"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Lead Security...

Preview:

Citation preview

Cyber Security – Current Landscape and Future Challenges

Cyber Security in news

Distributed Denial of Service

Cyber Security – IoT view

Cyber Security – Definition

n. cybersecurity:See “information security”

n. information security: The protection of information against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional.

Cyber Security – Attacks over time

Cyber Security – Ransomeware over time

Cyber Security – Bitcoin & Malware ● Malware which mines (steals

CPU/GPU cycles)

● Malware which steals Bitcoin from wallets

● Ransomware – accepts Bitcoins to release keys

Cyber Security – Bitcoin & Malware

Cyber Security – Dark Web

● The Dark Web then is classified as a small portion of the Deep Web that has been intentionally hidden and is inaccessible through standard web browsers (mostly via Tor)

● Pseudonmity and being invisible makes the perfect combination for various activities in grey area of law

Cyber Security – Silk Road

Smart Contracts – What is it ?

● Code executed on Blockchain● Scripted in Turing complete language● Operates on Blockchain state● State is publicity visible

Smart Contracts and Cyber Security

● Allows validation of conditions and implement actions, wether legal or illegal

● Ransom smart contract – a smart contract that would trigger an action if a ransom is not paid

Smart Contracts and Cyber Security (contd)

Cyber Security – Advanced Persistent Threat

Cyber Security – APT Life Cycle

Security Analytics – As an evolution

High Level Architecture for Security Analytics Platform

Security Analytics – Highly Scalable Well Studied Solutions

Cyber Security - Scenarios

•Security landscape is evolving fast, out pacing products

•Paradigm of Big Data ( Map Reduce) and Scalable Machine Learning offers promise

•Future might battle of Algorithms

Cyber Security - Future

“THE FUTURE IS ALREADY HERE, IT”S JUST NOT EVENLY DISTRIBUTED (YET)”

– William Gibson

Questions

Big Data and the Three V’s

CAP Theorem

“You can have at most two of these properties for any shared-data

system… the choice of which feature to discard determines the

nature of your system.” – Eric Brewer, 2000 (Inktomi)

Security Analytics – foundations CAP TheoremBig Data – benefits from the BASE consistency

CAP Theorem – General outcomes

Security Analytics – Machine Learning Tool chest

Security Analytics - Toolchest

Recommended