SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Jim Novack
eyebee Talent Swarm
www.talentswarm.com
June 8, 2015
How to Manage Enterprise
AR Safety & Risks
5/18/15 2www.theAREA.org
5/18/15 www.theAREA.org 3
Airbnb is rolling out a new identity
verification program that will eventually
require all users around the world to
connect their online identities with
conventional forms of identification.
Users have the choice of confirming their
birthdate and partial social security
number or uploading a scanned copy of a
government ID and linking it with an online
login through Airbnb, Facebook or
LinkedIn. A ‘Verified ID’ badge will appear
on profiles of users who have completed
the process.
“Trust is the key to our community. There
is no place for anonymity in a trusted
community,” Airbnb said in a blog post.
The company said it would ask a quarter of
its users in the United States to verify
their IDs starting today, but will soon
“expand this requirement to users around
the world.”
5/18/15 www.theAREA.org 4
Intrusion Protection (Perimeter defense)
5/18/15 www.theAREA.org 5
Playboy Mansion secret access
5/18/15 www.theAREA.org 6
A new electronic personal identity card will be introduced in Germany on 1 November 2010.
The complex overall system for managing the mandatory card and its contactless chip is on
display at CeBIT 2010. The card has three functions: 1. biometric identity verification, 2.
electronic identity verification, 3. authenticated electronic signature.
Identity Verification (Only Authorized Enter)
5/18/15 www.theAREA.org 7
Identity Theft
Tailgating
5/18/15 www.theAREA.org 8Trojan Horse
5/18/15 www.theAREA.org 9
5/18/15 www.theAREA.org 10
Mimetic Polyalloy
5/18/15 www.theAREA.org 11
Biometric Verification
5/18/15 www.theAREA.org 12
Minority Report
5/18/15 www.theAREA.org 13
• Telepresence (a remote viewer)
5/18/15 www.theAREA.org 14
5/18/15 www.theAREA.org 15Robonaut
5/18/15 www.theAREA.org 16
The Jedi Council Room - the ultimate telepresence conference room
This sounds like an
extension of a Microsoft
Research project,
Viewport, that was first
announced in 2012. The
team in charge of
Viewport proposed a
system that included a
camera rig that had a
number of color and
infrared cameras, along
with a series of infrared
projectors. The project
said that the goal was to
"reconstruct a 3D
representation in real-
time, which will be
rendered in a shared
virtual environment for
immersive
telecommunication."
http://gajitz.com/2-places-at-once-telexistence-bot-has-3-human-senses/
• Augmented Reality
(receiving information from a third party)
5/18/15 www.theAREA.org 17
http://umbra.sandia.gov/applications.html
Daqri
ODG
• Virtual Reality (artificial environment)
5/18/15 www.theAREA.org 18
5/18/15 www.theAREA.org 19Talent Swarm
5/18/15 www.theAREA.org 20
215/18/15
How to Manage Enterprise AR Safety & Risks?
5/18/15 www.theAREA.org 22
How to Manage Enterprise AR Safety & Risks?
• Confidentiality
(Authentication and Encryption and Private / Confidential)
• Integrity
(Message not Modified)
• Availability
(Usable)
5/18/15 www.theAREA.org 23
http://cacm.acm.org/magazines/2014/4/173222-security-and-
privacy-for-augmented-reality-systems/abstract
Data Security Basics:
AR “Laws” Should Minimally Account for:
7. Do No Harm (3 Laws…)
6. Respect privacy
5. Activity Auditing (Intention Proper and DNH)
4. Provide accuracy and source of information
(level of trust and affinity to user)
3. Verify identity of transmitter and receiver
2. Trusted network with Confidentiality, Integrity
of Messaging and Availability
1. Unalterable Device ID (like cell phone IMEI)
5/18/15 www.theAREA.org 24
5/18/15 www.theAREA.org 25
● User identification
● Key seed generation
● Centralized Management
● Statistics Management
Encrypted message through
regular communications network.
Authentication and seeds
through Central Authority.
Central Authority (CA)
5/18/15 www.theAREA.org 26
All information is
encrypted.
The central server
contains information on
the agenda, the keys and
is responsible for verifying
the identity of users and
devices.
Communications
(messages) never go
through the central
server.
The control packets are
also encrypted
communication.
5/18/15 www.theAREA.org 27
Who is providing the info?
Who has access to the video and audio streams?
Activity Auditing (Intention Proper and Do No Harm)
5/18/15 www.theAREA.org 28
5/18/15 www.theAREA.org 29
5/18/15 www.theAREA.org 30
5/18/15 www.theAREA.org 31
5/18/15 www.theAREA.org 32
5/18/15 www.theAREA.org 33
5/18/15 www.theAREA.org 34
“Soft Landing”
5/18/15 www.theAREA.org 35
Booth 84 – AWE 2015
Jim Novack
jim.novack@talentswarm.com
Come see us on July 1 in
Sheffield, England at
AR in the Strategic Enterprise
(ARise)
Thank you!
Talent Swarm
Collaborative Work Environment
eyebee AR Certification Services

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (13)

Mobile reach in Cina
Mobile reach in CinaMobile reach in Cina
Mobile reach in Cina
 
11 APIs (Adam Du Vander)
11 APIs (Adam Du Vander)11 APIs (Adam Du Vander)
11 APIs (Adam Du Vander)
 
Cyfirma is launching its proprietary cyber intelligence analytics platform ca...
Cyfirma is launching its proprietary cyber intelligence analytics platform ca...Cyfirma is launching its proprietary cyber intelligence analytics platform ca...
Cyfirma is launching its proprietary cyber intelligence analytics platform ca...
 
PacNOG 25: Life of a QR code
PacNOG 25: Life of a QR codePacNOG 25: Life of a QR code
PacNOG 25: Life of a QR code
 
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...
Open Source Insight:  Top Picks for Black Hat,  GDPR & Open Source Webinar,  ...Open Source Insight:  Top Picks for Black Hat,  GDPR & Open Source Webinar,  ...
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...
 
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via SlideshareThe Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
 
Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020
 
Overcoming Security Vulnerabilities and Cyberattacks in IoT Environment
Overcoming Security Vulnerabilities and Cyberattacks in IoT EnvironmentOvercoming Security Vulnerabilities and Cyberattacks in IoT Environment
Overcoming Security Vulnerabilities and Cyberattacks in IoT Environment
 
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
 
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
Open Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk ManagementOpen Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk Management
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
 
8 Internet of Things Figures Everyone Should Know
8 Internet of Things Figures Everyone Should Know8 Internet of Things Figures Everyone Should Know
8 Internet of Things Figures Everyone Should Know
 
Vladislav Iliushin: Dark side of IoT
Vladislav Iliushin: Dark side of IoTVladislav Iliushin: Dark side of IoT
Vladislav Iliushin: Dark side of IoT
 
Fraud and data. How an abundance of data on both B2B and B2C customers inevit...
Fraud and data. How an abundance of data on both B2B and B2C customers inevit...Fraud and data. How an abundance of data on both B2B and B2C customers inevit...
Fraud and data. How an abundance of data on both B2B and B2C customers inevit...
 

Ähnlich wie Jim Novack in #awe2015 with Talent Swarm. Best practices tips

Ähnlich wie Jim Novack in #awe2015 with Talent Swarm. Best practices tips (20)

Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?
 
Marketplace Innovation Report | Q4, 2015
Marketplace Innovation Report | Q4, 2015Marketplace Innovation Report | Q4, 2015
Marketplace Innovation Report | Q4, 2015
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
 
Knock, Knock…The Internet of Things wants to come in?
Knock, Knock…The Internet of Things wants to come in? Knock, Knock…The Internet of Things wants to come in?
Knock, Knock…The Internet of Things wants to come in?
 
Deepfake anyone, the ai synthetic media industry enters a dangerous phase
Deepfake anyone, the ai synthetic media industry enters a dangerous phaseDeepfake anyone, the ai synthetic media industry enters a dangerous phase
Deepfake anyone, the ai synthetic media industry enters a dangerous phase
 
Location Services and Geosocial Networking in Smartphones
Location Services and Geosocial Networking in SmartphonesLocation Services and Geosocial Networking in Smartphones
Location Services and Geosocial Networking in Smartphones
 
Latest Trends in Information Technology - 2020
Latest Trends  in Information Technology - 2020Latest Trends  in Information Technology - 2020
Latest Trends in Information Technology - 2020
 
Who needs spwyare when you have COVID-19 apps?
Who needs spwyare when you have COVID-19 apps?Who needs spwyare when you have COVID-19 apps?
Who needs spwyare when you have COVID-19 apps?
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT World
 
The Next Cyber Warfare Wave: AR and VR Worlds
The Next Cyber Warfare Wave: AR and VR WorldsThe Next Cyber Warfare Wave: AR and VR Worlds
The Next Cyber Warfare Wave: AR and VR Worlds
 
Risk-Adverse Real Estate Brokers
Risk-Adverse Real Estate BrokersRisk-Adverse Real Estate Brokers
Risk-Adverse Real Estate Brokers
 
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataApp Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing Data
 
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...
 
IoT And Inevitable Decentralization of The Internet
IoT And Inevitable Decentralization of The InternetIoT And Inevitable Decentralization of The Internet
IoT And Inevitable Decentralization of The Internet
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
INSECURE Magazine - 42
INSECURE Magazine - 42INSECURE Magazine - 42
INSECURE Magazine - 42
 
Top Technology Trends and Related Jobs
Top Technology Trends and Related JobsTop Technology Trends and Related Jobs
Top Technology Trends and Related Jobs
 
Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...
Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...
Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...
 
INSECURE Magazine - 33
INSECURE Magazine - 33INSECURE Magazine - 33
INSECURE Magazine - 33
 
MITRE-Module 4 Slides.pdf
MITRE-Module 4 Slides.pdfMITRE-Module 4 Slides.pdf
MITRE-Module 4 Slides.pdf
 

Kürzlich hochgeladen

Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
Sheetaleventcompany
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 

Kürzlich hochgeladen (20)

The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 

Jim Novack in #awe2015 with Talent Swarm. Best practices tips