SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
8/11/2010




       Identity Crisis: The Day My PC
           Mistook Me For A Hat*

                     GOPI KURUP


                          August 2010




                                        * With apologies to Oliver Sacks




                   Extol MSC
Extol Corp
  25th year in business
  Grown from a general PC and IT trading house to a leading
  ICT Security solution provider
R&D successes
  ARMOUR 1st Malaysian AV software – bi-directional
  technology transfer to Norman (1994), 1.5M copies
  bought by U.S. Dept of Defense, Dept of Energy,
  official AV for Kuala Lumpur XVI Commonwealth
  Games (1998)
  OpenVoice – voice attendant & mail module
  bundled with Toshiba PABX systems (1997)
  1st Malaysian RACE ADSL modem – developed by
  subsidiary, Cronos Systems (2001)




                                                                                  1
8/11/2010




                         Extol MSC
Human capital
  Staff strength ~ 70
  ~ 75% with technical background
  ~ 25% full-time R&D staff (inc mathematicians,
  physicists and engineers), contract staff from global
  talent pool
  CMMI L3 compliant, ISO27001:2005,
  ISO9001:2000, CDP Software Testing Capability
Selected products
  Managed Security Services, AI-Authentication
  Systems, Mobile Applications, Professional
  Services




           Landscape Snapshot

                                        Policies
       Monitoring                    Controls, Audits
    Threat Validation                      AV
       Mitigation                       Training



       Global Threats                Insider Threats



                SCADA




                                 Emerging Threats
   Exploiting Vulnerabilities




                                                                 2
8/11/2010




                  General Trends
      Attackers are proactive
      Defenders are reactive
      Attack mechanisms getting cheaper
      Defense mechanisms getting more expensive
      Attacks can be measured; defense mechanisms?

      Limitations of rule-based solutions
      Revisiting self learning mechanisms
      Scalable solutions




                Current Solutions



Problem       Analysis &   Platform &                                     Problem
Definition     Design                       Coding                        solved!
                           Language

                                                     Pre-defined set of
                                                        instructions



                                Reliable
                                Efficient
                                Robust
                                Portable




                                                                                           3
8/11/2010




                         Problem Statement




                                                            Give Me A Break!
                                    ??




           Artificial Intelligence Systems



                              Mathematical Models → Software Systems
                             Solves Complex, Dynamic & Non-linear Problems

                                                                                  and many more
Can be applied to...                                                               applications..




     Face           Signature     Computer Virus   Surveillance     Business
  Recognition                                                                      Biological Virus
                   Verification     Detection       Platforms      Intelligence     Identification




                                                                                                             4
8/11/2010




            Existing AI Solutions
AI technologies & techniques
  Tightly coupled to vertical applications
   −   Face Recognition AI API cannot be reused for Virus
       Detection although they may share many similar
       underlying mechanisms
   −   not scalable, flexible
  Delayed software prototyping process
   −   developers lack AI knowledge/skills (mathematical
       problem, not IT)
   −   current NN training process inefficient for commercial
       applications
   −   new data preprocessing and algorithms for each
       application (not reusable)




            Existing AI Solutions
  Limited commercial Application Programming
  Interfaces (APIs)
   −   expensive
   −   not comprehensive for a multitude of applications
   −   protected for military applications (technology export/sale
       restrictions)




                                                                            5
8/11/2010




                          Research Areas

Comprehensive AI
framework &
techniques within
each layer

Algorithm design
for specific
techniques to suit
applications



Optimization for
individual AI-APIs

Maximize AI
training capability
and efficiency




                          Making Sense
           Data collection
                Physical or geo-spatial
                      •   Trusted and untrusted domains
                      •   Location specific encryption
                Biometric information
                Electronic
           Correlation
           Heuristics




                                                                 6
8/11/2010




   Authorized
   Credentials
   Authentication                     One Time Password
                                         (2 Authorities)
                                              Person
                                              Purpose

          Access
          Presence                    Mantrap
          Location based services     Tailgating
          IT provisioning

                                        Credentials
                                        Authentication




Signature Verification




                          Thank You




                                                                  7
8/11/2010




                                Research
                                                 Training &
Cryptography        Authentication   Integrity
                                                 Awareness




  Audits, Risk
  Analysis &
Security Policies




                                                                     8

Más contenido relacionado

La actualidad más candente

SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologyOKsystem
 
Cyber security assocham
Cyber security assochamCyber security assocham
Cyber security assochamnmrdkoz
 
Can Information Security Survive
Can Information Security SurviveCan Information Security Survive
Can Information Security SurviveIT@Intel
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentationhemanth102030
 
DavidRodriguez ISCRAM summerschool 2012
DavidRodriguez ISCRAM summerschool 2012DavidRodriguez ISCRAM summerschool 2012
DavidRodriguez ISCRAM summerschool 2012d_rdgz
 
Ics Isac Overview V0.1pub
Ics Isac   Overview V0.1pubIcs Isac   Overview V0.1pub
Ics Isac Overview V0.1pubbradblask
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...GiantSteps Media Technology Strategies
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Arrow ECS UK
 
The Future of AI isn't Big, it's wide. By Gerardo Salandra
The Future of AI isn't Big, it's wide. By Gerardo SalandraThe Future of AI isn't Big, it's wide. By Gerardo Salandra
The Future of AI isn't Big, it's wide. By Gerardo SalandraGerardo Salandra
 
Multicore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data CentersMulticore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data Centersscarisbrick
 
SMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales PresentationSMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales PresentationVCW Security Ltd
 
SmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMSmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMOKsystem
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyAlexander Decker
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingCSCJournals
 
The Evolution of Big Data Analytics
The Evolution of Big Data AnalyticsThe Evolution of Big Data Analytics
The Evolution of Big Data AnalyticsAYATA
 

La actualidad más candente (20)

SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
 
Cyber security assocham
Cyber security assochamCyber security assocham
Cyber security assocham
 
Can Information Security Survive
Can Information Security SurviveCan Information Security Survive
Can Information Security Survive
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentation
 
DavidRodriguez ISCRAM summerschool 2012
DavidRodriguez ISCRAM summerschool 2012DavidRodriguez ISCRAM summerschool 2012
DavidRodriguez ISCRAM summerschool 2012
 
Ics Isac Overview V0.1pub
Ics Isac   Overview V0.1pubIcs Isac   Overview V0.1pub
Ics Isac Overview V0.1pub
 
MPG tech law
MPG tech lawMPG tech law
MPG tech law
 
MPG tech law
MPG tech lawMPG tech law
MPG tech law
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4
 
The Future of AI isn't Big, it's wide. By Gerardo Salandra
The Future of AI isn't Big, it's wide. By Gerardo SalandraThe Future of AI isn't Big, it's wide. By Gerardo Salandra
The Future of AI isn't Big, it's wide. By Gerardo Salandra
 
C2MS
C2MSC2MS
C2MS
 
Multicore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data CentersMulticore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data Centers
 
Identity Assertions Draftv5
Identity Assertions Draftv5Identity Assertions Draftv5
Identity Assertions Draftv5
 
SMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales PresentationSMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales Presentation
 
SmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMSmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCM
 
Sms passcode
Sms passcodeSms passcode
Sms passcode
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
 
The Evolution of Big Data Analytics
The Evolution of Big Data AnalyticsThe Evolution of Big Data Analytics
The Evolution of Big Data Analytics
 

Destacado

James Werner Lafayettemag
James Werner LafayettemagJames Werner Lafayettemag
James Werner LafayettemagJames Werner
 
Letter b1
Letter b1Letter b1
Letter b1ha dong
 
Combined Certifications
Combined CertificationsCombined Certifications
Combined CertificationsJames Werner
 
Sakai Student Survey Result 2008 & 2010, Claremont Consortium
Sakai Student Survey Result 2008 & 2010, Claremont ConsortiumSakai Student Survey Result 2008 & 2010, Claremont Consortium
Sakai Student Survey Result 2008 & 2010, Claremont ConsortiumSusan Kullmann
 
Role of hotels in the social development of a country
Role of hotels in the social development of a countryRole of hotels in the social development of a country
Role of hotels in the social development of a countryRahim Somani
 

Destacado (9)

James Werner Lafayettemag
James Werner LafayettemagJames Werner Lafayettemag
James Werner Lafayettemag
 
Jcwerner
JcwernerJcwerner
Jcwerner
 
Letter b1
Letter b1Letter b1
Letter b1
 
Combined Certifications
Combined CertificationsCombined Certifications
Combined Certifications
 
Vs 6
Vs 6Vs 6
Vs 6
 
123
123123
123
 
Sakai Student Survey Result 2008 & 2010, Claremont Consortium
Sakai Student Survey Result 2008 & 2010, Claremont ConsortiumSakai Student Survey Result 2008 & 2010, Claremont Consortium
Sakai Student Survey Result 2008 & 2010, Claremont Consortium
 
Pavasaris
PavasarisPavasaris
Pavasaris
 
Role of hotels in the social development of a country
Role of hotels in the social development of a countryRole of hotels in the social development of a country
Role of hotels in the social development of a country
 

Similar a My PC Mistook Me For A Hat

INFOSEC LANDSCAPE AND RESEARCH TRENDS
INFOSEC LANDSCAPE AND RESEARCH TRENDSINFOSEC LANDSCAPE AND RESEARCH TRENDS
INFOSEC LANDSCAPE AND RESEARCH TRENDSgopikurup
 
International approaches to critical information infrastructure protection ...
International approaches to critical information infrastructure protection   ...International approaches to critical information infrastructure protection   ...
International approaches to critical information infrastructure protection ...owaspindia
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightIBM WebSphereIndia
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's nextDuffy Fron
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Anindya Ghosh,
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USIBM Danmark
 
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseBeyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseCA API Management
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Unleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud ComputingUnleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud ComputingSam Garforth
 
Mobile Showcase Moblin2
Mobile Showcase Moblin2Mobile Showcase Moblin2
Mobile Showcase Moblin2Tomas Bennich
 
Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutionsakshayvreddy
 
Timelytrendsin appdelivery
Timelytrendsin appdeliveryTimelytrendsin appdelivery
Timelytrendsin appdeliveryKelly Emo
 
Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1Dan Miller
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityDirk Nicol
 
Ireland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firmsIreland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firmsMartina Naughton
 

Similar a My PC Mistook Me For A Hat (20)

INFOSEC LANDSCAPE AND RESEARCH TRENDS
INFOSEC LANDSCAPE AND RESEARCH TRENDSINFOSEC LANDSCAPE AND RESEARCH TRENDS
INFOSEC LANDSCAPE AND RESEARCH TRENDS
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 
International approaches to critical information infrastructure protection ...
International approaches to critical information infrastructure protection   ...International approaches to critical information infrastructure protection   ...
International approaches to critical information infrastructure protection ...
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with Worklight
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's next
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseBeyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Presentatie mc afee emm 2011
Presentatie mc afee emm 2011Presentatie mc afee emm 2011
Presentatie mc afee emm 2011
 
Unleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud ComputingUnleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud Computing
 
Mobile Showcase Moblin2
Mobile Showcase Moblin2Mobile Showcase Moblin2
Mobile Showcase Moblin2
 
Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutions
 
Timelytrendsin appdelivery
Timelytrendsin appdeliveryTimelytrendsin appdelivery
Timelytrendsin appdelivery
 
Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Ireland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firmsIreland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firms
 
Digital Pen En 2008
Digital Pen En 2008Digital Pen En 2008
Digital Pen En 2008
 

My PC Mistook Me For A Hat

  • 1. 8/11/2010 Identity Crisis: The Day My PC Mistook Me For A Hat* GOPI KURUP August 2010 * With apologies to Oliver Sacks Extol MSC Extol Corp 25th year in business Grown from a general PC and IT trading house to a leading ICT Security solution provider R&D successes ARMOUR 1st Malaysian AV software – bi-directional technology transfer to Norman (1994), 1.5M copies bought by U.S. Dept of Defense, Dept of Energy, official AV for Kuala Lumpur XVI Commonwealth Games (1998) OpenVoice – voice attendant & mail module bundled with Toshiba PABX systems (1997) 1st Malaysian RACE ADSL modem – developed by subsidiary, Cronos Systems (2001) 1
  • 2. 8/11/2010 Extol MSC Human capital Staff strength ~ 70 ~ 75% with technical background ~ 25% full-time R&D staff (inc mathematicians, physicists and engineers), contract staff from global talent pool CMMI L3 compliant, ISO27001:2005, ISO9001:2000, CDP Software Testing Capability Selected products Managed Security Services, AI-Authentication Systems, Mobile Applications, Professional Services Landscape Snapshot Policies Monitoring Controls, Audits Threat Validation AV Mitigation Training Global Threats Insider Threats SCADA Emerging Threats Exploiting Vulnerabilities 2
  • 3. 8/11/2010 General Trends Attackers are proactive Defenders are reactive Attack mechanisms getting cheaper Defense mechanisms getting more expensive Attacks can be measured; defense mechanisms? Limitations of rule-based solutions Revisiting self learning mechanisms Scalable solutions Current Solutions Problem Analysis & Platform & Problem Definition Design Coding solved! Language Pre-defined set of instructions Reliable Efficient Robust Portable 3
  • 4. 8/11/2010 Problem Statement Give Me A Break! ?? Artificial Intelligence Systems Mathematical Models → Software Systems Solves Complex, Dynamic & Non-linear Problems and many more Can be applied to... applications.. Face Signature Computer Virus Surveillance Business Recognition Biological Virus Verification Detection Platforms Intelligence Identification 4
  • 5. 8/11/2010 Existing AI Solutions AI technologies & techniques Tightly coupled to vertical applications − Face Recognition AI API cannot be reused for Virus Detection although they may share many similar underlying mechanisms − not scalable, flexible Delayed software prototyping process − developers lack AI knowledge/skills (mathematical problem, not IT) − current NN training process inefficient for commercial applications − new data preprocessing and algorithms for each application (not reusable) Existing AI Solutions Limited commercial Application Programming Interfaces (APIs) − expensive − not comprehensive for a multitude of applications − protected for military applications (technology export/sale restrictions) 5
  • 6. 8/11/2010 Research Areas Comprehensive AI framework & techniques within each layer Algorithm design for specific techniques to suit applications Optimization for individual AI-APIs Maximize AI training capability and efficiency Making Sense Data collection Physical or geo-spatial • Trusted and untrusted domains • Location specific encryption Biometric information Electronic Correlation Heuristics 6
  • 7. 8/11/2010 Authorized Credentials Authentication One Time Password (2 Authorities) Person Purpose Access Presence Mantrap Location based services Tailgating IT provisioning Credentials Authentication Signature Verification Thank You 7
  • 8. 8/11/2010 Research Training & Cryptography Authentication Integrity Awareness Audits, Risk Analysis & Security Policies 8