Slide title 70 pt CAPITALS Slide subtitle minimum 30 pt Top Ten Security Challenges for the Networked Society Mats Näslund Ericsson Research.

Презентация:



Advertisements
Похожие презентации
Slide title minimum 48 pt CAPITALS Slide subtitle minimum 30 pt SDP Bandwidth Attribute Magnus Westerlund Tomas Frankkila Bo Burman draft-westerlund-mmusic-sdp-bw-attribute-00.
Advertisements

Slide title 70 pt CAPITALS Slide subtitle minimum 30 pt ICN and video distribution IRTF ICNRG meeting Vancouver November, 2013 Börje Ohlman.
Slide title 70 pt CAPITALS Slide subtitle minimum 30 pt RTP Media Stream Pause / Resume draft-westerlund-avtext-rtp-stream-pause-03 draft-even-flow-control-to-zero-00.
Slide title minimum 48 pt CAPITALS Slide subtitle minimum 30 pt Glare Handling in WebRTC Signalling Magnus Westerlund draft-jennings-rtcweb-signaling-01.
Slide title 70 pt CAPITALS Slide subtitle minimum 30 pt Scrum Training: The Scrum Guide Explained for the Self-Organizing Team Glen Wang
Slide title minimum 48 pt CAPITALS Slide subtitle minimum 30 pt RTP Media Stream Pause and Resume Magnus Westerlund Bo Burman Daniel Gröndal Azam Akram.
Slide title 70 pt CAPITALS Slide subtitle minimum 30 pt Ericsson Learning Interface ELI User guide.
Slide title 70 pt CAPITALS Slide subtitle minimum 30 pt.
Slide title 70 pt CAPITALS Slide subtitle minimum 30 pt Review for Eclipse (R4E): Code and Model Reviews made easy Eclipse Con 2012 – Agile ALM track Sebastien.
Akamai Confidential©2011 AkamaiWe make the Internet work for you Your logo.
Slide title 70 pt CAPITALS Slide subtitle minimum 30 pt Codec Operation Point draft-westerlund-avtext-codec-operation-point-00 Bo Burman.
BRINGING THE NETWORKED SOCIETY TO LIFE SUSTAINABLE CITIES Carla Belitardo Sustainability Director Ericsson Latin America.
Slide title minimum 48 pt Slide subtitle minimum 30 pt Rendering advertisement and selection IETF#81, Quebec City, Canada
Slide title minimum 48 pt Slide subtitle minimum 30 pt PSAP Callback Identifier IETF#84, Vancouver, Canada
Slide title 70 pt CAPITALS Slide subtitle minimum 30 pt Ethernet Routing for Large Scale Distributed Data Center Fabrics Dave Allan, János Farkas, Panagiotis.
Slide title minimum 48 pt Slide subtitle minimum 30 pt PSAP Callback IETF#81, Quebec City, Canada draft-holmberg-ecrit-callback-00
Slide title minimum 48 pt Slide subtitle minimum 30 pt Measure Solutions.
Slide title minimum 48 pt Slide subtitle minimum 30 pt WEB REAL-TIME Communication Use-cases & Requirements draft-holmberg-rtcweb-ucreqs Christer Holmberg.
Slide title minimum 48 pt Slide subtitle minimum 30 pt Broadband market Trends & Strategy Dimitris logothetis Ericsson hellas.
Slide title minimum 48 pt Slide subtitle minimum 30 pt RENDERING TYPE NEGOTIATION Christer.Holmberg Erlendur.Karlsson CLUE Interim.
Транксрипт:

Slide title 70 pt CAPITALS Slide subtitle minimum 30 pt Top Ten Security Challenges for the Networked Society Mats Näslund Ericsson Research

Slide title 44 pt Text and bullet level 1 minimum 24 pt Bullets level 2-5 minimum 20 pt Characters for Embedded font: !"#$%&'()*+,-./ :; WXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~¡¢£¤¥¦§¨©ª« ¬®¯°±²³´¶·¸¹º»¼½ÀÁÂÃÄÅÆÇÈËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛ ÜÝÞßàáâãäåæçèéêëìíîïðñòóôõö÷øùúûüýþÿĀāĂăąĆćĊċ ČĎďĐđĒĖėĘęĚěĞğĠġĢģĪīĮįİıĶķĹĺĻļĽľŁłŃńŅņŇňŌŐőŒ œŔŕŖŗŘřŚśŞşŠšŢţŤťŪūŮůŰűŲųŴŵŶŷŸŹźŻżŽžƒˆˇ˘˙˚˛ ˜˝– …ĀĀĂĂĄĄĆĆĊĊČČĎĎĐĐĒĒĖĖĘĘĚĚ ĞĞĠĠĢĢĪĪĮĮİĶĶĹĹĻĻĽĽŃŃŅŅŇŇŌŌŐŐŔŔŖŖŘŘŚŚŞ ŞŢŢŤŤŪŪŮŮŰŰŲŲŴŴŶŶŹŹŻŻ ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰα βγδεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХ ЦЧШЩЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧ ШЩЪЫЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏ ѢѢѲѲѴѴ ҐҐәǽ Do not add objects or text in the footer area Top Ten Security Challenges in the Networked Society | Public | © Ericsson AB 2013 | | Page 2 (19) Outline Background and drivers –Facts and numbers Top ten list

Slide title 44 pt Text and bullet level 1 minimum 24 pt Bullets level 2-5 minimum 20 pt Characters for Embedded font: !"#$%&'()*+,-./ :; WXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~¡¢£¤¥¦§¨©ª« ¬®¯°±²³´¶·¸¹º»¼½ÀÁÂÃÄÅÆÇÈËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛ ÜÝÞßàáâãäåæçèéêëìíîïðñòóôõö÷øùúûüýþÿĀāĂăąĆćĊċ ČĎďĐđĒĖėĘęĚěĞğĠġĢģĪīĮįİıĶķĹĺĻļĽľŁłŃńŅņŇňŌŐőŒ œŔŕŖŗŘřŚśŞşŠšŢţŤťŪūŮůŰűŲųŴŵŶŷŸŹźŻżŽžƒˆˇ˘˙˚˛ ˜˝– …ĀĀĂĂĄĄĆĆĊĊČČĎĎĐĐĒĒĖĖĘĘĚĚ ĞĞĠĠĢĢĪĪĮĮİĶĶĹĹĻĻĽĽŃŃŅŅŇŇŌŌŐŐŔŔŖŖŘŘŚŚŞ ŞŢŢŤŤŪŪŮŮŰŰŲŲŴŴŶŶŹŹŻŻ ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰα βγδεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХ ЦЧШЩЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧ ШЩЪЫЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏ ѢѢѲѲѴѴ ҐҐәǽ Do not add objects or text in the footer area Top Ten Security Challenges in the Networked Society | Public | © Ericsson AB 2013 | | Page 3 (19) Everything Connected Intelligent transport, industry and society, smart utilities - Entertainment, security, health - Productivity, new revenues - Sustainability, regulation - Broadband ubiquity - Declining cost of connectivity -Openness and simplicity Drivers Enablers device heterogeneity could become attack vector Connected consumer electronics Attract hackers? also on cyber security cloud more info on users created How does it impact security and privacy?

Slide title 44 pt Text and bullet level 1 minimum 24 pt Bullets level 2-5 minimum 20 pt Characters for Embedded font: !"#$%&'()*+,-./ :; WXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~¡¢£¤¥¦§¨©ª« ¬®¯°±²³´¶·¸¹º»¼½ÀÁÂÃÄÅÆÇÈËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛ ÜÝÞßàáâãäåæçèéêëìíîïðñòóôõö÷øùúûüýþÿĀāĂăąĆćĊċ ČĎďĐđĒĖėĘęĚěĞğĠġĢģĪīĮįİıĶķĹĺĻļĽľŁłŃńŅņŇňŌŐőŒ œŔŕŖŗŘřŚśŞşŠšŢţŤťŪūŮůŰűŲųŴŵŶŷŸŹźŻżŽžƒˆˇ˘˙˚˛ ˜˝– …ĀĀĂĂĄĄĆĆĊĊČČĎĎĐĐĒĒĖĖĘĘĚĚ ĞĞĠĠĢĢĪĪĮĮİĶĶĹĹĻĻĽĽŃŃŅŅŇŇŌŌŐŐŔŔŖŖŘŘŚŚŞ ŞŢŢŤŤŪŪŮŮŰŰŲŲŴŴŶŶŹŹŻŻ ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰα βγδεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХ ЦЧШЩЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧ ШЩЪЫЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏ ѢѢѲѲѴѴ ҐҐәǽ Do not add objects or text in the footer area Top Ten Security Challenges in the Networked Society | Public | © Ericsson AB 2013 | | Page 4 (19) Some Facts and Numbers ( unless noted) $250Billion US companies loss due to IP theft $338Billion US companies loss due to cybercrime (incl downtime) 75Million Number of unique malware in McAfee database 90Million Number of spam/day sent by bots etc Privacy protection in country J Biggest threat to info theft according to country C IP protection in country C Biggest threat to info theft according to country J $600M Direct cost of Internet crime in Sweden 196 Number of countries in which Zeus malware was observed 6Million Number of passwords stolen from LinkedIn 50Million Estimated number of hosts in Storm botnet (2007) Note: Some numbers obtained from companies who make a living out of (in)security, should probably be taken with a grain of salt…

Slide title 44 pt Text and bullet level 1 minimum 24 pt Bullets level 2-5 minimum 20 pt Characters for Embedded font: !"#$%&'()*+,-./ :; WXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~¡¢£¤¥¦§¨©ª« ¬®¯°±²³´¶·¸¹º»¼½ÀÁÂÃÄÅÆÇÈËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛ ÜÝÞßàáâãäåæçèéêëìíîïðñòóôõö÷øùúûüýþÿĀāĂăąĆćĊċ ČĎďĐđĒĖėĘęĚěĞğĠġĢģĪīĮįİıĶķĹĺĻļĽľŁłŃńŅņŇňŌŐőŒ œŔŕŖŗŘřŚśŞşŠšŢţŤťŪūŮůŰűŲųŴŵŶŷŸŹźŻżŽžƒˆˇ˘˙˚˛ ˜˝– …ĀĀĂĂĄĄĆĆĊĊČČĎĎĐĐĒĒĖĖĘĘĚĚ ĞĞĠĠĢĢĪĪĮĮİĶĶĹĹĻĻĽĽŃŃŅŅŇŇŌŌŐŐŔŔŖŖŘŘŚŚŞ ŞŢŢŤŤŪŪŮŮŰŰŲŲŴŴŶŶŹŹŻŻ ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰα βγδεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХ ЦЧШЩЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧ ШЩЪЫЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏ ѢѢѲѲѴѴ ҐҐәǽ Do not add objects or text in the footer area Top Ten Security Challenges in the Networked Society | Public | © Ericsson AB 2013 | | Page 5 (19) Our Three Top-level Areas Infrastructure & Service Protection Privacy Technical security solutions for the Networked Societys threat landscape How do we make users feel comfortable using networked services? Usable Security How do we make security solutions usable, manageable and non-intrusive?

Slide title 44 pt Text and bullet level 1 minimum 24 pt Bullets level 2-5 minimum 20 pt Characters for Embedded font: !"#$%&'()*+,-./ :; WXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~¡¢£¤¥¦§¨©ª« ¬®¯°±²³´¶·¸¹º»¼½ÀÁÂÃÄÅÆÇÈËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛ ÜÝÞßàáâãäåæçèéêëìíîïðñòóôõö÷øùúûüýþÿĀāĂăąĆćĊċ ČĎďĐđĒĖėĘęĚěĞğĠġĢģĪīĮįİıĶķĹĺĻļĽľŁłŃńŅņŇňŌŐőŒ œŔŕŖŗŘřŚśŞşŠšŢţŤťŪūŮůŰűŲųŴŵŶŷŸŹźŻżŽžƒˆˇ˘˙˚˛ ˜˝– …ĀĀĂĂĄĄĆĆĊĊČČĎĎĐĐĒĒĖĖĘĘĚĚ ĞĞĠĠĢĢĪĪĮĮİĶĶĹĹĻĻĽĽŃŃŅŅŇŇŌŌŐŐŔŔŖŖŘŘŚŚŞ ŞŢŢŤŤŪŪŮŮŰŰŲŲŴŴŶŶŹŹŻŻ ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰα βγδεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХ ЦЧШЩЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧ ШЩЪЫЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏ ѢѢѲѲѴѴ ҐҐәǽ Do not add objects or text in the footer area Top Ten Security Challenges in the Networked Society | Public | © Ericsson AB 2013 | | Page 6 (19) Summary: Our Top Ten List 1. Usable Security 2.User Identity Management 3.Device/Network Provisioning Privacy 4.Security for Big Data Infrastructure and Service Protection 5.Device/platform Security 6.Software Security 7.Network/Product Assurance and Compliance 8.Secure Virtualization 9.Cloud Security 10.Keeping Unwanted Traffic at Bay …two main examples