adaptive intelligence security solution
DESCRIPTION
Today, whenever the security detail/device protecting a resource is compromised, the fight to guide the resource is virtually over. This paper presents a new look on the concept of adaptive intelligence as a plausible solution to this issue. Using an Automated Teller Machine (ATM) model for a software simulation plus a biometric application of the concept, the paper shows how security systems could evolve from protecting security details to preventing the utility of such details even after being compromised.TRANSCRIPT
Adaptive Intelligence Security Solution
Security in Future Conference, 2010. Turku, Finland
Baiyere, Abayomi F.
Adaptive
The Brain Vs Today’s Computers
[An important difference between humans and the current
generation of computers is - our ability to learn from examples and to adapt our
behavior to novel situations. ] SNN Netherlands
Adaptive Intelligence Security Solution
Image: http://www.fastcompany.com/1697779/coming-soon-a-brain-x-prize, http://www.badboycomputers.com/online/index.php?main_page=index&cPath=73
Intelligence
Intelligent behavior is understood as appropriate action in an uncertain environment.
[ where appropriate action is understood as action which increases the probability of success in achieving high priority goals.] Gary Berg-
Cross
Adaptive Intelligence Security Solution
How do we secure access info / device?
Protection Efforts Keys Pin Codes Passwords Fingerprints Access Cards Restricted Zones E.t.c
Adaptive Intelligence Security Solution
After security info is compromised..
Victory! The authentic owner of the security
access information or device basically loses the fight once compromised.
Adaptive Intelligence Security Solution
Compromised. Should that be the end?
Prevention Focus What if …
▪ there is another layer of security?
What if …▪ User can be verified?
Adaptive Intelligence Security Solution
Image: http://gujiadoors.en.made-in-china.com/product/JehnXPzHHBcI/China-Double-Antitheft-Steel-Security-Door-GJ-13A-.html
Protection Layer (Passwords…)
Prevention Layer (User attributes)
How can we prevent use of Compromised security info?
Concept: Protection – Prevention
Intelligence Concept: Decision Enabled System
Adaptive Intelligence Concept: Unique User Trends & Attributes
Adaptive Intelligence Concept
Adaptive Intelligence Security Solution
ATM Simulation Model
Adaptive Intelligence Security Solution
ATM Security Software Solution
Adaptive Intelligence Security Solution
ATM Security Software Solution
Adaptive Intelligence Security Solution
Reports
Adaptive Intelligence Security Solution
Sample parameters
Deductions from Location & Amount Analysis
Adaptive Intelligence Security Solution
Transactional Pattern- Location
Adaptive Intelligence Security Solution
Behavioural deductions
Adaptive Intelligence Security Solution
Application In Bio-security & Hardware Systems
Adaptive Intelligence Security Solution
Bio-security & Hardware Systems
Alerts & Principle of Least Authority
Adaptive Intelligence Security Solution
Using POLA to indicate points of Yellow, Orange and Red alert triggers within a business process diagram.
mild alert
caution alert
Critical alert
1. Use Case
Further Study PointsAdaptive Intelligence Security Solution
Ease of Use
Security
Hig
h
HighLow
2. Technical Implementation
3. Cost Economic Performance
Index (x,y)
LogRequest Allow/Confirm
What you have (Cards, Tokens …)+
What you know (Passwords, Pincodes …) and+
Who you are (characteristics, patterns…)
Adaptive Intelligence Security =
Adaptive Intelligence Security Solution
What you know
What you have
What you are
Who you are
Asset
Summarily…
Extending Security from only
What you have or know To
Who you are
Image: http://t3.gstatic.com/images?q=tbn:ANd9GcQjdf3hYY9GQzecZcogPhCqZAhj-8puhkCe0OnUk13LH7vnht-v
Thank You
Security in Future Conference, 2010. Turku, Finland
Baiyere, Abayomi F.
Adaptive Intelligence Security Solution