The Role of Cybersecurity in Modern Societies Prof. Mario Marchese - - PowerPoint PPT Presentation

the role of cybersecurity in modern societies
SMART_READER_LITE
LIVE PREVIEW

The Role of Cybersecurity in Modern Societies Prof. Mario Marchese - - PowerPoint PPT Presentation

The Role of Cybersecurity in Modern Societies Prof. Mario Marchese DITEN University of Genoa mario.marchese@unige.it mario.marchese@unige.it 1 The Need of Security and Resilience Physical security Cybersecurity Fault


slide-1
SLIDE 1

The Role of Cybersecurity in Modern Societies

  • Prof. Mario Marchese

DITEN – University of Genoa mario.marchese@unige.it

1

mario.marchese@unige.it

slide-2
SLIDE 2

The Need of Security and Resilience

  • Physical security
  • Cybersecurity
  • Fault tolerance and Replication

2

slide-3
SLIDE 3

Physical security

  • Critical Infrastructure Protection

– Deterrence methods – Physical barriers – Natural surveillance – Security lighting

3

– Security lighting

  • Intrusion detection and electronic surveillance

– Alarm systems and sensors – Video surveillance

  • Access control

– Mechanical access control systems – Electronic access control systems – Identification systems and access policies

slide-4
SLIDE 4

The word “cyber”

  • The word Cyber comes from the English word cybernetics,

derived from Greek κυβερνήτης (kybernetes) that means ‘helmsman, pilot of a ship’ and, with extended meaning, ‘the person who guides and governs a City or a State’.

  • James Watt, at the end of the 18-th century, used the word

cybernetic for the first time within a technical framework to

4

cybernetic for the first time within a technical framework to describe a tool to control the speed of a steam engine.

  • Cybernetic was formalized in the 20-th century thanks to

scientists such as Norbert Wiener, McCulloch, Alan Turing e W. Grey Walter.

  • Now the word describes an infinity of study and application

fields that has not much to do with the original meaning but generically refers to the implications in modern life of virtual worlds.

slide-5
SLIDE 5

Cybersecurity

  • Computer security
  • Network security
  • Web security
  • Cloud Security
  • Mobile Security

5

  • Mobile Security
  • Social Engineering and Intelligence for Cyber

Security

  • SCADA System Security
  • Critical Infrastructure Protection

Supervisory Control And Data Acquisition

slide-6
SLIDE 6

Critical Infrastructures

  • Complex systems that provide many

basic services are commonly referred to as Critical Infrastructures.

6

slide-7
SLIDE 7

Sectors linked to critical infrastructures

  • Chemical
  • Commercial Facilities
  • Communications
  • Critical Manufacturing

7

  • Critical Manufacturing
  • Dams
  • Defense Industrial Base
  • Emergency Services
  • Energy
slide-8
SLIDE 8

Sectors linked to critical infrastructures

  • Financial Services
  • Food and Agriculture
  • Government Facilities
  • Healthcare and Public Health

8

  • Healthcare and Public Health
  • Information Technology
  • Nuclear Reactors, Materials, and Waste
  • Transportation Systems
  • Water and Wastewater Systems
slide-9
SLIDE 9

Smart City / Industry

  • A dominant feature of modern achievements consists in the

pervasiveness of electronic / information technologies and in their interconnection in networks on a domestic, zonal, and extended geographic scale.

  • In order to implement a Smart City / Industry it is necessary to

connect all the devices that are part of this reality. This brings with it many benefits summarized in the Internet of Things (IoT) 9 with it many benefits summarized in the Internet of Things (IoT) paradigm, where devices, sensors, in a word "the objects", are connected in the network, but also considerable risks as the network connection (and the Internet in particular) exposes these environments to possible "cyber" attacks.

  • For this reason a policy of prevention and risk management

linked to cyber security that must be an integral part of the Smart City / Industry is strictly necessary

slide-10
SLIDE 10

Smart City

10

slide-11
SLIDE 11

Smart Industry

11

slide-12
SLIDE 12

The Role of Cybersecurity

  • Advanced functions and Smart Networked

services -> considerable exposure security problems.

  • Secure communication systems between the

devices that carry the information and adequate protection up to the final user (home

12

adequate protection up to the final user (home – mobile devices now at the center of our daily life).

  • Huge amount of interconnected devices, from

the simplest to the most complex, with different structures and features, each of them producing a considerable amount of data over time.

slide-13
SLIDE 13

Intervention Areas

Investigation about Italian TLC research group

Cyber Security

13

Security Network Security & Monitoring Data Analysis, User Profiling & Signal Processing Physical Layer Security & Cryptography

slide-14
SLIDE 14

Bits of Open Technological Problems Reference Points

  • “Analysis of future 5G application

scenarios and of related security levels of communication protocols” –

14

levels of communication protocols” – OpenFiber

  • Energy Building, Savona Campus,

University of Genoa

slide-15
SLIDE 15

Bits of Open Technological Problems

  • It is key to design IDS systems (Intrusion Detection

Systems) with the purpose of analyzing and detecting safety issues, quickly and efficiently, allowing the identification of malevolent behaviors at the level of the network equipment before they can reach the devices terminals.

  • Given the number of traffic flows involved, it is

15

  • Given the number of traffic flows involved, it is

important to evaluate the possibility of designing a system based only on the statistical survey of traffic, avoiding, as far as possible, a detailed analysis of the content of the information flow (deep packet inspection).

  • Interaction with Software Defined Networking (SDN)
slide-16
SLIDE 16

Bits of Open Technological Problems

  • Pervasiveness of the electronic / computer

technologies synthesized in the Internet of Things (IoT) paradigm -> it is of fundamental importance to equip devices with adequate communication and protection systems.

  • Since these are often very low-cost sensors, it

16

  • Since these are often very low-cost sensors, it

is rare to find appropriate security

  • implementations. These devices are often

exposed to attacks, interception of information and/or forwarding on third-party malicious systems.

  • It is important to make an analysis of the

protocols at lower layers (physical and data link).

slide-17
SLIDE 17

Operative Example: Energy Building, Savona Campus

Green Gym Smart Grid Lab

17

Distributed Generation Lab

Heat pump, DHW tank

slide-18
SLIDE 18

Operative Example: Control Network, Savona Campus

18

slide-19
SLIDE 19

Operative Example: Control Network, Savona Campus

Ethernet Switch Router / Firewall Internet

19

RTU Ethernet Switch Router / Firewall

What if the attack is down here?

slide-20
SLIDE 20

Conclusions

  • Need of security
  • Introduction to Cybersecurity
  • Critical Infrastructures - Smart City /

Smart Industry

20

Smart Industry

  • The Role of Cybersecurity
  • Intervention Areas
  • Network Security and Monitoring
  • Open Technological Problems
slide-21
SLIDE 21

Contacts

  • Mario Marchese

– Full Professor – Coordinator of the PhD in Science and Technology for Electronic and Telecommunication Engineering

  • Department of Electrical, Electronic and

Telecommunications Engineering, and Naval Architecture (DITEN)

21

Architecture (DITEN)

  • University of Genova, Italy
  • Via Opera Pia 13
  • 16145, Genova, Italy
  • mario.marchese@unige.it
  • Ph. +39-010-3536571 (office)
  • Ph. +39-010-3532806 (lab)
  • Fax +39-010-3532154