SlideShare a Scribd company logo
Security, Privacy and the Future Internet
Prof. Dr. Michael Waidner




                                            © Fraunhofer-Gesellschaft 2011
                  –1–
Outline



     Future Internet
     Security and Privacy
     Security and Privacy by Design




                                       © Fraunhofer-Gesellschaft 2011
                         –2–
Internet of People, Data, Services, Things, … and Crime & War


                      Online
                  Social Networks        Cloud-delivered
Cloud-delivered                            Crime & War
 IT & Business
    Services       Globally interconnected
                      cyber-physical system




                                                                 © Fraunhofer-Gesellschaft 2011
                              –3–
Overall, Security is Becoming More Difficult

                       Future Internet is the ideal target:
                         everybody, everything is online

                       Professionalization
                         and industrialization
                         of cybercrime and cyberwar

                       Network of people and
                         user-generated content
                             Privacy (in public spaces …)
                             Intellectual property




                                                                        © Fraunhofer-Gesellschaft 2011
                             Filtering illegal and dangerous content
                             Withstanding censorship

                                –4–
But Security may Also Benefit from the Future Internet

                       Better security through
                        standards, automation, services
                          Cloud will lower costs for good and
                           well-managed security and privacy
                          Today, poor service management
                           (governance, change, patch) is key
                           source of insecurity!

                       Global scale, global economy
                        may enable global standards
                          Trust and identity infrastructures




                                                                 © Fraunhofer-Gesellschaft 2011
                          Privacy and information sharing
                          Assurance, auditing, forensics

                              –5–
Outline



     Future Internet
     Security and Privacy
     Security and Privacy by Design




                                       © Fraunhofer-Gesellschaft 2011
                         –6–
A Slightly More Technical View: Security Problems
                      New technologies, new threat vectors
                           Massive resource sharing in clouds
                           Mobile and ambient as new access channel
                           Cyber-physical convergence
                           Global connectivity without global identity

                      Old principles don’t apply anymore
                         Perimeter security
                          vs. service decomposition
                         Trusted base vs. everything in the cloud
                         Managed endpoint security




                                                                          © Fraunhofer-Gesellschaft 2011
                          vs. consumerization
                        …

                               –7–
Some Security Research Challenges
                     Research pipe full of untested results
                       Crypto, trusted computing, provenance,
                          sticky policies, automated checking, …

                     More applied research
                         Security for legacy systems, networks, …
                         Unexpected intrusions, abuses, insiders
                         Accountability with privacy
                         Forensics with privacy
                         Quantification of risks and security

                     Create a network to fight a network
                       Cross-org sharing of security information




                                                                     © Fraunhofer-Gesellschaft 2011
                     Commons nature of security

                               –8–
Privacy in the Future Internet

                   Privacy is difficult to define
                     What is the €-value of your personal information?
                     What is privacy in a public space like an OSN?
                     Tradeoffs are always individual
                   Status
                     Purpose Binding: responsible data
                      management – mostly mature
                     Data minimization: crypto and data
                      management – no practical experience
                     Context binding: not even well defined




                                                                          © Fraunhofer-Gesellschaft 2011
                     Sustainable informational
                      self-determination: no good solutions


                                 –9–
Some Privacy Research Challenges
                What is privacy in …
                  OSN, location, ambient, mobile, cloud, smart grids, …
                  Mental models for usability
                Research pipe full of untested results
                Standardization
                  Portable id, pseudonyms, options, expiration dates, …
                  Globally practical trust and identity framework
                M0re applied research
                  Privacy despite accountability
                  Privacy despite forensics




                                                                           © Fraunhofer-Gesellschaft 2011
                  Computing with encrypted data
                Commons nature of privacy

                               – 10 –
Outline



     Future Internet
     Security and Privacy
     Security and Privacy by Design




                                       © Fraunhofer-Gesellschaft 2011
                         – 11 –
Building a Secure System


 Huge body of
  engineering
  knowledge
 Many articles,
  books, courses,
  degrees, tools, …
 So, in theory, this
  should be doable




                                    © Fraunhofer-Gesellschaft 2011
                           – 12 –
Building a Secure System

State of the
art in the
software
industry
                  Source: Microsoft Secure Development Lifecycle




                                                                   A more detailed look
But # of                                                           shows:
vulnerabilities                                                    •   Same errors
is still                                                               again and again
                                                                   •   IT people lack skills
going up                                                           •   Current processes




                                                                                               © Fraunhofer-Gesellschaft 2011
                                                                       and tools are too
                                                                       complex for humans

                  Source: IBM X-Force, 2011



                                                    – 13 –
Which one is Better: “by design” or “by patching”
                                                       NIST 2010:
Security and Privacy    Security and Privacy           • 80% of development
by Design               by Patching                       costs spent on finding
                                                          and fixing errors
Overall: economic       Overall: expensive
                                                       IBM 2010: Fixing a single
 High initial costs     Low initial costs            defect during … costs:
 Low recurring costs    High recurring costs         • Coding: $80
                                                       • Build: $240
Avoids damage           Damage might be                • QA/Test: $960
                        irreversible:                  • Post release: $7’600 +
                                                          reputational costs
                         Life and health
                         Critical infrastructure
                         Privacy, reputation,
                           confidentiality




                                                                                   © Fraunhofer-Gesellschaft 2011
      European Center for Security and Privacy by Design (EC-SPRIDE)
      Projected start: October 1st, 2011


                                      – 14 –
What needs to be done

                    Challenges
                         Consistent models throughout all phases
                         Patterns for requirements analysis
                         Model-driven security (design, test)
                         Static and dynamic analysis
                         Usability: end users, developers, admins
                         Ready to use building blocks
                         Demonstrable and quantifiable
                          improvements in security
                         Applied to interesting cases:




                                                                     © Fraunhofer-Gesellschaft 2011
                          cloud computing, embedded, …
                         Education for ordinary developers


                               – 15 –
Outline



     Future Internet
     Security and Privacy
     Security and Privacy by Design




                                       © Fraunhofer-Gesellschaft 2011
                         – 16 –
Prof. Dr. Michael Waidner
michael.waidner@sit.fraunhofer.de


Fraunhofer-Institut für
Sichere Informationstechnologie
Rheinstraße 75
64295 Darmstadt
www.fraunhofer.de
www.sit.fraunhofer.de


Center for Advanced Security
Research Darmstadt
Lehrstuhl für Sicherheit in der IT
Mornewegstraße 30




                                     © Fraunhofer-Gesellschaft 2011
64289 Darmstadt
www.cased.de
www.sit.tu-darmstadt.de



   – 17 –

More Related Content

PDF
Ehc brochure
PDF
Infromation Security as an Institutional Priority
PDF
Puppetnets and Botnets: Information Technology Vulnerability Exploits
PDF
Hakin9 interview w Prof Sood
PDF
Compliance standards interoperability - Zoltan Precsenyi
PPTX
Models of Escalation and De-escalation in Cyber Conflict
PDF
Narus Cyber 3.0 Position Paper
PDF
Mark Lanterman - The Risk Report October 2015
Ehc brochure
Infromation Security as an Institutional Priority
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Hakin9 interview w Prof Sood
Compliance standards interoperability - Zoltan Precsenyi
Models of Escalation and De-escalation in Cyber Conflict
Narus Cyber 3.0 Position Paper
Mark Lanterman - The Risk Report October 2015

What's hot (19)

PDF
Research Agenda in Security Research
PDF
International Cyber Security 2012
PDF
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
PDF
Ci31560566
PDF
Carbon Black: 32 Security Experts on Changing Endpoint Security
PPTX
Enhancing Academic Event Participation with Context-aware and Social Recommen...
PPTX
SCIT Labs - intrusion tolerant systems
PDF
Cyber defense: Understanding and Combating the Threat
PDF
The OK! technology - Exposé v3.26 20170208
PDF
Cyber Security for the Military and Defence Sector 2013
PPTX
Security Awareness Program
PDF
Peering Through the Cloud Forrester EMEA 2010
PPTX
Targeted Attacks: Have you found yours?
PPTX
Security assessment for financial institutions
PPT
Disaster Risk Management in the Information Age
PDF
Moving target-defense
PDF
Security of,for & by cloud
Research Agenda in Security Research
International Cyber Security 2012
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
Ci31560566
Carbon Black: 32 Security Experts on Changing Endpoint Security
Enhancing Academic Event Participation with Context-aware and Social Recommen...
SCIT Labs - intrusion tolerant systems
Cyber defense: Understanding and Combating the Threat
The OK! technology - Exposé v3.26 20170208
Cyber Security for the Military and Defence Sector 2013
Security Awareness Program
Peering Through the Cloud Forrester EMEA 2010
Targeted Attacks: Have you found yours?
Security assessment for financial institutions
Disaster Risk Management in the Information Age
Moving target-defense
Security of,for & by cloud
Ad

Viewers also liked (10)

PPTX
Digital Thinking II.
PDF
7 distributed storage_open_stack
PDF
Petit Club Cookies - The future of privacy par nugg.ad
PPTX
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
PDF
Future of privacy - Insights from Discussions Building on an Initial Perspect...
PDF
Web Meets World: Privacy and the Future of the Cloud
PDF
150625_핀테크포럼 6월 정기모임_빅데이터시대와 블록체인
PPTX
Mobile Cloud Computing Challenges and Security
PDF
Net Promoter Score Pitfalls to Avoid
PDF
Analytics Trends 2016: The next evolution
Digital Thinking II.
7 distributed storage_open_stack
Petit Club Cookies - The future of privacy par nugg.ad
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Future of privacy - Insights from Discussions Building on an Initial Perspect...
Web Meets World: Privacy and the Future of the Cloud
150625_핀테크포럼 6월 정기모임_빅데이터시대와 블록체인
Mobile Cloud Computing Challenges and Security
Net Promoter Score Pitfalls to Avoid
Analytics Trends 2016: The next evolution
Ad

Similar to Security, Privacy and the Future Internet (20)

PDF
Jacques Bus F I I R L Presentation J B
PPTX
Iot(security)
PPTX
BUTLER IoT - Luxemburg presentation 8 9-12
PPT
Josep Domingo Jordi Castella
PDF
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
PPTX
Bl cybersecurity z_dooly
PDF
The evolving threat in the face of increased connectivity
PPTX
Core security utcpresentation962012
PDF
Top 9 Data Security Trends for 2012
PDF
Security concepts
PPTX
Emerging Trends in Cybersecurity by Amar Prusty
PDF
From Identity to Ownership Theft
PDF
Simon Harrison RWE - Chain of Things 010616 final
PDF
Track 5 session 1 - st dev con 2016 - need for security for iot
PDF
FIA Budapest - Meyer
PPTX
559566583-Chapter-6-E-P.pptxGHRTHRTHTRHTH
PDF
Esecurity e202
PDF
Wireless Security on Context (disponible en español)
PDF
Internet Science
PDF
20120605 icse zurich
Jacques Bus F I I R L Presentation J B
Iot(security)
BUTLER IoT - Luxemburg presentation 8 9-12
Josep Domingo Jordi Castella
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
Bl cybersecurity z_dooly
The evolving threat in the face of increased connectivity
Core security utcpresentation962012
Top 9 Data Security Trends for 2012
Security concepts
Emerging Trends in Cybersecurity by Amar Prusty
From Identity to Ownership Theft
Simon Harrison RWE - Chain of Things 010616 final
Track 5 session 1 - st dev con 2016 - need for security for iot
FIA Budapest - Meyer
559566583-Chapter-6-E-P.pptxGHRTHRTHTRHTH
Esecurity e202
Wireless Security on Context (disponible en español)
Internet Science
20120605 icse zurich

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Mushroom cultivation and it's methods.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Encapsulation theory and applications.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
August Patch Tuesday
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Tartificialntelligence_presentation.pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
1. Introduction to Computer Programming.pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
Building Integrated photovoltaic BIPV_UPV.pdf
Mushroom cultivation and it's methods.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Encapsulation theory and applications.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Heart disease approach using modified random forest and particle swarm optimi...
August Patch Tuesday
Chapter 5: Probability Theory and Statistics
Encapsulation_ Review paper, used for researhc scholars
Tartificialntelligence_presentation.pptx
cloud_computing_Infrastucture_as_cloud_p
Enhancing emotion recognition model for a student engagement use case through...
Getting Started with Data Integration: FME Form 101
Group 1 Presentation -Planning and Decision Making .pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
1. Introduction to Computer Programming.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Zenith AI: Advanced Artificial Intelligence

Security, Privacy and the Future Internet

  • 1. Security, Privacy and the Future Internet Prof. Dr. Michael Waidner © Fraunhofer-Gesellschaft 2011 –1–
  • 2. Outline  Future Internet  Security and Privacy  Security and Privacy by Design © Fraunhofer-Gesellschaft 2011 –2–
  • 3. Internet of People, Data, Services, Things, … and Crime & War Online Social Networks Cloud-delivered Cloud-delivered Crime & War IT & Business Services Globally interconnected cyber-physical system © Fraunhofer-Gesellschaft 2011 –3–
  • 4. Overall, Security is Becoming More Difficult  Future Internet is the ideal target: everybody, everything is online  Professionalization and industrialization of cybercrime and cyberwar  Network of people and user-generated content  Privacy (in public spaces …)  Intellectual property © Fraunhofer-Gesellschaft 2011  Filtering illegal and dangerous content  Withstanding censorship –4–
  • 5. But Security may Also Benefit from the Future Internet  Better security through standards, automation, services  Cloud will lower costs for good and well-managed security and privacy  Today, poor service management (governance, change, patch) is key source of insecurity!  Global scale, global economy may enable global standards  Trust and identity infrastructures © Fraunhofer-Gesellschaft 2011  Privacy and information sharing  Assurance, auditing, forensics –5–
  • 6. Outline  Future Internet  Security and Privacy  Security and Privacy by Design © Fraunhofer-Gesellschaft 2011 –6–
  • 7. A Slightly More Technical View: Security Problems  New technologies, new threat vectors  Massive resource sharing in clouds  Mobile and ambient as new access channel  Cyber-physical convergence  Global connectivity without global identity  Old principles don’t apply anymore  Perimeter security vs. service decomposition  Trusted base vs. everything in the cloud  Managed endpoint security © Fraunhofer-Gesellschaft 2011 vs. consumerization … –7–
  • 8. Some Security Research Challenges  Research pipe full of untested results  Crypto, trusted computing, provenance, sticky policies, automated checking, …  More applied research  Security for legacy systems, networks, …  Unexpected intrusions, abuses, insiders  Accountability with privacy  Forensics with privacy  Quantification of risks and security  Create a network to fight a network  Cross-org sharing of security information © Fraunhofer-Gesellschaft 2011  Commons nature of security –8–
  • 9. Privacy in the Future Internet  Privacy is difficult to define  What is the €-value of your personal information?  What is privacy in a public space like an OSN?  Tradeoffs are always individual  Status  Purpose Binding: responsible data management – mostly mature  Data minimization: crypto and data management – no practical experience  Context binding: not even well defined © Fraunhofer-Gesellschaft 2011  Sustainable informational self-determination: no good solutions –9–
  • 10. Some Privacy Research Challenges  What is privacy in …  OSN, location, ambient, mobile, cloud, smart grids, …  Mental models for usability  Research pipe full of untested results  Standardization  Portable id, pseudonyms, options, expiration dates, …  Globally practical trust and identity framework  M0re applied research  Privacy despite accountability  Privacy despite forensics © Fraunhofer-Gesellschaft 2011  Computing with encrypted data  Commons nature of privacy – 10 –
  • 11. Outline  Future Internet  Security and Privacy  Security and Privacy by Design © Fraunhofer-Gesellschaft 2011 – 11 –
  • 12. Building a Secure System  Huge body of engineering knowledge  Many articles, books, courses, degrees, tools, …  So, in theory, this should be doable © Fraunhofer-Gesellschaft 2011 – 12 –
  • 13. Building a Secure System State of the art in the software industry Source: Microsoft Secure Development Lifecycle A more detailed look But # of shows: vulnerabilities • Same errors is still again and again • IT people lack skills going up • Current processes © Fraunhofer-Gesellschaft 2011 and tools are too complex for humans Source: IBM X-Force, 2011 – 13 –
  • 14. Which one is Better: “by design” or “by patching” NIST 2010: Security and Privacy Security and Privacy • 80% of development by Design by Patching costs spent on finding and fixing errors Overall: economic Overall: expensive IBM 2010: Fixing a single  High initial costs  Low initial costs defect during … costs:  Low recurring costs  High recurring costs • Coding: $80 • Build: $240 Avoids damage Damage might be • QA/Test: $960 irreversible: • Post release: $7’600 + reputational costs  Life and health  Critical infrastructure  Privacy, reputation, confidentiality © Fraunhofer-Gesellschaft 2011 European Center for Security and Privacy by Design (EC-SPRIDE) Projected start: October 1st, 2011 – 14 –
  • 15. What needs to be done Challenges  Consistent models throughout all phases  Patterns for requirements analysis  Model-driven security (design, test)  Static and dynamic analysis  Usability: end users, developers, admins  Ready to use building blocks  Demonstrable and quantifiable improvements in security  Applied to interesting cases: © Fraunhofer-Gesellschaft 2011 cloud computing, embedded, …  Education for ordinary developers – 15 –
  • 16. Outline  Future Internet  Security and Privacy  Security and Privacy by Design © Fraunhofer-Gesellschaft 2011 – 16 –
  • 17. Prof. Dr. Michael Waidner michael.waidner@sit.fraunhofer.de Fraunhofer-Institut für Sichere Informationstechnologie Rheinstraße 75 64295 Darmstadt www.fraunhofer.de www.sit.fraunhofer.de Center for Advanced Security Research Darmstadt Lehrstuhl für Sicherheit in der IT Mornewegstraße 30 © Fraunhofer-Gesellschaft 2011 64289 Darmstadt www.cased.de www.sit.tu-darmstadt.de – 17 –