2 1 9
- 2
- 3
F O S D E M 2 1 9
1
N G I Z e r
- :
y e a r
Come work for the internet
- n privacy, trust, search & discovery
N G I Z e r o : y e a r 0 Come work for the internet on - - PowerPoint PPT Presentation
N G I Z e r o : y e a r 0 Come work for the internet on privacy, trust, search & discovery Powered by the European Commission Directorate-General for Communications Networks Content and Technology 825322 / 825310 F O S D
2 1 9
F O S D E M 2 1 9
2 1 9
F O S D E M 2 1 9
2 1 9
F O S D E M 2 1 9
2 1 9
F O S D E M 2 1 9
2 1 9
F O S D E M 2 1 9
Next Generation Internet
2 1 9
F O S D E M 2 1 9
Public Procurement
D e s i g n f
r
u s t n e s s a n d a u t
y S t e e r a w a y f r
m
u l t u r e Follow best practices w.r.t.
L L e e g g i i s s l l a a t t i i v v e e a a s s p p e e c c t t s s
Mandatory hard switches for embedded cameras and other devices M
i l e
e r a t i n g s y s t e m s Stricter maintaining of existing laws and regulations protecting users R e t a i n u n a s s i g n e d s p e c t r u m f
p u b l i c d
a i n i n 5 G Data retention Right to be IoT ofgline (including environment) N e t N e u t r a l i t y Duty to update/mandatory
Right to encryption R i g h t t
a v e i n s i g h t i n t
i g d a t a g a t h e r i n g M
e r n i s e
e r
n v a s i v e c
y r i g h t t
l l
n
m e r c i a l s h a r i n g Lead by example D e a l i n g w i t h n e g l i g e n c e w . r . t . m a i n t e n a n c e a s a t h r e a t t
h e w h
e e c
y s t e m (Hardware) Isolation of cryptographic material C
t a i n d i g i t a l s p i l l
e r i n p h y s i c a l w
l d Protecting users during nomadic access (e.g. wifi) Open (user-defined and controlled) security Background process transparency S e c u r i t y p r
s Sensor data firewalling B r
s e r e n v i r
m e n t Open (user-defined and controlled) security Domain isolation S e c u r e s
w a r e / s c r i p t i n g d i s t r i b u t i
a n d u p d a t i n g Redesign insecure standards Strenghten encryption Declarative interaction S a f e ( p a s s i v e ) c
t e n t p r
i l e s
Addressing ng t threat categories
M a l i c i
s b i g d a t a Passive observation Pervasive surveillance U n k n
n c a p a b i l i t i e s Programmes exposed by whistle blowers Industrial sabotage I n d u s t r i a l e s p i
a g e Cyber warfare/conflicts C a s c a d e
s y s t e m f a i l u r e Lack of isolation 3 r d p a r t y d e p e n d e n c i e s Disaster Man-made Natural End-user service deployability I m p r
i n g m u l t i l i n g u a l s u p p
t Best practises and bundled expertise Management of high volume of updates/ changes S
u t i
i n t e g r a t i
a n d p r e c
p e t i t i v e b u n d l i n g
Eng ngine neering ng Trustworthine ness
S e c u r i t y t r a n s p a r e n c y Verifiability of routing paths End to end confidentiality of trafgic metadata Transport layer security Distributed reputation mechanism(s) Decentralised internet-wide identity mechanisms
"Greening" internet technology
Lack of transparency of environmental cost Need to improve efgiciency
Antagonistic (legacy) middleware
Lack of isolation Trafgic loss Legacy hardware
S S e e c c u u r r i i n n g g t t h h e e u u s s e e r r e e n n v v i i r r
n m m e e n n t t
Packet interference Legacy hardware T r a fg i c s h a p i n g Firewalls N A T Improve limited upgrade capabilities I n c r e a s e e m e r g e n c y r e s p
s i v e n e s s Real-time measurement data Numbering
Alterna native inf nfrastructure e element nts
High availability Asset distribution Abuse handling Redundancy Partitioning/scope isolation R e a l i s t i c t r a n s i t i
m e c h a n i s m s Tamper proof D i s t r i b u t e d t r u s t m e c h a n i s m Scalability
Improving deployability and maintainability
G l
a l r
t i n g t a b l e s i z e Confidentiality S e a r c h a n d d i s c
e r y Naming system alternatives R
t i n g l a y e r c
f i d e n t i a l i t y
Solving scalability issues Safeguarding ng o
nness to ne new e ent ntrant nts
O p e n s p e c t r u m 5G standardisation issues Improving low-level discovery P r e v e n t i n g h
i z
t a l s p i l l
e r Unlocking verticals
Next Generation Internet
2 1 9
F O S D E M 2 1 9
2 1 9
F O S D E M 2 1 9
R e a d f u l l t e x t a t h t t p s : / / n g i . e u / v i s i
2 1 9
F O S D E M 2 1 9
2 1 9
F O S D E M 2 1 9
2 1 9
F O S D E M 2 1 9
2 1 9
F O S D E M 2 1 9
2 1 9
F O S D E M 2 1 9
W e i g h t C r i t e r i
3 % T e c h n i c a l e x c e l l e n c e / f e a s i b i l i t y 4 % R e l e v a n c e / I m p a c t / S t r a t e g i c p
e n t i a l 3 % C
t e fg e c t i v e n e s s / V a l u e f
mo n e y
2 1 9
F O S D E M 2 1 9
2 1 9
F O S D E M 2 1 9
2 1 9
F O S D E M 2 1 9
2 1 9
F O S D E M 2 1 9
2 1 9
F O S D E M 2 1 9
2 1 9
F O S D E M 2 1 9
2 1 9
F O S D E M 2 1 9
2 1 9
F O S D E M 2 1 9
2 1 9
F O S D E M 2 1 9
5.6 million euro in small grants between now and 2021
5.6 million euro in small grants between now and 2021
2 1 9
F O S D E M 2 1 9
in grants between now and 2021
5.6 million euro in grants between now and 2021
2 1 9
F O S D E M 2 1 9
CC BY 2.0, created by Jérôme Decq https://www.flickr.com/photos/lesphotosdejerome/5958094770