back to the future - cyber security, privacy and visions of the future
DESCRIPTION
Back to the future. A retrospective look through the crystal ball at 6 Cyber security predictions from the rise Intrusion prevention to the loss of privacyTRANSCRIPT
![Page 1: Back to the future - cyber security, privacy and visions of the future](https://reader035.vdocuments.us/reader035/viewer/2022062419/557dddefd8b42a124f8b50f3/html5/thumbnails/1.jpg)
![Page 2: Back to the future - cyber security, privacy and visions of the future](https://reader035.vdocuments.us/reader035/viewer/2022062419/557dddefd8b42a124f8b50f3/html5/thumbnails/2.jpg)
2002 + 10 years from now
Visions of the Future?
1. The rise of Intrusion Prevention Systems (IPS)2. Widespread corporate use of instant messaging3. Convergence of information warfare and information security4. Cyber terrorism and directed energy weapons5. Emergence of holographic storage, quantum cryptography or AI6. The loss of privacy
![Page 3: Back to the future - cyber security, privacy and visions of the future](https://reader035.vdocuments.us/reader035/viewer/2022062419/557dddefd8b42a124f8b50f3/html5/thumbnails/3.jpg)
Holistic Intrusion Prevention Systems
The emergence of holistic Intrusion Prevention and the demise of Intruder Detection
Definition of holistic:
“Concerned with wholes rather than analysis or separation into parts”
Signature (or pattern) matching. This method is sometimes called “content-based” and it incorporates what is often referred to as “deep packet inspection” capabilities.
Behavioural assessment. This method is sometimes referred to as anomaly-based, statistical-based, or rate-based
Predicted - 2004/2005
![Page 4: Back to the future - cyber security, privacy and visions of the future](https://reader035.vdocuments.us/reader035/viewer/2022062419/557dddefd8b42a124f8b50f3/html5/thumbnails/4.jpg)
Holistic Intrusion Prevention Systems
Predicted - 2004/2005
![Page 5: Back to the future - cyber security, privacy and visions of the future](https://reader035.vdocuments.us/reader035/viewer/2022062419/557dddefd8b42a124f8b50f3/html5/thumbnails/5.jpg)
Corporate use of Instant Messaging system, associated data loss & threatsPredicted - 2006/2007
Instant messaging threats have taken malware delivery to a new level. Yahoo!® Messenger, Skype™ and Windows Live® Messenger are used as attack vectors for complex malware payloads.
Clickjacking:
![Page 6: Back to the future - cyber security, privacy and visions of the future](https://reader035.vdocuments.us/reader035/viewer/2022062419/557dddefd8b42a124f8b50f3/html5/thumbnails/6.jpg)
Corporate use of Instant Messaging system, associated data loss & threatsPredicted - 2006/2007
![Page 7: Back to the future - cyber security, privacy and visions of the future](https://reader035.vdocuments.us/reader035/viewer/2022062419/557dddefd8b42a124f8b50f3/html5/thumbnails/7.jpg)
The convergence of Information Warfare and Information SecurityPredicted - 2007/2008
Strike back capabilities in Defensive Information Security systems and adaptive security eco-systems
•Firewalls
•IPS/IDS
•Honeypots
Sidewinder provides an administrator with great flexibility to define an extensive set of security "alarms", each with its corresponding "strikeback" responses.
![Page 8: Back to the future - cyber security, privacy and visions of the future](https://reader035.vdocuments.us/reader035/viewer/2022062419/557dddefd8b42a124f8b50f3/html5/thumbnails/8.jpg)
The convergence of Information Warfare and Information SecurityHistorical - 1998
The hacktavists group Electronic Disturbance Theatre (EDT) On September 9, 1998, launched a denial of service program called FloodNet against the Pentagon.
Pentagon strikes back by launching a denial of service attack of its own.
A Java Applet named "Hostile Applet" was placed in the Pentagon' web site that was designed to activate whenever FloodNet was directed towards it.
![Page 9: Back to the future - cyber security, privacy and visions of the future](https://reader035.vdocuments.us/reader035/viewer/2022062419/557dddefd8b42a124f8b50f3/html5/thumbnails/9.jpg)
The convergence of Information Warfare and Information SecurityPredicted - 2007/2008,
Actual - 2013/2014 – adaptive security ecosystems and maturity
Executive Order 13636 - Improving Critical Infrastructure Cybersecurity
![Page 10: Back to the future - cyber security, privacy and visions of the future](https://reader035.vdocuments.us/reader035/viewer/2022062419/557dddefd8b42a124f8b50f3/html5/thumbnails/10.jpg)
Cyber-terrorism, attacks on critical national infrastructure using EMP/HERF weapons.Predicted - 2009/2010
Possible use of direct energy weapons to disrupt national critical infrastructure
![Page 11: Back to the future - cyber security, privacy and visions of the future](https://reader035.vdocuments.us/reader035/viewer/2022062419/557dddefd8b42a124f8b50f3/html5/thumbnails/11.jpg)
Cyber-terrorism, attacks on critical national infrastructure using EMP/HERF weapons.Predicted - 2009/2010
H.E.R.F. – High Energy Radio Frequency [HERF guns are able to shoot a high power radio signal at an electronic target and put it out of function.]
![Page 12: Back to the future - cyber security, privacy and visions of the future](https://reader035.vdocuments.us/reader035/viewer/2022062419/557dddefd8b42a124f8b50f3/html5/thumbnails/12.jpg)
Cyber-terrorism, attacks on critical national infrastructure using EMP/HERF weapons.Predicted - 2009/2010
E.M.P. – Electromagnetic Pulse [destroys the electronics of all computer and communication systems in quite a large area]
![Page 13: Back to the future - cyber security, privacy and visions of the future](https://reader035.vdocuments.us/reader035/viewer/2022062419/557dddefd8b42a124f8b50f3/html5/thumbnails/13.jpg)
Cyber-terrorism, attacks on critical national infrastructure using EMP/HERF weapons.Predicted - 2009/2010
E.M.P. – Electromagnetic Pulse [destroys the electronics of all computer and communication systems in quite a large area]
![Page 14: Back to the future - cyber security, privacy and visions of the future](https://reader035.vdocuments.us/reader035/viewer/2022062419/557dddefd8b42a124f8b50f3/html5/thumbnails/14.jpg)
Cyber-terrorism, attacks on critical national infrastructure using EMP/HERF weapons.Predicted - 2009/2010
No public disclosures of attacks using advanced weaponry
![Page 15: Back to the future - cyber security, privacy and visions of the future](https://reader035.vdocuments.us/reader035/viewer/2022062419/557dddefd8b42a124f8b50f3/html5/thumbnails/15.jpg)
The emergence of holographic storage, quantum communications/cryptography or artificial intelligence.Predicted - 2011/2012
1. Holographic Versatile Disc (HVD)
2. Quantum computing, cryptography
3. Artificial Intelligence (AI) - Artificial Neural Networks (ANN)
Security concerns/interests:
• Threat analysis and response
• Data mining and pattern analysis (Big data)
• Adaptive heuristic penetration testing
• AI blended attacks and network defences
“I’ll be back”
![Page 16: Back to the future - cyber security, privacy and visions of the future](https://reader035.vdocuments.us/reader035/viewer/2022062419/557dddefd8b42a124f8b50f3/html5/thumbnails/16.jpg)
The emergence of holographic storage, quantum communications/cryptography or artificial intelligence.Predicted - 2011/2012
1. Holographic Versatile Disc (HVD)
2. Quantum computing, cryptography
3. Artificial Intelligence (AI) - Artificial Neural Networks (ANN)
![Page 17: Back to the future - cyber security, privacy and visions of the future](https://reader035.vdocuments.us/reader035/viewer/2022062419/557dddefd8b42a124f8b50f3/html5/thumbnails/17.jpg)
The loss of Privacy.
Predicted - 2012/2013
Surveillance Society
“Taken away….”
Social Networks
“Given away…”
![Page 18: Back to the future - cyber security, privacy and visions of the future](https://reader035.vdocuments.us/reader035/viewer/2022062419/557dddefd8b42a124f8b50f3/html5/thumbnails/18.jpg)
The loss of Privacy.
Predicted - 2012/2013
Eroding of civil liberties due to anti terrorism and national security legislation
![Page 19: Back to the future - cyber security, privacy and visions of the future](https://reader035.vdocuments.us/reader035/viewer/2022062419/557dddefd8b42a124f8b50f3/html5/thumbnails/19.jpg)
The loss of Privacy.
Predicted - 2012/2013
Rise of social media, citizens are giving away there personal data, and privacy