Thales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg



Similar documents
CONSULTING IMAGE PLACEHOLDER

Management of Security Information and Events in Future Internet

ICT 7: Advanced cloud infrastructures and services. ICT 8: Boosting public sector productivity and innovation through cloud computing services

INSPIRE: INcreasing Security and Protection through Infrastructure REsilience

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

Cesario Di Sarno. Security Information and Event Management in Critical Infrastructures

Cyber Security and Privacy - Program 183

TUSKEGEE CYBER SECURITY PATH FORWARD

Exploiting peer group concept for adaptive and highly available services

NIST Cybersecurity Framework Manufacturing Implementation

Industrial Control Systems Security Guide

SERV SER ICE DE SIGN

Towards service awareness and autonomic features in a SIPenabled

15 th April 2010 FIA Valencia

NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives

WORK PROGRAMME Topic ICT 9: Tools and Methods for Software Development

Global self-management of network and telecommunication information systems and services

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

Northrop Grumman White Paper

Rational Telecom Cloud Positioning

Optimized for the Industrial Internet: GE s Industrial Data Lake Platform

Scalability in Log Management

SELFNET - Framework for Self-Organized Network Management in Virtualised and Software Defined Networks

Service Design, Management and Composition: Service Level Agreements Objectives

Introduction to Wireless Sensor Network Security

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Meeting Cyber Security Challenges

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Self-Management in SAC and FIRE

Intrusion Detection for Mobile Ad Hoc Networks

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Nadya Bartol, CISSP, CGEIT VP, Industry Affairs and Cybersecurity Strategist UTC (Utilities Telecom Council) USA Utilities Telecom Council 1

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Autonomic IoT Systems Realizing Self-* Properties in IoT Systems

National Cyber Security Framework and Protocol. for securing digital information in networked critical infrastructures and communications

Ohio Supercomputer Center

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Great Now We Have to Secure an Internet of Things. John Pescatore SANS Director, Emerging Security

Trust and Dependability in Cloud Computing

Cloud Security Specialist Certification Self-Study Kit Bundle

INSPIRE: INcreasing Security and Protection through Infrastructure REsilience

DoD Strategy for Defending Networks, Systems, and Data

Defensible Strategy To. Cyber Incident Response

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

Dynamic Trust Management for the Internet of Things Applications

Vendor Management. Outsourcing Technology Services

Preemptive security solutions for healthcare

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Cybersecurity Strategy

IEEE-Northwest Energy Systems Symposium (NWESS)

Towards an Organic Middleware for the Smart Doorplate Project

Update On Smart Grid Cyber Security

Steve Lusk Alex Amirnovin Tim Collins

Security & Trust in Wireless Sensor Networks

Autonomic computing system for selfmanagement of Machine-to-Machine networks

Security as Architecture A fine grained multi-tiered containment strategy

Cyber Security Risk Mitigation Checklist

Cisco Advanced Services for Network Security

New Broadband and Dynamic Infrastructures for the Internet of the Future

Roles within ITIL V3. Contents

SCADA System Overview

Supplier Security Assessment Questionnaire

Managed & Professional Services

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Service Improvement. Part 3 The Strategic View. Robert.Gormley@ed.ac.uk

Information Technology Engineers Examination. Network Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for

Injazat s Managed Services Portfolio

The Way to SOA Concept, Architectural Components and Organization

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

Rebecca Massello Energetics Incorporated

Department of Management Services. Request for Information

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Klickstart Business Solutions & Services

Privacy + Security + Integrity

RSA SecurID Two-factor Authentication

IT Infrastructure Services. White Paper. Cyber Risk Mitigation for Smart Cities

Managing IT Security with Penetration Testing

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

ConnectM M2M Solution Delivery Platform Brochure

Code of Practice for Cyber Security in the Built Environment

TOPOLOGIES NETWORK SECURITY SERVICES

Alessia Garofalo. Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks. Fai della Paganella, 10-12/02/2014

Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices

CESG Certification of Cyber Security Training Courses

Big Data, Big Risk, Big Rewards. Hussein Syed

Cloud Infrastructure Security Management

How To Manage Security On A Networked Computer System

Master of Science in Information Systems & Security Management. Courses Descriptions

Schedule A. MITA Career Level based on Responsibility Level (SFIA v5 Responsibility Levels)

OVERVIEW Cloud Deployment Services

Risk and Security Assessment. Zbigniew Kalbarczyk

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach.

Course Design Document. Information Security Management. Version 2.0

SYSTEMS SECURITY ENGINEERING

Transcription:

Thales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg

Challenges of Future Internet Internet as a starting point Was defined for asynchronous services (web pages, file transfer ) Designed as a best effort (no security, no guarantee, no priority ) and static network (no reconfigurability, no mobility, no wireless ) But the current Internet as we know it is reaching a saturation point to face increasing user expectations (video on demand, gaming, social networks, P2P, streaming ) is showing inability to efficiently respond to new socio-economical challenges in terms of security, scalability, mobility, availability, and manageability Future Internet is now a business platform, the future heart of the Economy that links social life of users as well as critical activities such as Communications (telephone, Internet), Energy & fluids (electricity, gas, water), Transportation (railways, airlines, road) & Health and emergency response 1

Thales objectives in the future Internet As a world leader in critical mission information systems, Thales Communications develops a common base of technologies to serve a single objective: The security of people, property and nations. The Group offers security solutions for large critical infrastructures as system integrator, security expertise and product&services supplier. Thales proposes to foster the development the Future Internet as critical information system environment with native: Trust, Dependability and security 2

Trusted Why Trusted systems? Security by design not sufficient For complex and large systems For dynamic systems For multi-players services providers Security and Trust tradeoffs Imposing a single common model/framework limitations Trust as a BUSINESS enabler We need to equip system evaluation tools with both: Internal probes/actuators to ensure security assurance External, non intrusive, trust evaluation engines 3

Trusted Distributing Trust Trust is made of Belief in reliability, honesty, good faith in the intend of another party Belief of proof that the means used to conduct the deal cannot be misused Distributing trust All the parties and medium involved maintain trustworthiness Trust and security Confidentiality of information Network termination Secured users&machines Authenticated sources Service access Answers Network/link protection Application/web protection Signature&time stamping Trusted identity&role-based rules ID federation, delegation of authority and resource provisioning 4

Trusted How to restore trust in Internet Trust Increase Internet can only be evaluated by Internet Experts Federation A Trusted Third Party F Users Community C Service Consumers (SC) Trust metrics consultation Trusted Advisors (Single, or federation, or social network) Trusted Third Party B Users Community Z Experts Federation N Business Increase Trust metrics assessment Service Providers (SP) 5

Dependable System resilience Thales aims to increase the dependability of critical open and interconnected systems by a multi-disciplinary and coordinated effort: Combined breakthroughs in Modelling, Fault analysis, Performance simulation, Symptomatic scenarios detection, Decision aid tools Reconfiguration 6 Reconfiguration

Dependable Critical system management 7 Autonomic computing background knowledge Self-configuration To speed up the configuration dedicated to new client according to negotiated SLAs To make sure previous SLAs are still correctly answered Self-healing To recover when critical incidents occurs (e.g hardware failure) Self-organisation To dynamically adapt the management resources and processes to the actual usage Self-protection To organize back-ups To early detect intrusion To perform security audits

Introduction of self* capabilities Autonomic system management self* actions implemented within bounds of high level policies With an aim to improve the deployment of heterogeneous systems with formal validation of policy introduction To increase resilience of critical systems by providing faster self-healing capabilities Central management Static policies Dependable Evolving policies Distributed management Virtual nets Evolving management Dynamic policies SDR SD* TODAY Man in THE LOOP Future Internet Objectives 8

Secure Secure Cyber-security: a FI priority 9 Cyber-Threats : Cyber-crime: breach of the law via Internet, Cyber-terrorism: Internet as a vector for destabilisation, disinformation, propaganda or to target critical infrastructures, Cyber-war: Attacks against military computer systems and/or critical civilian assets (power, telecoms, financial institutions, Airlines) Main kinds of attacks : Distributed denial of service targeting Internet or an information system Intrusion in order to steal or to modify data

Secure Secure Vulnerabilities assessment System vulnerabilities audit Criticality analysis Attacks models evaluation Framework based on the combination of several technologies Topology and services discovery Knowledge representation Inference engines Used to secure SCADA & Information systems Key capabilities to ensure an information system surveillance, decision making and anticipation 10

Thales Interest to PPP FI 11 Transport Dependable Multimodal transportation system (SOA, ETSI ITS/ISO CALM architectures, V2X) Multi-services networks (Virtual Network, Opportunistic network) Smart Cities Content Content network aware Content-based routing Content Based Information security (traceability,identity federation,anonymisation, multilevel cyphering) Distributed caching Core Platform Security & Trust Internet of Things (M2M, Embeded Sensors) Reliable and dependable Needed partners : - Living labs & User - Academic partners with prototyping skills and testbed for scalability assessment - SME with knowledge on - virtualisation; trust management, sensors integration Smart Grid Distributed Security Reliable distributed Scada Integration of small, long lifecycle devices Monitoring the overall integrated system