Digital Broadcasting, Future Cyberspace & Cyber Security Eduard Babulak PhD DSc FRSA FBCS Professor of Computer Engineering and Science Responsible for International Affairs College of Information and Communication Engineering Sungkyunkwan University (SKKU) Suwon, South Korea E-mail:
[email protected] Web: http://new.icc.skku.ac.kr/icc/main.do Copernicus: http://my.indexcopernicus.com/babulak
MAREW 2013 Faculty of Electrical Engineering & Informatics University of Pardubice Czech Republic, 16TH April 2013
AGENDA 1 INTRODUCTION: • MOORE’S LAW; • DATA TRAFFIC GROWTH; • USER EXPECTATIONS; • THE 21TH CENTURY ICT • IS FIVE ESSENTIAL KEY MANAGEMENT CHALLENGES THREE MAJOR TECHNOLOGICAL AREAS • RESEARCH FOCUS • UBIQUITY & PERVASIVE COMPUTINGBROADCASTING • TRANSITION FROM DIGITAL TV TO SMART TV – TRANSITION FROM SMART PHONES TO SMART TV – FUTURE TV – DIRECTIONS FOR NEXT GENERATION SMART TV – CONVERENCE MODEL, – CYBERSPACE & VIRTUAL REALITY – COPE: NEW DIGITAL PARADIGM – FUTURE WEB •
Professor Eduard Babulak
AGENDA 2 • CYBER SECURITY CHALLENGES – WHAT IS CYBER SECURITY – WHY CYBER SECURITY • COMPUTER EMERGENCY RESPONSE TEAM - CERT – MOBILE SECURITY: WHO IS LISTENING • DTV SECURITY & PRIVACY CHALLENGES – FUTURE CHALLENGES FOR SECURITY & PRIVACY • CONCLUSIONS & RECOMMENDATIONS • QUESTIONS & ANSWERS
Professor Eduard Babulak
INTRODUCTION •
•
•
•
The unprecedented outburst of advances and innovation in Internet and Information Communications Technology (ICT) drives the digital revolution today. The current trends in globalization create neither a level playing field nor a truly ‘‘Flat World.’’ Impact of Cyberspace on society today and tomorrow. Attempts to gain national competitive advantage while promoting creation of artificial walls that may trigger potential conflicts and disagreements. 2/17/2015 Professor Eduard Babulak
Moore’s Law
Credit to Prof. Fadi Kurdahi
Data Traffic Growth
Credit to Prof. Fadi Kurdahi
Users Expectations
[Ref: Delagi ISSCC 2010]
Technology vs Consumption Feedback Loop Consumption grows
Technology advances
Density
Applications
Performance
Devices
Switching energy
Cost per function
Credit to Prof. Fadi Kurdahi
Users
Revenue
THE 21TH CENTURY ICT •
•
•
•
Current challenges and dynamics in global business enterprise. ICT is a platform to conduct successful business globally. ICT facilitating management of knowledge assets and business intelligence. IS contributes to employees global mobility and management . 2/17/2015 Professor Eduard Babulak
Mobile Ubiquitous Service 7
6
Population in Billions 5
4
3
2
1
0
Credit to Prof. Fadi Kurdahi
Five essential key management challenges in developing & using information systems today: • Obtaining business value from information systems; • Providing appropriate complementary assets to use information technology effectively; • Understanding the system requirements of a global business environment; • Creating an information technology infrastructure that is flexible enough to support changing organizational goals;
• Designing systems that people can control, understand, and use in a socially and ethically responsible manner. 2/17/2015 Professor Eduard Babulak
Three major technological areas • • •
Smart: Intelligent Devices and Sensor Networks, Analytics: Distributed Intelligence , Humanoid Computing: Human to Computer Interaction and Integration.
Research focus on: •
•
•
•
Intelligent Device Integration: As devices gain in diversity, density and intelligence, so does the opportunity to gather knowledge. Analytics and Insight: Exploiting emerging data sources for high performance. Human Computer Interaction: The impact of emerging technologies and new business needs on workforce productivity and business performance. Systems Integration: Exploring tomorrow's enterprise ICT systems. 2/17/2015 Professor Eduard Babulak
Future Autonomic Computing will foster technologies such as: •
Self-healing Software;
•
Root-cause Discovery;
•
Correction, and Self-healing Hardware;
•
General-purpose Grid Computing
2/17/2015 Professor Eduard Babulak
Ubiquitous and Pervasive Computing There is burgeoning population of 'effectively invisible' computers around us, embedded in the fabric of our homes, shops, vehicles, farms and some even in our bodies. They are invisible in that they are part of the environment and we can interact with them as we go about our normal activities. However they can range in size from large Plasma displays on the walls of buildings to microchips implanted in the human body. They help us command, control, communicate, do business, travel and entertain ourselves, and these 'invisible‘ computers are far more numerous than their desktop cousins. 2/17/2015 Prof. Eduard Babulak
Ubiquity ANY NETWORK
ANY DEVICE Mobile
Enterprise
SEAMLESS CONNECTIVITY Any device, Any where, Any time, Any network
Home
ANY WHERE
ANY TIME Bringing together…
Communications and Entertainment
2/17/2015 Credit: Dr. Rick Wietfeldt Texas Instruments
Prof. Eduard Babulak
Three Principal Directions of Computer Development • Miniaturization: • Everything has become smaller. • ENIAC’s old-fashioned radio-style vacuum tubes gave way after 1947 to the smaller, faster, more reliable transistor. • Speed: • Due to enormous large volume of transaction and information processes the highest processing and communication speed is essential in all sectors. • Affordability: • The cost is critical to all business worldwide. 2/17/2015 Professor Eduard Babulak
MOBILE SYSTEMS EVOLUTION IN KOREA Analog 1st Stage
AMPS
Digital 2nd Stage
IS-95
2.5G
3rd Stage
1x EVDO WCDMA
4G DMB/ WiBro AMPS: Advanced Mobile Phone System (http://en.wikipedia.org/wiki/Advanced_Mobile_Phone_System ) IS-95: Interim Standard-95 (http://www.sis.pitt.edu/~dtipper/2720/2720_Slides9.pdf ) 1xEV-DO is a "3G" CDMA standard. EV-DO originally stood for "EVolution, Data-Only“ (http://www.phonescoop.com/glossary/term.php?gid=151 ) W-CDMA: Wide-Band Code Division Multiple Access (http://www.etsi.org/website/technologies/wcdma.aspx & http://www.3gpp.org/Technologies/Keywords-Acronyms/article/w-cdma ) DMB: Digital Media Broadcasting (http://www.telecomabc.com/d/dmb.html ) WiBro: Mobile WiMAX/WiBro (IEEE 802.16e): 2.3GHZ based mobile WiMAX (http://www.telecomabc.com/numbers/80216.html & http://csi.usc.edu/news/slides/WiBroSlides.pdf ) 4G: 4rd Generation system for mobile communications (http://www.telecomabc.com/numbers/4g.html )
Credit to KOREA TELECOM
제 7 정보 혁명 BROADCASTING & INTERNET 방송통신 융합 모델 Version 1.1 INDOOR
Broadcast Network
Multicast Service
HD TV • T-commerce • Home Banking • Internet Access
Integrated Multimedia Terminal
Internet
Phone Network
Unicast Service
OUTDOOR PDA/Smart Phone • Handheld PC • Cyber Wallet • Mobile Phone • Internet Access • Portable DTV
T-commerce: TV commerce (http://www.capitaine-commerce.com/2012/06/06/31619-et-maintenant-le-t-commerce/ )
Credit to KOREA TELECOM
Convergence Model Version 1.2 CONVERGENCE MODEL V.1.2
Internet
Convergence Media ? Phone Network
Broadcast Network
Credit to KOREA TELECOM
NEW CONVERGENCE NETWORK Mobility 3G Mobile
DMB
WiBro DBS SkyLife
Broadband
Interactivity
IPTV Samsung 32 inch LCD TV Korean direct broadcast satellite (DBS) broadcaster SkyLife launched in 2002 (http://spacejournal.ohio.edu/issue6/signal2.html ) DBDM: Digital Broadcasting Device Manager (http://www.software-data-solutions.com/dbdm.htm ) 3G Mobile: 3rd Generation of Mobile Communication (http://www.telecomabc.com/i/imt-2000.html ) IPTV: Delivery of television and other video and audio services over a broadband data network (http://www.telecomabc.com/i/iptv.html )
Source: www.32inch-lcd-tv.com
Credit to KOREA TELECOM
TRANSITION FORM SPART PHONE TO SMART TV 2009
Credit to KOREA TELECOM
2011
2012
SNS: Social Networking Service N Screen: Multiple TV Screens
SMART SCHOOLS & SMART HOMES & SMART SOCIETY
FUTURE TELEVISION 201X
Credit to UNISAT
DIRECTIONS FOR NEXT GENERATION SMART TV 1. 2. 3. 4. 5. 6. 7. 8. 9. Credit to: Jeff Jaffe
Multimedia, multi-device delivery and interaction Multiple screens scenarios Adaptive streaming of content Enhanced viewer experience Home networking (example: home security surveillance cameras incorporated in Smart TV) E-commerce (example: social networking and shopping during program) Content protection Testing Accessibility
CYBERSPACE VIRTUAL REALITY Registrational
Personalization Me TV
Home Banking
Cyber Wallet
Home Shopping
ID Card
Mobility
Mobile Phone Hand-held PC
New Convergence Network
Interactivity
Conversational E-mail IM Instant messaging
LBS Location Based Services
i-Content
ContextAwareness
Broadband
Game Quiz
Conferencing Target Marketing
Transmissional
VOD
Digital TV
Movie
Datacasting
Music
Value-added EPG Electronic program guides
PVR personal video recorder
Credit to KOREA TELECOM
CYBERSPACE VIRTUAL REALITY Registrational
Personalization Me TV
Home Banking
Cyber Wallet
Home Shopping
ID Card
Mobility
Mobile Phone Hand-held PC
New Convergence Network
Interactivity
Conversational E-mail IM
LBS
DMB + WiBro+ 3G
ContextAwareness
Broadband
Game Quiz
Conferencing Target Marketing
i-Content
Transmissional
VOD
Value-added
Digital TV
Movie
EPG
Datacasting
Music
PVR Credit to KOREA TELECOM
CYBERSPACE VIRTUAL REALITY Registrational
Personalization Me TV
Home Banking
Cyber Wallet
Home Shopping
ID Card
Mobility
Mobile Phone Hand-held PC
New Convergence Network
Interactivity
Conversational E-mail IM
LBS
CONVERGENCE MEDIA
ContextAwareness
Broadband
Game Quiz
Conferencing Target Marketing
i-Content
Transmissional
VOD
Value-added
Digital TV
Movie
EPG
Datacasting
Music
PVR Credit to KOREA TELECOM
COPE: CREATE ONCE – PUBISHED EVERYWHERE
POP
Analog TV
DTV Broadband
CarPC
In Flight
Consumer
eTV
DMB
Internet G3 WAP
PDA
Credit to KOREA TELECOM
NEW DIGITAL PARADIGM DTV
Production
IPTV
MAM Media COPE Asset Management
3G
Wireless
WiBro
DBS
Distribution
DMB
Entertainment Information
Game
Education
Cyber Nomad
Shopping VoIP GPS
VOD
Digital Nomad
Music
E-Mail Banking
Movie
Future IT Infrastructure Convergence
Ubiquitous
Digital Home
Digital Nomand: someone who uses technology, especially a laptop and a wireless network, to work remotely from anywhere in the world Source: http://www.macmillandictionary.com/open-dictionary/entries/digital-nomad.htm Credit to KOREA TELECOM
FUTURE WEB
Credit to: Jeff Jaffe
VIDEO WILL CREATE MOST OF THE INTERNET TRAFFIC
Cisco
Ixia
Credit to: Roger Watt
Cyber Security Challenges • The current and future dynamic development and innovation in the field of Information Communications Technologies (ICT) create a platform for the ubiquitous connectivity via Cyberspace for anywhere at any time for anyone worldwide. • Today, the Cyberspace is a daily part of life for organisations, governments and general public of all ages all over the world. • Globalisation and human factor have become essential to the Cyberspace proper use and application policies;
Prof. Eduard Babulak
31
What is Cyber? Anything related to the Internet is grouped in cyber category. Cyberspac e is the non-physical terrain originated from the computer systems.
Source: http://www.webopedia.com/TERM/C/cyber.html
What is Security? 1) Security is the degree of protection: to safeguard a nation, union of nations, persons or person against danger, damage, loss, and crime Source: http://en.wikipedia.org/wiki/Security
2) Cyber Security: Is Your Company Protected? Source: http://pingler.com/blog/cyber-security-is-your-company-prote cted/
WHAT IS CYBER SECURITY • Cyber security is a branch of computer security known as information security as applied to computers and networks worldwide; • When a computer or any computational device(s) connect to a network and establish communication channel with other computational device(s) in the Cyberspace, they are essentially subject to possible risks . • Cyber security involves the protection of integrity of a computer's Internet accounts and files from intrusion of an unknown user. • http://www.whitehouse.gov/cybersecurity • Homeland Security: http://www.dhs.gov/cybersecurity Source: http://whatis.techtarget.com/definition/cybersecurity Prof. Eduard Babulak
34
Seven Cyber Scenarios To Keep You Awake At Night Scenario 1. Collateral damage from cyberwar; Scenario 2. Political protestors enlist social media to target attacks; Scenario 3. An insider uses privileged access to steal customer data; Scenario 4. Malicious software updates; Scenario 5. Hardware backdoors; Scenario 6. Insider abuse; Scenario 7. State sponsored spying; What does this mean? It is hard to propose a Cyber Security scenario that has not already occurred somewhere in the world. While doomsday scenarios of economic devastation and complete loss of critical infrastructure for extended periods is highly unlikely it is still important to be cognizant of past incidents and thus become better armed to think about how these scenarios could play out in your own organization. Source: http://www.forbes.com/sites/firewall/2010/04/29/seven-cyber-scenarios-to-k eep-you-awake-at-night/
WHY CYBER SECURITY 1 • Activities such as, communication (email, cellphones), entertainment (digital cable, mp3s), transportation (car engine systems, airplane navigation), shopping (online stores, credit cards), medicine (equipment, medical records), are all computer, Internet and Cyberspace dependent; • How much of our daily life relies on computers? • How much of our personal information is stored either on your own computer or on someone else's system? • Cyber security is essential anyone, any organisation or government to protect, prevent, detect, and respond to all possible attacks from internal and/or outside source(s).
Prof. Eduard Babulak
36
WHY CYBER SECURITY 2 • Having millions of people all over the planet, connected to the Internet via his/her PC, laptop, or any portable mobile device create opportunities for communication all kind of information and content which may or may not be always contributing to the betterment of mankind. • Among thousands of different interest groups and social networks in countries worldwide, there are also groups that may wish to create, distribute or promote the information that may put state security, national economy and society in danger. Prof. Eduard Babulak
37
WHY CYBER SECURITY 3 • Evidence: http://www.securitydirectornews.com/topic/Publ ic-Sector • Tennessee nuclear plant guards suspected of cheating on security tests: http://www.y12.doe.gov/ • Idaho National Laboratory staff on how to avoid industrial attacks: http://www.itworld.com/security/211093/idahonational-laboratory-staff-how-avoid-industrialattacks?source=itwsidebar Prof. Eduard Babulak
38
POSSIBLE RISKS 1 • Hardware: – Connectivity; – Reliability;
• Software: – Malware(s) and/or spam(s); – Configuration; – Interoperability;
Prof. Eduard Babulak
39
POSSIBLE RISKS 2 • Human factor: – Terrorist driven attack(s); – Politically and Economically driven attack(s); – War(s), etc.;
• Natural disasters: – Flooding; – Earthquake(s); – Volcanic explosion(s), etc.
Prof. Eduard Babulak
40
MOBILE SECURITY: WHO'S LISTENING?
Source: Trend Micro Mobile Security Credit to: Karen McDowell
Credit to: Aaron Isaki
DTV SECURITY & PRIVACY CHALLENGES 1. 2.
3.
4.
5.
Digital television (DTV) provides a critical broadband broadcast resource for interoperable public safety and homeland security applications. DTV is a resource to public safety, existing DTV stations are providing megabits per second of encrypted data, including Internet Protocol (IP) video, geospatial visualization, data files, text messages, and any digital media. The concerns have moved from trade journals and policy gatherings to the front page of every newspaper with the advent of social networking, behavioural tracking These datacasts, not available to the public, can be targeted to one or any number of selected receivers or groups of receivers in the broadcast area with no congestion effects, unlike cellular systems; DTV ensures all subscribers receive the full bandwidth available.
ELECTRONIC WARFARE, CENSORSHIP, WEB SHUTDOWNS, DENIAL OF SERVICE • •
Cross-site scripting, request forgery It must become easier to build secure yet powerful apps
Credit to: Mark O’Brien, Robert I Desourdis and Jeff Jaffe
FUTURE CHALLENGES FOR SECURITY AND PRIVACY ‣ Tracking
It also can lead to unwanted intrusion into personal lives The tools to mitigate intrusion are confusing to novices and inconsistent Tracking and profiling of users can lead to beneficial value-added services The balance between these are hotly debated, poorly understood, and vary by culture
๏ ๏ ๏ ๏
‣ Identity ๏
Identity now part of core web architecture. Need for consistent experience through browser.
‣ Security ๏
in general
WebApps, HTML5
Credit to: Jeff Jaffe
YouTube Cyber Security Links: 1. Thomas Graham on Cyber Security (MacMillan Report) http://www.youtube.com/watch?v=Abq8QGBRGm8 2. RSA Security Management http://www.youtube.com/watch?v=AJfDnwcFQZw 3. MacMillan Report Homepage (Many interview on variety of subjects) http://www.yale.edu/macmillanreport/
WHAT IS COMPUTER EMERGENCY RESPONSE TEAM (CERT) • The regional CERTs coordinate and monitor the Internet in collaboration with the regional network service providers, security vendors, government agencies, as well as the industry associations. • All across the globe, there are many professional groups of experts working together to make sure that the Internet and ICT function properly. • There number of the Computer Emergency Response Teams (CERTs) that operate and cover a specific region on the planet, such as Australian CERT [1], Japanese CERT [2], US CERT [3], APCERT [4] and PacCERT [5]. Prof. Eduard Babulak
45
KOREAN & US CERTs • Korea National Computer Emergency Response Team: http://www.first.org/members/teams/kn-cert • Korean National Security Masterplan: http://service1.nis.go.kr/ go at: http://service1.nis.go.kr/eng/120802_masterplan_eng.pdf • Why is Cyber Security a Problem?: http://www.uscert.gov/cas/tips/ST04-001.html • Hacker, attacker, or intruder • Malicious code, sometimes called malware, is a broad category that includes any code that could be used to attack your computer. • Vulnerability - In most cases, vulnerabilities are caused by programming errors in software. Prof. Eduard Babulak
46
WHY CERT(S) 1 • Given the current complexity of the Internet and the ICT hardware and software infrastructures, in conjunction with the human factor, establish four basic categories that may trigger malfunction of the Internet and ultimately a cyberspace worldwide. • Anonymous hacks Japanese govt sites: http://www.zdnet.com/anonymous-hacks-japanesegovt-sites-2062305268/ • Japan to set up cyberdefense unit by 2013: http://www.zdnet.com/japan-to-set-up-cyberdefenseunit-by-2013-7000003941/ Prof. Eduard Babulak
47
CONCLUSIONS & DISCUSSION • Cyber Security is essential for the Global Internet and Cyberspace Infrastructure(s) that facilitate communication platform for current and future Digital Broadcasting and Smart TV technologies. • Provided the camera and microphone being an integrated part of the Smart TV, the privacy and security issues are becoming a new challenge for research and industry community. 48
RECOMMENDATIONS 1. Continue research in Cyber Security and Quality of Service Provision for Future Internet and DMB Infrastructures; 2. Develop new technologies and standards to design tools to secure Smart Devices & DTV hardware, smart cards and Pay TV chips; 3. To secure hardware and software for future embedded systems connected to cyber physical systems; 4. To develop unique security chips and cores on a system on chip, that will be protected against any cyber or hardware attacks; 5. To develop strategies, countermeasures and standards to deal with the future scenarios of any form of cyber attacks on Future Smart Devices, TV, at any time and from anywhere.
COMMUNICATION IS THE ECONOMY
Because communications – which in the end is what the digital technology and media are all about – is not just a sector of the economy. Communications is the economy. The new economy is about communications, deep and wide. ……………………………………………. Kevin Kelly in “New Rules for the New Economy”
Questions & Answers