsearch = Real-time AD Log Analysis System by...
[CB20] LogonTracer v1.5 + Elasticsearch = Real-time AD Log Analysis System by...CODE BLUE
Ā 
What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?lorzinian
Ā 
CrowdStrike Webinar: Taking Dwell-Time Out of Incident Response
CrowdStrike Webinar: Taking Dwell-Time Out of Incident ResponseCrowdStrike Webinar: Taking Dwell-Time Out of Incident Response
CrowdStrike Webinar: Taking Dwell-Time Out of Incident ResponseBrendon Macaraeg
Ā 
The Best Practice with Code Signing Certificates - CodeSignCert.com
The Best Practice with Code Signing Certificates - CodeSignCert.comThe Best Practice with Code Signing Certificates - CodeSignCert.com
The Best Practice with Code Signing Certificates - CodeSignCert.comKayra Obrain
Ā 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsIRJET Journal
Ā 
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ..."Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...PROIDEA
Ā 

What's hot (20)

CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael Narezzi
Ā 
Case study on JP Morgan Chase & Co
Case study on JP Morgan Chase & CoCase study on JP Morgan Chase & Co
Case study on JP Morgan Chase & Co
Ā 
Web security 2012
Web security 2012Web security 2012
Web security 2012
Ā 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security Analysis
Ā 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
Ā 
iKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password SecurityiKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password Security
Ā 
iot hacking, smartlockpick
 iot hacking, smartlockpick iot hacking, smartlockpick
iot hacking, smartlockpick
Ā 
CSF18 - Incident Response in the Cloud - Yuri Diogenes
CSF18 - Incident Response in the Cloud - Yuri DiogenesCSF18 - Incident Response in the Cloud - Yuri Diogenes
CSF18 - Incident Response in the Cloud - Yuri Diogenes
Ā 
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"..."Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
Ā 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
Ā 
Security Fact & Fiction: Three Lessons from the Headlines
Security Fact & Fiction: Three Lessons from the HeadlinesSecurity Fact & Fiction: Three Lessons from the Headlines
Security Fact & Fiction: Three Lessons from the Headlines
Ā 
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
Ā 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]
Ā 
Toward Better Password Requirements
Toward Better Password RequirementsToward Better Password Requirements
Toward Better Password Requirements
Ā 
[CB20] LogonTracer v1.5 + Elasticsearch = Real-time AD Log Analysis System by...
[CB20] LogonTracer v1.5 + Elasticsearch = Real-time AD Log Analysis System by...[CB20] LogonTracer v1.5 + Elasticsearch = Real-time AD Log Analysis System by...
[CB20] LogonTracer v1.5 + Elasticsearch = Real-time AD Log Analysis System by...
Ā 
What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?
Ā 
CrowdStrike Webinar: Taking Dwell-Time Out of Incident Response
CrowdStrike Webinar: Taking Dwell-Time Out of Incident ResponseCrowdStrike Webinar: Taking Dwell-Time Out of Incident Response
CrowdStrike Webinar: Taking Dwell-Time Out of Incident Response
Ā 
The Best Practice with Code Signing Certificates - CodeSignCert.com
The Best Practice with Code Signing Certificates - CodeSignCert.comThe Best Practice with Code Signing Certificates - CodeSignCert.com
The Best Practice with Code Signing Certificates - CodeSignCert.com
Ā 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Ā 
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ..."Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
Ā 

Viewers also liked

Enhancing Computer Security via End-to-End Communication Visualization
Enhancing Computer Security via End-to-End Communication Visualization Enhancing Computer Security via End-to-End Communication Visualization
Enhancing Computer Security via End-to-End Communication Visualization amiable_indian
Ā 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communicationMohd Arif
Ā 
Security in Near Field Communication
Security in Near Field CommunicationSecurity in Near Field Communication
Security in Near Field CommunicationVinit Varghese
Ā 
Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...sidhota
Ā 
Protocols for internet of things
Protocols for internet of thingsProtocols for internet of things
Protocols for internet of thingsCharles Gibbons
Ā 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNAMatteo Masi
Ā 
Realtime communication security - SIP, XMPP and others
Realtime communication security - SIP, XMPP and othersRealtime communication security - SIP, XMPP and others
Realtime communication security - SIP, XMPP and othersOlle E Johansson
Ā 
Physical Layer Security in Wireless Communication Systems
Physical Layer Security in Wireless Communication SystemsPhysical Layer Security in Wireless Communication Systems
Physical Layer Security in Wireless Communication SystemsAli Rahmanpour
Ā 
Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013Shane Turner
Ā 

Viewers also liked (10)

Enhancing Computer Security via End-to-End Communication Visualization
Enhancing Computer Security via End-to-End Communication Visualization Enhancing Computer Security via End-to-End Communication Visualization
Enhancing Computer Security via End-to-End Communication Visualization
Ā 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
Ā 
6421 b Module-09
6421 b Module-096421 b Module-09
6421 b Module-09
Ā 
Security in Near Field Communication
Security in Near Field CommunicationSecurity in Near Field Communication
Security in Near Field Communication
Ā 
Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...
Ā 
Protocols for internet of things
Protocols for internet of thingsProtocols for internet of things
Protocols for internet of things
Ā 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
Ā 
Realtime communication security - SIP, XMPP and others
Realtime communication security - SIP, XMPP and othersRealtime communication security - SIP, XMPP and others
Realtime communication security - SIP, XMPP and others
Ā 
Physical Layer Security in Wireless Communication Systems
Physical Layer Security in Wireless Communication SystemsPhysical Layer Security in Wireless Communication Systems
Physical Layer Security in Wireless Communication Systems
Ā 
Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013
Ā 

Similar to Internet transaction and communication security

INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37Felipe Prado
Ā 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignRajat Jain
Ā 
Cs credit card processor
Cs  credit card processorCs  credit card processor
Cs credit card processorLiora R. Herman
Ā 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
Ā 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35Felipe Prado
Ā 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
Ā 
How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsAll Things Open
Ā 
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...apidays
Ā 
Product brochure-print-spread
Product brochure-print-spreadProduct brochure-print-spread
Product brochure-print-spreadTran Thi Thuy Tuyet
Ā 
We explain the security flaw that's freaking out the internet
We explain the security flaw that's freaking out the internetWe explain the security flaw that's freaking out the internet
We explain the security flaw that's freaking out the internetaditi agarwal
Ā 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
Ā 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
Ā 
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity EducationA Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Educationijtsrd
Ā 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security TechnologiesRuchikaSachdeva4
Ā 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
Ā 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story BookSmart Defend UK
Ā 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryptionmonroel
Ā 
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlJose Lopez
Ā 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyVASCO Data Security
Ā 

Similar to Internet transaction and communication security (20)

INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37
Ā 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
Ā 
Cs credit card processor
Cs  credit card processorCs  credit card processor
Cs credit card processor
Ā 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
Ā 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
Ā 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
Ā 
How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source Applications
Ā 
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
Ā 
Product brochure-print-spread
Product brochure-print-spreadProduct brochure-print-spread
Product brochure-print-spread
Ā 
We explain the security flaw that's freaking out the internet
We explain the security flaw that's freaking out the internetWe explain the security flaw that's freaking out the internet
We explain the security flaw that's freaking out the internet
Ā 
Ppt
PptPpt
Ppt
Ā 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
Ā 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Ā 
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity EducationA Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Education
Ā 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
Ā 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
Ā 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story Book
Ā 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
Ā 
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat Control
Ā 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
Ā 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
Ā 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
Ā 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
Ā 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
Ā 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
Ā 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
Ā 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
Ā 
šŸ¬ The future of MySQL is Postgres šŸ˜
šŸ¬  The future of MySQL is Postgres   šŸ˜šŸ¬  The future of MySQL is Postgres   šŸ˜
šŸ¬ The future of MySQL is Postgres šŸ˜RTylerCroy
Ā 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
Ā 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
Ā 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
Ā 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
Ā 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
Ā 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
Ā 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĆŗjo
Ā 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
Ā 
Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024The Digital Insurer
Ā 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
Ā 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
Ā 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
Ā 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Ā 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Ā 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Ā 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Ā 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Ā 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Ā 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Ā 
šŸ¬ The future of MySQL is Postgres šŸ˜
šŸ¬  The future of MySQL is Postgres   šŸ˜šŸ¬  The future of MySQL is Postgres   šŸ˜
šŸ¬ The future of MySQL is Postgres šŸ˜
Ā 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Ā 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Ā 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Ā 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Ā 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Ā 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Ā 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Ā 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Ā 
Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024
Ā 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Ā 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Ā 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Ā 

Internet transaction and communication security

  • 3.
  • 4.
  • 5.
  • 6. Cybersecurity today. ļƒ˜ Trojan horses ļƒ˜ Keylogging ļƒ˜ Phishing ļƒ˜ Impersonation ļƒ˜ Malware ļƒ˜ Bots ļƒ˜ Worms ļƒ˜ Viruses ļƒ˜ Rootkits ļƒ˜ Spyware
  • 7. Recent breaches. ā€¢ Targetā€“ 70,000,000 ā€¢ Facebook ā€“ 6,000,000 ā€¢ Evernote ā€“ 50,000,000 ā€¢ Adobe ā€“ 38,000,000. ā€¢ RSA ā€“ 660,000 to 1,000,000 ā€¢ Zappos ā€“ 24,000,000 Today, this observation is all too true: ā€œA false sense of security is the only kind there is.ā€ -- Michael Meade
  • 8. Costs of cybercrime. Cost of cybercrime surges to $113 billion. Costs have climbed by an average of 78%. Time required to recover from a breach has increased 130%. In the United States alone, the annual cybercrime cost seen by the 60 businesses studied ranged from $1.3 million to more than $58 million and averaged $11.6 million per company ā€“ an increase of $2.6 million from 2012. The average cost of cleaning up after a single successful attack was $1 million. But the costs of correcting data breaches are no longer the only cause for concern. The legal consequences, such as class-action lawsuits on behalf of third parties affected by such cyber attacks, are a growing worry of business owners.
  • 9. Cybersecurity today. Todayā€™s authentication scheme is 40 years old. It identifies its users from one or a combination of the following elements: 1. Something the user has: computer, mobile phone or RSA key 2. Something the user knows: password, username, identification (PIN) number etc.
  • 10. Static authentication. All authentication protocols currently in use have one common weakness: They are static. Static credentials are prone to manipulation and theft. After several years of helping organizations investigate hundred of security breaches around the world, Mandiant has found a constant: 100% of breaches involved stolen credentials. And the average time until a breach is detected is 462 days.
  • 11. Industry response. ļƒ¼ Strong password ļƒ¼ Two-factor authentication ļƒ¼ Out-of-band verification. i.e. email, SMS, phone call follow-up (very inconvenient and still only verifies initial login and doesnā€™t stop Man-In-the-Middle intrusions) ļƒ¼ Secure tunneling (SSL), disk or transparent encryption (AES)
  • 12. Industry response is insufficient. Reports of successful attacks on smartcard-based technology illustrate that "true two-factor authentication is not possible without a physical component that is not accessible digitally.ā€ -- Jaime Blasco, Director, AlienVault Labs To overcome the limitation of static authentication ā€“ the weakness in digital identity security ā€“ a new physical component is required.
  • 13. But now thereā€™s Guardog has four elements that no other system has (think of them as Guardogā€™s four muscular legs).
  • 14. 1 Guardog gives a user a physical element: a Guardog key which the user inserts into his/her computer. This non-digital element, integral to a userā€™s session with the service provider, is beyond the reach of any intruder. The Guardog key is also available as a Smartphone app.
  • 15. 2 When a user logs in to the service provider, to authenticate who he/she is, Guardog has the service provider authenticate itself back to the user. Since this is the reverse of LOGIN, we call it NIGOL. Login/Nigol starts a mutual authentication that we call . . .
  • 16. The patented Guardog invention:
  • 17. 3 Cothenticationā„¢ does not stop at login. Instead, it continues throughout every session. Each time a user makes a request of the service provider ā€“ any monetary transaction or any transmission of information ā€“ Guardog institutes another Cothentication. Guardog repeatedly verifies the userā€™s and service providerā€™s identity.
  • 18. 4 Guardogā€™s Cothentication is dynamic, and based on 128 bit encryption through randomly generated codes. Thus every exchange is different from every previous exchange. This unpredictable characteristic defeats any and every attempted intrusion.
  • 19. 1. The Guardog Key. Guardog uses a unique and radically different approach to deliver the only absolute solution for Internet transaction and communication security. Guardog gives the user a physical element: the Guardog key, either as a USB key or as a Smartphone app which works in conjunction with the browser. By employing either of these physical elements, integral to a userā€™s session with the service provider, Guardog puts the session beyond the reach of any intruder.
  • 20. 1. The Guardog Key. Simply put, the Guardog Key is a next-generation hardware security device. It is designed to help all users achieve a higher level of digital security simply and easily. The Guardog Key helps protect digital identity, communications and transactions. It is a critical component in a state-of- the-art closed loop security solution that leaves a would-be "Man In The Browser" (MIB) and ā€œMan-In-the-Middleā€ (MITM)...a "Man Out In The Cold!" (MOITC).
  • 21. 2. The Guardog Server. Mutual. The Guardog server ā€œfacesā€ both ways ā€“ toward the service provider and toward the user. Guardog is a mutually trusted party. It creates and validates randomized, ā€œdestination-awareā€ secure communications and transactions. Zero knowledge. Just as a dog guarding a valuable installation has no knowledge of whatā€™s inside, Guardog has zero knowledge of the Internet transactions and communications whose security it protects.
  • 22. 3. The service provider (The Bank). A service provider uses designated authentication servers to perform special functions such as authenticating itself to the user and confirming the userā€™s authentication back to the service provider.
  • 23. 16-step Cothentication process. To begin a session with a service provider who has installed the Guardog system, a user inserts his/her Guardog key in a USB port or activates the Guardog Smartphone app in conjunction with his/her computer browser. This sets in motion a 16-step Cothentication process: the user authenticates himself/herself to the service provider and the service provider authenticates itself to the user...all within milliseconds. On step 14, Guardog "opens a gate" between the user and the service provider. The gate stays open through step 15, then closes on step 16...no time for a would-be intruder to get in.
  • 25. Once Guardog Cothentication is complete... Only when these 16 authentication steps are complete does Guardog ā€œopen a gateā€ or ā€œopen a windowā€ between the user and the service provider, for the communication or transaction itself. Within a session, whenever the user makes a new request, these steps are repeated. Once they are completed, Guardog opens another gate or window, for this new communication or transaction.
  • 26. Guardog visualized. Imagine you are standing in front of a huge blank wall. All of a sudden a window opens somewhere in the wall and an anonymous message passes through in a split second. Then the window disappears. Then another window opens up in a totally different spot - and disappears. It is never clear if and where another window will open. Thatā€™s how Guardog works. The message transfer cannot be spoofed, predicted or duplicated because it is random, encrypted and dynamic. This is Nuclear Launch Code Security.
  • 30. Competitive Analysis. 1. YubiKey 2. Safelock 3. Ironkey 4. iCloud Keychain 5. Smartcards 6. Public key/private key
  • 31. Comparison. Competitors Guardog Strong password ļƒ¼ Non-transferable Dynamic Credential 2 Factor Authentication (RSA) ļƒ¼ Continuous Mutual Authentication Out of Band Verification (email, SMS) ļƒ¼ Destination-aware Secure Messaging SSL and transparent encryption (AES) ļƒ¼ Authenticated Encryption/Decryption Encryption Key protected by password ļƒ¼ Encryption key protected by server and client side keys END RESULTS Identity fraud reduction ļƒ¼ Prevents identity fraud Increased barrier of attacks ļƒ¼ Eliminates an entire category of threats ļƒ¼ Mitigates the risk of impersonations ļƒ¼ Provides physical control over digital xxxassets ļƒ¼ Protects 100% of user accounts
  • 32. Guardog API supports: Operating System: Windows Server 2008, 2008 R2, 2013, Linux Web Servers: Apache, IIS etc. Database MySQL, MSSQL etc. Network Protocols: TCP, HTTP, HTTPS Development Languages: PHP, Asp.net, C/C++, Java
  • 33. In summary: The old authentication versus the new authentication :
  • 34. The existing Cybersecurity model: ļ»æShe sat down at her computer and inserted her username and password into her browser. Authenticated. She instructed her bank to move $150.00 from her checking to her savings account. She also sent a wire transfer to her sister in California. She paid the bill for her American Express card and instructed the bank to notify her of any payments over $200 as an additional security measure.
  • 35. Guardogā€™s Cybersecurity model: ļ»æļ»æShe sat down at her computer and inserted Guardogā€™s patented Guardog thumbdrive. She opened the browser for her bank Cothenticated and Cothenticated instructed her bank to move $150.00 from her checking Cothenticated to her savings account. Cothenticated She also sent a wire transfer Cothenticated to her sister in California. Cothenticated She paid the bill for her American Express card Cothenticated and instructed the bank to notify her Cothenticated of any payments over $200 as an additional security measure. Cothenticated
  • 36. Protection of Intellectual Property. Guardog technology is patented in the USA, Canada, China, Japan, Australia and New Zealand.
  • 37. In conclusion. ļ»æļ»æCybersecurity has been solved. The perpetual motion machine and cold fusion are next on our list. Thank you.