Download - Keynote : CODE BLUE in the ICU! by Jeff Moss
![Page 1: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/1.jpg)
Code Blue in the ICU! Thinking about network safety in a public health light
© Jeff Moss – [email protected]
![Page 2: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/2.jpg)
![Page 3: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/3.jpg)
![Page 4: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/4.jpg)
![Page 5: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/5.jpg)
![Page 6: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/6.jpg)
![Page 7: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/7.jpg)
![Page 8: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/8.jpg)
![Page 9: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/9.jpg)
![Page 10: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/10.jpg)
![Page 11: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/11.jpg)
h@p://chrisharrison.net/
![Page 12: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/12.jpg)
![Page 13: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/13.jpg)
![Page 14: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/14.jpg)
1. NaEon States want SECRETS
![Page 15: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/15.jpg)
1. NaEon States want SECRETS 2. Organized Criminals want MONEY
![Page 16: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/16.jpg)
1. NaEon States want SECRETS 2. Organized Criminals want MONEY 3. Protesters want ATTENTION
![Page 17: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/17.jpg)
1. NaEon States want SECRETS 2. Organized Criminals want MONEY 3. Protesters want ATTENTION 4. Hackers & researchers want KNOWLEDGE
![Page 18: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/18.jpg)
1. NaEon States want SECRETS 2. Organized Criminals want MONEY 3. Protesters want ATTENTION 4. Hackers & researchers want KNOWLEDGE
That’s you guys!
![Page 19: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/19.jpg)
Hackers & Researchers point the way!
-‐ Discover new classes of vulnerabiliEes -‐ Expose poor product security -‐ Spur public debate
![Page 20: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/20.jpg)
Hackers & Researchers point the way!
-‐ Discover new classes of vulnerabiliEes -‐ Expose poor product security -‐ Spur public debate
Criminals and Governments don’t do this It’s not in their interests
![Page 21: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/21.jpg)
All these groups need the net to work
![Page 22: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/22.jpg)
Q: What if there is a 5th group that doesn’t?
![Page 23: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/23.jpg)
Denial of service is increasing
0
100
200
300
400
500
600
700
2010 2011 Mar-‐12 Oct-‐12 Apr-‐13 Feb-‐14 Sept-‐14 ?
DDoS in Gigabits per second
Gps flow
?
NTP RAMP CloudFlare
DNS RAMP SpamHaus
![Page 24: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/24.jpg)
When invesEng:
Specialize for larger risk / returns
![Page 25: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/25.jpg)
When invesEng:
Specialize for larger risk / returns
Diversify to reduce risk / returns
![Page 26: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/26.jpg)
We now have clouds of complexity
![Page 27: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/27.jpg)
We have virtual clouds of complexity
![Page 28: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/28.jpg)
The failure modes of Complex systems are impossible to predict
![Page 29: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/29.jpg)
![Page 30: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/30.jpg)
![Page 31: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/31.jpg)
I like the Code Blue press release
“Code Blue is a hospital emergency code that indicates a paEent in need of immediate medical a@enEon, or that calls for relevant teams to respond immediately. We named the conference ajer the code because we hope to save the world by combining people’s knowledge”
h@p://japandailypress.com/white-‐hat-‐hackers-‐to-‐gather-‐at-‐code-‐blue-‐cybersecurity-‐conference-‐in-‐tokyo-‐1043926/
![Page 32: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/32.jpg)
Public health analogy
• No one thinks they are going to cure cancer
• Diseases are “managed”, very few are ever eliminated
• It is possible to be re-‐infected
![Page 33: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/33.jpg)
Public health analogy
• No one thinks they are going to cure cancer • No administrator thinks they can ever be perfectly secure • Diseases are “managed”, very few are ever eliminated
• Very few classes of vulnerabiliEes are ever eliminated • It is possible to be re-‐infected • A new variant of an old vulnerability can re-‐infect your systems
![Page 34: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/34.jpg)
This is a healthy way of thinking
![Page 35: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/35.jpg)
![Page 36: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/36.jpg)
Perimeter security
Involves: Security department IT department ApplicaEon teams
![Page 37: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/37.jpg)
![Page 38: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/38.jpg)
German arEst Babis Cloud has made 'hedonIsM(y) trojaner', an installaEon of the ancient greek trojan horse from computer keyboard bu@ons.
![Page 39: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/39.jpg)
They are already inside your perimeter
Involves: Security department Legal department IT department CommunicaEons ApplicaEon teams Risk Management
Public RelaEons Finance R&D
![Page 40: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/40.jpg)
The year is 2014
• You sEll can’t send secure email easily • You can’t have a secure mobile phone call • Web browsing securely is essenEally impossible • Name resoluEon is insecure, but geqng be@er
Why? What has failed us?
![Page 41: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/41.jpg)
We are running out of opEons
1990s
• Consumer SelecEon
![Page 42: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/42.jpg)
We are running out of opEons
1990s
• Consumer SelecEon
Consumers can’t make informed Security product decisions
![Page 43: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/43.jpg)
We are running out of opEons
1990s
• Consumer SelecEon
2000s
• Insurance Pressure
Consumers can’t make informed Security product decisions
![Page 44: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/44.jpg)
We are running out of opEons
1990s
• Consumer SelecEon
2000s
• Insurance Pressure
Consumers can’t make informed Security product decisions
Lack of data prevents the Crea>on of actuarial tables
![Page 45: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/45.jpg)
We are running out of opEons
1990s
• Consumer SelecEon
2000s
• Insurance Pressure
2010s
• RegulaEons
Consumers can’t make informed Security product decisions
Lack of data prevents the Crea>on of actuarial tables
![Page 46: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/46.jpg)
We are running out of opEons
1990s
• Consumer SelecEon
2000s
• Insurance Pressure
2010s
• RegulaEons
Consumers can’t make informed security product decisions
Lack of data prevents the crea>on of actuarial tables
Governments are reluctant to regulate the fast moving internet
![Page 47: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/47.jpg)
That leaves us
We must provide leadership and direcEon where and when we can
We need to help companies do the right thing through educaEon and configuraEon
![Page 48: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/48.jpg)
“First, Do No Harm” - Auguste François Chomel, 1847
Primum non nocere “SomeEmes it may be be@er to not do something, or even be@er to do nothing, than to risk causing more harm than good.”
![Page 49: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/49.jpg)
“First, Do No Harm” - Auguste François Chomel, 1847
To me this can be applied to informaEon security when thought of as a public safety issue:
• Do no harm to the trust of users – be open about your policies • Be honest about the risks of using technology • Do not let wishful thinking influence your decisions
![Page 50: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/50.jpg)
Community Immunity (Also known as Herd Immunity Theory)
“A form of immunity that occurs when the vaccinaEon of a significant porEon of a populaEon provides a measure of protecEon for individuals who have not developed immunity.”
![Page 51: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/51.jpg)
Three Modes of Immunity
![Page 52: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/52.jpg)
Three Modes of Immunity
![Page 53: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/53.jpg)
Three Modes of Immunity
![Page 54: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/54.jpg)
Community Immunity only applies to diseases that are contagious
Disease Transmission Immunity threshold
Mumps Airborne droplet 75 -‐ 86%
Pertussis Airborne droplet 92 -‐ 94% Rubella Airborne droplet 80 -‐ 85% Smallpox Social contact 83 -‐ 85%
![Page 55: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/55.jpg)
1. No one is immunized – Contagious disease spreads through the populaEon
2. Some of the populaEon gets immunized – Contagious disease spreads through some of the populaEon
3. Most of the populaEon is immunized – Spread of contagious disease is contained
Three Modes of Immunity
![Page 56: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/56.jpg)
1. No one is immunized – Contagious disease spreads through the populaEon Networks and systems are not maintained – Malware spreads through networks without noEce and li@le to stop them
2. Some of the populaEon gets immunized – Contagious disease spreads through some of the populaEon
3. Most of the populaEon is immunized – Spread of contagious disease is contained
Three Modes of Immunity
![Page 57: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/57.jpg)
1. No one is immunized – Contagious disease spreads through the populaEon Networks and systems are not maintained – Malware spreads through networks without noEce and li@le to stop them
2. Some of the populaEon gets immunized – Contagious disease spreads through some of the populaEon Some networks and systems are not maintained – Malware is someEmes noEced and removed, and spreads through some of the populaEon
3. Most of the populaEon is immunized – Spread of contagious disease is contained
Three Modes of Immunity
![Page 58: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/58.jpg)
1. No one is immunized – Contagious disease spreads through the populaEon Networks and systems are not maintained – Malware spreads through networks without noEce and li@le to stop them
2. Some of the populaEon gets immunized – Contagious disease spreads through some of the populaEon Some networks and systems are not maintained – Malware is someEmes noEced and removed, and spreads through some of the populaEon
3. Most of the populaEon is immunized – Spread of contagious disease is contained Most all networks and systems are maintained – Malware is noEced most of the Eme and removed, acEons are taken to protect other systems besides your own.
Three Modes of Immunity
![Page 59: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/59.jpg)
1. No one is immunized – Contagious disease spreads through the populaEon Networks and systems are not maintained – Malware spreads through networks without noEce and li@le to stop them
2. Some of the populaEon gets immunized – Contagious disease spreads through some of the populaEon Some networks and systems are not maintained – Malware is someEmes noEced and removed, and spreads through some of the populaEon
3. Most of the populaEon is immunized – Spread of contagious disease is contained Most all networks and systems are maintained – Malware is noEced most of the Eme and removed, acEons are taken to protect other systems besides your own.
Three Modes of Immunity
![Page 60: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/60.jpg)
Firewall as VaccinaEon?
![Page 61: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/61.jpg)
Vaccinate yourself and others
Can protecEng your network and systems with a firewall or router act as a “virtual vaccine”?
Can your network peers get a conferred benefit?
![Page 62: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/62.jpg)
Don’t do anything addiEonal on your network Don’t go out of your way to monitor your systems Don’t stay up to date on patches or applicaEon updates
Do Nothing or “Not Immunized”
![Page 63: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/63.jpg)
Do Nothing or “Not Immunized”
PRO: • Least expensive opEon, no training or changes necessary • Requires no network or applicaEon modificaEons
CON: • You are part of the problem and possibly causing harm • There might be legal consequences
![Page 64: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/64.jpg)
Protect your systems and applicaEons, but not those of others
Protect only yourself or “ParEally Immunized”
![Page 65: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/65.jpg)
Protect your systems and applicaEons, but not those of others
Examples: • Secure your systems by patching, updaEng, selecEng good sojware • Filter spoofed inbound traffic to your network, but not outbound
• Enable DNSSEC validaEon on your DNS, but do not sign your zones • Limit spam by checking for SPF records and using DNS blackholes, but not publishing your own SPF records
Protect only yourself or “ParEally Immunized”
![Page 66: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/66.jpg)
Protect only yourself or “Partially Immunized”
PRO: • Lower cost that being fully immunized • You are be@er protecEng your systems against misuse by others
CON: • You only take acEons that protect your systems – not those of others • Higher management and configuraEon overhead
![Page 67: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/67.jpg)
Same as “ParEally Immunized” but you take addiEonal acEons to protect those around you.
Protect yourself and others or “Fully Immunized”
![Page 68: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/68.jpg)
Same as “ParEally Immunized” but you take addiEonal acEons to protect those around you.
Examples: • Prevent source address spoofing from leaving your network • DNSSEC sign your zone files so others can rely on the data • Disable recursion on your name servers to limit AMP a@acks • Publish an SPF record to reduce spam by telling other networks about your mail server
Protect yourself and others or “Fully Immunized”
![Page 69: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/69.jpg)
Protect yourself and others or “Fully Immunized”
PRO: • You are “conferring an immunity” to some degree to others • Most beneficial to all users of the internet
• Best security stance for yourself and those around you
CON: • Most expensive to maintain due to configuraEon maintenance
• You need be@er trained staff to stay current on best pracEces
![Page 70: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/70.jpg)
DNSSEC is available to the majority of internet users
https://www.dnssec-deployment.org/
![Page 71: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/71.jpg)
What if you don’t own or operate a network?
![Page 72: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/72.jpg)
Donate Resources
![Page 73: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/73.jpg)
Donate resources
![Page 74: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/74.jpg)
![Page 75: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/75.jpg)
Donate resources
h?p://folding.stanford.edu/
![Page 76: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/76.jpg)
Different communities
Companies Governments Individuals
![Page 77: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/77.jpg)
![Page 78: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/78.jpg)
Think of the Future
Next GeneraEon technologies are starEng to be deployed
Can we use them to help protect ourselves and others?
DNSSEC = You can trust the answers from DNS DANE = Risk of rogue SSL CAs virtually eliminated IPv6 = IPSEC support, less NAT, be@er a@ribuEon, future growth
![Page 79: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/79.jpg)
Has thinking about network heath in a public safety light helped?
![Page 80: Keynote : CODE BLUE in the ICU! by Jeff Moss](https://reader036.vdocuments.us/reader036/viewer/2022062511/54c6babc4a795938518b45a3/html5/thumbnails/80.jpg)