Top Ten Security Challenges in the Networked Society

Download Report

Transcript Top Ten Security Challenges in the Networked Society

Top Ten Security
Challenges for the
Networked Society
Mats Näslund
Ericsson Research
Outline
› Background and drivers
– Facts and numbers
› Top ten list
Top Ten Security Challenges in the Networked Society | Public | © Ericsson AB 2013 | 2013-01-11 | Page 2 (19)
Everything Connected
How does it impact security and privacy?
- Entertainment, security, health
- Productivity, new revenues
- Sustainability, regulation
Connected
consumer electronics
cloud
also on “cyber security”
Connected
Intelligent
transport,
consumer
electronics
industry
and society,
smart
utilities
Attract
hackers?
more info on
users created
- Broadband ubiquity
- Declining cost of connectivity
-Openness and simplicity
Top Ten Security Challenges in the Networked Society | Public | © Ericsson AB 2013 | 2013-01-11 | Page 3 (19)
Enablers
device
heterogeneity
Drivers
could become
attack vector
Some “Facts” and Numbers
(2011-2012 unless noted)
IP protection in country “C”
$250Billion
Biggest threat to info theft
according to country “J”
US companies’ loss due to IP theft
50Million
Estimated number of hosts
in Storm botnet (2007)
6Million
Number of passwords
stolen from LinkedIn
$338Billion
US companies’ loss due to
cybercrime (incl downtime)
75Million
Number of unique malware in
McAfee database
Privacy protection in country “J”
Biggest threat to info theft
according to country “C”
196
Number of countries in which
“Zeus” malware was observed
$600M
Direct cost of Internet crime
in Sweden
90Million
Number of spam/day sent by bots etc
Note: Some numbers obtained from companies who make a living out of
(in)security, should probably be taken with a grain of salt…
Top Ten Security Challenges in the Networked Society | Public | © Ericsson AB 2013 | 2013-01-11 | Page 4 (19)
Our Three Top-level Areas
Usable Security
How do we make
security solutions
usable, manageable and
non-intrusive?
Privacy
How do we make
users feel comfortable
using networked services?
Technical security solutions for
the Networked Society’s
“threat landscape”
Infrastructure & Service
Protection
Top Ten Security Challenges in the Networked Society | Public | © Ericsson AB 2013 | 2013-01-11 | Page 5 (19)
Summary: Our Top Ten List
›
1. <Your favorite issue here>
›
Usable Security
2. User Identity Management
3. Device/Network Provisioning
›
Slide title
44 pt
Our Three Top-level Areas
Privacy
4. Security for Big Data
›
…two main examples
Usable Security
Text and bullet level 1
minimum 24 pt
Infrastructure and Service Protection
Bullets level 2-5
minimum 20 pt
5. Device/platform Security
6. Software Security
7. Network/Product Assurance and Compliance
8. Secure Virtualization
9. Cloud Security
10. Keeping Unwanted Traffic at Bay
Characters for Embedded font:
!"# $%&'()*+,./0 1234 56 78 9 :;<=>?@ABCDEFGHIJKLM NOPQRSTUV
WXYZ[\]^ _`a b c d ef g h ij k l m n o p q r s t u v w x y z{|}~¡
¢£¤¥ ¦§¨©ª «¬®¯°±² ³´¶·¸¹º »¼ ½ ÀÁÂÃÄÅÆÇÈËÌÍÎÏÐÑÒ
ÓÔÕÖ×ØÙÚÛÜÝÞß à á â ã ä å æ ç èéêëìíîïð ñ ò ó ô õ ö
÷ø ù ú û ü ý þÿ Āā Ăă ą Ćć Ċċ ČĎď Đđ ĒĖėĘęĚěĞğ Ġġ Ģģ
ĪīĮįİıĶķ Ĺĺ Ļļ Ľľ Łł Ńń Ņņ Ňň ŌŐő Œœ Ŕŕ Ŗŗ Řř Śś Şş Šš Ţ
ţ Ťť Ūū Ůů Űű Ųų Ŵŵ Ŷŷ ŸŹźŻżŽžƒȘș ˆˇ˘˙˚˛˜˝Ẁẁ ẃ Ẅẅ
Ỳỳ –—
‘’‚“”„†‡• …‰‹›⁄ € ™ĀĀĂĂĄĄĆĆĊĊČČĎĎĐĐĒĒĖĖĘĘĚĚĞĞ
ĠĠĢĢĪĪĮĮİĶĶĹĹĻĻĽĽŃŃŅŅŇŇŌŌŐŐŔŔŖŖŘŘŚŚŞŞŢŢŤ
ŤŪŪŮŮŰŰŲŲŴŴŶŶŹŹŻŻȘș −≤≥fi fl
ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰα
βγδεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ
ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦ
ЧШЩЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШ
ЩЪЫЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽẀẁ Ẃẃ
Ẅẅ Ỳỳ №
Do not add objects or
text in the footer area
How do we make
security solutions
usable, manageable and
non-intrusive?
Privacy
How do we make
users feel comfortable
using networked services?
Technical security solutions for
the Networked Society’s
“threat landscape”
Infrastructure & Service
Protection
Top Ten Security Challenges in the Networked Society | Public | © Ericsson AB 2013 | 2013-01-11 | Page 5 (19)
Top Ten Security Challenges in the Networked Society | Public | © Ericsson AB 2013 | 2013-01-11 | Page 6 (19)