SlideShare a Scribd company logo
1 © Copyright 2010 UNIKEN Inc. All rights reserved
Innovation Center
ProductBy
The Core Problem
What’s exactly wrong with the
internet?
2© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
So what’s wrong with it!! Nothing!!!
• It’s cheap
• Anyone can use it (no permissions required for accessing it!)
• It’s available and pervasive (almost everywhere now)
• Anyone can create any website, put any content, on a server, with an IP
address with absolutely NO GOVERNMENT CONTROL!
• Its freedom and democracy at its best!
w w w. u n i k e n . c o m
3© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
The Internet Classification
www.uniken.com
Resources that
REQUIRE
Access Control
[Online Banking]
[www.bankofamerica.com]
Resources that DO
NOT require Access
Control
[News]
[www.cnn.com]
Users who want
privacy and identity
protection
Users who DO NOT
want privacy and
identity protection
Needs
Secure
Private
Communication
Does not need
Secure
Private
Communication
4© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
5© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
THE CORE PROBLEM
THE CURRENT INTERNET INFRASTRUCTURE CANNOT
GUARANTEE THAT THE USER IS CONNECTING TO THE
DESIRED AUTHENTIC SERVER AND THE SERVER IS TALKING
TO AN AUTHENTIC PRIVELEGED USER
IT AT BEST PROVIDES ENCRYPTION WITH NO GUARANTEE
ON IDENTITY OF PARTIES INVOLVED IN THE
COMMUNICATION!!!
6© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Internet Evolution – A simplified view
[ARPANET]
TCP/IP
DNSRouters
TLS/SSL
BrowsersHTML
UDP
Web2.0
IPSEC
DNSSEC
Evolution
Digital
Certificates Tokens (OTP)
Site-Key
7© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Customer PC
hosts
INTERNET
ISP DNS
Server
ISP
INTERNET
Certificate
Authority
Fraudster’s
MachineFraudster’s
Machine
Fraudster’s
Machine
Man-in-the-middle
Session Hijacking
Replay Attacks
Phishing
Pharming
Bank
Datacenter
Domain
Registrar
Registrar /
Other
DNS Server
Man-in-the-browser
Man-on-the-machine
Modem
The Result!
8© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
The Internet is being used for something that it was NOT
designed for in the first place (Online Banking, Online Share
trading, Enterprise Web-Applications, Mobile Internet
Banking! )
Its’ designers never claimed the Internet (i.e. the packet
switched network – TCP/IP/UDP) was meant for secure private
communications!!
9© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
The current application services delivery
model is inherently vulnerable from a security
standpoint [Download Browser (from any
source) -> Type URL -> Give Password -> Hope
for the best!]
10© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
URL (domain name) (and corresponding DNS
infrastructure) CANNOT be used as identity
elements (identity look-up stores)(!)
11© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
SSL/Digital Certificate based Identity/Trust
Model is broken and has failed to deliver on
its original promise (of providing identity to
enterprises) – since it is based on a flawed
trust model
12© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Available end-user identity technologies are
not geared up to tackle the current attack
vectors (OTP 2FA /Biometric became obsolete
with the advent of MITM kind of attack
vectors)
13© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
The current Mutual Authentication based
protocols like IPSEC and the corresponding
applications IPSEC/VPN are not scalable (e.g.
Bank and Customers - Million end-points??)
14© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
End-Point Computing Environment is the new
threat frontier - What can AV do if the
processor cannot differentiate between an
authorized and unauthorized machine code(!)
15© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
WHAT IS A PRIVATE
(INTERNET)
APPLICATION
ECOSYSTEM?
16© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
SIMPLIFY AND
SECURE
APPLICATION
ECOSYSTEM
CREATE A TECHNOLOGY ENABLED
SECURE SERVICE DELIVERY
PLATFORM TO ENABLE FASTER TIME
TO MARKET AND INCREASED COST
EFFICIENCIES
Device Channel Applications
EnterpriseEnd-User
On Premise
On Cloud
Desktop/Laptop
Smart Phone
Tablet
Internet/Intranet
Employees
Customers
Partners
ECOSYSTEM CONTEXT
17© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
PUBLIC (mobile) APP ECOSYSTEMS
Apple (iOS)
Blackberry
They are consumer centric and focus ONLY on
mobile devices and mobile Apps
While Apple and Blackberry ecosystems are
closed (controlled store and proprietary
devices) the rest are open
Enterprises obviously cant use these consumer
centric, platform dependent ecosystems for
distribution, access, control and security for
enterprise applications
[App Store +
(Proprietary) Devices]
Google (Android)
Windows
[App Store + OS]
18© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Private Internet Circuits
18
Bank
Users
Bank
Users Bank
Users
Users
merchant
Users
eMail
Users
Social Networking
Users
merchant
Online Bank and its customers
Online Merchant and its customers
Online Collaboration tools (email, chat etc) and its
users
Social Networking Websites and its users
Online News Websites and its readers
Enterprises, their employees, their customers
and vendors
Online Government Services and its citizens
19© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Features of a Private Internet Circuit
• Safety
– Before any communication begins between entities in a PIC, their respective identities are verified by
both entities
– All communication is confidential and tamper proof (encrypted)
• Privileged and Exclusive
– An entity (user, software etc) not having the PIC identity relative to a given online service and the PIC
access system on his/her device will not be able to access the Online Service in the PIC
• Moderated and Controlled
– A central PIC server will control and enable the online services available to all the users of the PIC
ecosystem
– The PIC Server will provision and broker identity relationships in real-time
• Open and Extensible
– Developers can create PIC compatible Online Services and register it with the Central PIC server for
distribution to the users of the PIC ecosystem
19
20© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Private Internet (and Application) Ecosystem
Application Store
[Manage, Distribute]
User
Device Manager
[Manage, Control]
User Device Protection
Technology
Authentication
Infrastructure
Channel Security
Infrastructure
[Internet/Intranet]
Secure Application
Viewer
[Application Renderer]
Data Security
Technology
[Control, Protect]
Access Management
Technology
[Closed, Private]
PUBLIC INTERNET SERVICES (B2C)
ENTERPRISE APPLICATION SERVICES (B2B or B2E)
End-Point Container
Technology
[Security, Control]
21© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
PRIVATE [CLOSED] INTERNET
ECOSYSTEM
Private
Internet
Ecosystem
Identity
Device
Security
Data
Security
Channel
Security
Access
Management
Device
Management
App
Management
Identity Protection
Personal Online Identity is secured and protected
Closed and Private
Should not be accessible/visible from outside of the ecosystem
Platform, Device and Application Type Independent
Support Multiple OS’s, Laptops/Desktops/Mobiles/Tablets,
Web-Apps and Mobile Apps
Device, Application and Data Security
Application and Device Management
22© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
END-USER
REQUIREMENTS
23© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
How do I ?
Protect my login credentials of various critical websites (e.g. Online
Banking, Share Trading)
Protect from MITM/PHISHING and other sophisticated attacks
Protect my credit card/debit card information while doing ecommerce
transactions
Manage and Secure my personal Mobile Devices (e.g. Smart Phones,
Tablets and Latops)
Protect my personal data (e.g. contacts, files)
24© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Multiple Platforms
Windows, iOS, Android,
Blackberry
Plethora of
Devices
Desktops, Laptops, Mobile
Phones, Tablets
Identity Clutter
Too Many Passwords
Sophisticated
Attacks
MITM/PHISHING/PHARMING
Sensitive Data
Personal Contacts, Financial data
Secure
Communication
Chat/File Transfer
eMoney Safety
Credit Card/Debit Card
Ecommerce Transaction Safety
25© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
CIO CHALLENGES
26© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
How do I ?
Protect Enterprise Data from leaking out
Quickly deploy and rapidly roll-out new enterprise application services
Manage and Secure Mobile Devices
Manage Enterprise Web-Apps and Mobile Apps
Provide Secure Remote Access to Enterprise Applications to partners and customers and not just employees
Protect enterprise information/applications from MITM/PHISHING and other sophisticated attacks
Protect Online and Offline Content
Provide Authentication to End-Users [2FA and 3FA]
Provide remote support to enterprise devices
Reduce the total cost of application infrastructure
And many more such critical security and application management requirements..
27© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Multiple Platforms
Windows, iOS, Android,
Blackberry
Multiple User Types
Customers, Partners, Executive
Management, Employees
Plethora of
Devices
Desktops, Laptops, Mobile
Phones, Tablets
Identity Clutter
Too Many Passwords
Complex Enterprise
Application Landscape
On-Premise Web-Apps, Mobile Apps,
Hosted/Cloud Based Apps
Multiple Network
Types
Intranet and Internet
Shorter Cycles
Quick Development and Launch,
increasing business speed and
decreasing budgets!
28© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
THE REL-ID WIDGET
 Simple Client Side Software
that you download from
The REL-ID GATE on your
desktop/Laptop/Mobile
Phones/Tablets
 Configure your web-sites
on the REL-ID widget and
enter your private secure
internet world!
 The REL-ID Widget connects
to your configured web-
sites through the REL-ID
GATE (a cloud or on-
premise based Private
Internet Infrastructure)
Gate MyData
Connect MyCard
Settings Exit
29© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
VISUALS
(LAPTOPS/DESKTOPS)
30© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
31© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
32© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Enter previously set Device
Pin
33© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
34© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
IB User Id will get
prepopulated
35© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
VISUALS
(MOBILE PHONES AND TABLETS)
36© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
37© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
38© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
39© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
REL-ID
Secure Client
App
Containers
Web-Apps are visible and
accessible only if they are
provisioned in REL-ID
GATETM
Desktop/Laptop REL-ID Widget
REL-ID Web App Viewer
(Micro-Web-Apps)
REL-ID Mobile APP Container
REL-ID Widget
securely connects to the
Web-Apps via R-PCC
REL-ID Web App-Viewer
40© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
REL-ID
GATE
REL-ID
GATE
App Management
Identity Management
Device Management
Authentication
(2FA/3FA)
Access Management
R-PCC* Over Intranet R-PCC* Over Internet
Secure
Channel
Enterprise Web-Apps
[Virtual Image]
Enterprise Mobile Apps
3rd Party Web-Apps
[Virtual Image]
3rd Party
Mobile Apps
Command Center
Secure
Channel
Employee
Partner
Customer
REL-ID Widget
(Secure Client
App Container)
Mobile Phones,
Tablets,
Desktops and
Laptops
*R-PCC:
REL-ID Private Communication Channel (Encrypted)
THE REL-ID ECOTM
Internet
Private
Data
Center
41© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Network
REL-ID Private Communication Channel (R-PCC)
Mutually Authenticated Communication Handshake (MITM
Proof)
Encrypted Communication (optional), High-Speed and
Concurrent
Horizontally Scalable (Millions of End-Points)
Assets behind R-PCC are not visible to the Internet
and hence protected from various attacks
Requires zero admin privileges on end-user devices
Is created ON-DEMAND
Is agnostic to the underlying NETWORK (Internet or
Intranet)
RPCC Agent can be embedded in any third party application
stack (both software and firmware)
Application Application
REL-ID PCC
Agent
R-PCC (REL-ID Mutually Authenticated
and Encrypted Channel)
Internet or Intranet
42© Copyright 2012 UNIKEN Inc. All rights reserved
www.uniken.com
Network
End-User Device
Laptop
Mobile Phone
Tablet
Desktop
REL-ID Secure Container
(Safe Zone)
REL-ID Secure (encrypted)
Data Zone
3rd Party
Browser
REL-ID Web-App
Viewer
Enterprise Apps
Desktop/Laptop/Mobile
REL-ID
Multi-Factor
Authentication
2FA/3FA
R-PCC Agent
R-PCC
REL-ID Secure Container Technology (R-SCT)
REL-ID Device Fingerprinting and
Binding
REL-ID
Device
Management
And Control
Module

More Related Content

Similar to What is wrong with the Internet? [On the foundations of internet security, fundamental flaws, and the way forward] | Turing100@Persistent (20)

PPTX
Mobilize your workforce with secure identity services
Sumana Mehta
 
PPTX
Con8823 access management for the internet of things-final
OracleIDM
 
PPTX
Con8896 securely enabling mobile access for business transformation - final
OracleIDM
 
PPTX
Catalyst 2015: Patrick Harding
Ping Identity
 
PPTX
Check Point: Securing Web 2.0
Group of company MUK
 
PDF
Trends in IRM: Internet of Things
ForgeRock
 
PPTX
106 Threat defense and information security development trends
SsendiSamuel
 
PDF
Zabezpečení mobilních zařízení ve firemním prostředí
MarketingArrowECS_CZ
 
PPT
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
John Blossom
 
PPTX
Mobile Payments: Protecting Apps and Data from Emerging Risks
IBM Security
 
PPTX
Check Point Mobile Security
Group of company MUK
 
PDF
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CloudIDSummit
 
PPTX
Authshield integration with mails
AuthShield Labs
 
PDF
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Cyren, Inc
 
PPTX
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
IBM Security
 
PDF
BYOD and Security Trends
Cisco Russia
 
PDF
ISACA CACS 2012 - Mobile Device Security and Privacy
Michael Davis
 
PDF
CIS14: Mobilize Your Workforce with Secure Identity Services
CloudIDSummit
 
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Security Innovation
 
PDF
Appaloosa & AppDome: deploy & protect mobile applications
Julien Ott
 
Mobilize your workforce with secure identity services
Sumana Mehta
 
Con8823 access management for the internet of things-final
OracleIDM
 
Con8896 securely enabling mobile access for business transformation - final
OracleIDM
 
Catalyst 2015: Patrick Harding
Ping Identity
 
Check Point: Securing Web 2.0
Group of company MUK
 
Trends in IRM: Internet of Things
ForgeRock
 
106 Threat defense and information security development trends
SsendiSamuel
 
Zabezpečení mobilních zařízení ve firemním prostředí
MarketingArrowECS_CZ
 
Browsers in a Cloud-Powered World: Geeknet Virtual Trade Show - John Blossom
John Blossom
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
IBM Security
 
Check Point Mobile Security
Group of company MUK
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CloudIDSummit
 
Authshield integration with mails
AuthShield Labs
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Cyren, Inc
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
IBM Security
 
BYOD and Security Trends
Cisco Russia
 
ISACA CACS 2012 - Mobile Device Security and Privacy
Michael Davis
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CloudIDSummit
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Security Innovation
 
Appaloosa & AppDome: deploy & protect mobile applications
Julien Ott
 

More from Persistent Systems Ltd. (17)

PPTX
Skilling for SMAC by Anand Deshpande, Founder, Chairman and Managing Director...
Persistent Systems Ltd.
 
PDF
Embedded Linux Evolution | Turing Techtalk
Persistent Systems Ltd.
 
PDF
Life and Work of Ken Thompson and Dennis Ritchie | Turing Techtalk
Persistent Systems Ltd.
 
PPTX
Life and Work of Ivan Sutherland | Turing100@Persistent
Persistent Systems Ltd.
 
PDF
Evolution of the modern graphics architectures with a focus on GPUs | Turing1...
Persistent Systems Ltd.
 
PPTX
Life and Work of Ronald L. Rivest, Adi Shamir & Leonard M. Adleman | Turing10...
Persistent Systems Ltd.
 
PPTX
Life and Work of Judea Perl | Turing100@Persistent
Persistent Systems Ltd.
 
PDF
Early History of Fortran: The Making of a Wonder | Turing100@Persistent
Persistent Systems Ltd.
 
PPT
Life and Work of Dr. John Backus | Turing100@Persistent
Persistent Systems Ltd.
 
PPTX
Life and Work of Jim Gray | Turing100@Persistent
Persistent Systems Ltd.
 
PPT
Software Faults, Failures and Their Mitigations | Turing100@Persistent
Persistent Systems Ltd.
 
PPTX
Systems Design Experiences or Just Some War Stories…
Persistent Systems Ltd.
 
PPTX
Life & Work of Dr. Vinton Cerf and Dr. Robert Kahn | Turing100@Persistent
Persistent Systems Ltd.
 
PPTX
Net Neutrality | Turing100@Persistent Systems
Persistent Systems Ltd.
 
PPT
Alan Turing Scientist Unlimited | Turing100@Persistent Systems
Persistent Systems Ltd.
 
PPTX
Life and work of E.F. (Ted) Codd | Turing100@Persistent
Persistent Systems Ltd.
 
PPTX
Alan Turing Centenary @ Persistent Systems
Persistent Systems Ltd.
 
Skilling for SMAC by Anand Deshpande, Founder, Chairman and Managing Director...
Persistent Systems Ltd.
 
Embedded Linux Evolution | Turing Techtalk
Persistent Systems Ltd.
 
Life and Work of Ken Thompson and Dennis Ritchie | Turing Techtalk
Persistent Systems Ltd.
 
Life and Work of Ivan Sutherland | Turing100@Persistent
Persistent Systems Ltd.
 
Evolution of the modern graphics architectures with a focus on GPUs | Turing1...
Persistent Systems Ltd.
 
Life and Work of Ronald L. Rivest, Adi Shamir & Leonard M. Adleman | Turing10...
Persistent Systems Ltd.
 
Life and Work of Judea Perl | Turing100@Persistent
Persistent Systems Ltd.
 
Early History of Fortran: The Making of a Wonder | Turing100@Persistent
Persistent Systems Ltd.
 
Life and Work of Dr. John Backus | Turing100@Persistent
Persistent Systems Ltd.
 
Life and Work of Jim Gray | Turing100@Persistent
Persistent Systems Ltd.
 
Software Faults, Failures and Their Mitigations | Turing100@Persistent
Persistent Systems Ltd.
 
Systems Design Experiences or Just Some War Stories…
Persistent Systems Ltd.
 
Life & Work of Dr. Vinton Cerf and Dr. Robert Kahn | Turing100@Persistent
Persistent Systems Ltd.
 
Net Neutrality | Turing100@Persistent Systems
Persistent Systems Ltd.
 
Alan Turing Scientist Unlimited | Turing100@Persistent Systems
Persistent Systems Ltd.
 
Life and work of E.F. (Ted) Codd | Turing100@Persistent
Persistent Systems Ltd.
 
Alan Turing Centenary @ Persistent Systems
Persistent Systems Ltd.
 
Ad

Recently uploaded (20)

PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
PDF
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PPT
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PPTX
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PDF
July Patch Tuesday
Ivanti
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PPTX
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
July Patch Tuesday
Ivanti
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
Ad

What is wrong with the Internet? [On the foundations of internet security, fundamental flaws, and the way forward] | Turing100@Persistent

  • 1. 1 © Copyright 2010 UNIKEN Inc. All rights reserved Innovation Center ProductBy The Core Problem What’s exactly wrong with the internet?
  • 2. 2© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com So what’s wrong with it!! Nothing!!! • It’s cheap • Anyone can use it (no permissions required for accessing it!) • It’s available and pervasive (almost everywhere now) • Anyone can create any website, put any content, on a server, with an IP address with absolutely NO GOVERNMENT CONTROL! • Its freedom and democracy at its best! w w w. u n i k e n . c o m
  • 3. 3© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com The Internet Classification www.uniken.com Resources that REQUIRE Access Control [Online Banking] [www.bankofamerica.com] Resources that DO NOT require Access Control [News] [www.cnn.com] Users who want privacy and identity protection Users who DO NOT want privacy and identity protection Needs Secure Private Communication Does not need Secure Private Communication
  • 4. 4© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com
  • 5. 5© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com THE CORE PROBLEM THE CURRENT INTERNET INFRASTRUCTURE CANNOT GUARANTEE THAT THE USER IS CONNECTING TO THE DESIRED AUTHENTIC SERVER AND THE SERVER IS TALKING TO AN AUTHENTIC PRIVELEGED USER IT AT BEST PROVIDES ENCRYPTION WITH NO GUARANTEE ON IDENTITY OF PARTIES INVOLVED IN THE COMMUNICATION!!!
  • 6. 6© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Internet Evolution – A simplified view [ARPANET] TCP/IP DNSRouters TLS/SSL BrowsersHTML UDP Web2.0 IPSEC DNSSEC Evolution Digital Certificates Tokens (OTP) Site-Key
  • 7. 7© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Customer PC hosts INTERNET ISP DNS Server ISP INTERNET Certificate Authority Fraudster’s MachineFraudster’s Machine Fraudster’s Machine Man-in-the-middle Session Hijacking Replay Attacks Phishing Pharming Bank Datacenter Domain Registrar Registrar / Other DNS Server Man-in-the-browser Man-on-the-machine Modem The Result!
  • 8. 8© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com The Internet is being used for something that it was NOT designed for in the first place (Online Banking, Online Share trading, Enterprise Web-Applications, Mobile Internet Banking! ) Its’ designers never claimed the Internet (i.e. the packet switched network – TCP/IP/UDP) was meant for secure private communications!!
  • 9. 9© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com The current application services delivery model is inherently vulnerable from a security standpoint [Download Browser (from any source) -> Type URL -> Give Password -> Hope for the best!]
  • 10. 10© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com URL (domain name) (and corresponding DNS infrastructure) CANNOT be used as identity elements (identity look-up stores)(!)
  • 11. 11© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com SSL/Digital Certificate based Identity/Trust Model is broken and has failed to deliver on its original promise (of providing identity to enterprises) – since it is based on a flawed trust model
  • 12. 12© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Available end-user identity technologies are not geared up to tackle the current attack vectors (OTP 2FA /Biometric became obsolete with the advent of MITM kind of attack vectors)
  • 13. 13© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com The current Mutual Authentication based protocols like IPSEC and the corresponding applications IPSEC/VPN are not scalable (e.g. Bank and Customers - Million end-points??)
  • 14. 14© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com End-Point Computing Environment is the new threat frontier - What can AV do if the processor cannot differentiate between an authorized and unauthorized machine code(!)
  • 15. 15© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com WHAT IS A PRIVATE (INTERNET) APPLICATION ECOSYSTEM?
  • 16. 16© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com SIMPLIFY AND SECURE APPLICATION ECOSYSTEM CREATE A TECHNOLOGY ENABLED SECURE SERVICE DELIVERY PLATFORM TO ENABLE FASTER TIME TO MARKET AND INCREASED COST EFFICIENCIES Device Channel Applications EnterpriseEnd-User On Premise On Cloud Desktop/Laptop Smart Phone Tablet Internet/Intranet Employees Customers Partners ECOSYSTEM CONTEXT
  • 17. 17© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com PUBLIC (mobile) APP ECOSYSTEMS Apple (iOS) Blackberry They are consumer centric and focus ONLY on mobile devices and mobile Apps While Apple and Blackberry ecosystems are closed (controlled store and proprietary devices) the rest are open Enterprises obviously cant use these consumer centric, platform dependent ecosystems for distribution, access, control and security for enterprise applications [App Store + (Proprietary) Devices] Google (Android) Windows [App Store + OS]
  • 18. 18© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Private Internet Circuits 18 Bank Users Bank Users Bank Users Users merchant Users eMail Users Social Networking Users merchant Online Bank and its customers Online Merchant and its customers Online Collaboration tools (email, chat etc) and its users Social Networking Websites and its users Online News Websites and its readers Enterprises, their employees, their customers and vendors Online Government Services and its citizens
  • 19. 19© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Features of a Private Internet Circuit • Safety – Before any communication begins between entities in a PIC, their respective identities are verified by both entities – All communication is confidential and tamper proof (encrypted) • Privileged and Exclusive – An entity (user, software etc) not having the PIC identity relative to a given online service and the PIC access system on his/her device will not be able to access the Online Service in the PIC • Moderated and Controlled – A central PIC server will control and enable the online services available to all the users of the PIC ecosystem – The PIC Server will provision and broker identity relationships in real-time • Open and Extensible – Developers can create PIC compatible Online Services and register it with the Central PIC server for distribution to the users of the PIC ecosystem 19
  • 20. 20© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Private Internet (and Application) Ecosystem Application Store [Manage, Distribute] User Device Manager [Manage, Control] User Device Protection Technology Authentication Infrastructure Channel Security Infrastructure [Internet/Intranet] Secure Application Viewer [Application Renderer] Data Security Technology [Control, Protect] Access Management Technology [Closed, Private] PUBLIC INTERNET SERVICES (B2C) ENTERPRISE APPLICATION SERVICES (B2B or B2E) End-Point Container Technology [Security, Control]
  • 21. 21© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com PRIVATE [CLOSED] INTERNET ECOSYSTEM Private Internet Ecosystem Identity Device Security Data Security Channel Security Access Management Device Management App Management Identity Protection Personal Online Identity is secured and protected Closed and Private Should not be accessible/visible from outside of the ecosystem Platform, Device and Application Type Independent Support Multiple OS’s, Laptops/Desktops/Mobiles/Tablets, Web-Apps and Mobile Apps Device, Application and Data Security Application and Device Management
  • 22. 22© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com END-USER REQUIREMENTS
  • 23. 23© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com How do I ? Protect my login credentials of various critical websites (e.g. Online Banking, Share Trading) Protect from MITM/PHISHING and other sophisticated attacks Protect my credit card/debit card information while doing ecommerce transactions Manage and Secure my personal Mobile Devices (e.g. Smart Phones, Tablets and Latops) Protect my personal data (e.g. contacts, files)
  • 24. 24© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Multiple Platforms Windows, iOS, Android, Blackberry Plethora of Devices Desktops, Laptops, Mobile Phones, Tablets Identity Clutter Too Many Passwords Sophisticated Attacks MITM/PHISHING/PHARMING Sensitive Data Personal Contacts, Financial data Secure Communication Chat/File Transfer eMoney Safety Credit Card/Debit Card Ecommerce Transaction Safety
  • 25. 25© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com CIO CHALLENGES
  • 26. 26© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com How do I ? Protect Enterprise Data from leaking out Quickly deploy and rapidly roll-out new enterprise application services Manage and Secure Mobile Devices Manage Enterprise Web-Apps and Mobile Apps Provide Secure Remote Access to Enterprise Applications to partners and customers and not just employees Protect enterprise information/applications from MITM/PHISHING and other sophisticated attacks Protect Online and Offline Content Provide Authentication to End-Users [2FA and 3FA] Provide remote support to enterprise devices Reduce the total cost of application infrastructure And many more such critical security and application management requirements..
  • 27. 27© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Multiple Platforms Windows, iOS, Android, Blackberry Multiple User Types Customers, Partners, Executive Management, Employees Plethora of Devices Desktops, Laptops, Mobile Phones, Tablets Identity Clutter Too Many Passwords Complex Enterprise Application Landscape On-Premise Web-Apps, Mobile Apps, Hosted/Cloud Based Apps Multiple Network Types Intranet and Internet Shorter Cycles Quick Development and Launch, increasing business speed and decreasing budgets!
  • 28. 28© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com THE REL-ID WIDGET  Simple Client Side Software that you download from The REL-ID GATE on your desktop/Laptop/Mobile Phones/Tablets  Configure your web-sites on the REL-ID widget and enter your private secure internet world!  The REL-ID Widget connects to your configured web- sites through the REL-ID GATE (a cloud or on- premise based Private Internet Infrastructure) Gate MyData Connect MyCard Settings Exit
  • 29. 29© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com VISUALS (LAPTOPS/DESKTOPS)
  • 30. 30© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com
  • 31. 31© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com
  • 32. 32© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Enter previously set Device Pin
  • 33. 33© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com
  • 34. 34© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com IB User Id will get prepopulated
  • 35. 35© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com VISUALS (MOBILE PHONES AND TABLETS)
  • 36. 36© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com
  • 37. 37© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com
  • 38. 38© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com
  • 39. 39© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com REL-ID Secure Client App Containers Web-Apps are visible and accessible only if they are provisioned in REL-ID GATETM Desktop/Laptop REL-ID Widget REL-ID Web App Viewer (Micro-Web-Apps) REL-ID Mobile APP Container REL-ID Widget securely connects to the Web-Apps via R-PCC REL-ID Web App-Viewer
  • 40. 40© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com REL-ID GATE REL-ID GATE App Management Identity Management Device Management Authentication (2FA/3FA) Access Management R-PCC* Over Intranet R-PCC* Over Internet Secure Channel Enterprise Web-Apps [Virtual Image] Enterprise Mobile Apps 3rd Party Web-Apps [Virtual Image] 3rd Party Mobile Apps Command Center Secure Channel Employee Partner Customer REL-ID Widget (Secure Client App Container) Mobile Phones, Tablets, Desktops and Laptops *R-PCC: REL-ID Private Communication Channel (Encrypted) THE REL-ID ECOTM Internet Private Data Center
  • 41. 41© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Network REL-ID Private Communication Channel (R-PCC) Mutually Authenticated Communication Handshake (MITM Proof) Encrypted Communication (optional), High-Speed and Concurrent Horizontally Scalable (Millions of End-Points) Assets behind R-PCC are not visible to the Internet and hence protected from various attacks Requires zero admin privileges on end-user devices Is created ON-DEMAND Is agnostic to the underlying NETWORK (Internet or Intranet) RPCC Agent can be embedded in any third party application stack (both software and firmware) Application Application REL-ID PCC Agent R-PCC (REL-ID Mutually Authenticated and Encrypted Channel) Internet or Intranet
  • 42. 42© Copyright 2012 UNIKEN Inc. All rights reserved www.uniken.com Network End-User Device Laptop Mobile Phone Tablet Desktop REL-ID Secure Container (Safe Zone) REL-ID Secure (encrypted) Data Zone 3rd Party Browser REL-ID Web-App Viewer Enterprise Apps Desktop/Laptop/Mobile REL-ID Multi-Factor Authentication 2FA/3FA R-PCC Agent R-PCC REL-ID Secure Container Technology (R-SCT) REL-ID Device Fingerprinting and Binding REL-ID Device Management And Control Module