• Complain

Hamid Jahankhani - Strategy, Leadership, and AI in the Cyber Ecosystem: The Role of Digital Societies in Information Governance and Decision Making

Here you can read online Hamid Jahankhani - Strategy, Leadership, and AI in the Cyber Ecosystem: The Role of Digital Societies in Information Governance and Decision Making full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: London, year: 2020, publisher: Academic Press, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Hamid Jahankhani Strategy, Leadership, and AI in the Cyber Ecosystem: The Role of Digital Societies in Information Governance and Decision Making

Strategy, Leadership, and AI in the Cyber Ecosystem: The Role of Digital Societies in Information Governance and Decision Making: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Strategy, Leadership, and AI in the Cyber Ecosystem: The Role of Digital Societies in Information Governance and Decision Making" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Strategy, Leadership and AI in the Cyber Ecosystem investigates the restructuring of the way cybersecurity and business leaders engage with the emerging digital revolution towards the development of strategic management, with the aid of AI, and in the context of growing cyber-physical interactions (human/machine co-working relationships). The book explores all aspects of strategic leadership within a digital context. It investigates the interactions from both the firm/organization strategy perspective, including cross-functional actors/stakeholders who are operating within the organization and the various characteristics of operating in a cyber-secure ecosystem.

As consumption and reliance by business on the use of vast amounts of data in operations increase, demand for more data governance to minimize the issues of bias, trust, privacy and security may be necessary. The role of management is changing dramatically, with the challenges of Industry 4.0 and the digital revolution. With this intelligence explosion, the influence of artificial intelligence technology and the key themes of machine learning, big data, and digital twin are evolving and creating the need for cyber-physical management professionals.

Hamid Jahankhani: author's other books


Who wrote Strategy, Leadership, and AI in the Cyber Ecosystem: The Role of Digital Societies in Information Governance and Decision Making? Find out the surname, the name of the author of the book and a list of all author's works by series.

Strategy, Leadership, and AI in the Cyber Ecosystem: The Role of Digital Societies in Information Governance and Decision Making — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Strategy, Leadership, and AI in the Cyber Ecosystem: The Role of Digital Societies in Information Governance and Decision Making" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
9: Zero Trust networks, the concepts, the strategies, and the reality

David Allan Eric Haddon Imperial College, London, United Kingdom

Abstract

For decades, firewalls have protected networks from attack by restricting and inspecting traffic at the network perimeter. With cloud computing and increase demands for remote access to corporate networks, the network boundaries have widened. Not only is email hosted in the cloud, but also are virtual desktops. Apps that previously required a few exceptions on a firewall now need to validate licence subscriptions and allow updates. The user must be able to transfer data as needed to online portals and reporting services that require an ever-increasing number of custom ports configured on firewalls. Updating firewall configurations used to be a seldom event, this is now no longer the case. As well as external threats, threats from malware and venomous links, bad actors such as malicious and careless insiders act on the inside network, such that the corporate network can no longer be assumed to be safe.

In March 2019 at the RSA conference, Matt Soseman, a security architect at Microsoft, declared the future as a Zero Trust environment, where physical firewalls would be obsolete (). The concept was not new, but the announcement was significant as Microsoft have been the champions of the on-premise in-house trusted domain-based network for decades.

Network security has evolved over many years to enforce greater security within internal networks. This is seen in PCI-DSS, ISO 27001:2013, and NIST and is widely referred to as defence in depth. As communications are increasingly encrypted with end-to-end encryption, firewalls are having increasing difficulties in inspecting network traffic due to the encryption. The network boundary is getting blurred, and a new approach is needed. This is the basis of the Zero Trust concept.

Keywords

Zero-Trust; BeyondCorp; Carta; CASB; Firewall; Reauthentication

1: Introduction

When Matt Soseman, security architect at Microsoft made the announcement that firewalls were no longer needed () this might have appeared at first sight that Microsoft were throwing caution to the wind and are giving the impression that network security is no longer important.

Following this announcement in April 2019, Microsoft announced that they were dropping the baseline password expiration policy from Windows 10. The direction of travel might appear rash and imply that Microsoft are pandering to the users that hate IT people who disrupt and hinder business by blocking websites and emails with firewalls, web proxies, and email filters and frustrate users by enforcing password changes. The user is king, and any slight inconvenience caused by security is maligned as a nuisance and hindrance to business. Users want security, but they want security to be unobtrusive. The words false positive, quarantined, undeliverable, unavailable, and not found are no longer acceptable, yet at the same time if a spam email gets through an explanation is demanded as to why it was allowed.

Microsoft's view why firewalls are no longer useful as a first line of defence though is based on the following argument:

What has made the trusted technology obsolete is the variety of devices employees use to access corporate data from far-flung places outside the corporate offices.

Although Microsoft's statements appear rather frivolous, it goes without saying that Microsoft has put considerable thought into how security is evolving. Microsoft see the future with technologies like Windows Hello, authentication using biometrics, facial recognition, and leveraging Azure AD Conditional Access Policies with artificial intelligence checking for user and physical abnormalities and restricting access as needed. AI has long been used in card payment systems, where a suspicious transaction triggers a teleworker to investigate. Tomorrow's network authentication systems like Azure AD Conditional Access are already pursuing this approach. Taking this a stage further, have proposed methods whereby firewalls learn rules based on assets and zones.

The world is digital, and banking systems are online, and tax and national insurance submissions are now only accepted in digital format. Validating who, what device, and from what location is connected to a service is essential to reduce fraud.

This chapter will attempt to reconcile the concepts from the latest research from Forrester Research and others and discuss the concepts of a Zero Trust framework.

2: What is Zero Trust?

The Zero Trust model was initially proposed by John Kindervag of Forrester Research in 2010 (). This proposal is very much an academic work considering the network, network zones, the need for central network visibility, and the logging necessary to create a data acquisition network (DAN) for reporting.

The concept of Zero Trust starts with the preposition that everything is untrusted () and all traffic should be monitored, so that a threat should trigger an alert and be isolated.

Cloud providers who are not responsible for client internal networks may advocate that perimeter firewalls and proxy servers are no longer needed. This is based on the premise that all data is secured in the cloud and that firewalls interfere with access. This though is naive as a rogue keylogger installed on a remote workstation could capture passwords and other information which could then be used to compromise a cloud service.

The key element of Zero Trust approach is to treat the internal network as untrusted to the same degree as the internet.

Where some data are held on the internal network, the model proposes the network be divided into zones based on the assets to be protected by the zone, which implies that traffic between zones should be controlled by firewalls!

Some of the concepts are not new; the age-old practice of least privileged access as extolled in ISO27001 is an example of microsegregation which is a principle of Zero Trust.

3: What are the key principles of a Zero Trust network?

The five core concepts of Zero Trust Networks are as follows (, p. 1):

  1. The Network is always assumed to be hostile.
  2. External and internal threats exist on the network at all times.
  3. Network locality is not sufficient for deciding trust in a network.
  4. Every device, user, and network flow are authenticated and authorised.
  5. Policies must be dynamic and calculated from as many sources of data as possible.

The other two important elements that John Kindervag includes are:

  1. MCAPmicrocore and perimeter. This is about microsegmentation of networks. Each of the switching zones attached to an interface is referred to as a microcore switch. A physical interface may support multiple MCAPs. Although Kindervag promotes the concept of network segmentation, it must be remembered that there is not a trusted network segment. The rational is that segmentation allows for the isolation of a network segment by software if necessary.
  2. DANData Acquisition Network. This relates to network visibility of traffic flows. Monitoring network traffic means having access to the traffic on all MCAP's which needs to be planned as part of the implementation strategy.

These two aims, MCAPS and DANS, are clearly slightly at odds because providing greater visibility gets problematic as the network is segregated.

4: Are there variations on the Zero Trust concept?

The Zero Trust model is also known by other names. This is because Zero Trust is a very general concept; when it comes to implementing Zero Trust, choices must be made and implemented in a consistent way. The strategies of Googles BeyondCorp and Cisco Trusted Access (CTA) are different approaches based on the strategies chosen by Google and Cisco, respectively.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Strategy, Leadership, and AI in the Cyber Ecosystem: The Role of Digital Societies in Information Governance and Decision Making»

Look at similar books to Strategy, Leadership, and AI in the Cyber Ecosystem: The Role of Digital Societies in Information Governance and Decision Making. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Strategy, Leadership, and AI in the Cyber Ecosystem: The Role of Digital Societies in Information Governance and Decision Making»

Discussion, reviews of the book Strategy, Leadership, and AI in the Cyber Ecosystem: The Role of Digital Societies in Information Governance and Decision Making and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.