adaptive intelligence security solution

22
Adaptive Intelligence Security Solution Security in Future Conference, 2010. Turku, Finland Baiyere, Abayomi F.

Upload: abayomi-baiyere

Post on 29-Jun-2015

1.764 views

Category:

Technology


3 download

DESCRIPTION

Today, whenever the security detail/device protecting a resource is compromised, the fight to guide the resource is virtually over. This paper presents a new look on the concept of adaptive intelligence as a plausible solution to this issue. Using an Automated Teller Machine (ATM) model for a software simulation plus a biometric application of the concept, the paper shows how security systems could evolve from protecting security details to preventing the utility of such details even after being compromised.

TRANSCRIPT

Page 1: Adaptive Intelligence Security Solution

Adaptive Intelligence Security Solution

Security in Future Conference, 2010. Turku, Finland

Baiyere, Abayomi F.

Page 2: Adaptive Intelligence Security Solution

Adaptive

The Brain Vs Today’s Computers

[An important difference between humans and the current

generation of computers is - our ability to learn from examples and to adapt our

behavior to novel situations. ] SNN Netherlands

Adaptive Intelligence Security Solution

Image: http://www.fastcompany.com/1697779/coming-soon-a-brain-x-prize, http://www.badboycomputers.com/online/index.php?main_page=index&cPath=73

Page 3: Adaptive Intelligence Security Solution

Intelligence

Intelligent behavior is understood as appropriate action in an uncertain environment.

[ where appropriate action is understood as action which increases the probability of success in achieving high priority goals.] Gary Berg-

Cross

Adaptive Intelligence Security Solution

Page 4: Adaptive Intelligence Security Solution

How do we secure access info / device?

Protection Efforts Keys Pin Codes Passwords Fingerprints Access Cards Restricted Zones E.t.c

Adaptive Intelligence Security Solution

Page 5: Adaptive Intelligence Security Solution

After security info is compromised..

Victory! The authentic owner of the security

access information or device basically loses the fight once compromised.

Adaptive Intelligence Security Solution

Page 6: Adaptive Intelligence Security Solution

Compromised. Should that be the end?

Prevention Focus What if …

▪ there is another layer of security?

What if …▪ User can be verified?

Adaptive Intelligence Security Solution

Image: http://gujiadoors.en.made-in-china.com/product/JehnXPzHHBcI/China-Double-Antitheft-Steel-Security-Door-GJ-13A-.html

Protection Layer (Passwords…)

Prevention Layer (User attributes)

Page 7: Adaptive Intelligence Security Solution

How can we prevent use of Compromised security info?

Concept: Protection – Prevention

Intelligence Concept: Decision Enabled System

Adaptive Intelligence Concept: Unique User Trends & Attributes

Adaptive Intelligence Concept

Adaptive Intelligence Security Solution

Page 8: Adaptive Intelligence Security Solution

ATM Simulation Model

Adaptive Intelligence Security Solution

Page 9: Adaptive Intelligence Security Solution

ATM Security Software Solution

Adaptive Intelligence Security Solution

Page 10: Adaptive Intelligence Security Solution

ATM Security Software Solution

Adaptive Intelligence Security Solution

Page 11: Adaptive Intelligence Security Solution

Reports

Adaptive Intelligence Security Solution

Page 12: Adaptive Intelligence Security Solution

Sample parameters

Page 13: Adaptive Intelligence Security Solution

Deductions from Location & Amount Analysis

Adaptive Intelligence Security Solution

Page 14: Adaptive Intelligence Security Solution

Transactional Pattern- Location

Adaptive Intelligence Security Solution

Page 15: Adaptive Intelligence Security Solution

Behavioural deductions

Adaptive Intelligence Security Solution

Page 16: Adaptive Intelligence Security Solution

Application In Bio-security & Hardware Systems

Adaptive Intelligence Security Solution

Page 17: Adaptive Intelligence Security Solution

Bio-security & Hardware Systems

Page 18: Adaptive Intelligence Security Solution

Alerts & Principle of Least Authority

Adaptive Intelligence Security Solution

Using POLA to indicate points of Yellow, Orange and Red alert triggers within a business process diagram.

mild alert

caution alert

Critical alert

Page 19: Adaptive Intelligence Security Solution

1. Use Case

Further Study PointsAdaptive Intelligence Security Solution

Ease of Use

Security

Hig

h

HighLow

2. Technical Implementation

3. Cost Economic Performance

Index (x,y)

LogRequest Allow/Confirm

Page 20: Adaptive Intelligence Security Solution

What you have (Cards, Tokens …)+

What you know (Passwords, Pincodes …) and+

Who you are (characteristics, patterns…)

Adaptive Intelligence Security =

Adaptive Intelligence Security Solution

What you know

What you have

What you are

Who you are

Asset

Page 21: Adaptive Intelligence Security Solution

Summarily…

Extending Security from only

What you have or know To

Who you are

Image: http://t3.gstatic.com/images?q=tbn:ANd9GcQjdf3hYY9GQzecZcogPhCqZAhj-8puhkCe0OnUk13LH7vnht-v

Page 22: Adaptive Intelligence Security Solution

Thank You

Security in Future Conference, 2010. Turku, Finland

Baiyere, Abayomi F.

Adaptive Intelligence Security Solution