SlideShare una empresa de Scribd logo
1 de 39
Nye udfordringer, sikkerhedi den nyeverden  - skalsikkerhedsmodellenvendespåhovedet? Jakob I. Pagter Forsknings- ogInnovationschef Center for it-sikkerhed Alexandra Instituttet A/S
Buzzword compliance! Gamletravere: Digital natives Pervasive computing Cloud computing SaaSogHaaS Fremtidens buzzwords (buzzwords 2.0) Micro Perimeter Secure Multiparty Computing Obfuscated clients
Alexandra Instituttet A/S
Center for it-sikkerhed Kompetencer Secure Multiparty Computation Autentifikation Brugbarhed Sikkerkommunikation Forretningsforståelse Bagland Aarhus Universitet DTU Informatik IBM Logica Danske Bank Cryptomathic ÅrhusKommune KMD
Teknologihorisont apod.nasa.gov
Perimeterparadigmet
6 tendenser – 6 udfordringer
It-kriminalitet
Cloud Computing Computerkraftsomforsyningsvare (vision: 1966) Armbrust et al.: Above The Clouds, Berkeley 2009
Cloud Computing Multi-tennancy Adgangskontrol Hvilkebrugere? Hvilke data? -- “Architecture Strategies for Catching the Long Tail”, Microsoftmsdn.microsoft.com/en-us/library/aa479069.aspx
Cloud Computing Data ogapplikationeruden forperimeteren – logiskogfysisk Cloud Computing
Cloud Computing Ikkeraketvidenskab! Del-og-hersk --www.fermatproof.com
Cloud Computing Datacentrisksikkerhed (ikkeapplikationscentrisk!) Del-og-hersk Ækvivalensprincippet De store talslov
6 tendenser – 6 udfordringer
Pervasive Computing Ubiquitous computing, ambient intelligence, it-i-alting
Pervasive Computing von Neumann Tilgængelighed
Pervasive Computing Data ogbrugereuden for perimeterenpåenhedersomangribes – fysiskoglogisk Pervasive Computing
Pervasive Computing Obfuskering All-Or-Nothing public void zXcv(StringyTl, String ff, intqW){ ff = yTh+="nnn"; print(l99UY(yTl,yTI)); } String yTI; public void l99UY(String 6ty, String Fg) { return 6ty+ytI; } public void hello(Strings)  { print(s); }
Pervasive Computing Datacentrisksikkerhed Ækvivalensprincippet
6 tendenser – 6 udfordringer
Mutual Computing Web2.0 for virksomheder… diligentsia.net
Mutual Computing Auktioner Benchmarking
Mutual Computing Data flyttesuden for perimeter ogiværstefaldindenfor en konkurrents perimeter Mutual Computing
Mutual Computing Markedsdesign Secure Multiparty Computation
Mutual Computing Datacentrisksikkerhed Del-og-hersk Secure Multiparty Computation
6 tendenser – 6 udfordringer
Privacy Privacy
Privacy
Digital Natives Technology is “stuff”
Digital Natives Rogue users Getting the job done --Bardram et al.
Digital Natives Cloud Computing Mutual Computing Privacy Pervasive Computing
Digital Natives “If you love somebody – set them free”-politikken Secure Mashups http://cace-project.eu/
Digital Natives Datacentrisksikkerhed Embrace (ikke block) Pas på med ækvivalensprincippet!
6 tendenser – 6 udfordringer Dynamik Rogue users Egneenheder Rogue users Rogue users
Værdiafperimeteren? Cloud Computing Mutual Computing Privacy Pervasive Computing
Sikkerhedsmodellenpåhovedet? Org. ASP Data1 ASP+Data Org. Data
Inspiration Strategi/politik Datacentrisk Ækvivalensprincippet Del-og-hersk De store talslov Hærdcentralekomponenter ID-styring! Nye teknikker Distribueret lager Anvendtkrypto Secure Multiparty Computation
Sikkerhed og Revision 2009: Skal sikkerhedsmodellen vendes på hovedet?

Más contenido relacionado

La actualidad más candente

International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AIForcepoint LLC
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
Mesh Twin Learning - Optimization of Smart Factories with Mesh Twin Learning
Mesh Twin Learning - Optimization of Smart Factories with Mesh Twin LearningMesh Twin Learning - Optimization of Smart Factories with Mesh Twin Learning
Mesh Twin Learning - Optimization of Smart Factories with Mesh Twin LearningPGS Software S.A.
 

La actualidad más candente (20)

International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Hans Bos
Hans BosHans Bos
Hans Bos
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Mesh Twin Learning - Optimization of Smart Factories with Mesh Twin Learning
Mesh Twin Learning - Optimization of Smart Factories with Mesh Twin LearningMesh Twin Learning - Optimization of Smart Factories with Mesh Twin Learning
Mesh Twin Learning - Optimization of Smart Factories with Mesh Twin Learning
 
Ijwns
IjwnsIjwns
Ijwns
 
Matrix Table
Matrix TableMatrix Table
Matrix Table
 
Ijwns
IjwnsIjwns
Ijwns
 

Destacado

Инструкция по записи обучающегося на кружки и секции
Инструкция по записи обучающегося на кружки и секцииИнструкция по записи обучающегося на кружки и секции
Инструкция по записи обучающегося на кружки и секцииco1858
 
BusinessCard_ByrdGEO
BusinessCard_ByrdGEOBusinessCard_ByrdGEO
BusinessCard_ByrdGEOJohn Byrd
 
Das revoluções inglesas à revolução industrial
Das revoluções inglesas à revolução industrialDas revoluções inglesas à revolução industrial
Das revoluções inglesas à revolução industrialMaiquel Laux
 
พระราชนิเวศน์มฤคทายวัน
พระราชนิเวศน์มฤคทายวันพระราชนิเวศน์มฤคทายวัน
พระราชนิเวศน์มฤคทายวันPachari
 
Immurich Capsule
Immurich CapsuleImmurich Capsule
Immurich CapsuleLucky Saggi
 
Результаты ГИА 2016
Результаты ГИА 2016Результаты ГИА 2016
Результаты ГИА 2016co1858
 
Gérer les avis clients sur Internet et sa e-réputation (Edition 2016)
Gérer les avis clients sur Internet et sa e-réputation (Edition 2016)Gérer les avis clients sur Internet et sa e-réputation (Edition 2016)
Gérer les avis clients sur Internet et sa e-réputation (Edition 2016)Vincent Pereira
 
Identité d'entreprise ou de marque : le nom, la signature et le logo
Identité d'entreprise ou de marque : le nom, la signature et le logoIdentité d'entreprise ou de marque : le nom, la signature et le logo
Identité d'entreprise ou de marque : le nom, la signature et le logoVincent Pereira
 

Destacado (15)

Finales
FinalesFinales
Finales
 
Minneapolis MO Proclamation
Minneapolis MO ProclamationMinneapolis MO Proclamation
Minneapolis MO Proclamation
 
Task 1.3 aoc
Task 1.3 aocTask 1.3 aoc
Task 1.3 aoc
 
GESTION AGILE DE L’ÉNERGIE
GESTION AGILE DE L’ÉNERGIEGESTION AGILE DE L’ÉNERGIE
GESTION AGILE DE L’ÉNERGIE
 
Atif Khan
Atif KhanAtif Khan
Atif Khan
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Teacher researcher1a
Teacher researcher1aTeacher researcher1a
Teacher researcher1a
 
Инструкция по записи обучающегося на кружки и секции
Инструкция по записи обучающегося на кружки и секцииИнструкция по записи обучающегося на кружки и секции
Инструкция по записи обучающегося на кружки и секции
 
BusinessCard_ByrdGEO
BusinessCard_ByrdGEOBusinessCard_ByrdGEO
BusinessCard_ByrdGEO
 
Das revoluções inglesas à revolução industrial
Das revoluções inglesas à revolução industrialDas revoluções inglesas à revolução industrial
Das revoluções inglesas à revolução industrial
 
พระราชนิเวศน์มฤคทายวัน
พระราชนิเวศน์มฤคทายวันพระราชนิเวศน์มฤคทายวัน
พระราชนิเวศน์มฤคทายวัน
 
Immurich Capsule
Immurich CapsuleImmurich Capsule
Immurich Capsule
 
Результаты ГИА 2016
Результаты ГИА 2016Результаты ГИА 2016
Результаты ГИА 2016
 
Gérer les avis clients sur Internet et sa e-réputation (Edition 2016)
Gérer les avis clients sur Internet et sa e-réputation (Edition 2016)Gérer les avis clients sur Internet et sa e-réputation (Edition 2016)
Gérer les avis clients sur Internet et sa e-réputation (Edition 2016)
 
Identité d'entreprise ou de marque : le nom, la signature et le logo
Identité d'entreprise ou de marque : le nom, la signature et le logoIdentité d'entreprise ou de marque : le nom, la signature et le logo
Identité d'entreprise ou de marque : le nom, la signature et le logo
 

Similar a Sikkerhed og Revision 2009: Skal sikkerhedsmodellen vendes på hovedet?

McClansy Security Corporation
McClansy Security CorporationMcClansy Security Corporation
McClansy Security CorporationsmailOrhan3
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computingarchana lisbon
 
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistanceComputer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistancePhD Assistance
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentationomkar parab
 
The End of the Fortress: The new Approach to Cybersecurity
The End of the Fortress: The new Approach to CybersecurityThe End of the Fortress: The new Approach to Cybersecurity
The End of the Fortress: The new Approach to CybersecurityMarc Nader
 
Managing Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your OrganizationManaging Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your OrganizationCharles Lim
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricMark Underwood
 
Le potentiel du Machine Learning et de l’analyse prédictive à portée de votre...
Le potentiel du Machine Learning et de l’analyse prédictive à portée de votre...Le potentiel du Machine Learning et de l’analyse prédictive à portée de votre...
Le potentiel du Machine Learning et de l’analyse prédictive à portée de votre...Microsoft
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGIRJET Journal
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxSonaliG6
 
Artificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyArtificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyPetar Radanliev
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comPhD Assistance
 
Think in grid - executive resume
Think in grid - executive resumeThink in grid - executive resume
Think in grid - executive resumedmarino
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...IJNSA Journal
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security TechnologiesRuchikaSachdeva4
 
A New Security Paradigm for IoT (Internet of Threats)
A New Security Paradigm for IoT (Internet of Threats)A New Security Paradigm for IoT (Internet of Threats)
A New Security Paradigm for IoT (Internet of Threats)Priyanka Aash
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 

Similar a Sikkerhed og Revision 2009: Skal sikkerhedsmodellen vendes på hovedet? (20)

McClansy Security Corporation
McClansy Security CorporationMcClansy Security Corporation
McClansy Security Corporation
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Serguei Seloussov - Future of computing and SIT MSc program
Serguei Seloussov - Future of computing and SIT MSc programSerguei Seloussov - Future of computing and SIT MSc program
Serguei Seloussov - Future of computing and SIT MSc program
 
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistanceComputer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
The End of the Fortress: The new Approach to Cybersecurity
The End of the Fortress: The new Approach to CybersecurityThe End of the Fortress: The new Approach to Cybersecurity
The End of the Fortress: The new Approach to Cybersecurity
 
Managing Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your OrganizationManaging Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your Organization
 
2018 learning approach-digitaltrends
2018 learning approach-digitaltrends2018 learning approach-digitaltrends
2018 learning approach-digitaltrends
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
Le potentiel du Machine Learning et de l’analyse prédictive à portée de votre...
Le potentiel du Machine Learning et de l’analyse prédictive à portée de votre...Le potentiel du Machine Learning et de l’analyse prédictive à portée de votre...
Le potentiel du Machine Learning et de l’analyse prédictive à portée de votre...
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
 
Artificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyArtificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum Cryptography
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
 
Think in grid - executive resume
Think in grid - executive resumeThink in grid - executive resume
Think in grid - executive resume
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
A New Security Paradigm for IoT (Internet of Threats)
A New Security Paradigm for IoT (Internet of Threats)A New Security Paradigm for IoT (Internet of Threats)
A New Security Paradigm for IoT (Internet of Threats)
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 

Más de Jakob Illeborg Pagter

Secure Multiparty Computation or: How I learned to stop worrying and love the...
Secure Multiparty Computation or: How I learned to stop worrying and love the...Secure Multiparty Computation or: How I learned to stop worrying and love the...
Secure Multiparty Computation or: How I learned to stop worrying and love the...Jakob Illeborg Pagter
 
Cloud Computing - fra udfordring til løsning
Cloud Computing - fra udfordring til løsningCloud Computing - fra udfordring til løsning
Cloud Computing - fra udfordring til løsningJakob Illeborg Pagter
 
Secure Multiparty Computation - a technology with promises for privacy
Secure Multiparty Computation - a technology with promises for privacySecure Multiparty Computation - a technology with promises for privacy
Secure Multiparty Computation - a technology with promises for privacyJakob Illeborg Pagter
 

Más de Jakob Illeborg Pagter (6)

Secure Multiparty Computation or: How I learned to stop worrying and love the...
Secure Multiparty Computation or: How I learned to stop worrying and love the...Secure Multiparty Computation or: How I learned to stop worrying and love the...
Secure Multiparty Computation or: How I learned to stop worrying and love the...
 
Cloud Computing - fra udfordring til løsning
Cloud Computing - fra udfordring til løsningCloud Computing - fra udfordring til løsning
Cloud Computing - fra udfordring til løsning
 
20100113 cc i det offentlige
20100113 cc i det offentlige20100113 cc i det offentlige
20100113 cc i det offentlige
 
En status på kryptoalgoritmer
En status på kryptoalgoritmerEn status på kryptoalgoritmer
En status på kryptoalgoritmer
 
Secure Multiparty Computation - a technology with promises for privacy
Secure Multiparty Computation - a technology with promises for privacySecure Multiparty Computation - a technology with promises for privacy
Secure Multiparty Computation - a technology with promises for privacy
 
En sikker børs for roekvoter
En sikker børs for roekvoterEn sikker børs for roekvoter
En sikker børs for roekvoter
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Último (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Sikkerhed og Revision 2009: Skal sikkerhedsmodellen vendes på hovedet?

Notas del editor

  1. MinbaggrundDialog med Jens Roed Andersen
  2. Lidtsjov
  3. VI sælgerrådgivningpå desværetekniskeproblemer:- Ex 1: foredrag- ex 2: goalref
  4. Jegharingen “silverbullit” med I tasken – forsøger bare at stille de godespørgsmålForhåbenligtlidtstoftileftertankeomkringhvaddererbagvedhorisontenteknologiskogsikkerhedsmæssigtForståhvorjegkommerfra: vi vilgerne lave løsningerderbidragerteknisk, men vedgodt at teknik kun er en mindre delJegkommerindpånogleforslagpåtekniskeløsninger – disseeralle – I en elleranden form – kommercielttilgængelige, sådeterikkeren science fiction!
  5. Den grundlæggendetankegang – fordideterpraktisk!
  6. Eller Utility computing som Carr foretrækkerPointenerikkeomdeterHaaS,PaaSellerSaas – dethar kun noget at gøre med omhvordan I brugerdetHovedpointe – detkommerog I skalforholdejertildetSnakom el for 100 årsiden
  7. Mangeproblemer (lokation/jura), tilgængelighedTing somernogetvrøvl: fx for SaaS – stole påfremmed software (detgør vi heletiden!)2 specieltvæsentlige
  8. Ifht. Perimeterparadigmeter den primæreudfodring at data flyttesuden for perimeterenI traditionelle data centre har org. stadig en form for kontrol – den forsvinder!
  9. (fermat) – brug den sundefornuftSpredrisiko (på mange niveauer: fxbrugflereleverandører; brug distr. Lagring)
  10. Datacentrisk – detgørallejo, men håndenpåhjertet, sårygerfokusmåske over påkontrollerneindimellemÆkvivalens – detdervargodtnokfør (men husk ogsådetsomikkevargodtnokogmåske nu kanblivedet)Destore talslov – effektivitetgælderikke bare drift men (formentlig) ogsåsikkerhed – ikkemindst for SMV
  11. Ikke bare laptopsogmobiltelefonerElmålere, varmestyring, temperaturmålere, dørlåse, firmabiler, allemuligetyperaf data services (banalt: vejr)SCADA/HVAC…
  12. En computer er en computer og en computer får virus. Lad være med at tro at I kanforhindredet (overalt).Menneskerglemmer ting. Netværkgårved.
  13. I Perimeterparadigmetforsøger vi at holde mobile enhederindenforperimeteren,Men - vækst I mængdenaf pervasive enheder - vækst I interaktion med “fremmede” enheder (gæsters laptops, elselskabetejerelmåler, …)
  14. To tekniskeforslagObfuskering – fokuserpå dataAll-or-nothing = brugbarsikkerhed
  15. Del-og-hersk (fx all-or-nothing)
  16. Hvader mutual computing2 eksempler - auktioner (herunderprocuremet, supply chain management, …) - benchmarking(Snakikkeomtrusler her!!!! Kun om at data måudveksles med konkurrenterprincipielt set)
  17. Blivermegetmeget mere dynamisk/ad-hoc I fremtiden
  18. Meredynamisk I fremtiden
  19. Konference 26/11
  20. Ækvi: