Cyber Security for 2020

Cyber Security protect from theft, corruption or natural disaster while allowing the information and property remain accessible. It helps to understand the cyber security strategy, cyber ecosystem and science of cyber security. Cyber security deals with securing the future- “Securing for tomorrow’s world”.
Securing for tomorrow’s world

Cyber Security Today

To the world of computer technology, government, police and intelligence units, Cyber crime is emerging as serious threat. Cyber Security techniques developed to safeguard information systems stored on computers. Potential threats which is include the destruction of Computer Software and Computer Hardware and the loss, modification, theft, unauthorized use, observation or disclosure of computer data. Cyber security restricted to describing the criminal activity in which the computer or network is a part of crime as fraud, black mail and theft.

Cyber Security protect from theft, corruption or natural disaster while allowing the information and property remain accessible. It helps to understand the cyber security strategy, cyber ecosystem and science of cyber security. Cyber security deals with securing the future- “Securing for tomorrow’s world”.

Many Companies spend million of their dollars on firewalls and secure access devices and it’s money wasted because none of these measures address the weakest link in the security chain.

5 Stages of Business Cyber Security

  1. Identity   
  • Am: Asset management
  • BE: Business environment
  • GV: Governance
  • RA: Risk Assessment
  • RM: Risk Management strategy

2. Project

  • AC: Access Control
  • AT: Awareness Training
  • DS: Data Security
  • IP: Information Protection process and procedures

3. Detect

  • AE: Anomalies and events
  • CM: Security Continuous Monitoring
  • DP: Detection Processes

4. Respond

  • RP: Response Planning
  • CO: Communications
  • AN: Analysis
  • MI: Mitigation
  • IM: Improvements

5. Recover

  • RP: Recovery Planning
  • IM: Improvements
  • CO: Communications

Cyber security Process

  • Assess = Analyze Assets and Controls
  • Evaluate = Understand GDPR Maturity Based on Current Program
  • Build = Develop Road map to Fill the Gaps
  • Execute = Take Action with Strategic GOPR Readiness Road map

This process repeat again and again.

Process for Secure from Cyber Security

  • Awareness = A lot of hacks happen because staff is not aware of the risks. Encourage SMEs to educate more in terms of cyber security.
  • Strong Passwords = With strong password it is one step closer to being secured from breaches or hacks.
  • Updates = Updating is one crucial part of being safe, for example a lot of websites get hacked through plugins that are out of date and vulnerable.
  • Backups = Having duplicate copies of your information saved in a remote location keeps it safe in case anything goes wrong with your computer or website.
  • Firewall = Use the protective measures which can protect you even if you can not react in time.

Real Challenges of Cyber Security

  • The world economic forum again rated cyber-attacks in top 5 risks to society
  • 46% of all companies were affected
  • 36% of all consumers globally lost data
  • 11% more was spent on cyber security this year

Generations of Attacks and Protections

First Generation ( Late 1980s)

Attack = Virus ( PC attacks – standalone)

Protection = The Anti Virus

Second Generations (Mid 1990s)

Attack = Networks ( Attacks from the internet)

Protections = The Firewall

Third Generations (Early 2000s)

Attack = Applications (exploiting vulnerabilities in applications)

Protections = Intrusion Prevention (IPS)

Fourth Generations (2010)

Attack = Payload (Polymorphic Content)

Protections = Behavioral Analysis

Top IT Security Salaries

  • Lead software security engineer – $233,333
  • Chief security officer – $225,000
  • Global information security director – $ 200,000
  • Chief information security officer – $192,500
  • Director of security – $178,333

Please follow and like us:

Blockchain Technology

What is blockchain?

The block chain is a database of information. This information is not stored in a single place, but across a variety of data servers that participate in the network, this is what is meant by “decentralized” there is no central point. Identities are kept completely private, through the cryptography, however all transactions that happen on the block chain are open to viewing by anyone at any tie for always.

Trust in the block chain is enough to transact with anyone. Every record that’s written on a block chain is secured by a unique cryptographic key, making the block chain and it’s information immutable.

How Does a Block chain Work

  • A user requests for a transaction
  • A block representing the transaction is created
  • The block is broadcast-ed to all the nodes of the network
  • All the nodes validate the block and the transaction
  • The block chain is added to the chain
  • The transaction gets verified and executed

How to create a blockchain transaction?

  • When 2 parties initiate a transaction, blockchain assigns an encryption
  • Blockchain verifies the transaction and creates a block
  • The new block is appended to the blockchain
  • The blockchain transaction is now complete and the ledger is updated

Blockchain Checklist

  • Database: Block chain is a unique shared database technology. A block chain project must use a structured data repository
  • Mistrust: Block chain implies multiple non-trusting writers. They don’t allow other users to modify their entries.
  • Interaction: The block chain transactions often depend on another writer’s transactions created collaboratively without exposing the parties to risks
  • Writers: Block chain relies on multiple writers who generate transactions modifying the database
  • Disinter Mediation: No central gatekeeper needed to verify transactions and  authenticate their sources
  • Rules: The database is modified by various non-trusting writers. It must contain integrated rules that restrain the transactions and define legitimate transactions.

7 Ways the blockchain can help the environment

  • Environmental treaties:  Track real impact and compliance of environmental treaties decrease fraud and manipulation
  • Non-Profits: Track where donations are going decrease inefficiency and bureaucracy in charities
  • Carbon Tax: Calculate tax for products based on carbon footprint create a reputation system for companies based on emissions
  • Changing Incentives: Align incentives with sustainable practices create incentives for people to act in sustainable ways
  • Supply Chains: Transparently track products from origin to store shelf reduce carbon footprint and unsustainable practices.
  • Recycling: Encourage recycling by providing tokenized reward track and evaluate efficacy of recycling programs
  • Energy: Increase efficiency with P2P electrical grids improve access to power in areas with poverty or natural disasters.

Enterprises Which are Implementing Block chain Technology

Data Protection

  • Apple: Patented block chain technology for time stamping data
  • Facebook: Exploring the use of block chain to enhance data security and users privacy.
  • Google: Exploring the use of block chain technology to enhance cloud services security and for data protection.
  • Baidu: Using block chain to enhance intellectual rights management.

Transportation

  • Ford: Leveraging block chain technology to enhance the mobility of technologies.
  • Toyota: Planning to use block chain technology to enhance autonomous driving technology
  • British Airways: Implementing block chain to manage flight data as well as verifying travelers identity

Data Integrity

  • AIA Group: Launched the first of it’s kind bancassurance for sharing policy data

Healthcare

  • United Health Care: Using block chain technology to improve doctors directories to enable accurate insurance claim fillings.
  • MetLife : Using block chain technology for storing patients medical records for insurance purposes.

Supply Chains

  • Walmart: Using block chain technology to track product movement from farmers to stores.
  • Samsung: Intends to use block chain technology to enhance supply chain management when it comes to electronics shipments.
  • UPS : Block Chain powered logistics monitoring and management solution
  • Maersk: Block chain system for tracking movement of shipments between ports.
  • Nestle: Using block chain technology in supply management to track baby food products.

Trading

  • FeedEx: Working on block chain solution for setting customer disputes.
  • BHP Billiton: Leveraging block chain technology for supply chains management.
  • Prudential: Unveils a block chain powered trading platform for small and medium sized enterprises.

E-Commers

  • Tencent: A solution for verifying invoice authenticity and for ensuring tax compliance.
  • Alibaba: Using block chain technology to track luxury goods in it’s e-commerce platforms.

Please follow and like us:

Evolution of 5G Technology

5G will provide services across a wide swath of disruptive technologies. Improvements in performance over LTE will be essential to the future use of many of these emerging application. Today more than half of executives at large mobile network operators believe there are no any compelling near- term business cases for 5G. 5G promises a step change in network performance for those operators that are ready to invest in it. 4G network do not enable the range of services that the future requires. 5G will be faster and more flexible. It’s change the way of Social Media.

American President Donald J. Trump tweet:

“I want 5G, and even 6G, technology in the United States as soon as possible. It is far more powerful,faster, and smarter than the current standard. American companies must step up their efforts, or get left behind. There is no reason that we should be lagging behind on …..”



The Evolution

5G evolution in mobile
5G evolution in Mobile phones devices
  • 1G –> 1991—> Analog network with voice, AMPS,TACS
  • 2G –>1991 –> Analog to digital transition, introduced data services such as text messaging and more secure, GSM, EDGE, data up to 3Mbp/s
  • 3G –> 2001 —> More spectrum allowed basic access to more than just voice and text services such as e-mail, UMTS/HSPA, data up to 2Mbp/s
  • 2010 —> Merged cellular and IP technologies, LTE, data up to 50M p/s
  • 5G —> 2020—> A fundamental shift in the way we construct and manage mobile network infrastructure. Enables mass connectivity of devices and applications, 1000 time faster than 4G network, Amazing Connectivity, Fibre like experience

Building the Foundation for 5G

  • 5G is all about high-band spectrum, which Sprint has commercially deployed
  • 2.5 GHZ spectrum is considered the low-band spectrum for 5G
  • Street furniture such as poles not towers
  • Signal from both side of wall
  • Network Function Virtualization
  • Software Defined Networking

5G Network Slicing

5G networking slicing
Structure of 5G network slicing

5G network slicing enables service poviders to build virtual end-to-end neworks tailored to application requirements.

  • Mobil broad band ——> Communation, Entertainment, Internet
  • Machine to machine –> Retail, Shipping, Manufacturimg
  • Reliable low latency –>Automative, Medical, Infrastructure
  • Others ———————-> Other Applications

Some Real Points about 5G

 Mission Critical Control

  • Strong Security : Health, Government, Financial trusted
  • Ultra high reliability : 10^5 per 1 millisecond
  • Ultra – low latency : As low as 1 millisecond
  • Extreme user mobility : Up to 500km/h

Enhanced Mobile Broadband

  • Deep Awareness : Discovery and optimization
  • Extreme Data Rates : Multi-Gbps peak rates; 100+ Mbps user experienced rates
  • Extreme Capacity : 10 Tbps per Km^2

Massive Internet of Things

  • Ultra-high density : 1 million nodes per Km^2
  • Ultra-low complexity : 10s of bits  per second
  • Ulra-low energy : 10+ years of  battery life
  • Deep Coverage : To reach challenging locations

Enabling Smart Industry

5G test
5G smart industry test area
  • Cutting the cord : Wireless industrial Ethernet enables reconfigurable factories
  • Enabling new use cases: Such as operators using augmented reality glasses
  • Leveraging big data analytics : Edge analytics of massive real time data collection increases productivity

Private 5G NR Network Enables the next Industrial revolution

New Capabilities

  • URLLC – ultra reliable, low latency
  • Time sensitive networking

Large Cellilar Ecosystem

  • Global solutions
  • Certified inter operability

More Spectrum

  • Licensed, shared, unlicensed
  • Low, mid, mmWave spectrum

Single Network for the Entire Factory

  • Multimode network supporting LTE and 5G NR
  • Scalable to all connectivity needs

Quick Figure of 5G

  • Real Time Performance : Fast response time, low jitter, latency and delay, high availability
  • Critical infrastructure : Hugh reliability, priority access, very wide area coverage
  • Very high speed broadband : Gigabit data rates, high quality coverage, multi spectrum service
  • IoT and M2M : Many more connected devices, deep indoor coverage, signaling efficiency
  • Virtualized Infrastructure

“Rolling out 5G is absolutely insane … and doing so without a single biological test of safety has got to be about the stupidest idea anyone has had in the history of the World.”

Dr Martin Pall

5G Technology Cost Impact

An Illustration : Capex Stress from

  • Massive cell densifications
  • Smaller & Smallest cell connectivity.
  • Operators likely Backbone modernization / uplift.
  • Core,IT & Platforms more likely to be within spend profile ( on average ).
  • Depends on complexity ,e.g., slicing…

An Illustration : Opex Pressure from

  • Overall poor economical scalability of small, smaller & smaller cells.
  • Open impact will depend on level of fixed -mobile integration & the technology modernization level.
  • Dependency of level of automation & degree of zero – touch network state.

The Landscape of 5G




5G will differentiate itself by delivering various improvements

  • 10X : Decrease in latency = Delivering latency as low as 1 ms.
  • 10X : Connection density = Enabling more efficient signaling for lot connectivity.
  • 10X : Experienced throughput = Bringing more uniform , multi-Gbps peak rates.
  • 3X : Spectrum efficiency = Achieving even more bits per Hz with advanced antenna technique.
  • 100X : Traffic capacity = Driving network hyper-densification with more small cells everywhere.
  • 100X : Network efficiency = Optimizing network energy consumption with more efficient processing.

All Flavors of 5G are Developing in Parallel!

All tracks include higher integration and further RF Sip development

5G mm Wave 

  • mmWave 5G technology – disruptive innovation
  • Introduction of mmWave frequencies >24 GHz
  • Adoption of new packaging architectures and platforms
  • Major design changes and new materials required

5G sub 6 GHz

  • Upgrade of 4G technology – incremental innovation
  • Will stay at frequencies < 6GHz 
  • Modification of current RF packaging architectures 
  • Minimal change in BOM

5G IoT

  • Used frequencies < 1GHz
  • To address transfer of data generated by many IoT end devices ( mainly sensors )
  • Still undefined standards / protocols
  • Little to no innovation regarding semiconductor packaging

For more info please visit this blog : What is 5G technology?

see also : 5 Things to know about 5G wireless technology




Please follow and like us: