SWAMI Threats, vulnerabilities & safeguards in a World of Ambient Intelligence David Wright Trilateral Research & Consulting 21 March 2006.

Slides:



Advertisements
Similar presentations
E-ID: are you (proven) in control? INFORMATION RISK MANAGEMENT DENNIS VAN HAM.
Advertisements

4 Information Security.
Ethics, Privacy and Information Security
Security Vulnerabilities and Conflicts of Interest in the Provider-Clearinghouse*-Payer Model Andy Podgurski and Bret Kiraly EECS Department & Sharona.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Mr C Johnston ICT Teacher
Ch.5 It Security, Crime, Compliance, and Continuity
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Lecture 10 Security and Control.
1 An Overview of Computer Security computer security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
CYBER CRIME AND SECURITY TRENDS
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
TRACs Security Awareness FY2009 Office of Information Technology Security 1.
Author: Andy Reedftp://topsurf.co.uk/reed FdSc IT/Computer Networking & IT(e-commerce) Communications Network Management An Introduction to Security.
Securing Information Systems
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Storage Security and Management: Security Framework
7.1 © 2007 by Prentice Hall 10 Chapter Securing Information Systems.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Lessons Learned in Smart Grid Cyber Security
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
C8- Securing Information Systems
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Information Warfare Playgrounds to Battlegrounds.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
IS Network and Telecommunications Risks Chapter Six.
ACM 511 Introduction to Computer Networks. Computer Networks.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Future ICT Landscapes – Security and Privacy Challenges & Requirements Simone Fischer-Hübner IVA Workshop, Stockholm 24th May 2012.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Information Warfare Playgrounds to Battlegrounds.
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Cyber Security : Indian perspective. 22 Internet Infrastructure in INDIA.
Information Systems Week 7 Securing Information Systems.
THE NEED FOR NETWORK SECURITY Hunar & Nawzad & Kovan & Abdulla & Aram.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Information Management System Ali Saeed Khan 29 th April, 2016.
Securing Information Systems
Securing Information Systems
Cyber Security Zafar Sadik
ISSeG Integrated Site Security for Grids WP2 - Methodology
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Business Risks of Insecure Networks
Securing Information Systems
Securing Information Systems
– Communication Technology in a Changing World
Securing Information Systems
– Communication Technology in a Changing World
Presentation transcript:

SWAMI Threats, vulnerabilities & safeguards in a World of Ambient Intelligence David Wright Trilateral Research & Consulting 21 March 2006

SWAMI PrivacyIdentitySecurityTrust Digital divide

SWAMI goal Identify research & policy options re safeguards & privacy-enhancing mechanisms needed to ensure user control, acceptance and enforceability of policy with equal rights & opportunities for citizens

Privacy threats & vulnerabilities - 1  Hackers & malware  Function creep  Security & surveillance  Profiling  Sharing of data between companies & government  Lack of public awareness about privacy rights  Lack of enforcement & oversight  Erosion of rights & values  Uncertainties about what to protect & costs

Privacy threats & vulnerabilities - 2  Uncertainties about the economic costs of privacy erosion  Lax security  Government and industry are less than forthright

Identity threats & vulnerabilities - 1  Identity theft  Function creep  Exploitation of linkages by industry & government  Penetration of identity management systems (hacking, spoofing, denial of service, etc)  Authentication may intrude upon privacy  Complexity of identity management systems

Identity threats & vulnerabilities - 2  Failures in identity management & authentication systems  Inadequate protection of cyber identity  Misplaced trust in security mechanisms

Security threats Attackers - viruses, worms, Trojans, phishing, denial of service attacks Attackers – criminals, terrorists, government, industry

Security vulnerabilities System complexity, unexpected behaviour, not sufficiently reliable, generating false positives, insider attacks (authorised, but dishonest employee) Individuals are careless, lose their mobiles, forget to use security measures, are easily tricked Organisations don’t take adequate security measures, don’t know what to protect, don’t keep software up to date, have cost issues

Undermining trust - 1  Lack of trust in underlying cyber infrastructure and other people  Identity theft  Resourcefulness of hackers & intruders  Inadequate profiling (attribution conflicts & misinterpretation of user needs)

Undermining trust - 2  Loss of control –Technology paternalism (machines know best) –Unpredictable system behaviour –Hijacking of an AmI system  Service denial & discrimination  Victimisation

The digital divide could grow wider because of  technological & user dependencies  insufficient interoperability  cost  isolation  AmI “technosis”  stress  exclusion & discrimination – unequal access & stigmatisation

Safeguards A multiplicity of threats & vulnerabilities require a multiplicity of safeguards TechnologicalSocio-economic Legal & regulatory

Technological safeguards - 1 Main privacy-protecting principles in network applications:  Anonymity  Pseudonymity  Unlinkability  Unobservability

Technological safeguards - 2  Minimal data collection, transmission & storage  Active intrusion prevention – e.g., antivirus software  Passive intrusion prevention - encryption  Prove user authorisation locally, transmit only confirmation of authorisation  Hide relations between user identity & actions  Communications protocols that hide device ID  Limiting signal range

Technological safeguards - 3 Access control ISO – good but focuses on organisational security In AmI world access control will be needed in the wider, embedded world Unobtrusive, continuous, multimodal authentication Context-dependent access control Embedding legal requirements & personal user wishes Problem of authorised, but dishonest person Artificial intelligence to catch unusual patterns

Socio-economic safeguards Open standards Codes of practice Service contracts Trust marks Privacy audits Education Public awareness & media attention

Actions by the EC & Member States  Accessibility & inclusion  Accountability, audits, international collaboration, enforcement  Research proposals to identify potential privacy impacts  Guidelines for ICT research  Public procurement  Developing the legal framework to take AmI into account