"cybersecurity - current landscape and future challenges", anish mohammed, lead security...
TRANSCRIPT
Cyber Security – Current Landscape and Future Challenges
Cyber Security in news
Distributed Denial of Service
Cyber Security – IoT view
Cyber Security – Definition
n. cybersecurity:See “information security”
n. information security: The protection of information against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional.
Cyber Security – Attacks over time
Cyber Security – Ransomeware over time
Cyber Security – Bitcoin & Malware ● Malware which mines (steals
CPU/GPU cycles)
● Malware which steals Bitcoin from wallets
● Ransomware – accepts Bitcoins to release keys
Cyber Security – Bitcoin & Malware
Cyber Security – Dark Web
● The Dark Web then is classified as a small portion of the Deep Web that has been intentionally hidden and is inaccessible through standard web browsers (mostly via Tor)
● Pseudonmity and being invisible makes the perfect combination for various activities in grey area of law
Cyber Security – Silk Road
Smart Contracts – What is it ?
● Code executed on Blockchain● Scripted in Turing complete language● Operates on Blockchain state● State is publicity visible
Smart Contracts and Cyber Security
● Allows validation of conditions and implement actions, wether legal or illegal
● Ransom smart contract – a smart contract that would trigger an action if a ransom is not paid
Smart Contracts and Cyber Security (contd)
Cyber Security – Advanced Persistent Threat
Cyber Security – APT Life Cycle
Security Analytics – As an evolution
High Level Architecture for Security Analytics Platform
Security Analytics – Highly Scalable Well Studied Solutions
Cyber Security - Scenarios
•Security landscape is evolving fast, out pacing products
•Paradigm of Big Data ( Map Reduce) and Scalable Machine Learning offers promise
•Future might battle of Algorithms
Cyber Security - Future
“THE FUTURE IS ALREADY HERE, IT”S JUST NOT EVENLY DISTRIBUTED (YET)”
– William Gibson
Questions
Big Data and the Three V’s
CAP Theorem
“You can have at most two of these properties for any shared-data
system… the choice of which feature to discard determines the
nature of your system.” – Eric Brewer, 2000 (Inktomi)
Security Analytics – foundations CAP TheoremBig Data – benefits from the BASE consistency
CAP Theorem – General outcomes
Security Analytics – Machine Learning Tool chest
Security Analytics - Toolchest