masterclass security in data cloud and blockchain
play

Masterclass: Security in data, cloud and blockchain Professor Trish - PowerPoint PPT Presentation

Masterclass: Security in data, cloud and blockchain Professor Trish Williams Cisco Chair and Professor of Digital Health Systems Co-Director of Flinders Digital Health Research Centre College of Science and Engineering Flinders University,


  1. Masterclass: Security in data, cloud and blockchain Professor Trish Williams Cisco Chair and Professor of Digital Health Systems Co-Director of Flinders Digital Health Research Centre College of Science and Engineering Flinders University, South Australia Ivan Jasenovic Managing Director, Sicoor.com

  2. HISA Cybersecurity Community of Practice . https://www.hisa.org.au/cybersecurity/ http://katyaburg.ru/sites/default/files/pictures/prikolnye_video/super-smeshnaya-podborka-video-pro-kotov-koty-otjigaut.jpg

  3. Current security in e-Health

  4. Continuum of Security https://securityledger.com/wp-content/uploads/2015/03/Fotolia_75085004_S.jpg

  5. What to expect today? 1. Cybersecurity in healthcare – context 2. Basics test 3. Why do we need to start thinking differently? 4. What’s coming our way? 5. Blockchain in health

  6. 1. Cybersecurity in healthcare - context http://documents.trendmicro.com/images/TEx/articles/healthcare-breaches-timeline.jpg

  7. Attack capability http://i1-news.softpedia-static.com/images/news2/dyn-ddos-attack-powered-mainly-by-mirai-botnet-509541-2.png

  8. Mirai (IoT malware), botnets and DDOS attacks • Searches online for internet connected devices with default authentication • usernames and passwords • Build a botnet • harnessing the computation resources of equipment infected • Distributed denial of service • Design suggests it’s a platform • so many data requests the target is not just a ‘piece’ of attack flooded and can no longer respond or malware function) • Last attack was a test run https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/dumped-source-code-hacks-iot-devices-to-build-ddos-army-showcase_image-5-p-2267.jpg

  9. Ransomware https://digitalguardian.com/sites/default/files/26884181_m.jpg

  10. Rarely one cause e.g. Impact on NHS of WannaCry

  11. Why do we have this problem?

  12. Australian healthcare = a complex system

  13. Complex to defend… https://media.licdn.com/mpr/mpr/p/6/000/252/246/289588f.jpg

  14. Data intensive https://www.blackpepper.co.uk/wp-content/uploads/2016/09/Big-data-blog-image.jpg

  15. Critical Infrastructure http://www.nhisac.org/wp-content/uploads/CIKRCollage.jpg http://www.nhisac.org/wp-content/uploads/health1.jpg

  16. Convergence and Integration • Immaturity and a lack distinction between health software and medical devices in the health mobile marketplace, presents a major challenge for the security discipline

  17. Threat landscape • advanced I malware • Mirai • Ransomware • targeted Advanced Persistent attacks Threat • advanced persistent threats (APTs) https://s-media-cache-ak0.pinimg.com/originals/aa/5c/f1/aa5cf14cd468e04f46d7173ab76165a1.jpg

  18. The hacking business • Healthcare is an attractive and valuable target for hackers • Ransom for $$$ • Denial of Service for malice/$$$ • Stealing confidential data • Compromising data • Identity theft • Compromising devices https://upload.wikimedia.org/wikipedia/en/0/07/H_Commerce_film_poster.jpg

  19. New technology and new/old threats http://www.healthwareinternational.com/HP3Image/Content/internet-of-things.jpg https://img.wonderhowto.com/img/50/81/63545703386404/0/advice-from-real-hacker-protect-yourself-from-being-hacked.1280x600.jpg

  20. https://blog.gemalto.com/wp-content/uploads/2016/09/2016-breaches-by-type-source.jpg

  21. Unfortunately, the reality is that ….. “The healthcare sector is slow to update technology and as such is woefully unprepared for an oncoming onslaught of cyber attacks” SecurityBriefAu, March 02, 2016 Following the Mirai attack - “Hospitals survived not by design by by luck” Kevin Fu, Report to US Congress, https://securitybrief.com.au/media/cache/6a/f7/6af72e9f889fb0cc6f785790f208c1c9.jpg

  22. But it’s not all doom and gloom….. https://i.pinimg.com/736x/34/1f/99/341f99bee46fd9f0d5da541d2c628486--cat-tunnel-train-tunnel.jpg

  23. Continuum of Security Start Here https://securityledger.com/wp-content/uploads/2015/03/Fotolia_75085004_S.jpg

  24. 2. Basics test http://epicfails.net/wp-content/uploads/2011/04/camera_fail.jpg

  25. Back to basics….. Passwords.... Weak or strong?  Password Rate the strength of the eight  rover passwords: – Rate 1 for the strongest  1qaz2wsx password  Fluffy19 – To 8 for the weakest password  Pa$$w0rd  :);):-:( ;):-  1qaz@WSX  21734260118924

  26. Back to basics…..Passwords 8. rover 7. Password 6. 21734260118924 :);):-:(  ;):-  5. 4. Fluffy19 3. 1qaz2wsx 2. Pa$$w0rd 1. 1qaz@WSX

  27. Continuum of Security Gradually moving to here https://securityledger.com/wp-content/uploads/2015/03/Fotolia_75085004_S.jpg

  28. Lets test your knowledge…. • Does your organisation use email ? • Does your organisation send any patient related data via email? • Yes  • No – think again - https://stupidevilbastard.com/wp-content/uploads/2012/03/techsupportcat.jpg

  29. How much do you know? Is email a secure form of communication? a) Yes b) No b) No – can be traced, intercepted, spoofed, read (unless encrypted)

  30. What is phishing? a) Spoofed e-mails and fraudulent websites to fool recipients b) A type of computer virus c) An example of a strong password a) Spoofed e-mails and fraudulent websites to fool recipients

  31. What do you do if you get spammed? a) Reboot with sysdoc.exe disabled b) Delete the email c) Wipe your monitor with soft cloth b) Delete the email

  32. Phishing – real or not?

  33. Real or not? 

  34. What does this prove? Captcha: "Completely Automated Public Turing test to tell Computers and Humans Apart".

  35. Continuum of Security Lets advance to here https://securityledger.com/wp-content/uploads/2015/03/Fotolia_75085004_S.jpg

  36. 3. Why do we need to start thinking differently? • Things are moving faster than we can imagine http://ichef.bbci.co.uk/wwfeatures/live/624_351/images/live/p0/0z/95/p00z9591.jpg

  37. How do we usually approach cybersecurity? So much cybersecurity advice out there …

  38. Layered Security https://businessinsightsdm.files.wordpress.com/2017/03/graphic-1.jpg?w=616 http://www.infoexchangeja.com/uploads/blog/Layered_Security_Diagram-01.png

  39. Why change? Your challenges are: How do we keep up with attacks that are different, constant, and more and more sophisticated?

  40. Continuum of Security Now to here https://securityledger.com/wp-content/uploads/2015/03/Fotolia_75085004_S.jpg

  41. Acceptance of new ways of doing things http://slideplayer.com/10952745/39/images/6/The+Cloud+Continuum+Customer+Entry+into+Cloud+Security.jpg

  42. 4. What’s coming our way? (or is already here!) https://pbs.twimg.com/media/DHNY_r3XsAASKi5.jpg

  43. https://media.licdn.com/mpr/mpr/AAEAAQAAAAAAAAt3AAAAJDM5NDBhN2JiLTQ2MDYtNGYxMi1hYTEwLWVmMWU2ZjhkYjQzZA.jpg

  44. http://www.geekculture.com/joyoftech/joyimages/2340.png

  45. Continuum of Security Ultimately to here https://securityledger.com/wp-content/uploads/2015/03/Fotolia_75085004_S.jpg

  46. Blockchain • A blockchain is a type of distributed ledger, comprised of un-changable, digitally recorded data in packages called blocks . https://gallery.mailchimp.com/0c60818e26ecdbe423a10ad2f/images/5335b0a4-1b15-46e7-acf9-01f43ad813d7.jpg

  47. Healthcare data security is like…

  48. What we need to build is ……Resilience Resilience is the ability to “bounce back” from stressful or challenging experiences. It involves being able to adapt to changes and approach negative events, sources of stress and traumatic events as constructively as possible. Cyber resilience refers to an entity's ability to continuously deliver the intended outcome despite adverse cyber events http://www.motivationalmemo.com/wp-content/uploads/2012/07/resilience.jpg

  49. Australia’s Cyber Resilience Taskforce https://www.pmc.gov.au/cyber-security/cyber-resilience-taskforce

  50. Resilience philosophy http://4.bp.blogspot.com/-oGounP7z0S0/TiBdgq_X-TI/AAAAAAAAAfI/XjzKNvSHrqQ/s1600/1tiggerbounce.gif

  51. Thank you Questions/Discussion

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend