What Nature has been teaching us about Information Security?
-
Upload
roberto-rigolin-ferreira-lopes -
Category
Science
-
view
222 -
download
4
Transcript of What Nature has been teaching us about Information Security?
![Page 1: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/1.jpg)
Agenda
Presentation title
1
yyyy-mm-dd
Three things:
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
What Nature has been teaching us about Information Security?
Roberto Rigolin Ferreira [email protected]
19th February 2016 - Gjøvik, Norway
![Page 2: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/2.jpg)
Agenda
Presentation title
Three things: In short
2
What’s the relation with Cyber Security?
Information Theory
zUkWcE7uWxvXgkH5ZhGpJ/Ehr8CDohpY/AVy1QkCDuA0eszi/LzhYf1BK+23OasWSTHjaMhGNAOfwdDoYy0ewxOngwIgcAbYWigkZw/qvP7n6i1EiAKYpqDKg+VDKTCVynToO80qdYeskgd7ZHv2lbKDYe+A8ap9hgDE4jXorrtZbeHl2zCfCnzt+kczOE2NlT31XV/numPnm+OtKN2X2tZlbw9kjcxvmNAZVUGw7lX7z7FmHA8O3fMLfGcQNGhwrLr8gHAro5O3o/XnBmbOtn1t7ort8A0OMOULnUyv
Entropy67 years (1948)
NatureLife
Thermodynamics+
+~3.8 billion years
~13.8 billion years
Language~100.000 years
+Milk Way
... inspiration for a Tactical Service Infrastructure (TSI)
1st Programming Language62 years (1954)
World Wide Web26 years (1989)
RSA38 years (1977)
![Page 3: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/3.jpg)
Agenda
Presentation title yyyy-mm-dd
Three things: AgendaLet us have look at Cyber Security from a different angle…
3
@src Dead Poets Society (1989) scenehttp://www.imdb.com/title/tt0097165/ + fake thermo view by Photoshop
![Page 4: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/4.jpg)
Agenda
Presentation title yyyy-mm-dd
Three things: Captain, my captain; our tools:
i. Copernicus attitude
4
ii. DeLorean to travel in time
iii. Millennium Falcon Fram…
Hey, Earth isn’t the center of the Universe!
We can use it to leave Earth, right?
iv. Basic PhysicsJust for fun...
Deadlines, hum?!
![Page 5: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/5.jpg)
Agenda
Presentation title
5
yyyy-mm-dd
Three things: What if we ask a Security Expert:
What’s up?
Systems
We are keeping systems running… (and runs to grab some coffee)
+ + …
That is, MISSION IMPOSSIBLE business
Risk Assessment + … etc
Say it is a good day
![Page 6: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/6.jpg)
Agenda
Presentation title yyyy-mm-dd
Three things: What if we ask an Astrophysicist:
6
What’s up?Say it is a good day
System with 10 billion galaxies interacting
She will show you the latest simulated picture of the Universe:
Explaining: If you can compute the entropy S of such system, you will notice that the amount of disorder is always increasing.
𝑑𝑆≥0Amount of disorder always increase.
Second law of ThermodynamicsThat is,
Systems + + …
That’s why Cyber Security is Mission Impossible?It is easier to break in than to protect systems...
dSuniverse = (dSsurroundings + dSsystem ) ≥ 0
![Page 7: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/7.jpg)
Agenda
yyyy-mm-dd
Three things: Thermodynamics
7
𝑑𝑆≥0Amount of disorder always increase
You can’t break it!
First law : Conservation o Energy
Second law : EntropyEnergy can be neither created nor destroyed
Zero law : Temperature
What if the Universe is an OS?Hypothesis: Then thermodynamics is
an unbreakable subsystem.
~13.8 billion years
![Page 8: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/8.jpg)
Agenda
Presentation title yyyy-mm-dd
Three things: Let’s give it a try…
8
zUkWcE7uWxvXgkH5ZhGpJ/Ehr8CDohpY/AVy1QkCDuA0eszi/LzhYf1BK+23OasWSTHjaMhGNAOfwdDoYy0ewxOngwIgcAbYWigkZw/qvP7n6i1EiAKYpqDKg+VDKTCVynToO80qdYeskgd7ZHv2lbKDYe+A8ap9hgDE4jXorrtZbeHl2zCfCnzt+kczOE2NlT31XV/numPnm+OtKN2X2tZlbw9kjcxvmNAZVUGw7lX7z7FmHA8O3fMLfGcQNGhwrLr8gHAro5O3o/XnBmbOtn1t7ort8A0OMOULnUyvRubiks’ cube Paper ball Encrypted
message
𝑑𝑆≥0Amount of disorder always increase.
Second law of Thermodynamics:
What’s the relation?
Put on your Copernicus hat!
dSuniverse = (dSsurroundings + dSsystem ) ≥ 0
![Page 9: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/9.jpg)
Agenda
Presentation title yyyy-mm-dd
Three things:
Warm up in short9
zUkWcE7uWxvXgkH5ZhGpJ/Ehr8CDohpY/AVy1QkCDuA0eszi/LzhYf1BK+23OasWSTHjaMhGNAOfwdDoYy0ewxOngwIgcAbYWigkZw/qvP7n6i1EiAKYpqDKg+VDKTCVynToO80qdYeskgd7ZHv2lbKDYe+A8ap9hgDE4jXorrtZbeHl2zCfCnzt+kczOE2NlT31XV/numPnm+OtKN2X2tZlbw9kjcxvmNAZVUGw7lX7z7FmHA8O3fMLfGcQNGhwrLr8gHAro5O3o/XnBmbOtn1t7ort8A0OMOULnUyv
Kabalmysteriet er bygget opp med en rammefortelling om den 12 år gamle Hans Thomas, som sammen med faren reiser med bil gjennom Europa. Inn i denne rammefortellingen finnes historien fra Bolleboka, en minitayrbok som Hans Thomas får i Sveits. Hele historien fortelles i tilbakeblikk av den 18 gamle Hans Thomas. Romanen har 53 kapitler, med navn etter.
Kabalmysteriet er bygget opp med en rammefortelling om den 12 år gamle Hans Thomas, som sammen med faren reiser med bil gjennom Europa. Inn i denne rammefortellingen finnes historien fra Bolleboka, en minitayrbok som Hans Thomas får i Sveits. Hele historien fortelles i tilbakeblikk av den 18 gamle Hans Thomas. Romanen har 53 kapitler, med navn etter.
BigPrime x BigPrime
BigNumber
Designed to be reversible
Designed to be reversible
Hard to reverse!
Private:
Public:
![Page 10: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/10.jpg)
In Short
Presentation title yyyy-mm-dd
TSI Tactical Service Infrastructure10
Handheld
Laptop
HQ
Custom
MobileWLAN, UHF
Dismounted
VHFVHF, SatCom
UHF, VHF, SatCom
WLAN, UHF, VHF
WLANUHF, VHF, SatCom
HQ Laptop
Connectivity graph
Example of system: Tactical Ground Support
SatComVHF UHFWLAN
Good connectivity
Poor connectivity
No connectivity
![Page 11: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/11.jpg)
In Short
Presentation title yyyy-mm-dd
TSI Tactical Service Infrastructure11
<Mobile>
<Core>
HQ (TN-H)
Dismounted (TN-D)
Mobile (TN-M)
Custom (TN-C) Company
Brigade
The equal capable adversary is here, Tiger
Observe
OrientDecide
Act
Services
Squads
Platoon1
Platoonx…Tactical Ground Support
MEDEVAC
Observe
OrientDecide
Act
Cyber Napoleon As you know, cyberwar is a “movie” apart…
![Page 12: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/12.jpg)
Decision Loop12
Observe
OrientDecide
Act Observe
OrientDecide
Act
<Faster tempo>
<Disorder>You win!
The game is get inside the adversary’s decision loop first.
Remember Tiger, these loops scale…Observe
OrientDecide
Act
Platoon
Observe
OrientDecide
Act
Squad
Observe
OrientDecide
Act
Node
?Vs. Cyber Napoleon
![Page 13: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/13.jpg)
Agenda
Presentation title yyyy-mm-dd
Three things:
13
Information System
Critical System
What if … ?
= =
If things can blow up, then you call it:
![Page 14: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/14.jpg)
Agenda
Presentation title yyyy-mm-dd
Three things:
14
Digital rubber band!
Insights so far
=
= TSITactical Service Infrastructure
show starts now!
x
x
![Page 15: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/15.jpg)
In Short
Presentation title yyyy-mm-dd
TSI Tactical Service Infrastructure15
Two chains: Static view
Two Core ServicesController
Service Mediator
Message Handler
Packet Handler
TSI Node
Southbound Interface
Northbound Interface
1
2
3
Information Systems
Cross-layer
ServicesSn
IN OUT<You>
![Page 16: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/16.jpg)
Agenda
Presentation title yyyy-mm-dd
Three things: The fun chart
zUkWcE7uWxvXgkH5ZhGpJ/Ehr8CDohpY/AVy1QkCDuA0eszi/LzhYf1BK+23OasWSTHjaMhGNAOfwdDoYy0ewxOngwIgcAbYWigkZw/qvP7n6i1EiAKYpqDKg+VDKTCVynToO80qdYeskgd7ZHv2lbKDYe+A8ap9hgDE4jXorrtZbeHl2zCfCnzt+kczOE2NlT31XV/numPnm+OtKN2X2tZlbw9kjcxvmNAZVUGw7lX7z7FmHA8O3fMLfGcQNGhwrLr8gHAro5O3o/XnBmbOtn1t7ort8A0OMOULnUyv
16
<FUN
>
<BORI
NG>
Constant entropy
Changing entropy
Also handling information…
Information is the change in entropy
47 years (1968)
~3.8 billion years
![Page 17: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/17.jpg)
Agenda
Presentation title yyyy-mm-dd
Three things: Life forms
17
Negative entropy
Increasing entropy
Entropy goes here
Heat + gases
<You>Docking; lots of data is
transfered to make a baby
processed food has higher entropy
>IN
OUT
Information = change in entropy
~3.8 billion years
Replication
Food
![Page 18: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/18.jpg)
Agenda
Presentation title yyyy-mm-dd
Three things: Calculators of yours
18
Negative entropy
Increasing entropy
Entropy goes here
Heat + gases
<Computer>Docking; lots of data is
transfered to make a baby
processed food has higher entropy
>Software
SoftwareSoftware
SoftwareIN
OUT
Information = change in entropy
Ops! Software Services
47 years (1968) Microprocessor
![Page 19: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/19.jpg)
In Short
Presentation title yyyy-mm-dd
19
Dynamic view
ServiceSn
i3i2i1 o1o2o3
In Out
TSI TSICross-layer calls
rorin
Cross-layer calls
1 Packet handler2 Message handler3 Service mediator
r Radio {WLAN, UHF, VHF, SatCom}TSI Tactical Service Infrastructure
i1
i2
i3 o3
o2
o1
Traceability::Labelling and Protection::MessageHandling .readLabel().decryptMesg()
.writeLabel()
.encryptMsg()
Principle of least privilege for methods’ calls:
Entropy is zero (dS = 0)
Entropy increases (dS > 0)
Wait a second, we just created another definition of ENTROPY?
.readLabel()
.decryptMesg().writeLabel().encryptMsg()
![Page 20: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/20.jpg)
In Short
Presentation title
yyyy-mm-dd
Entropy, hum?20
𝑆=𝑘 log𝑊1875 Boltzmann
Kinetic theory of gases1948 Shannon
𝐻 (𝑥 )=−∑𝑖𝑝𝑖 (𝑥 ) log𝑝𝑖 (𝑥 )
Information theory
1944 Schrödinger
−(𝑒𝑛𝑡𝑟𝑜𝑝𝑦)=𝑘 log 1𝐷
Metabolism of life forms
How many definitions of entropy out there?
![Page 21: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/21.jpg)
In Short
Presentation title
yyyy-mm-dd
21
𝑆=𝑘 log𝑊
Kinetic theory of gases
1875 Boltzmann
1948 Shannon
𝐻 (𝑥 )=−∑𝑖𝑝𝑖 (𝑥 ) log𝑝𝑖 (𝑥 )
Information theory
1944 Schrödinger−(𝑒𝑛𝑡𝑟𝑜𝑝𝑦)=𝑘 log 1𝐷
Metabolism of life forms
Brain power much needed!
Quantum Physics Classical Physics
Organic Chemistry
Biology
<new computing stuff here>
Cyber Security
Your species
Systems, computers and networksLet’s do another experiment…
If you go Iron man, …
![Page 22: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/22.jpg)
Agenda
Presentation title yyyy-mm-dd
Three things: If , then:
22
Past FutureNow
𝑑𝑆≥0
<Low entropy> <High entropy>
No cryptographyNo life forms
No cryptographyNo life forms
All fun must to happen NOW!
Including Information Security…
Amount of disorder always increase<B
ORING
>
<BORI
NG>
<FUN
><F
UN><F
UN>
white dwarfIn 5 billion years
Milk way will collide withAndromeda
No life and its calculators
![Page 23: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/23.jpg)
Agenda
Presentation title yyyy-mm-dd
Three things: Boundaries for cyber stuff
23
organized complexityprimal simplicity
Origin of life @Earth
First Digital Electronic Computer
Natural selection+ Science and Technology
[ [H0 H0+y
Hypothetical Boundaries for fun Life in the Universe
] ]Hx Hx+c
Computers will collapse after life
forms
Humans today
Natural selection + Science and Technology
Jedi Master
Closer look at humans: Little trouble here!The machines may beat us up…
How to compute such conditions?A. Matrix you must use
![Page 24: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/24.jpg)
Agenda
Three things:
What if f(x) is more complex than
24
Girls
Will be easier cure cancer than fix a bug…
f -1(f(x)) = xSystem’s states: x is protected and y is unprotected
Singularity: humans are then obsolete*
f(x) > > Neo > guysEven Neo can’t inverse such thing
Matrix in short: Neo is the inverse function of Smith
f(x)= yf -1(y) = xNeo Smith
The whole trilogy: Just calculations?
Yeah, girls!
f(x)= y*g(x)That is,
![Page 25: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/25.jpg)
In Short
Presentation title yyyy-mm-dd
What if we have a dino?
Mechanics Thermodynamics Cyber Security
25 @detour trying to reach your permanent memory
foodsmart food
# find / –n rootkitfor dino
Defense, hum?
![Page 26: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/26.jpg)
In Short
@Tactical network27
Diversity of nodes and radios:
decreases
Specialization
Ded
uctio
n ca
pabi
litie
s
General SpecializedLow
High
Node B
Node C
Node A
DetectionDiligencePlanningProtectionResponse
DetectionDiligenceProtectionResponse
DetectionDiligence
Protection
# policy domains increase
Server(s)Battalion
Sensor network(s)
increases
# classes, instances and axioms
<OWL-DL>
<OWL-Lite>
<RDFS>
Life is protecting information using flesh and bones…
DiversityRedundancy
![Page 27: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/27.jpg)
In Short
Presentation title yyyy-mm-dd
SV-1 TSI Node
«Software»TSI Node
«Software»Controller
«Software»Service Mediator
«Software»Packet Handler
«Software»Message Handler
«Function»Session
Management
«Function»Message Exchange
«Function»Message Adaption
«Function»Message
Forwarding
«Function»Message Transport
«Function»Packet
Forwarding
«Function»Packet
Scheduling
«Function»QoS Handling
«Function»Routing
«Function»Security Handling
«Function»Service Registry
«Function»Contextual Monitoring
«Function»Policy
Management
«Function»Metadata Handling
BS
IS
IF I003
IF E001
IF I001
IF I005
IF I002
IF I004
IF E002
Let us make TSI so good…
…that an adversary will give us flowers!
The mindset one year ago...28
Tactical Service Infra (TSI) - Just Another Rather Very Intelligent System (JARVIS)
![Page 28: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/28.jpg)
Agenda
Presentation title yyyy-mm-dd
Three things:
Fix your species, Tiger!
Future of your speciesRight now: Given a f-word function f(x), then f(People)
What if we GO Interstellar?
29
Want to improve Cyber Security?
Solar System in scale
All Cyber Security issues are here!Let’s recompile your species with the SECURITY flag TICKED!
47 years (1968)Microprocessor
World Wide Web26 years (1989)
RSA38 years (1977)
![Page 29: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/29.jpg)
Agenda
Presentation title yyyy-mm-dd
Three things:
What if we could go skiing to the moon?
Norwegians conquered the last place on Earth… the Moon was next…
30
Then we would have Norwegian flags all over the place...
Cool universe
The south pole... something went wrong...
Cyber skiers... rejoice!
![Page 30: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/30.jpg)
In Short
Presentation title yyyy-mm-dd
Entropy and Space Exploration
A human is the lowest-cost, ~70kg, nonlinear, all-purpose computer system which can be
mass-produced by unskilled labor.― NASA, man-in-space report, 1965
What about potatoes entropy, NASA?
What !?
The Force
31
![Page 31: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/31.jpg)
Agenda
Presentation title yyyy-mm-dd
Three things: The puzzle
32
http://robertorigolin.com/puzzle/
![Page 32: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/32.jpg)
Agenda
Presentation title yyyy-mm-dd
Three things: The puzzle
33
Notables from Lucasfilm: The options:
a) Smaug spitting fireb) Storm Troopers in a explosionc) Iron man flyingd) Sherlock blowing something
http://robertorigolin.com/puzzle/
![Page 33: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/33.jpg)
Agenda
Presentation title yyyy-mm-dd
Three things: The puzzle
34
Congrats, Smaug!
![Page 34: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/34.jpg)
In Short
Security Domains
Security domains:Planning
Protection
Detection
Diligence
Response
First try: Sharks’ hygiene
35
![Page 35: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/35.jpg)
Security Handling
3 Missions
Presentation title
36
yyyy-mm-dd
Say ‘Hi’ TSI!
3 layers<Packets>
<Messages><Services>
3 brushes at the same time!
ServiceSn
i3i2i1 o1o2o3
In Out
TSI TSICross-layer calls
rorin
Cross-layer calls
![Page 36: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/36.jpg)
Security Handling
Distributed Security Policies37
Node A
<Dismounted>
UHF WLAN
Node C
<Mobile>
VHFUHFWLAN SatCom
HQ Node D
<Deployed>
SatComVHF UHFWLAN
![Page 37: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/37.jpg)
Security Handling Nodes (N), Policies (P) and Security Domains (S)
Distributed Security Policies
Presentation title
38
yyyy-mm-dd
Node A
<Dismounted>
UHF WLAN
Node C
<Mobile>
VHFUHFWLAN SatCom
Node B
<Relay>
SatComVHF
HQ Node D
<Deployed>
SatComVHF UHFWLAN
N1:P1(N1:S1)
N2:P2(N2:S2), N2:P’1(N1:R1)
Ni:Pi(Ni:Si),…, Ni:P’i-1(Ni-1:Ri-1)
Resources and # domains
![Page 38: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/38.jpg)
Reasoning over policies
Distributed Policies39
owl:thingowl:intersectionOFowl:unionOfowl:equivalentClass
owl:thingowl:intersectionOFowl:unionOfowl:equivalentClassowl:equivalentPropertyowl:inverseOfowl:functionalPropertyowl:inverseFunctionalPropertyowl:symmetricPropertyowl:transitivePropertyowl:hasValueowl:disjointWithowl:sameAsowl:differentFromowl:distinctMembersowl:someValuesFromowl:allValuesFromowl:cardinalityowl:minCardinalityowl:maxCardinality
OWL-lite20 axioms
2
OWL-DL25 axioms
1AllowDeny
Validate
Is valid? YesNo
loop
OWL-fullOWL-lite 20 axioms
![Page 39: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/39.jpg)
Agenda
Presentation title yyyy-mm-dd
Three things: Nature calls every day…
- =
40 The happiness equation!
Feeling heavy?high entropy
HAPPY again!
entropy goes hereless entropy
𝑑𝑆≥0Amount of disorder always increase.
Second law of Thermodynamics:
The secret of life in short
𝑑=𝑑𝑆 ≥0This demands a closer look…
![Page 40: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/40.jpg)
In Short
Presentation title yyyy-mm-dd
Happiness with respect to toilet41
𝑑.𝑑¿:− ¿
> 0
= 0
< 0entropy goes here
once a week
2 weeks
+ 3 weeks
Hypothesis: happiness is predictable!
![Page 41: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/41.jpg)
In Short
Presentation title yyyy-mm-dd
Insights so far42
=
TSI=
=
Once a week
Tactical Service Infrastructure
Rubber ban
Hygiene
![Page 42: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/42.jpg)
In Short
Presentation title yyyy-mm-dd
Using my expertise43
Preparation Mission Debrief1 2 3
ri
i3
i2
i1 o1
o2
o3
ro
C11 C12 C1x...
C21 C22 C2x...
C31 C32 C3x...*
*
*
TN-xn
S1,...,Sn
Olocal
How many methods?
25 Core Services * 3 Interfaces * 5 methods/Int= 375 methods
How many permutations?
(3755 )(37510 )= 1010 to 1019
C1x
C2y
C3z ...
...
C22 C2n...
ri
i3
i2
i1
C2y
Orchestrations of core services
![Page 43: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/43.jpg)
In Short
Presentation title yyyy-mm-dd
Using my expertise44
Observe
Orient
Decide
Act
Observe
Orient
Decide
Act
S1 S2
Sn
i3i2i1
In
TSI Cross-layer calls
rin
o1o2o3
Out
TSI
ro
Cross-layer calls
O1
O2
O1On
O3
={ }S1 S2 Sn...O1
VHF SatCom
i1 o2
TN-D
O1 O2o1 i2
TN-M
onOnin
TN-H
...
O1 ~ {Observe, Act} O2 ~ {Orient, Act} On ~ {Orient, Decide}
O3
Attack
Diligence
ResponsePlanning
Attack
DiligencePlanning
Response Response
Cyber Napoleon - Unauthorized access/modification- Replace services- Mess with orchestrations
![Page 44: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/44.jpg)
Connectivity Graph and Security domains
Distributed Security Policies
Presentation title
45
yyyy-mm-dd
UHF, VHF, SatCom
Observe, Act Orient, Act Decide
1 Detection2 Protection3 Attack4 Diligence5 Response6 Planning
Ni-1 Ni Ni+1
Security domains
{1,2,3} {1,2,3,4,5} {1,2,3,4,5,6}
UHF, WLAN UHF, VHF,
WLAN
SatCom
UHF, WLAN
Observe, Act Orient, Decide, Act -Observe, Orient, Act Orient, Decide, Act -
L1,n
L2,n
L3,n
<Dismounted> <Mobile> <Deployed>
Knitting kinetic and cyber domains
![Page 45: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/45.jpg)
In Short
Presentation title yyyy-mm-dd
46
Mission: catch the creative attackers within the system
<WANTED>
Observe
Orient
Decide
Act
Tactical Service Infra (TSI) - Just Another Rather Very Intelligent System (JARVIS)
Observe
Orient
Decide
ActObserv
e
Orient
Decide
Act
Observe
Orient
Decide
ActHandheld
<Dismounted>Drone
<Relay>
Laptop
<Mobile>
Observe
Orient
Decide
Act
Cyber Napoleon Vs.
Hey TSI.JARVIS, the funny guy is around?
TSI.JARVIS
![Page 46: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/46.jpg)
In Short
Presentation title yyyy-mm-dd
Path to the Force…
Jedi Masters have high entropy or are hard to find…
But they wrote books…so you can meet them!
47
dead (thermo equilibrium)
![Page 47: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/47.jpg)
Agenda
Presentation title yyyy-mm-dd
Three things: # dmesg | grep The Force* The figures were stolen from the web and the ideas synthetized from these books:
48
![Page 48: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/48.jpg)
In Short
Presentation title yyyy-mm-dd
Acknowledgment
KabalmysterietJostein Gaarder The Solitary Mystery
Thanks to Jostein Gaarder for motivating teenagers to think for themselves.
49
Warning: this is a “dangerous” book. Use and abuse!
![Page 49: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/49.jpg)
Agenda
Presentation title yyyy-mm-dd
Three things: Take away message:Let us have look at EVERYTHING from a different angle…
50
@src Dead Poets Society (1989) scenehttp://www.imdb.com/title/tt0097165/
Grip dagen, stol så lite som mulig på den neste!
Message from the first Norwegian I ever met.
![Page 50: What Nature has been teaching us about Information Security?](https://reader031.fdocuments.in/reader031/viewer/2022013013/58d12cb61a28abe3298b55bb/html5/thumbnails/50.jpg)
Agenda
Presentation title yyyy-mm-dd
Three things:
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
Roberto Rigolin Ferreira [email protected]
The end… evolving…
What Nature has been teaching us about Information Security?
51
“Study hard what interests you the most in the most undisciplined, irreverent and original manner
possible.” ― Richard FeynmanAlways remember,
entropy goes here... \o/