SlideShare una empresa de Scribd logo
1 de 19
Visions of the Future? 
2002 + 10 years from now 
1.The rise of Intrusion Prevention Systems (IPS) 
2.Widespread corporate use of instant messaging 
3.Convergence of information warfare and information security 
4.Cyber terrorism and directed energy weapons 
5.Emergence of holographic storage, quantum cryptography or AI 
6.The loss of privacy
Holistic Intrusion Prevention Systems 
Predicted - 2004/2005 
The emergence of holistic Intrusion Prevention and the demise of 
Intruder Detection 
Definition of holistic: 
“Concerned with wholes rather than analysis or separation into parts” 
Signature (or pattern) matching. This method is sometimes called “content-based” 
and it incorporates what is often referred to as “deep packet inspection” 
capabilities. 
Behavioural assessment. This method is sometimes referred to as anomaly-based, 
statistical-based, or rate-based
Holistic Intrusion Prevention Systems 
Predicted - 2004/2005
Corporate use of Instant Messaging system, associated data 
loss & threats 
Predicted - 2006/2007 
Instant messaging threats have taken malware delivery to a new 
level. Yahoo!® Messenger, Skype™ and Windows Live® Messenger 
are used as attack vectors for complex malware payloads. 
Clickjacking:
Corporate use of Instant Messaging system, associated data 
loss & threats 
Predicted - 2006/2007
The convergence of Information Warfare and Information 
Security 
Predicted - 2007/2008 
Strike back capabilities in Defensive Information Security systems 
and adaptive security eco-systems 
• Firewalls 
• IPS/IDS 
• Honeypots 
Sidewinder provides an administrator with great flexibility to define 
an extensive set of security "alarms", each with its corresponding 
"strikeback" responses.
The convergence of Information Warfare and Information 
Security 
Historical - 1998 
The hacktavists group Electronic Disturbance Theatre (EDT) On 
September 9, 1998, launched a denial of service program called 
FloodNet against the Pentagon. 
Pentagon strikes back by 
launching a denial of service 
attack of its own. 
A Java Applet named "Hostile 
Applet" was placed in the 
Pentagon' web site that was 
designed to activate whenever 
FloodNet was directed towards it.
The convergence of Information Warfare and Information 
Security 
Predicted - 2007/2008, 
Actual - 2013/2014 – adaptive security ecosystems and maturity 
Executive Order 13636 - Improving Critical Infrastructure 
Cybersecurity
Cyber-terrorism, attacks on critical national infrastructure 
using EMP/HERF weapons. 
Predicted - 2009/2010 
Possible use of direct energy weapons to disrupt national critical 
infrastructure
Cyber-terrorism, attacks on critical national infrastructure 
using EMP/HERF weapons. 
Predicted - 2009/2010 
H.E.R.F. – High Energy Radio Frequency [HERF guns are able to shoot 
a high power radio signal at an electronic target and put it out of 
function.]
Cyber-terrorism, attacks on critical national infrastructure 
using EMP/HERF weapons. 
Predicted - 2009/2010 
E.M.P. – Electromagnetic Pulse [destroys the electronics of all 
computer and communication systems in quite a large area]
Cyber-terrorism, attacks on critical national infrastructure 
using EMP/HERF weapons. 
Predicted - 2009/2010 
E.M.P. – Electromagnetic Pulse [destroys the electronics of all 
computer and communication systems in quite a large area]
Cyber-terrorism, attacks on critical national infrastructure 
using EMP/HERF weapons. 
Predicted - 2009/2010 
No public disclosures of attacks using advanced weaponry
The emergence of holographic storage, quantum 
communications/cryptography or artificial intelligence. 
Predicted - 2011/2012 
1. Holographic Versatile Disc (HVD) 
2. Quantum computing, cryptography 
3. Artificial Intelligence (AI) - Artificial Neural Networks (ANN) 
Security concerns/interests: 
• Threat analysis and response 
• Data mining and pattern analysis (Big data) 
• Adaptive heuristic penetration testing 
• AI blended attacks and network defences 
“I’ll be back”
The emergence of holographic storage, quantum 
communications/cryptography or artificial intelligence. 
Predicted - 2011/2012 
1. Holographic Versatile Disc (HVD) 
2. Quantum computing, cryptography 
3. Artificial Intelligence (AI) - Artificial Neural Networks (ANN)
The loss of Privacy. 
Predicted - 2012/2013 
Surveillance Society 
“Taken away….” 
Social Networks 
“Given away…”
The loss of Privacy. 
Predicted - 2012/2013 
Eroding of civil liberties due to anti terrorism and national security 
legislation
The loss of Privacy. 
Predicted - 2012/2013 
Rise of social media, citizens are giving away there personal data, 
and privacy

Más contenido relacionado

La actualidad más candente

La actualidad más candente (18)

Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism.. sir summar
Cyber terrorism.. sir summarCyber terrorism.. sir summar
Cyber terrorism.. sir summar
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Space Operation- Offensive Cyber Space Operation
Cyber Space Operation- Offensive Cyber Space OperationCyber Space Operation- Offensive Cyber Space Operation
Cyber Space Operation- Offensive Cyber Space Operation
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
1358619756 cyber terrorism
1358619756 cyber terrorism1358619756 cyber terrorism
1358619756 cyber terrorism
 
Cyber War 1st Prize
Cyber War 1st PrizeCyber War 1st Prize
Cyber War 1st Prize
 
امن الشبكات ccnas
امن الشبكات ccnasامن الشبكات ccnas
امن الشبكات ccnas
 
CCNAS Ch01
CCNAS Ch01 CCNAS Ch01
CCNAS Ch01
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Destacado

Destacado (8)

IPS Product Comparison of Cisco 4255 & TippingPoint 5000E
IPS Product Comparison of Cisco 4255 & TippingPoint 5000EIPS Product Comparison of Cisco 4255 & TippingPoint 5000E
IPS Product Comparison of Cisco 4255 & TippingPoint 5000E
 
Skl kelas 6
Skl kelas 6Skl kelas 6
Skl kelas 6
 
Review of Information Security Concepts
Review of Information Security ConceptsReview of Information Security Concepts
Review of Information Security Concepts
 
Journey to iPS Cell our future
Journey to iPS Cell our futureJourney to iPS Cell our future
Journey to iPS Cell our future
 
Intrusion Prevention Systems
Intrusion Prevention SystemsIntrusion Prevention Systems
Intrusion Prevention Systems
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 

Similar a Back to the future - cyber security, privacy and visions of the future

Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64
Chema Alonso
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
Andrea Rossetti
 
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
IJNSA Journal
 

Similar a Back to the future - cyber security, privacy and visions of the future (20)

Encountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanismEncountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanism
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectors
 
Cyber Threats
Cyber ThreatsCyber Threats
Cyber Threats
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docx
 
20111214 iisf shinoda_
20111214 iisf shinoda_20111214 iisf shinoda_
20111214 iisf shinoda_
 
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies via
 
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESDETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 
Info sec 12 v1 2
Info sec 12 v1 2Info sec 12 v1 2
Info sec 12 v1 2
 
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSSECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 

Back to the future - cyber security, privacy and visions of the future

  • 1.
  • 2. Visions of the Future? 2002 + 10 years from now 1.The rise of Intrusion Prevention Systems (IPS) 2.Widespread corporate use of instant messaging 3.Convergence of information warfare and information security 4.Cyber terrorism and directed energy weapons 5.Emergence of holographic storage, quantum cryptography or AI 6.The loss of privacy
  • 3. Holistic Intrusion Prevention Systems Predicted - 2004/2005 The emergence of holistic Intrusion Prevention and the demise of Intruder Detection Definition of holistic: “Concerned with wholes rather than analysis or separation into parts” Signature (or pattern) matching. This method is sometimes called “content-based” and it incorporates what is often referred to as “deep packet inspection” capabilities. Behavioural assessment. This method is sometimes referred to as anomaly-based, statistical-based, or rate-based
  • 4. Holistic Intrusion Prevention Systems Predicted - 2004/2005
  • 5. Corporate use of Instant Messaging system, associated data loss & threats Predicted - 2006/2007 Instant messaging threats have taken malware delivery to a new level. Yahoo!® Messenger, Skype™ and Windows Live® Messenger are used as attack vectors for complex malware payloads. Clickjacking:
  • 6. Corporate use of Instant Messaging system, associated data loss & threats Predicted - 2006/2007
  • 7. The convergence of Information Warfare and Information Security Predicted - 2007/2008 Strike back capabilities in Defensive Information Security systems and adaptive security eco-systems • Firewalls • IPS/IDS • Honeypots Sidewinder provides an administrator with great flexibility to define an extensive set of security "alarms", each with its corresponding "strikeback" responses.
  • 8. The convergence of Information Warfare and Information Security Historical - 1998 The hacktavists group Electronic Disturbance Theatre (EDT) On September 9, 1998, launched a denial of service program called FloodNet against the Pentagon. Pentagon strikes back by launching a denial of service attack of its own. A Java Applet named "Hostile Applet" was placed in the Pentagon' web site that was designed to activate whenever FloodNet was directed towards it.
  • 9. The convergence of Information Warfare and Information Security Predicted - 2007/2008, Actual - 2013/2014 – adaptive security ecosystems and maturity Executive Order 13636 - Improving Critical Infrastructure Cybersecurity
  • 10. Cyber-terrorism, attacks on critical national infrastructure using EMP/HERF weapons. Predicted - 2009/2010 Possible use of direct energy weapons to disrupt national critical infrastructure
  • 11. Cyber-terrorism, attacks on critical national infrastructure using EMP/HERF weapons. Predicted - 2009/2010 H.E.R.F. – High Energy Radio Frequency [HERF guns are able to shoot a high power radio signal at an electronic target and put it out of function.]
  • 12. Cyber-terrorism, attacks on critical national infrastructure using EMP/HERF weapons. Predicted - 2009/2010 E.M.P. – Electromagnetic Pulse [destroys the electronics of all computer and communication systems in quite a large area]
  • 13. Cyber-terrorism, attacks on critical national infrastructure using EMP/HERF weapons. Predicted - 2009/2010 E.M.P. – Electromagnetic Pulse [destroys the electronics of all computer and communication systems in quite a large area]
  • 14. Cyber-terrorism, attacks on critical national infrastructure using EMP/HERF weapons. Predicted - 2009/2010 No public disclosures of attacks using advanced weaponry
  • 15. The emergence of holographic storage, quantum communications/cryptography or artificial intelligence. Predicted - 2011/2012 1. Holographic Versatile Disc (HVD) 2. Quantum computing, cryptography 3. Artificial Intelligence (AI) - Artificial Neural Networks (ANN) Security concerns/interests: • Threat analysis and response • Data mining and pattern analysis (Big data) • Adaptive heuristic penetration testing • AI blended attacks and network defences “I’ll be back”
  • 16. The emergence of holographic storage, quantum communications/cryptography or artificial intelligence. Predicted - 2011/2012 1. Holographic Versatile Disc (HVD) 2. Quantum computing, cryptography 3. Artificial Intelligence (AI) - Artificial Neural Networks (ANN)
  • 17. The loss of Privacy. Predicted - 2012/2013 Surveillance Society “Taken away….” Social Networks “Given away…”
  • 18. The loss of Privacy. Predicted - 2012/2013 Eroding of civil liberties due to anti terrorism and national security legislation
  • 19. The loss of Privacy. Predicted - 2012/2013 Rise of social media, citizens are giving away there personal data, and privacy