SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Nye udfordringer, sikkerhedi den nyeverden  - skalsikkerhedsmodellenvendespåhovedet? Jakob I. Pagter Forsknings- ogInnovationschef Center for it-sikkerhed Alexandra Instituttet A/S
Buzzword compliance! Gamletravere: Digital natives Pervasive computing Cloud computing SaaSogHaaS Fremtidens buzzwords (buzzwords 2.0) Micro Perimeter Secure Multiparty Computing Obfuscated clients
Alexandra Instituttet A/S
Center for it-sikkerhed Kompetencer Secure Multiparty Computation Autentifikation Brugbarhed Sikkerkommunikation Forretningsforståelse Bagland Aarhus Universitet DTU Informatik IBM Logica Danske Bank Cryptomathic ÅrhusKommune KMD
Teknologihorisont apod.nasa.gov
Perimeterparadigmet
6 tendenser – 6 udfordringer
It-kriminalitet
Cloud Computing Computerkraftsomforsyningsvare (vision: 1966) Armbrust et al.: Above The Clouds, Berkeley 2009
Cloud Computing Multi-tennancy Adgangskontrol Hvilkebrugere? Hvilke data? -- “Architecture Strategies for Catching the Long Tail”, Microsoftmsdn.microsoft.com/en-us/library/aa479069.aspx
Cloud Computing Data ogapplikationeruden forperimeteren – logiskogfysisk Cloud Computing
Cloud Computing Ikkeraketvidenskab! Del-og-hersk --www.fermatproof.com
Cloud Computing Datacentrisksikkerhed (ikkeapplikationscentrisk!) Del-og-hersk Ækvivalensprincippet De store talslov
6 tendenser – 6 udfordringer
Pervasive Computing Ubiquitous computing, ambient intelligence, it-i-alting
Pervasive Computing von Neumann Tilgængelighed
Pervasive Computing Data ogbrugereuden for perimeterenpåenhedersomangribes – fysiskoglogisk Pervasive Computing
Pervasive Computing Obfuskering All-Or-Nothing public void zXcv(StringyTl, String ff, intqW){ ff = yTh+="nnn"; print(l99UY(yTl,yTI)); } String yTI; public void l99UY(String 6ty, String Fg) { return 6ty+ytI; } public void hello(Strings)  { print(s); }
Pervasive Computing Datacentrisksikkerhed Ækvivalensprincippet
6 tendenser – 6 udfordringer
Mutual Computing Web2.0 for virksomheder… diligentsia.net
Mutual Computing Auktioner Benchmarking
Mutual Computing Data flyttesuden for perimeter ogiværstefaldindenfor en konkurrents perimeter Mutual Computing
Mutual Computing Markedsdesign Secure Multiparty Computation
Mutual Computing Datacentrisksikkerhed Del-og-hersk Secure Multiparty Computation
6 tendenser – 6 udfordringer
Privacy Privacy
Privacy
Digital Natives Technology is “stuff”
Digital Natives Rogue users Getting the job done --Bardram et al.
Digital Natives Cloud Computing Mutual Computing Privacy Pervasive Computing
Digital Natives “If you love somebody – set them free”-politikken Secure Mashups http://cace-project.eu/
Digital Natives Datacentrisksikkerhed Embrace (ikke block) Pas på med ækvivalensprincippet!
6 tendenser – 6 udfordringer Dynamik Rogue users Egneenheder Rogue users Rogue users
Værdiafperimeteren? Cloud Computing Mutual Computing Privacy Pervasive Computing
Sikkerhedsmodellenpåhovedet? Org. ASP Data1 ASP+Data Org. Data
Inspiration Strategi/politik Datacentrisk Ækvivalensprincippet Del-og-hersk De store talslov Hærdcentralekomponenter ID-styring! Nye teknikker Distribueret lager Anvendtkrypto Secure Multiparty Computation
Sikkerhed og Revision 2009: Skal sikkerhedsmodellen vendes på hovedet?

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Hans Bos
Hans BosHans Bos
Hans Bos
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Mesh Twin Learning - Optimization of Smart Factories with Mesh Twin Learning
Mesh Twin Learning - Optimization of Smart Factories with Mesh Twin LearningMesh Twin Learning - Optimization of Smart Factories with Mesh Twin Learning
Mesh Twin Learning - Optimization of Smart Factories with Mesh Twin Learning
 
Ijwns
IjwnsIjwns
Ijwns
 
Matrix Table
Matrix TableMatrix Table
Matrix Table
 
Ijwns
IjwnsIjwns
Ijwns
 

Andere mochten auch

BusinessCard_ByrdGEO
BusinessCard_ByrdGEOBusinessCard_ByrdGEO
BusinessCard_ByrdGEO
John Byrd
 
Das revoluções inglesas à revolução industrial
Das revoluções inglesas à revolução industrialDas revoluções inglesas à revolução industrial
Das revoluções inglesas à revolução industrial
Maiquel Laux
 
พระราชนิเวศน์มฤคทายวัน
พระราชนิเวศน์มฤคทายวันพระราชนิเวศน์มฤคทายวัน
พระราชนิเวศน์มฤคทายวัน
Pachari
 

Andere mochten auch (15)

Finales
FinalesFinales
Finales
 
Minneapolis MO Proclamation
Minneapolis MO ProclamationMinneapolis MO Proclamation
Minneapolis MO Proclamation
 
Task 1.3 aoc
Task 1.3 aocTask 1.3 aoc
Task 1.3 aoc
 
GESTION AGILE DE L’ÉNERGIE
GESTION AGILE DE L’ÉNERGIEGESTION AGILE DE L’ÉNERGIE
GESTION AGILE DE L’ÉNERGIE
 
Atif Khan
Atif KhanAtif Khan
Atif Khan
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Teacher researcher1a
Teacher researcher1aTeacher researcher1a
Teacher researcher1a
 
Инструкция по записи обучающегося на кружки и секции
Инструкция по записи обучающегося на кружки и секцииИнструкция по записи обучающегося на кружки и секции
Инструкция по записи обучающегося на кружки и секции
 
BusinessCard_ByrdGEO
BusinessCard_ByrdGEOBusinessCard_ByrdGEO
BusinessCard_ByrdGEO
 
Das revoluções inglesas à revolução industrial
Das revoluções inglesas à revolução industrialDas revoluções inglesas à revolução industrial
Das revoluções inglesas à revolução industrial
 
พระราชนิเวศน์มฤคทายวัน
พระราชนิเวศน์มฤคทายวันพระราชนิเวศน์มฤคทายวัน
พระราชนิเวศน์มฤคทายวัน
 
Immurich Capsule
Immurich CapsuleImmurich Capsule
Immurich Capsule
 
Результаты ГИА 2016
Результаты ГИА 2016Результаты ГИА 2016
Результаты ГИА 2016
 
Gérer les avis clients sur Internet et sa e-réputation (Edition 2016)
Gérer les avis clients sur Internet et sa e-réputation (Edition 2016)Gérer les avis clients sur Internet et sa e-réputation (Edition 2016)
Gérer les avis clients sur Internet et sa e-réputation (Edition 2016)
 
Identité d'entreprise ou de marque : le nom, la signature et le logo
Identité d'entreprise ou de marque : le nom, la signature et le logoIdentité d'entreprise ou de marque : le nom, la signature et le logo
Identité d'entreprise ou de marque : le nom, la signature et le logo
 

Ähnlich wie Sikkerhed og Revision 2009: Skal sikkerhedsmodellen vendes på hovedet?

Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
ijtsrd
 
Think in grid - executive resume
Think in grid - executive resumeThink in grid - executive resume
Think in grid - executive resume
dmarino
 

Ähnlich wie Sikkerhed og Revision 2009: Skal sikkerhedsmodellen vendes på hovedet? (20)

McClansy Security Corporation
McClansy Security CorporationMcClansy Security Corporation
McClansy Security Corporation
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Serguei Seloussov - Future of computing and SIT MSc program
Serguei Seloussov - Future of computing and SIT MSc programSerguei Seloussov - Future of computing and SIT MSc program
Serguei Seloussov - Future of computing and SIT MSc program
 
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistanceComputer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
The End of the Fortress: The new Approach to Cybersecurity
The End of the Fortress: The new Approach to CybersecurityThe End of the Fortress: The new Approach to Cybersecurity
The End of the Fortress: The new Approach to Cybersecurity
 
Managing Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your OrganizationManaging Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your Organization
 
2018 learning approach-digitaltrends
2018 learning approach-digitaltrends2018 learning approach-digitaltrends
2018 learning approach-digitaltrends
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
Le potentiel du Machine Learning et de l’analyse prédictive à portée de votre...
Le potentiel du Machine Learning et de l’analyse prédictive à portée de votre...Le potentiel du Machine Learning et de l’analyse prédictive à portée de votre...
Le potentiel du Machine Learning et de l’analyse prédictive à portée de votre...
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
 
Artificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyArtificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum Cryptography
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
 
Think in grid - executive resume
Think in grid - executive resumeThink in grid - executive resume
Think in grid - executive resume
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
A New Security Paradigm for IoT (Internet of Threats)
A New Security Paradigm for IoT (Internet of Threats)A New Security Paradigm for IoT (Internet of Threats)
A New Security Paradigm for IoT (Internet of Threats)
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 

Mehr von Jakob Illeborg Pagter (6)

Secure Multiparty Computation or: How I learned to stop worrying and love the...
Secure Multiparty Computation or: How I learned to stop worrying and love the...Secure Multiparty Computation or: How I learned to stop worrying and love the...
Secure Multiparty Computation or: How I learned to stop worrying and love the...
 
Cloud Computing - fra udfordring til løsning
Cloud Computing - fra udfordring til løsningCloud Computing - fra udfordring til løsning
Cloud Computing - fra udfordring til løsning
 
20100113 cc i det offentlige
20100113 cc i det offentlige20100113 cc i det offentlige
20100113 cc i det offentlige
 
En status på kryptoalgoritmer
En status på kryptoalgoritmerEn status på kryptoalgoritmer
En status på kryptoalgoritmer
 
Secure Multiparty Computation - a technology with promises for privacy
Secure Multiparty Computation - a technology with promises for privacySecure Multiparty Computation - a technology with promises for privacy
Secure Multiparty Computation - a technology with promises for privacy
 
En sikker børs for roekvoter
En sikker børs for roekvoterEn sikker børs for roekvoter
En sikker børs for roekvoter
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Sikkerhed og Revision 2009: Skal sikkerhedsmodellen vendes på hovedet?

Hinweis der Redaktion

  1. MinbaggrundDialog med Jens Roed Andersen
  2. Lidtsjov
  3. VI sælgerrådgivningpå desværetekniskeproblemer:- Ex 1: foredrag- ex 2: goalref
  4. Jegharingen “silverbullit” med I tasken – forsøger bare at stille de godespørgsmålForhåbenligtlidtstoftileftertankeomkringhvaddererbagvedhorisontenteknologiskogsikkerhedsmæssigtForståhvorjegkommerfra: vi vilgerne lave løsningerderbidragerteknisk, men vedgodt at teknik kun er en mindre delJegkommerindpånogleforslagpåtekniskeløsninger – disseeralle – I en elleranden form – kommercielttilgængelige, sådeterikkeren science fiction!
  5. Den grundlæggendetankegang – fordideterpraktisk!
  6. Eller Utility computing som Carr foretrækkerPointenerikkeomdeterHaaS,PaaSellerSaas – dethar kun noget at gøre med omhvordan I brugerdetHovedpointe – detkommerog I skalforholdejertildetSnakom el for 100 årsiden
  7. Mangeproblemer (lokation/jura), tilgængelighedTing somernogetvrøvl: fx for SaaS – stole påfremmed software (detgør vi heletiden!)2 specieltvæsentlige
  8. Ifht. Perimeterparadigmeter den primæreudfodring at data flyttesuden for perimeterenI traditionelle data centre har org. stadig en form for kontrol – den forsvinder!
  9. (fermat) – brug den sundefornuftSpredrisiko (på mange niveauer: fxbrugflereleverandører; brug distr. Lagring)
  10. Datacentrisk – detgørallejo, men håndenpåhjertet, sårygerfokusmåske over påkontrollerneindimellemÆkvivalens – detdervargodtnokfør (men husk ogsådetsomikkevargodtnokogmåske nu kanblivedet)Destore talslov – effektivitetgælderikke bare drift men (formentlig) ogsåsikkerhed – ikkemindst for SMV
  11. Ikke bare laptopsogmobiltelefonerElmålere, varmestyring, temperaturmålere, dørlåse, firmabiler, allemuligetyperaf data services (banalt: vejr)SCADA/HVAC…
  12. En computer er en computer og en computer får virus. Lad være med at tro at I kanforhindredet (overalt).Menneskerglemmer ting. Netværkgårved.
  13. I Perimeterparadigmetforsøger vi at holde mobile enhederindenforperimeteren,Men - vækst I mængdenaf pervasive enheder - vækst I interaktion med “fremmede” enheder (gæsters laptops, elselskabetejerelmåler, …)
  14. To tekniskeforslagObfuskering – fokuserpå dataAll-or-nothing = brugbarsikkerhed
  15. Del-og-hersk (fx all-or-nothing)
  16. Hvader mutual computing2 eksempler - auktioner (herunderprocuremet, supply chain management, …) - benchmarking(Snakikkeomtrusler her!!!! Kun om at data måudveksles med konkurrenterprincipielt set)
  17. Blivermegetmeget mere dynamisk/ad-hoc I fremtiden
  18. Meredynamisk I fremtiden
  19. Konference 26/11
  20. Ækvi: