SlideShare a Scribd company logo
1 of 12
Download to read offline
CYBER IMMUNE SYSTEMS THAT
HELPS TRUST AND RELIABILITY,
HELPED BY CROSS BOARDER
CORPORATION
Sao Paulo, Brazil
November 12, 2013
Dr. Makoto (Mac) Yokozawa
Nomura Research Institute, Ltd.(Japan)
Visiting Professor at Kyoto University
JISA, Japan Information Service Industry Association, Public Policy
Subcommittee Chair

11820047(08
)

0
1
ISSUES AROUND THE ICT

C O P Y R I G H T M . Y O K O ZAW A

2
CYBER IMMUNE TECHNOLOGIES

Figure 2 Key Elements of a Simplified Immune System
Artificial Immune Systems for Intrusion Detection, James McCaffrey,
“Microsoft MSDN Test Run”

Heuristics Based Antivirus Protection Software
(Commercial)

3
WHAT’S NEW AND WHAT’S OLD
Cyber Security

Cyber Immunity

 Protection before incidents

 Resilience after incidents

 “In vitro” observation

 “In vivo” observation

 Rules and Patterns Based

 Heuristics and Knowledge Based

Filtering and Collaboration

Filtering and Collaboration

 Quick Response

 Reorganizing the Ecosystem

 Artificial

 Organic

4
WHY IMMUNE SYSTEM?
 Maturity in Cyber Security to some extent,
 New Fashion in Countermeasures for Cyber security

Incidents
 Increasing Number of Unknown Threats
 Weak Literacy and Zero Literacy Nodes (IOT,M2M)
 BYOD

 Moving from Governance by Legislation to Governance by Market-base Principles and

Architecture

 Reasons for Immunity
 Do not re-install the Windows, Repair and Reuse without Shutting down your Service
 Targeted Attack

and Advanced Persistent Attack will never end in a day, with a single

pattern
 Backdoors everywhere - Embedding Spy Chips in Everyday Household Gadgets and

Appliances
 Data Sovereignty and Data Ownership

5
HOW DO WE COLLABORATE IN CYBER
IMMUNITY?
 Sharing Immunity
 Forensics
 Heuristics in Detection
 Heuristics in Immunity
 Meta Knowledge

 New Network Structure and Technologies
 IPv6

 non-IP New Network Protocol
 Resilient Structure
 Redundant and Modular Network Connection

 Privacy and Security Tradeoff Study
 Security Improves Privacy Protection in many situation
 Sometimes Privacy have to be sacrificed in order to improve Security
 Security BY Design and Privacy BY Design --- need to Change the Architecture
 Identity Management and Trust Framework
6
7
WHAT YOU SEE ON THE TABLE

8
Proposal from US-Japan Business to US-Japan Governments 2012
(1) Privacy
a. Balancing Protection and Utilization
b. OECD Guideline on the Protection of Privacy and Cross boarder Flows of
Personal Data
c. Public-Private Partnership in Privacy Protection, 3rd Country Issues,
Activities in International Institutes
d. Regulatory Structure and Vitality in Cloud Business
e. EU Data Protection Rules and APEC Cross Boarder Privacy Rules

(2) Information Security
a. “Security as a Service”, “Security in Cloud Services”, Trust and Cost
b. Cloud Services and Devices, their New Aspects and New Threats in
Information Security
c. Maturity and Immaturity in Security Awareness
d. Security related Areas of Collaboration between US and Japan
• Developments of Security Enhancing Technology
• Organizational Design in Operation
• Organizational Management and Internal/External Communication
• Education and Awareness Development
• Quick Response and Resilience
• Desktop Exercise and Evaluation of Maturity in Information Security
9
ID Federation Business is blooming in Japan
(based on NRI’s track record in 2011)

More than
200 million IDs
Yahoo! Japan: Active User: 25 mil.
Yahoo! Premium member:7.6 mil.

Membership-based site
Insurance
NIKKEI
AD Tech

NIKKEI
Career College

Nonlife Insurance

Credit Card
Gmail Account170 mil.

News Media
NIKKEI ID 1 mil.

Real Estate

Member: over 20 mil.

Housing Rental

30 mil. in Japan
(estimated)

Publishing
9 mil. in Japan (estimated)

Air Career
2 mil. members
JAL Milage
Bank 20 mil.

56 mil. subscriber

EC

Beverage

25 mil. subscriber

Travel Agent

32mil subscribers

Telecom

Affiliated
Contents provider
Affiliated
Net shop

Telecom

67 mil.
Active:43 mil.
Trust Framework should be the platform for the National Identification System in
Japan

As-Is

Establishing Trust Framework in Japan

To-Be

Link

U.S.

Japan

U.S. ver. of Link
Trust
Framework

ID

ID

ID

U.S.

E.U.
Link E.U. ver. of
Trust
Framework

ID

ID

ID

ID

ID

ID

Japan

E.U.

U.S. ver. of Link Japan ver. Of Link E.U. ver. of
Trust
Trust
Trust
Framework
Framework
Framework

ID

ID

ID

ID

ID

ID

ID

ID

ID

NII
Due to the absence of Trust
Framework (OITF) in Japan, NII
(National Institute of Informatics) needs
to get certified by an assessor working
for U.S. national identification system.
Copyright(C) Nomura Research Institute, Ltd. All rights reserved.

Establishing Trust Framework (OITF)
in Japan, Japanese e-government can
be accessed by a private sectors ID.
Furthermore, it will enable Japanese
people to connect to the global
services.
11

More Related Content

What's hot

Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
Shyam Goyal
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Andris Soroka
 

What's hot (19)

The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
Internet of things: dispelling common myths
Internet of things: dispelling common myths Internet of things: dispelling common myths
Internet of things: dispelling common myths
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
35 Cyber Security Deals during Q4 2013
35 Cyber Security Deals during Q4 201335 Cyber Security Deals during Q4 2013
35 Cyber Security Deals during Q4 2013
 
State of the OpenCloud Report 2020
State of the OpenCloud Report 2020State of the OpenCloud Report 2020
State of the OpenCloud Report 2020
 
76 s201918
76 s20191876 s201918
76 s201918
 
EuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyEuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the sky
 
Kijiji 160616
Kijiji 160616Kijiji 160616
Kijiji 160616
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
 

Similar to [GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust and Reliability, Helped By Cross Boarder Corporation

New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
ijtsrd
 
AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...
AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...
AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...
ijtsrd
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
donnajames55
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
ChantellPantoja184
 

Similar to [GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust and Reliability, Helped By Cross Boarder Corporation (20)

New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security Aspects
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
Japan's Soft Power Panel #2: High-Tech
Japan's Soft Power Panel #2: High-TechJapan's Soft Power Panel #2: High-Tech
Japan's Soft Power Panel #2: High-Tech
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...
AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...
AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
 
State of AI Report 2022 - ONLINE.pdf
State of AI Report 2022 - ONLINE.pdfState of AI Report 2022 - ONLINE.pdf
State of AI Report 2022 - ONLINE.pdf
 

More from Assespro Nacional

WCIT 2016 | Informativo nº4
WCIT 2016 | Informativo nº4WCIT 2016 | Informativo nº4
WCIT 2016 | Informativo nº4
Assespro Nacional
 
WCIT 2016 - Informativo nº3
WCIT 2016 - Informativo nº3WCIT 2016 - Informativo nº3
WCIT 2016 - Informativo nº3
Assespro Nacional
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II
Assespro Nacional
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...
Assespro Nacional
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados
[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados
[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados
Assespro Nacional
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping
Assespro Nacional
 
[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos
[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos
[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos
Assespro Nacional
 
Guia GIFE - IBGC 2014: Guia das Melhores Práticas de Governança para Institu...
Guia GIFE - IBGC 2014:  Guia das Melhores Práticas de Governança para Institu...Guia GIFE - IBGC 2014:  Guia das Melhores Práticas de Governança para Institu...
Guia GIFE - IBGC 2014: Guia das Melhores Práticas de Governança para Institu...
Assespro Nacional
 
[GPATS 2013] The São Paulo Declaration
[GPATS 2013] The São Paulo Declaration[GPATS 2013] The São Paulo Declaration
[GPATS 2013] The São Paulo Declaration
Assespro Nacional
 
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...
Assespro Nacional
 
[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia
[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia
[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia
Assespro Nacional
 
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services
Assespro Nacional
 
[GPATS 2013] Torbjörn Fredriksson - PROMOTING THE ICT SECTOR: The Importance ...
[GPATS 2013] Torbjörn Fredriksson - PROMOTING THE ICT SECTOR: The Importance ...[GPATS 2013] Torbjörn Fredriksson - PROMOTING THE ICT SECTOR: The Importance ...
[GPATS 2013] Torbjörn Fredriksson - PROMOTING THE ICT SECTOR: The Importance ...
Assespro Nacional
 

More from Assespro Nacional (20)

2018 aleti+-it-census-results-2017
2018 aleti+-it-census-results-20172018 aleti+-it-census-results-2017
2018 aleti+-it-census-results-2017
 
WCIT 2016 | Informativo nº4
WCIT 2016 | Informativo nº4WCIT 2016 | Informativo nº4
WCIT 2016 | Informativo nº4
 
WCIT 2016 - Informativo nº3
WCIT 2016 - Informativo nº3WCIT 2016 - Informativo nº3
WCIT 2016 - Informativo nº3
 
[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...
[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...
[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...
 
2014 - Censo ALETI do Setor de TIC: Resultados
2014 - Censo ALETI do Setor de TIC: Resultados2014 - Censo ALETI do Setor de TIC: Resultados
2014 - Censo ALETI do Setor de TIC: Resultados
 
Dissertação - Sr. Luiz Paiva
Dissertação - Sr. Luiz PaivaDissertação - Sr. Luiz Paiva
Dissertação - Sr. Luiz Paiva
 
Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...
Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...
Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados
[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados
[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping
 
[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos
[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos
[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos
 
Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...
Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...
Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...
 
Guia GIFE - IBGC 2014: Guia das Melhores Práticas de Governança para Institu...
Guia GIFE - IBGC 2014:  Guia das Melhores Práticas de Governança para Institu...Guia GIFE - IBGC 2014:  Guia das Melhores Práticas de Governança para Institu...
Guia GIFE - IBGC 2014: Guia das Melhores Práticas de Governança para Institu...
 
Censo do Setor de TI 2013
Censo do Setor de TI 2013 Censo do Setor de TI 2013
Censo do Setor de TI 2013
 
[GPATS 2013] The São Paulo Declaration
[GPATS 2013] The São Paulo Declaration[GPATS 2013] The São Paulo Declaration
[GPATS 2013] The São Paulo Declaration
 
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...
 
[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia
[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia
[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia
 
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services
 
[GPATS 2013] Torbjörn Fredriksson - PROMOTING THE ICT SECTOR: The Importance ...
[GPATS 2013] Torbjörn Fredriksson - PROMOTING THE ICT SECTOR: The Importance ...[GPATS 2013] Torbjörn Fredriksson - PROMOTING THE ICT SECTOR: The Importance ...
[GPATS 2013] Torbjörn Fredriksson - PROMOTING THE ICT SECTOR: The Importance ...
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust and Reliability, Helped By Cross Boarder Corporation

  • 1. CYBER IMMUNE SYSTEMS THAT HELPS TRUST AND RELIABILITY, HELPED BY CROSS BOARDER CORPORATION Sao Paulo, Brazil November 12, 2013 Dr. Makoto (Mac) Yokozawa Nomura Research Institute, Ltd.(Japan) Visiting Professor at Kyoto University JISA, Japan Information Service Industry Association, Public Policy Subcommittee Chair 11820047(08 ) 0
  • 2. 1
  • 3. ISSUES AROUND THE ICT C O P Y R I G H T M . Y O K O ZAW A 2
  • 4. CYBER IMMUNE TECHNOLOGIES Figure 2 Key Elements of a Simplified Immune System Artificial Immune Systems for Intrusion Detection, James McCaffrey, “Microsoft MSDN Test Run” Heuristics Based Antivirus Protection Software (Commercial) 3
  • 5. WHAT’S NEW AND WHAT’S OLD Cyber Security Cyber Immunity  Protection before incidents  Resilience after incidents  “In vitro” observation  “In vivo” observation  Rules and Patterns Based  Heuristics and Knowledge Based Filtering and Collaboration Filtering and Collaboration  Quick Response  Reorganizing the Ecosystem  Artificial  Organic 4
  • 6. WHY IMMUNE SYSTEM?  Maturity in Cyber Security to some extent,  New Fashion in Countermeasures for Cyber security Incidents  Increasing Number of Unknown Threats  Weak Literacy and Zero Literacy Nodes (IOT,M2M)  BYOD  Moving from Governance by Legislation to Governance by Market-base Principles and Architecture  Reasons for Immunity  Do not re-install the Windows, Repair and Reuse without Shutting down your Service  Targeted Attack and Advanced Persistent Attack will never end in a day, with a single pattern  Backdoors everywhere - Embedding Spy Chips in Everyday Household Gadgets and Appliances  Data Sovereignty and Data Ownership 5
  • 7. HOW DO WE COLLABORATE IN CYBER IMMUNITY?  Sharing Immunity  Forensics  Heuristics in Detection  Heuristics in Immunity  Meta Knowledge  New Network Structure and Technologies  IPv6  non-IP New Network Protocol  Resilient Structure  Redundant and Modular Network Connection  Privacy and Security Tradeoff Study  Security Improves Privacy Protection in many situation  Sometimes Privacy have to be sacrificed in order to improve Security  Security BY Design and Privacy BY Design --- need to Change the Architecture  Identity Management and Trust Framework 6
  • 8. 7
  • 9. WHAT YOU SEE ON THE TABLE 8
  • 10. Proposal from US-Japan Business to US-Japan Governments 2012 (1) Privacy a. Balancing Protection and Utilization b. OECD Guideline on the Protection of Privacy and Cross boarder Flows of Personal Data c. Public-Private Partnership in Privacy Protection, 3rd Country Issues, Activities in International Institutes d. Regulatory Structure and Vitality in Cloud Business e. EU Data Protection Rules and APEC Cross Boarder Privacy Rules (2) Information Security a. “Security as a Service”, “Security in Cloud Services”, Trust and Cost b. Cloud Services and Devices, their New Aspects and New Threats in Information Security c. Maturity and Immaturity in Security Awareness d. Security related Areas of Collaboration between US and Japan • Developments of Security Enhancing Technology • Organizational Design in Operation • Organizational Management and Internal/External Communication • Education and Awareness Development • Quick Response and Resilience • Desktop Exercise and Evaluation of Maturity in Information Security 9
  • 11. ID Federation Business is blooming in Japan (based on NRI’s track record in 2011) More than 200 million IDs Yahoo! Japan: Active User: 25 mil. Yahoo! Premium member:7.6 mil. Membership-based site Insurance NIKKEI AD Tech NIKKEI Career College Nonlife Insurance Credit Card Gmail Account170 mil. News Media NIKKEI ID 1 mil. Real Estate Member: over 20 mil. Housing Rental 30 mil. in Japan (estimated) Publishing 9 mil. in Japan (estimated) Air Career 2 mil. members JAL Milage Bank 20 mil. 56 mil. subscriber EC Beverage 25 mil. subscriber Travel Agent 32mil subscribers Telecom Affiliated Contents provider Affiliated Net shop Telecom 67 mil. Active:43 mil.
  • 12. Trust Framework should be the platform for the National Identification System in Japan As-Is Establishing Trust Framework in Japan To-Be Link U.S. Japan U.S. ver. of Link Trust Framework ID ID ID U.S. E.U. Link E.U. ver. of Trust Framework ID ID ID ID ID ID Japan E.U. U.S. ver. of Link Japan ver. Of Link E.U. ver. of Trust Trust Trust Framework Framework Framework ID ID ID ID ID ID ID ID ID NII Due to the absence of Trust Framework (OITF) in Japan, NII (National Institute of Informatics) needs to get certified by an assessor working for U.S. national identification system. Copyright(C) Nomura Research Institute, Ltd. All rights reserved. Establishing Trust Framework (OITF) in Japan, Japanese e-government can be accessed by a private sectors ID. Furthermore, it will enable Japanese people to connect to the global services. 11