Adaptive Intelligence Security Solution

Preview:

DESCRIPTION

Today, whenever the security detail/device protecting a resource is compromised, the fight to guide the resource is virtually over. This paper presents a new look on the concept of adaptive intelligence as a plausible solution to this issue. Using an Automated Teller Machine (ATM) model for a software simulation plus a biometric application of the concept, the paper shows how security systems could evolve from protecting security details to preventing the utility of such details even after being compromised.

Citation preview

Adaptive Intelligence Security Solution

Security in Future Conference, 2010. Turku, Finland

Baiyere, Abayomi F.

Adaptive

The Brain Vs Today’s Computers

[An important difference between humans and the current

generation of computers is - our ability to learn from examples and to adapt our

behavior to novel situations. ] SNN Netherlands

Adaptive Intelligence Security Solution

Image: http://www.fastcompany.com/1697779/coming-soon-a-brain-x-prize, http://www.badboycomputers.com/online/index.php?main_page=index&cPath=73

Intelligence

Intelligent behavior is understood as appropriate action in an uncertain environment.

[ where appropriate action is understood as action which increases the probability of success in achieving high priority goals.] Gary Berg-

Cross

Adaptive Intelligence Security Solution

How do we secure access info / device?

Protection Efforts Keys Pin Codes Passwords Fingerprints Access Cards Restricted Zones E.t.c

Adaptive Intelligence Security Solution

After security info is compromised..

Victory! The authentic owner of the security

access information or device basically loses the fight once compromised.

Adaptive Intelligence Security Solution

Compromised. Should that be the end?

Prevention Focus What if …

▪ there is another layer of security?

What if …▪ User can be verified?

Adaptive Intelligence Security Solution

Image: http://gujiadoors.en.made-in-china.com/product/JehnXPzHHBcI/China-Double-Antitheft-Steel-Security-Door-GJ-13A-.html

Protection Layer (Passwords…)

Prevention Layer (User attributes)

How can we prevent use of Compromised security info?

Concept: Protection – Prevention

Intelligence Concept: Decision Enabled System

Adaptive Intelligence Concept: Unique User Trends & Attributes

Adaptive Intelligence Concept

Adaptive Intelligence Security Solution

ATM Simulation Model

Adaptive Intelligence Security Solution

ATM Security Software Solution

Adaptive Intelligence Security Solution

ATM Security Software Solution

Adaptive Intelligence Security Solution

Reports

Adaptive Intelligence Security Solution

Sample parameters

Deductions from Location & Amount Analysis

Adaptive Intelligence Security Solution

Transactional Pattern- Location

Adaptive Intelligence Security Solution

Behavioural deductions

Adaptive Intelligence Security Solution

Application In Bio-security & Hardware Systems

Adaptive Intelligence Security Solution

Bio-security & Hardware Systems

Alerts & Principle of Least Authority

Adaptive Intelligence Security Solution

Using POLA to indicate points of Yellow, Orange and Red alert triggers within a business process diagram.

mild alert

caution alert

Critical alert

1. Use Case

Further Study PointsAdaptive Intelligence Security Solution

Ease of Use

Security

Hig

h

HighLow

2. Technical Implementation

3. Cost Economic Performance

Index (x,y)

LogRequest Allow/Confirm

What you have (Cards, Tokens …)+

What you know (Passwords, Pincodes …) and+

Who you are (characteristics, patterns…)

Adaptive Intelligence Security =

Adaptive Intelligence Security Solution

What you know

What you have

What you are

Who you are

Asset

Summarily…

Extending Security from only

What you have or know To

Who you are

Image: http://t3.gstatic.com/images?q=tbn:ANd9GcQjdf3hYY9GQzecZcogPhCqZAhj-8puhkCe0OnUk13LH7vnht-v

Thank You

Security in Future Conference, 2010. Turku, Finland

Baiyere, Abayomi F.

Adaptive Intelligence Security Solution

Recommended