CYBER SECURITY & 3rd MILLENNIUM CYBER PARADIGM Prof. Eduard Babulak D.Sc., Ph.D., MSc, C.Eng., CITP Panelist Consultant Expert in Cyber Security & Computing US National Science Foundation & EU Horizon 2020 E-mail:
[email protected] ORCID: http://orcid.org/0000-0003-2450-090X LINKEDIN: https://www.linkedin.com/in/babulak RESEARCHGATE: https://www.researchgate.net/profile/Eduard_Babulak
https://www.e-zigurat.com/digital/
Agenda • •
Introduction Journey to 3rd Millennium Cyber Paradigm – 19th Century Industrial Revolution – 20th Century Technology – 21st Century Cyber • • • •
•
21st Century Computing Industry • • •
•
Smart Analytic Humanoid
– Computing Industry Trends Cyber Security – What-Where-Why & How •
•
Ubiquity Future Web COPE Internet Traffic Trends
7 Cyber scenarios to keep you awake at night
– Possible Risks Conclusions & Recommendations – –
Smart World (Health * Transport) Questions & Answers
Source: Cyber Industry (Google images) 2
JOURNEY TO THE 3RD MILLENIUM CYBER PARADIGM
19TH CENTURY INDUSTRIAL REVOLUTION • • • •
Manufacturing Industry Car Industry & Electricity Jobs & Urbanization Pollution
Source: 19th Century Technology (Google images) The Factory Age: https://www.youtube.com/watch?v=Vo2oLQl2NbM&list=PLB3B453DE4BC630BE&index=2 Industrial Revolution Overview: http://www.youtube.com/watch?v=d4joqYycnqM
4
19TH & 20TH CENTURY TECHNOLOGY KEYWORDS Physics & Math Electricity Mores Code Telephone Locomotive - Car Industry World’s Economic Crisis Electronics & Transistor Telephone Radio TVs Electric Drives Controlled Systems Microprocessor PC Computer Aided Engineering Internet Web 5
WIRELESS MARKET EVOLUTION CELLULAR Today
Today
3.9G/ OFDM 3G 2.5G/ 2.75G
2G 1G
Digital Cellular
Analog Cellular
Voice AMPS, TACS
Voice Pager 10kbps data GSM, TDMA CDMAOne
Wide-Band Digital Cellular
Digital Cellular
Voice Email Photos Web ~100kbps data GPRS/EDGE CDMA 2000 1X 6
Credit: Dr. Rick Wietfeldt Texas Instruments
Wide-Band Digital Cellular
Video M-pixel cam. 3D 300kbps 14Mbps UMTS, WCDMA, HSDPA CDMA 1X EVDO
Video High-end gaming 100 Mbps, 10msec Flexible bandwidth Super 3G HSOPA MC-CDMA
Today
5G
4G Wide-Band Network
Ubiquitous data Flexible Spectrum use Enhanced apps. 100Mbps – 1Gbps
http://standards.ieee.org/wireless/ http://www.wireless.com/
6
COMMUNICATION IS THE ECONOMY
Because communications – which in the end is what the digital technology and media are all about – is not just a sector of the economy. Communications is the economy. The new economy is about communications, deep and wide. ……………………………………………. Kevin Kelly in “New Rules for the New Economy”
7
INFORMATION AGE
8
MEDIA CONVERGENCE
Registrational
Personalization Me TV
Home Banking
Cyber Wallet
Home Shopping
ID Card
Mobility
Mobile Phone Hand-held PC
New Convergence Network
Interactivity
Conversational E-mail IM
LBS
i-Content
ContextAwareness
Broadband
Game Quiz
Conferencing Target Marketing
Transmissional
VOD
Value-added
Digital TV
Movie
EPG
Datacasting
Music
PVR Credit to KOREA TELECOM 9
TRANSITION FORM SPART PHONE TO SMART TV 2009
Credit to KOREA TELECOM
2011
2012
SNS: Social Networking Service N Screen: Multiple TV Screens
SMART SCHOOLS & SMART HOMES & SMART SOCIETY
21ST CENTURY DIGITAL PARADIGM
NEW DIGITAL PARADIGM DTV
Production
IPTV
MAM Media Asset Management
COPE
Information
3G Game Wireless
WiBro
Distribution
Entertainment
DBS DMB
VO D
Education
Cyber Nomad
Shopping VoIP GPS
Digital Nomad
Music
EMail Banking
Movie
Future IT Infrastructure
Convergence
Ubiquitous
Digital Home
Digital Nomand: someone who uses technology, especially a laptop and a wireless network, to work remotely from anywhere in the world Source: http://www.macmillandictionary.com/open-dictionary/entries/digital-nomad.htm
11 Credit to KOREA TELECOM
COPE: CREAT ONCE & PUBLISH EVERYWHERE
POP
Analog TV
DTV Broadband
CarPC
In Flight
Consumer
eTV
DMB
Internet G3 WAP
PDA
12 Credit to KOREA TELECOM
UBIQUITY
ANY DEVICE Mobile
Enterprise
ANY NETWORK
SEAMLESS CONNECTIVITY Any device, Any where, Any time, Any network
Home
ANY WHERE
ANY TIME Bringing together…
Credit: Dr. Rick Wietfeldt Texas Instruments
Communications and Entertainment 13
Prof. Eduard Babulak
The Future of Wireless – The Converged Device ANY DEVICE
SEAMLESS CONNECTIVITY
ANY NETWORK
Cellular UMTS
HSDPA HSUPA
EDGE GPRS GSM
802.16d
WMAN 802.11g
802.16e
A-GPS
®
Bluetooth
Galileo
ISDB-T FM
Credit: Dr. Rick Wietfeldt Texas Instruments
UWB DMB
Broadcast Radio HD
802.11a
WPAN 802.11n
Broadcast DTV DVB-H
4G
WLAN
Navigation
ANY WHERE
3.9G
802.11b
RFID
DRM DAB
ANY TIME
FUTURE WEB
Credit to: Jeff Jaffe
15
WIRELLES & MOBILE DATA TRAFFIC GROWTH
Credit to Prof. Fadi Kurdahi
16
INTERNET TRAFFIC TRENDS
Credit to: Roger Watt
17
21ST CENTURY COMPUTING INDUSTRY Three major technological areas • •
•
Smart: Intelligent Devices and Sensor Networks Analytics: Distributed Intelligence Humanoid Computing: Human to Computer Interaction and Integration
Research focus on: •
• •
•
Intelligent Device Integration: As devices gain in diversity, density and intelligence, so does the opportunity to gather knowledge. Analytics and Insight: Exploiting emerging data sources for high performance. Human Computer Interaction: The impact of emerging technologies and new business needs on workforce productivity and business performance. Systems Integration: Exploring tomorrow's enterprise ICT systems.
Computing Industry trends
• Miniaturization: • Everything has become smaller. • ENIAC’s old-fashioned radio-style vacuum tubes gave way after 1947 to the smaller, faster, more reliable transistor. • Speed: •
Due to enormous large volume of transaction and information processes the highest processing and communication speed is essential in all sectors.
• Affordability: • The cost is critical to all business worldwide.
Professor Eduard Babulak
18
WHAT IS CYBER SECURITY • Cyber security is a branch of computer security known as information security as applied to computers and networks worldwide; • When a computer or any computational device(s) connect to a network and establish communication channel with other computational device(s) in the Cyberspace, they are essentially subject to possible risks . • Cyber security involves the protection of integrity of a computer's Internet accounts and files from intrusion of an unknown user. • https://homeland.house.gov/hearing/cybersecurity-and-export-control/ • What Will Cybersecurity Look Like in the Next Decade?: https://www.youtube.com/watch?v=SA73OaUT5ew • Interdisciplinary Approaches and The Future of Cybersecurity: https://www.youtube.com/watch?v=B9MWppIGMzQ
Source: http://whatis.techtarget.com/definition/cybersecurity
19
•
The US Government agencies have struggled for years to keep pace with malicious hackers and insider threats, a challenge that came into focus after it was disclosed last year that more than 21 million individuals had their sensitive data pilfered during a breach at the Office of Personnel Management. •
•
The Canadian insurance industry ranked cyber security as third among the ten most important issues facing the property and casualty insurance industry at this time. •
•
https://www.reuters.com/article/us-usa-cybersecurity-rankings/u-s-government-worse-than-allmajor-industries-on-cyber-security-report-idUSKCN0XB27K
https://www.insuranceinstitute.ca/en/resources/insights-research/cyber-risks
The UK estimated market size of the total cyber security sector in 2017 is 3,489 million British pounds (GBP) • •
Cyber security exists because the threats and costs are great enough to warrant these measure. When considering the average annual cyber crime costs by industry sector it is necessary to have cyber security in place. • https://www.statista.com/statistics/289173/uk-cyber-security-private-enterprises-segmentsize/ 20 Professor Eduard Babulak
CYBER SECURITY THREADS HISTORY
Source: Korean CERT: http://www.krcert.or.kr/english_www/
21
MOTIVATION FOR CYBER SECURITY I The Joint Task Force (JTF) defines cybersecurity as: “computing-based discipline involving technology, people, information, and processes to enable assured operations. It involves the: • • • •
creation, operation, analysis, and testing of secure computer systems.
It is an interdisciplinary course of study, including aspects of: • • • • •
law, policy, human factors, ethics, and risk management in the context of adversaries.”
Source: https://cybered.hosting.acm.org/wp/
MOTIVATION FOR CYBER SECURITY II •
By all accounts, the world faces a current and growing workforce shortage of qualified cybersecurity professionals and practitioners.
•
In fact, both government and nongovernment sources project nearly 1.8 million cybersecurity-related positions going unfilled by 2021.
•
The workforce demand is acute, immediate, and growing.
•
In order to develop the required talent, academic departments across the spectrum of computing disciplines are launching initiatives to establish new cybersecurity programs or courses of study within existing programs.
•
Whether developing full new programs, defining new concentrations within existing programs, or augmenting existing course content, these institutions need curricular guidance based on: • a comprehensive view of the cybersecurity field, • the specific demands of the base discipline, • and the relationship between the curriculum and cybersecurity workforce frameworks.
Source: Chapter 1: Introduction to Cybersecurity Education, pg. 9., in Cybersecurity 2017 Version 1.0 Report CSEC2017 31 December 2017.
CYBERSECURITY RESEARCH TEAM I Promote working closely with colleagues from a range of complementary backgrounds from: • • • • •
criminologists, social scientists, psychologists, engineers and computer scientists
to provide a distinctive Cyber Security interdisciplinary team science approach most attractive.
The “Human Factor” is considered to be the “Weakest Link” in Cyber Security. To understand and develop best strategies on how to solve the "Human Factor" Cyber Security Challenges will require working closely with colleagues from a range of complementary backgrounds.
CYBER SECURITY RESEARCH TEAM II Promote creation of National and Global Multidisciplinary Teams to gather ideas on how to solve the Cyber Security Challenges. Proper Cyber Security is essential in Digital Transformation in particular Cyber Security Business Policies, Business Ethical and Professional Conduct Given the current and future Cyber Security Threads, I do believe that number of areas of: • engineering, • science, • applied informatics • •
Smart Cities Smart • • •
• •
Transport e-Government Digital Health
Smart Energy Grid plus
are closely related to Cyber Security.
SEVEN CYBER SCENARIOS THAT SHOULD KEEP YOU AWAKE AT NIGHT 1. 2. 3. 4. 5. 6. 7.
Collateral damage from cyberwar; Political protestors enlist social media to target attacks; An insider uses privileged access to steal customer data; Malicious software updates; Hardware backdoors; Insider abuse; State sponsored spying;
What does this mean? • It is hard to propose a Cyber Security scenario that has not already occurred somewhere in the world. • While doomsday scenarios of economic devastation and complete loss of critical infrastructure for extended periods is highly unlikely it is still important to be cognizant of past incidents and thus become better armed to think about how these scenarios could play out in your own organization. 26
POSSIBLE RISKS •
Hardware: • •
•
Software: • • •
•
Malware(s) and/or spam(s) Configuration Interoperability
Human factor: • • •
•
Connectivity Reliability
Terrorist driven attack(s) Politically and Economically driven attack(s) War(s), etc.
Natural disasters: • • •
Flooding Earthquake(s) Volcanic explosion(s), etc. 27
MOBILE SECURITY: WHO’S LISTENING
Source: Trend Micro Mobile Security
Credit to: Karen McDowell
Credit to: Aaron Isaki
28
US, JAPANESE & KOREAN CERTS
• US CERT: Why is Cyber Security a Problem?: http://www.uscert.gov/cas/tips/ST04-001.html • Japan Security Operation Centre: http://www.first.org/members/teams/jsoc • Korea National Computer Emergency Response Team: http://www.first.org/members/teams/kn-cert • Korean National Security Masterplan: http://eng.nis.go.kr/
29
QUESTIONS & ANSWERS
APPENDICES SMART HEALTH & TRANSPORT INTERESTING LINKS
Home Healthcare Scenario
31 t to: OBC Soft Co. LTD
Display Body information & result of analyzed data on the front of user
Analyze Health Care Server Save, Analyze (weight,body fat, urine)
Body Inform. (weight,body fat, urine)
DataBase
Measure user’s body Information (Invisible)
Weight Measure
Body Fat Measure Urine Measure
Credit to: OBC Soft Co. LTD
Health Chamber Pot
32
Prompt action for urgent event Patient Location
Analyze body Signal
Search nearest hospital, Send patient data
HealthEvent Care Urgent Server
Assign doctor, nurse, room
Prompt action at urgent event for treatment
Body Signal
Body Information
(Blood Sugar, Heart Status)
(breath,ECG,heart)
Urgent Event
Smart 33 Shirts Credit to: OBC Soft Co. LTD
Prompt patient transportation
Search hospital Send Patient Data
Assign doctor, nurse, rooms
Smart Watch
Patient Treatment use body inform.
Body Information (breath,ECG,heart)
Health Care Server
Suggest dietry life
Body inform.
doctor
Voice treatment (video, voice)
Advice health for patient constitution
Patient Status (video, voice)
Body Information (breath,ECG,heart)
patient health Video Information
Home Healthcare Service
34 pillow Intelligent
Intelligent bed
Credit to: OBC Soft Co. LTD
Send body information to remote doctor for home healthcare
21ST CENTURY TRANSPORT
35
21ST CENTURY TRANSPORT
• A state of the art system made by mostly sensors, radio frequencies, antennas, and advanced computer software systems. – Adaptive Cruise Control, and Blind-spot Detection are already available.
• Autonomous Vehicle – To make decisions on its own based on calculations, observations, and analyses of the environment surrounding the car – The vehicle’s autonomous secure and reliable choices
• The Car Computer System on board
36
SELF-DRIVEN CAR
http://www.youtube.com/watch?v=e32yeI1YSI0 37
CASUAL CAR
38
WEB-LINKS I •
What is Digital Transformation?: https://www.youtube.com/watch?v=8Rb6fSaHmjU
•
Digital transformation: are you ready for exponential change? Futurist Gerd Leonhard, TFAStudios: https://www.youtube.com/watch?v=ystdF6jN7hc
•
Terence McKenna - Our Cyberspiritual Future (Part 1&2): https://www.youtube.com/watch?v=ZanOnebJeRA
•
Terence McKenna - Our Cyberspiritual Future (Part 3&4): https://www.youtube.com/watch?v=uJNTWzy8WQ
39
WEB-LINKS II 1.
Next Future Terrifying Technology Will Blow Your Mind: http://www.youtube.com/watch?v=JbQeABIoO6A
2.
FUTURISTIC COMPUTER SYSTEM - ACCESSOFT VISUAL FX http://www.youtube.com/watch?v=yyNk0vH175I
3.
Awesome fully Automated BMW Car Factory Must Watch http://www.youtube.com/watch?v=VpwkT2zV9H0
4.
Manufacturing of Bugatti Veyron Part 1 http://www.youtube.com/watch?v=wdTQrPIKKFU
5.
2014 Breaking News Pentagon DARPA shows USA Secretary of Defense Chuck Hagel Humanoid robot http://www.youtube.com/watch?v=YhGdqZjjQZU
6.
(HD) Future Humanoid Robots Will Blow your Mind- 2014 full Documentary http://www.youtube.com/watch?v=LFm5avbuWWU 40
WEB-LINKS III Next Future Terrifying Technology #Mind Blow (Full Documentary) http://www.youtube.com/watch?v=Ubz4dcafNF8 Most Luxurious City in the World - Full Documentary http://www.youtube.com/watch?v=QutITM2KY-Y
Building an Internet for Robots: Gajan Mohanarajah at TEDxYouth@Adliswil http://www.youtube.com/watch?v=7JHbpdt8Av8 http://www.techeblog.com/index.php/tech-gadget/10-futuristic-computer-concepts http://www.pcworld.com/article/2369145/insane-future-tech-revealed-shadow-network-chips-hybrid-memory-cubes-and-hyperrealistic-androids.html http://www.theverge.com/2013/10/10/4824026/a-first-look-inside-googles-secretive-quantum-lab http://io9.com/10-mindblowingly-futuristic-technologies-that-will-appe-673136756
http://www.inquisitr.com/1277386/futuristic-quantum-computer-is-here-the-512-qubit-d-wave-two/ http://www.pewinternet.org/2014/04/17/us-views-of-technology-and-the-future/ http://research.microsoft.com/en-us/um/cambridge/projects/hci2020/downloads/beinghuman_a3.pdf
http://www.entrepreneurshipchallenge.org/ http://www.psfk.com/2014/04/pew-research-american-view-future-technologies.html 41