70 likes | 83 Views
Top Ten Security Challenges for the Networked Society. Mats Näslund Ericsson Research. Outline. Background and drivers Facts and numbers Top ten list. cloud. also on “cyber security”. Connected consumer electronics. Intelligent transport, industry and society, smart utilities.
E N D
Top Ten Security Challenges for the Networked Society Mats Näslund Ericsson Research
Outline Background and drivers Facts and numbers Top ten list
cloud also on “cyber security” Connectedconsumer electronics Intelligent transport, industry and society, smart utilities deviceheterogeneity Attract hackers? more info on users created could become attack vector Everything Connected How does it impact security and privacy? Drivers • Entertainment, security, health • Productivity, new revenues • Sustainability, regulation • Broadband ubiquity • Declining cost of connectivity • Openness and simplicity Enablers
Some “Facts” and Numbers(2011-2012 unless noted) IP protection in country “C” $250Billion Biggest threat to info theft according to country “J” US companies’ loss due to IP theft 50Million Estimated number of hosts in Storm botnet (2007) 6Million Number of passwords stolen from LinkedIn $338Billion US companies’ loss due to cybercrime (incl downtime) 75Million Number of unique malware in McAfee database 196 Privacy protection in country “J” Number of countries in which “Zeus” malware was observed Biggest threat to info theft according to country “C” 90Million $600M Number of spam/day sent by bots etc Direct cost of Internet crimein Sweden Note: Some numbers obtained from companies who make a living out of (in)security, should probably be taken with a grain of salt…
Usable Security Privacy Infrastructure & ServiceProtection Our Three Top-level Areas How do we makeusers feel comfortableusing networked services? How do we make security solutionsusable, manageable and non-intrusive? Technical security solutions forthe Networked Society’s “threat landscape”
…two main examples Summary: Our Top Ten List • 1. <Your favorite issue here> • Usable Security • User Identity Management • Device/Network Provisioning • Privacy • Security for Big Data • Infrastructure and Service Protection • Device/platform Security • Software Security • Network/Product Assurance and Compliance • Secure Virtualization • Cloud Security • Keeping Unwanted Traffic at Bay