SlideShare a Scribd company logo
1 of 12
Download to read offline
CYBER IMMUNE SYSTEMS THAT
HELPS TRUST AND RELIABILITY,
HELPED BY CROSS BOARDER
CORPORATION
Sao Paulo, Brazil
November 12, 2013
Dr. Makoto (Mac) Yokozawa
Nomura Research Institute, Ltd.(Japan)
Visiting Professor at Kyoto University
JISA, Japan Information Service Industry Association, Public Policy
Subcommittee Chair

11820047(08
)

0
1
ISSUES AROUND THE ICT

C O P Y R I G H T M . Y O K O ZAW A

2
CYBER IMMUNE TECHNOLOGIES

Figure 2 Key Elements of a Simplified Immune System
Artificial Immune Systems for Intrusion Detection, James McCaffrey,
“Microsoft MSDN Test Run”

Heuristics Based Antivirus Protection Software
(Commercial)

3
WHAT’S NEW AND WHAT’S OLD
Cyber Security

Cyber Immunity

 Protection before incidents

 Resilience after incidents

 “In vitro” observation

 “In vivo” observation

 Rules and Patterns Based

 Heuristics and Knowledge Based

Filtering and Collaboration

Filtering and Collaboration

 Quick Response

 Reorganizing the Ecosystem

 Artificial

 Organic

4
WHY IMMUNE SYSTEM?
 Maturity in Cyber Security to some extent,
 New Fashion in Countermeasures for Cyber security

Incidents
 Increasing Number of Unknown Threats
 Weak Literacy and Zero Literacy Nodes (IOT,M2M)
 BYOD

 Moving from Governance by Legislation to Governance by Market-base Principles and

Architecture

 Reasons for Immunity
 Do not re-install the Windows, Repair and Reuse without Shutting down your Service
 Targeted Attack

and Advanced Persistent Attack will never end in a day, with a single

pattern
 Backdoors everywhere - Embedding Spy Chips in Everyday Household Gadgets and

Appliances
 Data Sovereignty and Data Ownership

5
HOW DO WE COLLABORATE IN CYBER
IMMUNITY?
 Sharing Immunity
 Forensics
 Heuristics in Detection
 Heuristics in Immunity
 Meta Knowledge

 New Network Structure and Technologies
 IPv6

 non-IP New Network Protocol
 Resilient Structure
 Redundant and Modular Network Connection

 Privacy and Security Tradeoff Study
 Security Improves Privacy Protection in many situation
 Sometimes Privacy have to be sacrificed in order to improve Security
 Security BY Design and Privacy BY Design --- need to Change the Architecture
 Identity Management and Trust Framework
6
7
WHAT YOU SEE ON THE TABLE

8
Proposal from US-Japan Business to US-Japan Governments 2012
(1) Privacy
a. Balancing Protection and Utilization
b. OECD Guideline on the Protection of Privacy and Cross boarder Flows of
Personal Data
c. Public-Private Partnership in Privacy Protection, 3rd Country Issues,
Activities in International Institutes
d. Regulatory Structure and Vitality in Cloud Business
e. EU Data Protection Rules and APEC Cross Boarder Privacy Rules

(2) Information Security
a. “Security as a Service”, “Security in Cloud Services”, Trust and Cost
b. Cloud Services and Devices, their New Aspects and New Threats in
Information Security
c. Maturity and Immaturity in Security Awareness
d. Security related Areas of Collaboration between US and Japan
• Developments of Security Enhancing Technology
• Organizational Design in Operation
• Organizational Management and Internal/External Communication
• Education and Awareness Development
• Quick Response and Resilience
• Desktop Exercise and Evaluation of Maturity in Information Security
9
ID Federation Business is blooming in Japan
(based on NRI’s track record in 2011)

More than
200 million IDs
Yahoo! Japan: Active User: 25 mil.
Yahoo! Premium member:7.6 mil.

Membership-based site
Insurance
NIKKEI
AD Tech

NIKKEI
Career College

Nonlife Insurance

Credit Card
Gmail Account170 mil.

News Media
NIKKEI ID 1 mil.

Real Estate

Member: over 20 mil.

Housing Rental

30 mil. in Japan
(estimated)

Publishing
9 mil. in Japan (estimated)

Air Career
2 mil. members
JAL Milage
Bank 20 mil.

56 mil. subscriber

EC

Beverage

25 mil. subscriber

Travel Agent

32mil subscribers

Telecom

Affiliated
Contents provider
Affiliated
Net shop

Telecom

67 mil.
Active:43 mil.
Trust Framework should be the platform for the National Identification System in
Japan

As-Is

Establishing Trust Framework in Japan

To-Be

Link

U.S.

Japan

U.S. ver. of Link
Trust
Framework

ID

ID

ID

U.S.

E.U.
Link E.U. ver. of
Trust
Framework

ID

ID

ID

ID

ID

ID

Japan

E.U.

U.S. ver. of Link Japan ver. Of Link E.U. ver. of
Trust
Trust
Trust
Framework
Framework
Framework

ID

ID

ID

ID

ID

ID

ID

ID

ID

NII
Due to the absence of Trust
Framework (OITF) in Japan, NII
(National Institute of Informatics) needs
to get certified by an assessor working
for U.S. national identification system.
Copyright(C) Nomura Research Institute, Ltd. All rights reserved.

Establishing Trust Framework (OITF)
in Japan, Japanese e-government can
be accessed by a private sectors ID.
Furthermore, it will enable Japanese
people to connect to the global
services.
11

More Related Content

What's hot

The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)Saurabh Yadav
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
Internet of things: dispelling common myths
Internet of things: dispelling common myths Internet of things: dispelling common myths
Internet of things: dispelling common myths Vish Nandlall
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseDavid Berkelmans
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseDavid Berkelmans
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoTAmy Daly
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsShyam Goyal
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsBHAVANA KONERU
 
35 Cyber Security Deals during Q4 2013
35 Cyber Security Deals during Q4 201335 Cyber Security Deals during Q4 2013
35 Cyber Security Deals during Q4 2013Rob Rowlingson
 
State of the OpenCloud Report 2020
State of the OpenCloud Report 2020State of the OpenCloud Report 2020
State of the OpenCloud Report 2020Dharmesh Thakker
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
EuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyEuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyCarlos Chalico
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security Robert Smith
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Andris Soroka
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningeSAT Journals
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Andris Soroka
 

What's hot (19)

The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
Internet of things: dispelling common myths
Internet of things: dispelling common myths Internet of things: dispelling common myths
Internet of things: dispelling common myths
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
35 Cyber Security Deals during Q4 2013
35 Cyber Security Deals during Q4 201335 Cyber Security Deals during Q4 2013
35 Cyber Security Deals during Q4 2013
 
State of the OpenCloud Report 2020
State of the OpenCloud Report 2020State of the OpenCloud Report 2020
State of the OpenCloud Report 2020
 
76 s201918
76 s20191876 s201918
76 s201918
 
EuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyEuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the sky
 
Kijiji 160616
Kijiji 160616Kijiji 160616
Kijiji 160616
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
 

Similar to CYBER IMMUNE SYSTEMS THAT HELPS TRUST AND RELIABILITY

New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...ijtsrd
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!DIGITALCONFEX
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTvishal dineshkumar soni
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsIRJET Journal
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
 
Japan's Soft Power Panel #2: High-Tech
Japan's Soft Power Panel #2: High-TechJapan's Soft Power Panel #2: High-Tech
Japan's Soft Power Panel #2: High-TechKatherine Butler
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...
AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...
AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...ijtsrd
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can ChantellPantoja184
 
State of AI Report 2022 - ONLINE.pdf
State of AI Report 2022 - ONLINE.pdfState of AI Report 2022 - ONLINE.pdf
State of AI Report 2022 - ONLINE.pdfvizologi
 

Similar to CYBER IMMUNE SYSTEMS THAT HELPS TRUST AND RELIABILITY (20)

New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security Aspects
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
Japan's Soft Power Panel #2: High-Tech
Japan's Soft Power Panel #2: High-TechJapan's Soft Power Panel #2: High-Tech
Japan's Soft Power Panel #2: High-Tech
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...
AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...
AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
 
State of AI Report 2022 - ONLINE.pdf
State of AI Report 2022 - ONLINE.pdfState of AI Report 2022 - ONLINE.pdf
State of AI Report 2022 - ONLINE.pdf
 

More from Assespro Nacional

2018 aleti+-it-census-results-2017
2018 aleti+-it-census-results-20172018 aleti+-it-census-results-2017
2018 aleti+-it-census-results-2017Assespro Nacional
 
WCIT 2016 | Informativo nº4
WCIT 2016 | Informativo nº4WCIT 2016 | Informativo nº4
WCIT 2016 | Informativo nº4Assespro Nacional
 
WCIT 2016 - Informativo nº3
WCIT 2016 - Informativo nº3WCIT 2016 - Informativo nº3
WCIT 2016 - Informativo nº3Assespro Nacional
 
[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...
[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...
[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...Assespro Nacional
 
2014 - Censo ALETI do Setor de TIC: Resultados
2014 - Censo ALETI do Setor de TIC: Resultados2014 - Censo ALETI do Setor de TIC: Resultados
2014 - Censo ALETI do Setor de TIC: ResultadosAssespro Nacional
 
Dissertação - Sr. Luiz Paiva
Dissertação - Sr. Luiz PaivaDissertação - Sr. Luiz Paiva
Dissertação - Sr. Luiz PaivaAssespro Nacional
 
Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...
Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...
Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...Assespro Nacional
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping IIAssespro Nacional
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...Assespro Nacional
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados
[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados
[Prêmio Imre Simon 2014] Multimídia Educacional - AtestadosAssespro Nacional
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping
[Prêmio Imre Simon 2014] Multimídia Educacional - ClippingAssespro Nacional
 
[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos
[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos
[Prêmio Imre Simon 2014] Grupo Consulters - DepoimentosAssespro Nacional
 
Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...
Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...
Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...Assespro Nacional
 
Guia GIFE - IBGC 2014: Guia das Melhores Práticas de Governança para Institu...
Guia GIFE - IBGC 2014:  Guia das Melhores Práticas de Governança para Institu...Guia GIFE - IBGC 2014:  Guia das Melhores Práticas de Governança para Institu...
Guia GIFE - IBGC 2014: Guia das Melhores Práticas de Governança para Institu...Assespro Nacional
 
[GPATS 2013] The São Paulo Declaration
[GPATS 2013] The São Paulo Declaration[GPATS 2013] The São Paulo Declaration
[GPATS 2013] The São Paulo DeclarationAssespro Nacional
 
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...Assespro Nacional
 
[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia
[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia
[GPATS 2013] Ivo Ivanovski - Master Presentation of MacedoniaAssespro Nacional
 
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and ServicesAssespro Nacional
 
[GPATS 2013] Torbjörn Fredriksson - PROMOTING THE ICT SECTOR: The Importance ...
[GPATS 2013] Torbjörn Fredriksson - PROMOTING THE ICT SECTOR: The Importance ...[GPATS 2013] Torbjörn Fredriksson - PROMOTING THE ICT SECTOR: The Importance ...
[GPATS 2013] Torbjörn Fredriksson - PROMOTING THE ICT SECTOR: The Importance ...Assespro Nacional
 

More from Assespro Nacional (20)

2018 aleti+-it-census-results-2017
2018 aleti+-it-census-results-20172018 aleti+-it-census-results-2017
2018 aleti+-it-census-results-2017
 
WCIT 2016 | Informativo nº4
WCIT 2016 | Informativo nº4WCIT 2016 | Informativo nº4
WCIT 2016 | Informativo nº4
 
WCIT 2016 - Informativo nº3
WCIT 2016 - Informativo nº3WCIT 2016 - Informativo nº3
WCIT 2016 - Informativo nº3
 
[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...
[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...
[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...
 
2014 - Censo ALETI do Setor de TIC: Resultados
2014 - Censo ALETI do Setor de TIC: Resultados2014 - Censo ALETI do Setor de TIC: Resultados
2014 - Censo ALETI do Setor de TIC: Resultados
 
Dissertação - Sr. Luiz Paiva
Dissertação - Sr. Luiz PaivaDissertação - Sr. Luiz Paiva
Dissertação - Sr. Luiz Paiva
 
Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...
Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...
Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados
[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados
[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping
 
[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos
[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos
[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos
 
Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...
Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...
Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...
 
Guia GIFE - IBGC 2014: Guia das Melhores Práticas de Governança para Institu...
Guia GIFE - IBGC 2014:  Guia das Melhores Práticas de Governança para Institu...Guia GIFE - IBGC 2014:  Guia das Melhores Práticas de Governança para Institu...
Guia GIFE - IBGC 2014: Guia das Melhores Práticas de Governança para Institu...
 
Censo do Setor de TI 2013
Censo do Setor de TI 2013 Censo do Setor de TI 2013
Censo do Setor de TI 2013
 
[GPATS 2013] The São Paulo Declaration
[GPATS 2013] The São Paulo Declaration[GPATS 2013] The São Paulo Declaration
[GPATS 2013] The São Paulo Declaration
 
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...
 
[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia
[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia
[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia
 
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services
 
[GPATS 2013] Torbjörn Fredriksson - PROMOTING THE ICT SECTOR: The Importance ...
[GPATS 2013] Torbjörn Fredriksson - PROMOTING THE ICT SECTOR: The Importance ...[GPATS 2013] Torbjörn Fredriksson - PROMOTING THE ICT SECTOR: The Importance ...
[GPATS 2013] Torbjörn Fredriksson - PROMOTING THE ICT SECTOR: The Importance ...
 

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Recently uploaded (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

CYBER IMMUNE SYSTEMS THAT HELPS TRUST AND RELIABILITY

  • 1. CYBER IMMUNE SYSTEMS THAT HELPS TRUST AND RELIABILITY, HELPED BY CROSS BOARDER CORPORATION Sao Paulo, Brazil November 12, 2013 Dr. Makoto (Mac) Yokozawa Nomura Research Institute, Ltd.(Japan) Visiting Professor at Kyoto University JISA, Japan Information Service Industry Association, Public Policy Subcommittee Chair 11820047(08 ) 0
  • 2. 1
  • 3. ISSUES AROUND THE ICT C O P Y R I G H T M . Y O K O ZAW A 2
  • 4. CYBER IMMUNE TECHNOLOGIES Figure 2 Key Elements of a Simplified Immune System Artificial Immune Systems for Intrusion Detection, James McCaffrey, “Microsoft MSDN Test Run” Heuristics Based Antivirus Protection Software (Commercial) 3
  • 5. WHAT’S NEW AND WHAT’S OLD Cyber Security Cyber Immunity  Protection before incidents  Resilience after incidents  “In vitro” observation  “In vivo” observation  Rules and Patterns Based  Heuristics and Knowledge Based Filtering and Collaboration Filtering and Collaboration  Quick Response  Reorganizing the Ecosystem  Artificial  Organic 4
  • 6. WHY IMMUNE SYSTEM?  Maturity in Cyber Security to some extent,  New Fashion in Countermeasures for Cyber security Incidents  Increasing Number of Unknown Threats  Weak Literacy and Zero Literacy Nodes (IOT,M2M)  BYOD  Moving from Governance by Legislation to Governance by Market-base Principles and Architecture  Reasons for Immunity  Do not re-install the Windows, Repair and Reuse without Shutting down your Service  Targeted Attack and Advanced Persistent Attack will never end in a day, with a single pattern  Backdoors everywhere - Embedding Spy Chips in Everyday Household Gadgets and Appliances  Data Sovereignty and Data Ownership 5
  • 7. HOW DO WE COLLABORATE IN CYBER IMMUNITY?  Sharing Immunity  Forensics  Heuristics in Detection  Heuristics in Immunity  Meta Knowledge  New Network Structure and Technologies  IPv6  non-IP New Network Protocol  Resilient Structure  Redundant and Modular Network Connection  Privacy and Security Tradeoff Study  Security Improves Privacy Protection in many situation  Sometimes Privacy have to be sacrificed in order to improve Security  Security BY Design and Privacy BY Design --- need to Change the Architecture  Identity Management and Trust Framework 6
  • 8. 7
  • 9. WHAT YOU SEE ON THE TABLE 8
  • 10. Proposal from US-Japan Business to US-Japan Governments 2012 (1) Privacy a. Balancing Protection and Utilization b. OECD Guideline on the Protection of Privacy and Cross boarder Flows of Personal Data c. Public-Private Partnership in Privacy Protection, 3rd Country Issues, Activities in International Institutes d. Regulatory Structure and Vitality in Cloud Business e. EU Data Protection Rules and APEC Cross Boarder Privacy Rules (2) Information Security a. “Security as a Service”, “Security in Cloud Services”, Trust and Cost b. Cloud Services and Devices, their New Aspects and New Threats in Information Security c. Maturity and Immaturity in Security Awareness d. Security related Areas of Collaboration between US and Japan • Developments of Security Enhancing Technology • Organizational Design in Operation • Organizational Management and Internal/External Communication • Education and Awareness Development • Quick Response and Resilience • Desktop Exercise and Evaluation of Maturity in Information Security 9
  • 11. ID Federation Business is blooming in Japan (based on NRI’s track record in 2011) More than 200 million IDs Yahoo! Japan: Active User: 25 mil. Yahoo! Premium member:7.6 mil. Membership-based site Insurance NIKKEI AD Tech NIKKEI Career College Nonlife Insurance Credit Card Gmail Account170 mil. News Media NIKKEI ID 1 mil. Real Estate Member: over 20 mil. Housing Rental 30 mil. in Japan (estimated) Publishing 9 mil. in Japan (estimated) Air Career 2 mil. members JAL Milage Bank 20 mil. 56 mil. subscriber EC Beverage 25 mil. subscriber Travel Agent 32mil subscribers Telecom Affiliated Contents provider Affiliated Net shop Telecom 67 mil. Active:43 mil.
  • 12. Trust Framework should be the platform for the National Identification System in Japan As-Is Establishing Trust Framework in Japan To-Be Link U.S. Japan U.S. ver. of Link Trust Framework ID ID ID U.S. E.U. Link E.U. ver. of Trust Framework ID ID ID ID ID ID Japan E.U. U.S. ver. of Link Japan ver. Of Link E.U. ver. of Trust Trust Trust Framework Framework Framework ID ID ID ID ID ID ID ID ID NII Due to the absence of Trust Framework (OITF) in Japan, NII (National Institute of Informatics) needs to get certified by an assessor working for U.S. national identification system. Copyright(C) Nomura Research Institute, Ltd. All rights reserved. Establishing Trust Framework (OITF) in Japan, Japanese e-government can be accessed by a private sectors ID. Furthermore, it will enable Japanese people to connect to the global services. 11