SlideShare a Scribd company logo
1 of 52
Download to read offline
H o l ist i c
Security
Peter Cochrane
cochrane.org.uk
University of Singapore
17 November 2017
what we know for sure
Attacks are escalating
The Dark Side is winning
The attack surface is increasing
Cyber disruption costs are growing
Companies do not collaborate and share
The attackers operate an open market
All our security tools are reactive
Attacker rewards are on the up
People are the biggest risk
There are no silver bullets
It is time to rethink our strategy and solution space
More of the same but
better & faster will not
change the game…
…we have to think anew
-get out of the box
and do something very
different !
C Y B E R w a r f a r e
A new and really big game changer
“The American Military can no longer
protect the nation”
C Y B E R w a r f a r e C O S T
Published numbers vary widely - all we can say is
the cost is big and getting bigger year on year
Top 10 economies only
C Y B E R w a r f a r e C O S T
Published numbers vary widely - all we can say is
the cost is big and getting bigger year on year
Top 10 economies only
All Nations are
Paying a price
T H E B I G P I C T U R E
Cyber security is no longer contained
The Dark Side are winning because
they are 100% committed and see
this war as total; a much wider
conflict than CYBER alone…
They are far more integrated and
sharing - than we are and operate
as a virtualised workforce driven
by money and evil intent…
We do not anticipate their innovation,
tactics, tools, attacks, and we don’t think
as they do…we are always on the back foot!
We need to:
Scale & Complexity
Beyond human abilities across too many fronts
Physical AND&&Cyber
are integrateD
R e l at i o ns h i pS
Criminals
T h e D a r k S i d e o f T h e F o rc e !
Rogue
States
Hackers
Politicos
Terrorists
responsibility
People have no security abilities
And why should they ?
It is not their problem !
They are just users and
victims of very poor
design and a lack
of support
Industry needs to step up to the
plate; take control; automate &
deliver turnkey solutions.
They sold the products
and services: and
should ensure all
operate safely &
problem free!
Dominated by
Government
Forces
Government, Military, Industry,
White Hats, General Population
Warfare continues to rapidly evolve,
and is now total, embracing: Politics
Media, Infrastructure, Institutions,
Financial Systems, Intel Agencies,
Industry, Banks,
Government, Homes,
Appliances, Health Care,
Emergency Services, Defence,
Military, Transportation Systems,
Farming, Food Production, Logistics,
Networks, Devices, Hardware,
Hardware, Software…+++
theatres of war
No longer a sole military preserve
AIR
SEA
LAND
SPACE
CYBERCYBER
CYBER EMBRACE
All peoples & all things in the loop
Autonomous Entities
Intelligences
Computers
Networks
Electronic
Electrical
Mechanical
Mankind
Population
ManandMan/MachineMadeThings
Humans Are The
Minor Players
Cyber is now a part of everything we do and
own; what we are - and there are now far
more machines than people
AT T A C K S U R F A C E
We a re c o m p o u n d i n g o u r p ro b l e m s
I N T E R N E T
M O B I L I T Y
I O T
A n d , M O R E :
U s e r s
Devices
S e r v i c e s
M o b i l i t y
Networks
B r o a d c a s t
Social Nets
C o m p l e x i t y
e C o m m e rc e
A p p l i c a t i o n s
Transactions
C o n n e c t i v i t y
O p e n A c c e s s
D i g i t a l i s a t i o n
I n f r a s t r u c t u r e
G ro w i n g Re w a rd s
++++
The tar get is growing!
W H O A R E T H EY
And their primary occupation ?
Possible
Recruit
Terrorist
Trainee
CIA Agent
Rogue
Gov Spy
Black Hat
Terrorist
Criminal
Terrorist
Recruitor
White Hat
Hacker
Police
Security
Agent
CEO/CIO
Social
Engineer
Cyber
Bully Malware
Breeder
Security
Consultant
W H O A R E T H EY
And their primary occupation ?
Possible
Recruit
Terrorist
Trainee
CIA Agent
Rogue
Gov Spy
Black Hat
Terrorist
Criminal
Terrorist
Recruitor
White Hat
Hacker
Police
Security
Agent
CEO/CIO
Social
Engineer
Cyber
Bully Malware
Breeder
Security
Consultantpeople are not just bad
and good in one domain
their habitualities are
permiate all domains
WHAT ARE THEIR DEVICES
communicating / hiding
To whom and what are
they communicating
W h at i s t h i s ?
A DDoS attack, or something more
Main Event ?
Decoy ?
Masking ?
Diversion ?
Tunnel set up ?
Infiltration ?
Intel Ops ?
Implant ?
Theft ?
Tests ?
+++
AXIOMATIC
Machines dominate
Number of Machines >> Number of People
They are by far the biggest communicators
Their sensory capabilities growing
Their intelligence is growing
T h e y a re a p a r t o f u s
We are a part of them
We enjoy an irreversible mutual dependency
“I think we can safely assume that they are collecting
vast amounts of data and information…and we do not
understand the significance of most of it”
AXIOMATIC
P r o b l e m s o l v i n g
“Our biggets and most complex cyber
security problems cannot be solved by
analogue methods, and that almost
certainly includes the human mind”
AXIOMATIC
P r o b l e m s o l v i n g
“Our biggets and most complex cyber
security problems cannot be solved by
analogue methods, and that almost
certainly includes the human mind”
A
AI AND Machine Help
has become vital
NEEDLE IN A NEEDLE STACK
A multi-tool challenge
People Surveillance
Communications
Employments
Associations
Individuals
Purchases
Networks
Habits
Social
Travel
Work
+++
Device/s Surveillance
Other Device Connect
Net Node Connect
Social Networks
eAssociations
eConnections
ePurchases
Locations
Habits
Travel
eMail
TXTs
Calls
Web
+++
A
Habits+Activities
GIVE VITAL CLUES
W HAT W E NOW NEED ?
An essentials shopping list is reasonably short
Global monitoring and shared situational awareness
Cooperative environments on attacks and solutions
Universal sharing of identified attacks/developments
Address cloaking & decoy customer sites/net nodes
Behavioural analysis of networks, devices, people
To continue and expand all established efforts
Auto-Immunity for all devices including IoT
Secure wireless channels - invisible signals
L ets e x aM I N E T H R E E
The grey items have been addressed elsewhere
Global monitoring and shared situational awareness
Cooperative environments on attacks and solutions
Universal sharing of identified attacks/developments
Address cloaking & decoy customer sites/net nodes
Behavioural analysis of networks, devices, people
To continue and expand all established efforts
Auto-Immunity for all devices including IoT
Secure wireless channels - invisible signals
Sociology of things
The sociology of things is not
understood and has yet to be
studied- and it is digital!
Relationships
The keys to the security kingdom
and behaviors
b e h a v i o u r a l a n a lys i s
People, devices, networks, components, things are habitual
Habituality identifies us
Any deviation indicates some form of change
b e h a v i o u r a l a n a lys i s
Network data shows a marked increase in activity
222120191817161514131210987654
Attack generated data
Normal data
Auto-immunity
Mirrors biological forebears
Applied everywhere 24 x 7
ICs
ISPs
WiFi
Hubs
LANs
Cards
Traffic
Servers
Circuits
Devices
Internet
Networks
Organisations
Companies
Platforms
Groups
People
Mobile
Fixed
Broadcasting
Malware
Responding
with updated
protection Wider
Network
Updated
Latest
Solution
Update
Dynamic isolation of infected
devices and components
leading to repairA mix of clean and infected
Auto-immunity
A Multiplicity of channels
Attack detection/exposure/thwarting using access diversity
BlueTooth
Short Range
Device to Cloud
Device to Device
WiFi, WiMax
Medium Range
WLAN/Cloud
Integrated and intelligent
security systems embedded
into all products and components
ZigBe/Other ??
Car-to-Car Direct
Communications
Defence opportunities in channel/device/system diversity
A wide plurality of channel detection and protection
Attacks almost never isolated or single sourced
Not restricted to single channel/attempt
Secure attack and infection isolation
Diverse immunity/support access
Distributed info sharing
GEO info location
3, 4, 5 G
Long Range
Device to Net
Device to Cloud
SatCom
Broadcast
A uto - i m m u n ity
F i g h t i n g f i r e w i t h f i r e
Infinite IoT WirElesS
Sans channels, bands & regulation
“ T h e r e i s n o b a n d w i d t h c r i s i s , a n
adherence to the past, limited thinking,
bad design and engineering….we have to
rethink the day and not be constrained by
the past”
Where it all started
Fork lift radio - analogue - long distances - lots of power
CW, AM, FM, SSB+++
P2P Fixed, Broadcast+++
LW, MW, SW, VHF, UHF+++
Terrestrial, Maritime, Airborne+++
~30Bn fixed and mobile
broadcast radio & TV receivers
dominate followed by simplex
voice transceivers
Big cells and n x1000s of towers
Fast forward
~7Bn live devices on 3/4G
connected to a global net of
duplex voice & data comms
• Digital modes only
• Personal mixed use and traffic
• Static base stations dominate
• Terrestrial concentration
• Large cells <20km
Does everything, but badly
THE BIG FIX ?
5g
• Replaces optical fibre
• Outguns 3 & 4G
• Gbit/s everywhere
• Will dominate the IoT
• +++++
• Cooks a chicken
• Improves your sex life….
Observations
It is a miracle it all works
Protocols very inefficient
We avoid interference by dynamic juggling!
The spectrum shortage is an illusion
We seldom use more than 20% of the available space
5G unlikely to be a big player
It cannot fully service the IoT
We need more than incrementalism
More bands, channels, modulation and coding schemes are not enough
n e w d i r e c t i o n S
From connected people to connected things
People
~10Bns
Traffic
~1 Bn
Goods
~100Bns
Components
~1 Tn IoT
E n e r g y l i m i t a t i o n S
We cannot realise such a future using our current approach
Internet and connected devices ~ 10% of all energy generated
What would 50, 250 or 1000Bn IoT devices demand ?
We have to get down from mW to µW, nW and pW
This demands ‘simplicity’ of processing and communications
N e w M o d e s
More things linking off net than on
Most THINGS will never connect to the internet
THINGS will want to network and connect with other THINGS
The IoT is entirely evolutionary and not just revolutionary
New sporadic networks and associations will occur
one size fits all - not!
We are going to need a multiplicity of technologies
Cost Per Unit ~ 0 - 20 £, $, €
Size of Units ~ 1 - 50 mm3
Power Used ~ pW - mW
Single Chips Rule
C o n t i n u e t W e a k i n g ?
This heritage/thinking cannot possible get us there
The Illusion of scarcity
Why do we do this - it is largely legacy thinking
The Illusion of scarcity
Why do we do this - it is largely legacy thinking
Actually the
spectrum
is m
ostly unused!
A dense london location
~50k WiFi nodes within a 1km radius of Liverpool St
New Opportunities
High loss is a short distance/reuse +++
God Given Spatial Filters
Status Quo
Leave well
alone
New Territory
and new
opportunities
Continues untouched
All modulation
schemes from
the past +new
New modulation
schemes & modes
including hyper
Direct Sequence
Spread Spectrum
The Illusion of scarcity
Why do we do this - it is largely legacy thinking
far too complex & expensive
Unfit for the IoT purpose - especially at 30 - 300 GHz
N e w O p p o rt u n i t i es
High loss ideal for short distance/reuse +++
Direct Sequence
Spread Spectrum
HYPER
Direct Sequence
Spread Spectrum
S/N dB
BW Hz
Duration
T seconds
Volumetric representation of S/N, BW and Time
Claude Shannon 1945/46
I = B.T log2(1 + k.S/N)
I ~ B.T.K.S/NdB
vv
Back to basics
k.S/N >> 1
The same information transmitted in 3
different modes exploiting S/N, BW and T
S/N dB
BW Hz
Duration
T seconds
degrees of freedom
S/N dB
BW Hz
Duration
T seconds
In the Extreme
‘Waste Bandwidth’ to push the Signal Below the Noise
Filters
Coding
Modulation
Timing Recovery
Amplifiers & Mixers
Jitter
Phase Noise
Doppler Shift
Frequency Stability
Multi-Path Propagation
Negated
BW ~ 500MHz
All digital no analogue elements - mixers, amplifies, filters
UWB ON AFTERBURNERS
From UWB
To HWB Hyper Wide Band
BW ~ 50GHz
SIGNAL CODING/Error Correction => Bit Counting/Averaging
1bit/Hz
0.01bit/Hz
Antennas spanning huge
frequency ranges are a non-
trivial problem…and whilst
fractal antennas are seen to
be (theoretically) the holy grail,
no one has yet succeeded in
realising fully workable designs
Challenge
For the usa army
The cyber war HAS
becomE Just war
Thank You
www.cochrane.org.uk

More Related Content

More from University of Hertfordshire

ICTON 2020 KeyNote: Evolving Network Security & Resilience
ICTON 2020 KeyNote:  Evolving Network Security & ResilienceICTON 2020 KeyNote:  Evolving Network Security & Resilience
ICTON 2020 KeyNote: Evolving Network Security & ResilienceUniversity of Hertfordshire
 

More from University of Hertfordshire (20)

Society 5.0: A Vital Symbiosis
Society 5.0: A Vital SymbiosisSociety 5.0: A Vital Symbiosis
Society 5.0: A Vital Symbiosis
 
Cyber Portents and Precursors
Cyber Portents and PrecursorsCyber Portents and Precursors
Cyber Portents and Precursors
 
Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?
 
THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS
 
Quantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence MathematicallyQuantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence Mathematically
 
Technologies That Will Change Everything
Technologies That Will Change EverythingTechnologies That Will Change Everything
Technologies That Will Change Everything
 
Cyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The EnemyCyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The Enemy
 
Society 5.0 Redefined
Society 5.0 RedefinedSociety 5.0 Redefined
Society 5.0 Redefined
 
The Future WorkScape
The Future WorkScapeThe Future WorkScape
The Future WorkScape
 
Engineering Reliability and Resilience
Engineering Reliability and ResilienceEngineering Reliability and Resilience
Engineering Reliability and Resilience
 
Smart Materials and Structures
Smart Materials and StructuresSmart Materials and Structures
Smart Materials and Structures
 
TRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESSTRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESS
 
The Scientific Method
The Scientific MethodThe Scientific Method
The Scientific Method
 
Its My Data Not Yours!
Its My Data Not Yours!Its My Data Not Yours!
Its My Data Not Yours!
 
Cyber Security - Becoming Evil
Cyber Security - Becoming EvilCyber Security - Becoming Evil
Cyber Security - Becoming Evil
 
Wireless Past Present Future
Wireless Past Present FutureWireless Past Present Future
Wireless Past Present Future
 
QUANTUM COMPUTING REALITY CHECK
QUANTUM COMPUTING REALITY CHECKQUANTUM COMPUTING REALITY CHECK
QUANTUM COMPUTING REALITY CHECK
 
Cyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile WorldCyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile World
 
MSP Automation - Application and Execution
MSP Automation - Application and ExecutionMSP Automation - Application and Execution
MSP Automation - Application and Execution
 
ICTON 2020 KeyNote: Evolving Network Security & Resilience
ICTON 2020 KeyNote:  Evolving Network Security & ResilienceICTON 2020 KeyNote:  Evolving Network Security & Resilience
ICTON 2020 KeyNote: Evolving Network Security & Resilience
 

Recently uploaded

Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Holistic security

  • 1. H o l ist i c Security Peter Cochrane cochrane.org.uk University of Singapore 17 November 2017
  • 2. what we know for sure Attacks are escalating The Dark Side is winning The attack surface is increasing Cyber disruption costs are growing Companies do not collaborate and share The attackers operate an open market All our security tools are reactive Attacker rewards are on the up People are the biggest risk There are no silver bullets It is time to rethink our strategy and solution space More of the same but better & faster will not change the game… …we have to think anew -get out of the box and do something very different !
  • 3. C Y B E R w a r f a r e A new and really big game changer “The American Military can no longer protect the nation”
  • 4. C Y B E R w a r f a r e C O S T Published numbers vary widely - all we can say is the cost is big and getting bigger year on year Top 10 economies only
  • 5. C Y B E R w a r f a r e C O S T Published numbers vary widely - all we can say is the cost is big and getting bigger year on year Top 10 economies only All Nations are Paying a price
  • 6. T H E B I G P I C T U R E Cyber security is no longer contained The Dark Side are winning because they are 100% committed and see this war as total; a much wider conflict than CYBER alone… They are far more integrated and sharing - than we are and operate as a virtualised workforce driven by money and evil intent… We do not anticipate their innovation, tactics, tools, attacks, and we don’t think as they do…we are always on the back foot! We need to:
  • 7. Scale & Complexity Beyond human abilities across too many fronts Physical AND&&Cyber are integrateD
  • 8. R e l at i o ns h i pS Criminals T h e D a r k S i d e o f T h e F o rc e ! Rogue States Hackers Politicos Terrorists
  • 9. responsibility People have no security abilities And why should they ? It is not their problem ! They are just users and victims of very poor design and a lack of support Industry needs to step up to the plate; take control; automate & deliver turnkey solutions. They sold the products and services: and should ensure all operate safely & problem free!
  • 10. Dominated by Government Forces Government, Military, Industry, White Hats, General Population Warfare continues to rapidly evolve, and is now total, embracing: Politics Media, Infrastructure, Institutions, Financial Systems, Intel Agencies, Industry, Banks, Government, Homes, Appliances, Health Care, Emergency Services, Defence, Military, Transportation Systems, Farming, Food Production, Logistics, Networks, Devices, Hardware, Hardware, Software…+++ theatres of war No longer a sole military preserve AIR SEA LAND SPACE CYBERCYBER
  • 11. CYBER EMBRACE All peoples & all things in the loop Autonomous Entities Intelligences Computers Networks Electronic Electrical Mechanical Mankind Population ManandMan/MachineMadeThings Humans Are The Minor Players Cyber is now a part of everything we do and own; what we are - and there are now far more machines than people
  • 12. AT T A C K S U R F A C E We a re c o m p o u n d i n g o u r p ro b l e m s I N T E R N E T M O B I L I T Y I O T A n d , M O R E : U s e r s Devices S e r v i c e s M o b i l i t y Networks B r o a d c a s t Social Nets C o m p l e x i t y e C o m m e rc e A p p l i c a t i o n s Transactions C o n n e c t i v i t y O p e n A c c e s s D i g i t a l i s a t i o n I n f r a s t r u c t u r e G ro w i n g Re w a rd s ++++ The tar get is growing!
  • 13. W H O A R E T H EY And their primary occupation ? Possible Recruit Terrorist Trainee CIA Agent Rogue Gov Spy Black Hat Terrorist Criminal Terrorist Recruitor White Hat Hacker Police Security Agent CEO/CIO Social Engineer Cyber Bully Malware Breeder Security Consultant
  • 14. W H O A R E T H EY And their primary occupation ? Possible Recruit Terrorist Trainee CIA Agent Rogue Gov Spy Black Hat Terrorist Criminal Terrorist Recruitor White Hat Hacker Police Security Agent CEO/CIO Social Engineer Cyber Bully Malware Breeder Security Consultantpeople are not just bad and good in one domain their habitualities are permiate all domains WHAT ARE THEIR DEVICES communicating / hiding To whom and what are they communicating
  • 15.
  • 16.
  • 17. W h at i s t h i s ? A DDoS attack, or something more Main Event ? Decoy ? Masking ? Diversion ? Tunnel set up ? Infiltration ? Intel Ops ? Implant ? Theft ? Tests ? +++
  • 18. AXIOMATIC Machines dominate Number of Machines >> Number of People They are by far the biggest communicators Their sensory capabilities growing Their intelligence is growing T h e y a re a p a r t o f u s We are a part of them We enjoy an irreversible mutual dependency “I think we can safely assume that they are collecting vast amounts of data and information…and we do not understand the significance of most of it”
  • 19. AXIOMATIC P r o b l e m s o l v i n g “Our biggets and most complex cyber security problems cannot be solved by analogue methods, and that almost certainly includes the human mind”
  • 20. AXIOMATIC P r o b l e m s o l v i n g “Our biggets and most complex cyber security problems cannot be solved by analogue methods, and that almost certainly includes the human mind” A AI AND Machine Help has become vital
  • 21. NEEDLE IN A NEEDLE STACK A multi-tool challenge People Surveillance Communications Employments Associations Individuals Purchases Networks Habits Social Travel Work +++ Device/s Surveillance Other Device Connect Net Node Connect Social Networks eAssociations eConnections ePurchases Locations Habits Travel eMail TXTs Calls Web +++ A Habits+Activities GIVE VITAL CLUES
  • 22. W HAT W E NOW NEED ? An essentials shopping list is reasonably short Global monitoring and shared situational awareness Cooperative environments on attacks and solutions Universal sharing of identified attacks/developments Address cloaking & decoy customer sites/net nodes Behavioural analysis of networks, devices, people To continue and expand all established efforts Auto-Immunity for all devices including IoT Secure wireless channels - invisible signals
  • 23. L ets e x aM I N E T H R E E The grey items have been addressed elsewhere Global monitoring and shared situational awareness Cooperative environments on attacks and solutions Universal sharing of identified attacks/developments Address cloaking & decoy customer sites/net nodes Behavioural analysis of networks, devices, people To continue and expand all established efforts Auto-Immunity for all devices including IoT Secure wireless channels - invisible signals
  • 24. Sociology of things The sociology of things is not understood and has yet to be studied- and it is digital! Relationships The keys to the security kingdom and behaviors
  • 25. b e h a v i o u r a l a n a lys i s People, devices, networks, components, things are habitual Habituality identifies us Any deviation indicates some form of change
  • 26. b e h a v i o u r a l a n a lys i s Network data shows a marked increase in activity 222120191817161514131210987654 Attack generated data Normal data
  • 27. Auto-immunity Mirrors biological forebears Applied everywhere 24 x 7 ICs ISPs WiFi Hubs LANs Cards Traffic Servers Circuits Devices Internet Networks Organisations Companies Platforms Groups People Mobile Fixed
  • 28. Broadcasting Malware Responding with updated protection Wider Network Updated Latest Solution Update Dynamic isolation of infected devices and components leading to repairA mix of clean and infected Auto-immunity
  • 29. A Multiplicity of channels Attack detection/exposure/thwarting using access diversity BlueTooth Short Range Device to Cloud Device to Device WiFi, WiMax Medium Range WLAN/Cloud Integrated and intelligent security systems embedded into all products and components ZigBe/Other ?? Car-to-Car Direct Communications Defence opportunities in channel/device/system diversity A wide plurality of channel detection and protection Attacks almost never isolated or single sourced Not restricted to single channel/attempt Secure attack and infection isolation Diverse immunity/support access Distributed info sharing GEO info location 3, 4, 5 G Long Range Device to Net Device to Cloud SatCom Broadcast
  • 30. A uto - i m m u n ity F i g h t i n g f i r e w i t h f i r e
  • 31. Infinite IoT WirElesS Sans channels, bands & regulation “ T h e r e i s n o b a n d w i d t h c r i s i s , a n adherence to the past, limited thinking, bad design and engineering….we have to rethink the day and not be constrained by the past”
  • 32. Where it all started Fork lift radio - analogue - long distances - lots of power CW, AM, FM, SSB+++ P2P Fixed, Broadcast+++ LW, MW, SW, VHF, UHF+++ Terrestrial, Maritime, Airborne+++ ~30Bn fixed and mobile broadcast radio & TV receivers dominate followed by simplex voice transceivers
  • 33. Big cells and n x1000s of towers Fast forward ~7Bn live devices on 3/4G connected to a global net of duplex voice & data comms • Digital modes only • Personal mixed use and traffic • Static base stations dominate • Terrestrial concentration • Large cells <20km
  • 34. Does everything, but badly THE BIG FIX ? 5g • Replaces optical fibre • Outguns 3 & 4G • Gbit/s everywhere • Will dominate the IoT • +++++ • Cooks a chicken • Improves your sex life….
  • 35. Observations It is a miracle it all works Protocols very inefficient We avoid interference by dynamic juggling! The spectrum shortage is an illusion We seldom use more than 20% of the available space 5G unlikely to be a big player It cannot fully service the IoT We need more than incrementalism More bands, channels, modulation and coding schemes are not enough
  • 36. n e w d i r e c t i o n S From connected people to connected things People ~10Bns Traffic ~1 Bn Goods ~100Bns Components ~1 Tn IoT
  • 37. E n e r g y l i m i t a t i o n S We cannot realise such a future using our current approach Internet and connected devices ~ 10% of all energy generated What would 50, 250 or 1000Bn IoT devices demand ? We have to get down from mW to µW, nW and pW This demands ‘simplicity’ of processing and communications
  • 38. N e w M o d e s More things linking off net than on Most THINGS will never connect to the internet THINGS will want to network and connect with other THINGS The IoT is entirely evolutionary and not just revolutionary New sporadic networks and associations will occur
  • 39. one size fits all - not! We are going to need a multiplicity of technologies Cost Per Unit ~ 0 - 20 £, $, € Size of Units ~ 1 - 50 mm3 Power Used ~ pW - mW Single Chips Rule
  • 40. C o n t i n u e t W e a k i n g ? This heritage/thinking cannot possible get us there
  • 41. The Illusion of scarcity Why do we do this - it is largely legacy thinking
  • 42. The Illusion of scarcity Why do we do this - it is largely legacy thinking Actually the spectrum is m ostly unused!
  • 43. A dense london location ~50k WiFi nodes within a 1km radius of Liverpool St
  • 44. New Opportunities High loss is a short distance/reuse +++ God Given Spatial Filters Status Quo Leave well alone New Territory and new opportunities Continues untouched All modulation schemes from the past +new New modulation schemes & modes including hyper Direct Sequence Spread Spectrum
  • 45. The Illusion of scarcity Why do we do this - it is largely legacy thinking far too complex & expensive Unfit for the IoT purpose - especially at 30 - 300 GHz
  • 46. N e w O p p o rt u n i t i es High loss ideal for short distance/reuse +++ Direct Sequence Spread Spectrum HYPER Direct Sequence Spread Spectrum
  • 47. S/N dB BW Hz Duration T seconds Volumetric representation of S/N, BW and Time Claude Shannon 1945/46 I = B.T log2(1 + k.S/N) I ~ B.T.K.S/NdB vv Back to basics k.S/N >> 1
  • 48. The same information transmitted in 3 different modes exploiting S/N, BW and T S/N dB BW Hz Duration T seconds degrees of freedom
  • 49. S/N dB BW Hz Duration T seconds In the Extreme ‘Waste Bandwidth’ to push the Signal Below the Noise Filters Coding Modulation Timing Recovery Amplifiers & Mixers Jitter Phase Noise Doppler Shift Frequency Stability Multi-Path Propagation Negated
  • 50. BW ~ 500MHz All digital no analogue elements - mixers, amplifies, filters UWB ON AFTERBURNERS From UWB To HWB Hyper Wide Band BW ~ 50GHz SIGNAL CODING/Error Correction => Bit Counting/Averaging 1bit/Hz 0.01bit/Hz
  • 51. Antennas spanning huge frequency ranges are a non- trivial problem…and whilst fractal antennas are seen to be (theoretically) the holy grail, no one has yet succeeded in realising fully workable designs Challenge
  • 52. For the usa army The cyber war HAS becomE Just war Thank You www.cochrane.org.uk