SlideShare a Scribd company logo
1 of 10
Download to read offline
SECURITY of THINGS
2014
Everyone today is vulnerable to security breach since it is relying on 1976 D&H old PKI Technologies
When D&H created PKI, it gave birth to Alice and Bob(Key Exchange).
However Alice and Bob, usually allow uninvited evil guests such as Eve, Chuck, Craig, Oscar, Sybill and Wendy,
as Alice and Bob, attempt to secure IoT, M2M, Banks,ATM, EMV, Cloud, ConnectedCar, ConnectedHome, Industrial Internet, etc.
Here is a short list of attacks / security issues with PKI:
- Impersonation, MiTM (Main In the Middle), MiTB(Main in the Browser)
- RA /VA Compromise
- CA System Compromise
- CA Signing Key Compromise
- SideChannel, KnapSack, BruteForce
http://www.reuters.com/article/2014/10/21/us-usa-justice-cybersecurity-idUSKCN0IA0BM20141021
http://www.businessinsider.in/Hackers-Are-Stealing-Millions-From-ATM-Worldwide-With-New-Malware/articleshow/44629993.cms
The U.S. Department of Commerce estimates that the theft of intellectual property costs businesses
more than US$250 billion and results in the loss of 750,000 jobs in the United States every year
PROPOSED SOLUTION
NEW GLOBAL CyberSecurity Infrastructure : Private Cloud - Hybrid Cloud forVetted Companies and their clients.
Initial Tenants: Payment Processors, Banks, Financial Networks, ATM networks, Utilities,TelCOs, CableCOs, M2M, ISPs
CyberSECURITY ISSUES
2014
2014
BEAST ATTACK
CRIME ATTACK
PKI - CA - SSL VULNERABILITIES
Poodle
SSL DOS
Man In The Middle SSL, Man in the Browser, Man In the Phone,
Perfect Forward Secrecy, Strict Transport Security, Keylogger.
http://www.macworld.com/article/2841965/swedish-hacker-finds-serious-vulnerability-in-os-x-yosemite.html
CERTIFICATE AUTHORITIES
Can be Fake
SSL KEYS
Can be Broken
+
PKI - CA - SSL
Facebook - Twitter : Edpimentl
2014
IDENTITY STRONG KEY
+
CERTIFICATES & WEAK KEY ESCROW
NO
iSEC
InternetID Secured Encryption
Facebook - Twitter : Edpimentl
2014
EXCEEDS NIST - ISO - PCI-DSS - HIPPA REQUIREMENTS
Security of Things
HeTNet, FOG, SDN-NFV, Secured MicroServices, eSIM,TrustZone,
SmartCity, Fintech, iIoT, IoT / WoT / WebRTC. mHealth,Wearable,
2014
M2M
EXCEEDS NIST - ISO - PCI-DSS - HIPPA REQUIREMENTS
Bring Your Own Cloud
viasip
VIRTUAL INFRASTRUCTIRE - APPLICATIONS & SERVICES over IP
1 Dynamic Network Encryption - ISP - Cloud Provider Agnostic
2- WiFi Encrypted Personal Cloud Storage (Biometric Access)
3- Corporate and Personal DATA LEAK DETECTION and PROTECTION
4- Does not use Weak - Diluted PKI - CA - SSL
5- End to End Encrypted VOIP, eMail, Data, Messaging NO MITM
6- Private WEB & Encrypted File Sharing (Intellectual Property - Legal -HIPPA)
7- Vaulted (TOKENIZED) DebitCard / CC = Recurring Billing / Payment
8- Modified FireFox & Chrome Browser No MITB Man In The Browser
9- BitCOIN Wallet - Prepaid Debit - Prepaid Minutes - P2P Payment
10- Secure Social VPN - Providers and Consumer MUST be vetted
11- Software as a Contract MiddleWare / APIs (no unauthorized BigData )
12- Modified Android CyanogenMod OS
byoc
viasip
1- Cyber-Secure and Cyber-Reslient Private / Hybrid / Embedded Cloud
2- Does not use today’s Weak - Diluted - Forgeable CA and SSL/TLS
3- Corporate & Personal DATA LEAK DETECTION and PROTECTION
4 - Dynamic Personal - Device - Network Encryption - ISP Cloud Provider Agnostic
5- End to End Encrypted MetaData - Messaging - Data - Email - Voice NO MITM
6- Next Gen eMAIL .. D2D / P2P Only and not Archaic Stored-Forward email
7- Private WEB & Encrypted File Sharing (Intellectual Property - Legal - PII - EMR )
8- Software as a Contract MiddleWare / API (no unauthorized BigData data mining)
9- Modified Firefox & Chrome Browser .. no MITB Man In The Browser
10-BlockChain xPayment / Banking / IoT-M2M ATM / MobileMoney Networks
11- Modified Android CynaogenMOD OS and Embedded SOC OS
12- MRC “ Managed Relations by Customer” and “not” CRM
Ed Pimentel
- TEE-TrustZone
2014
V.Risk Management - Fraud Detection - Using BigData - Machine Learning - Augmente Intelligence - Artificial Intelligence - Predictive & Prescriptive Analytics
CyberResilient Financial Transactions
( IoT / FOG / EDGE / Cognitive Radio )
Beyond PCI - EMV
Disable or Enable List of Merchants(National or Intl.) that can charge your ChainAPP Issue Prepaid Card
Chain-APP BLE Sensor, (Voice, Face, Finger)Biometric, Blockchain, Image & Audio Capturing.
AgileCHAIN (blockchain) APP Debit Card Issuing - HCE - eSIM - TrustZone- OTA
Weak 3DES, MD5, CR4, SHA1, Unsafe PKI, CA, DH, or even the latest ECDSA
2014
IoT Cloud - CyberSecurity
Infrastructure
WANT TO PARTNER WITH US?
CONTACT
MobileMondayATL at GMAIL dot COM
SECURITY of THINGS
Twitter / Skype : EdPimentl2014

More Related Content

What's hot

Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketArief Gunawan
 
Beyond cards, phones and terminals: New payment form factors
Beyond cards, phones and terminals: New payment form factorsBeyond cards, phones and terminals: New payment form factors
Beyond cards, phones and terminals: New payment form factorsNXPSemiconductors
 
Mwc 2013 a devices review
Mwc 2013 a devices reviewMwc 2013 a devices review
Mwc 2013 a devices reviewMTKDMI
 
Overview of Mobile Payment Systems
Overview of Mobile Payment SystemsOverview of Mobile Payment Systems
Overview of Mobile Payment SystemsAmit Naik
 
Gemalto corporate presentation & m health introduction
Gemalto corporate presentation & m health introductionGemalto corporate presentation & m health introduction
Gemalto corporate presentation & m health introduction3GDR
 
Next Big Trends: A Librarian’s Field Guide to Near Field Communication
Next Big Trends: A Librarian’s Field Guide to Near Field CommunicationNext Big Trends: A Librarian’s Field Guide to Near Field Communication
Next Big Trends: A Librarian’s Field Guide to Near Field CommunicationKristen Yarmey
 
Future of mobile payment and mobile commerce may 2013
Future of mobile payment and mobile commerce may 2013Future of mobile payment and mobile commerce may 2013
Future of mobile payment and mobile commerce may 2013Tarang Shah
 
Payment revolution by Yoav Elgrichi
Payment revolution by Yoav ElgrichiPayment revolution by Yoav Elgrichi
Payment revolution by Yoav ElgrichiSiti Aishah Zahari
 
Near field communication
Near field communicationNear field communication
Near field communicationNishank Magoo
 
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula HunterRFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula HunterNFC Forum
 
Virtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe SolutionVirtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe Solutiongreatdaniel
 
e-wallet , The future of Cards and Money
e-wallet , The future of Cards and Moneye-wallet , The future of Cards and Money
e-wallet , The future of Cards and MoneyVikram Dahiya
 
Best Practices in Risk Management for Mobile Payments - MRC 2011
Best Practices in Risk Management for Mobile Payments - MRC 2011Best Practices in Risk Management for Mobile Payments - MRC 2011
Best Practices in Risk Management for Mobile Payments - MRC 2011Hill Ferguson
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationMarc Vael
 
Mobile Payments: An IBM Point of View
Mobile Payments: An IBM Point of ViewMobile Payments: An IBM Point of View
Mobile Payments: An IBM Point of ViewMark Sherman
 
2 D Barcodes ,Wallets for Mobiles
2 D Barcodes ,Wallets for Mobiles 2 D Barcodes ,Wallets for Mobiles
2 D Barcodes ,Wallets for Mobiles Atul Singh
 

What's hot (20)

Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and Market
 
Secure mobile payment
Secure mobile paymentSecure mobile payment
Secure mobile payment
 
Beyond cards, phones and terminals: New payment form factors
Beyond cards, phones and terminals: New payment form factorsBeyond cards, phones and terminals: New payment form factors
Beyond cards, phones and terminals: New payment form factors
 
Mwc 2013 a devices review
Mwc 2013 a devices reviewMwc 2013 a devices review
Mwc 2013 a devices review
 
Overview of Mobile Payment Systems
Overview of Mobile Payment SystemsOverview of Mobile Payment Systems
Overview of Mobile Payment Systems
 
Gemalto corporate presentation & m health introduction
Gemalto corporate presentation & m health introductionGemalto corporate presentation & m health introduction
Gemalto corporate presentation & m health introduction
 
Next Big Trends: A Librarian’s Field Guide to Near Field Communication
Next Big Trends: A Librarian’s Field Guide to Near Field CommunicationNext Big Trends: A Librarian’s Field Guide to Near Field Communication
Next Big Trends: A Librarian’s Field Guide to Near Field Communication
 
Future of mobile payment and mobile commerce may 2013
Future of mobile payment and mobile commerce may 2013Future of mobile payment and mobile commerce may 2013
Future of mobile payment and mobile commerce may 2013
 
Payment revolution by Yoav Elgrichi
Payment revolution by Yoav ElgrichiPayment revolution by Yoav Elgrichi
Payment revolution by Yoav Elgrichi
 
Near field communication
Near field communicationNear field communication
Near field communication
 
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula HunterRFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
 
Virtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe SolutionVirtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe Solution
 
Mobile Payments
Mobile PaymentsMobile Payments
Mobile Payments
 
Digital reality nxp final.pptx
Digital reality nxp final.pptxDigital reality nxp final.pptx
Digital reality nxp final.pptx
 
Report
ReportReport
Report
 
e-wallet , The future of Cards and Money
e-wallet , The future of Cards and Moneye-wallet , The future of Cards and Money
e-wallet , The future of Cards and Money
 
Best Practices in Risk Management for Mobile Payments - MRC 2011
Best Practices in Risk Management for Mobile Payments - MRC 2011Best Practices in Risk Management for Mobile Payments - MRC 2011
Best Practices in Risk Management for Mobile Payments - MRC 2011
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentation
 
Mobile Payments: An IBM Point of View
Mobile Payments: An IBM Point of ViewMobile Payments: An IBM Point of View
Mobile Payments: An IBM Point of View
 
2 D Barcodes ,Wallets for Mobiles
2 D Barcodes ,Wallets for Mobiles 2 D Barcodes ,Wallets for Mobiles
2 D Barcodes ,Wallets for Mobiles
 

Viewers also liked

Resource Public Key Infrastructure presentation, Mynog5
Resource Public Key Infrastructure presentation, Mynog5Resource Public Key Infrastructure presentation, Mynog5
Resource Public Key Infrastructure presentation, Mynog5APNIC
 
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeDigiCert, Inc.
 
Programming IoT Gateways in JavaScript with macchina.io
Programming IoT Gateways in JavaScript with macchina.ioProgramming IoT Gateways in JavaScript with macchina.io
Programming IoT Gateways in JavaScript with macchina.ioGünter Obiltschnig
 
Building Open Source IoT Cloud
Building Open Source IoT CloudBuilding Open Source IoT Cloud
Building Open Source IoT Clouddejanb
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudAmazon Web Services
 
Internet of Things (IoT) reference architecture using Azure -MIC - Lahore
Internet of Things (IoT) reference architecture using Azure -MIC - LahoreInternet of Things (IoT) reference architecture using Azure -MIC - Lahore
Internet of Things (IoT) reference architecture using Azure -MIC - LahoreInformation Technology University
 
Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing GlobalSign
 
Real World IoT Architectures and Projects with Eclipse IoT
Real World IoT Architectures and Projects with Eclipse IoTReal World IoT Architectures and Projects with Eclipse IoT
Real World IoT Architectures and Projects with Eclipse IoTEurotech
 
Introduction to Internet of Things Hardware
Introduction to Internet of Things HardwareIntroduction to Internet of Things Hardware
Introduction to Internet of Things HardwareDaniel Eichhorn
 
Building IoT with Arduino Day One
Building IoT with Arduino Day One Building IoT with Arduino Day One
Building IoT with Arduino Day One Anthony Faustine
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 
IoT Architecture - Are Traditional Architectures Good Enough or do we Need Ne...
IoT Architecture - Are Traditional Architectures Good Enough or do we Need Ne...IoT Architecture - Are Traditional Architectures Good Enough or do we Need Ne...
IoT Architecture - Are Traditional Architectures Good Enough or do we Need Ne...Guido Schmutz
 
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsIoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsEurotech
 
MySQL Atchitecture and Concepts
MySQL Atchitecture and ConceptsMySQL Atchitecture and Concepts
MySQL Atchitecture and ConceptsTuyen Vuong
 
Open IoT Cloud Architecture, Web of Things, Shenzhen, China.
Open IoT Cloud Architecture, Web of Things, Shenzhen, China.Open IoT Cloud Architecture, Web of Things, Shenzhen, China.
Open IoT Cloud Architecture, Web of Things, Shenzhen, China.Jollen Chen
 
IoT Cloud architecture
IoT Cloud architectureIoT Cloud architecture
IoT Cloud architectureMachinePulse
 

Viewers also liked (20)

Resource Public Key Infrastructure presentation, Mynog5
Resource Public Key Infrastructure presentation, Mynog5Resource Public Key Infrastructure presentation, Mynog5
Resource Public Key Infrastructure presentation, Mynog5
 
Best practise Infrastructure pki
Best practise Infrastructure pkiBest practise Infrastructure pki
Best practise Infrastructure pki
 
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
 
Lab IoT 2016
Lab IoT 2016Lab IoT 2016
Lab IoT 2016
 
Programming IoT Gateways in JavaScript with macchina.io
Programming IoT Gateways in JavaScript with macchina.ioProgramming IoT Gateways in JavaScript with macchina.io
Programming IoT Gateways in JavaScript with macchina.io
 
Building Open Source IoT Cloud
Building Open Source IoT CloudBuilding Open Source IoT Cloud
Building Open Source IoT Cloud
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
 
Internet of Things (IoT) reference architecture using Azure -MIC - Lahore
Internet of Things (IoT) reference architecture using Azure -MIC - LahoreInternet of Things (IoT) reference architecture using Azure -MIC - Lahore
Internet of Things (IoT) reference architecture using Azure -MIC - Lahore
 
Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing
 
Real World IoT Architectures and Projects with Eclipse IoT
Real World IoT Architectures and Projects with Eclipse IoTReal World IoT Architectures and Projects with Eclipse IoT
Real World IoT Architectures and Projects with Eclipse IoT
 
Introduction to Internet of Things Hardware
Introduction to Internet of Things HardwareIntroduction to Internet of Things Hardware
Introduction to Internet of Things Hardware
 
Building IoT with Arduino Day One
Building IoT with Arduino Day One Building IoT with Arduino Day One
Building IoT with Arduino Day One
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
IoT Architecture - Are Traditional Architectures Good Enough or do we Need Ne...
IoT Architecture - Are Traditional Architectures Good Enough or do we Need Ne...IoT Architecture - Are Traditional Architectures Good Enough or do we Need Ne...
IoT Architecture - Are Traditional Architectures Good Enough or do we Need Ne...
 
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsIoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
 
MySQL
MySQLMySQL
MySQL
 
MySQL Atchitecture and Concepts
MySQL Atchitecture and ConceptsMySQL Atchitecture and Concepts
MySQL Atchitecture and Concepts
 
Open IoT Cloud Architecture, Web of Things, Shenzhen, China.
Open IoT Cloud Architecture, Web of Things, Shenzhen, China.Open IoT Cloud Architecture, Web of Things, Shenzhen, China.
Open IoT Cloud Architecture, Web of Things, Shenzhen, China.
 
MySql slides (ppt)
MySql slides (ppt)MySql slides (ppt)
MySql slides (ppt)
 
IoT Cloud architecture
IoT Cloud architectureIoT Cloud architecture
IoT Cloud architecture
 

Similar to IoTcloud-cybersecurity-securityofthings

Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingOKsystem
 
AgileCO-Labs WhiteLabel ICO-Services Blockchain-Solutions
AgileCO-Labs WhiteLabel ICO-Services Blockchain-SolutionsAgileCO-Labs WhiteLabel ICO-Services Blockchain-Solutions
AgileCO-Labs WhiteLabel ICO-Services Blockchain-SolutionsSlideCentral
 
Unwired Ground-Cloud Ecosystem
Unwired Ground-Cloud EcosystemUnwired Ground-Cloud Ecosystem
Unwired Ground-Cloud EcosystemEd Pimentel
 
AgileCO PDIOO - SmartCITY - IOT - IIOT - FINTECH SOLUTIONS
AgileCO PDIOO - SmartCITY - IOT - IIOT - FINTECH SOLUTIONSAgileCO PDIOO - SmartCITY - IOT - IIOT - FINTECH SOLUTIONS
AgileCO PDIOO - SmartCITY - IOT - IIOT - FINTECH SOLUTIONSEd Pimentel
 
Mobile Authentication on the Internet
Mobile Authentication on the InternetMobile Authentication on the Internet
Mobile Authentication on the Internetevidos
 
Big data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursBig data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursDilum Bandara
 
Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 James Wu
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantVladimir Jirasek
 
6 Trends in Telecom for 2020
6 Trends in Telecom for 20206 Trends in Telecom for 2020
6 Trends in Telecom for 2020RAD-INFO, Inc.
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
Blockchain 2Gether - EthEDU Training & Education
Blockchain 2Gether - EthEDU Training & EducationBlockchain 2Gether - EthEDU Training & Education
Blockchain 2Gether - EthEDU Training & EducationSlideCentral
 
Hacking Point of Sale
Hacking Point of SaleHacking Point of Sale
Hacking Point of SaleTripwire
 
Security is sexy again
Security is sexy againSecurity is sexy again
Security is sexy againVitor Domingos
 
Securing IoT devices
Securing IoT devicesSecuring IoT devices
Securing IoT devicesCharef Hamdi
 
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New AuthenticationPasswords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New AuthenticationPriyanka Aash
 
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCOEl IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCODomotys
 
Five Trends Enabled by 5G that will Change Networking Forever
Five Trends Enabled by 5G that will Change Networking ForeverFive Trends Enabled by 5G that will Change Networking Forever
Five Trends Enabled by 5G that will Change Networking ForeverOpen Networking Summit
 

Similar to IoTcloud-cybersecurity-securityofthings (20)

Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
AgileCO-Labs WhiteLabel ICO-Services Blockchain-Solutions
AgileCO-Labs WhiteLabel ICO-Services Blockchain-SolutionsAgileCO-Labs WhiteLabel ICO-Services Blockchain-Solutions
AgileCO-Labs WhiteLabel ICO-Services Blockchain-Solutions
 
Unwired Ground-Cloud Ecosystem
Unwired Ground-Cloud EcosystemUnwired Ground-Cloud Ecosystem
Unwired Ground-Cloud Ecosystem
 
AgileCO PDIOO - SmartCITY - IOT - IIOT - FINTECH SOLUTIONS
AgileCO PDIOO - SmartCITY - IOT - IIOT - FINTECH SOLUTIONSAgileCO PDIOO - SmartCITY - IOT - IIOT - FINTECH SOLUTIONS
AgileCO PDIOO - SmartCITY - IOT - IIOT - FINTECH SOLUTIONS
 
ViaSip beta
ViaSip betaViaSip beta
ViaSip beta
 
Mobile Authentication on the Internet
Mobile Authentication on the InternetMobile Authentication on the Internet
Mobile Authentication on the Internet
 
Big data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursBig data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is Yours
 
Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
6 Trends in Telecom for 2020
6 Trends in Telecom for 20206 Trends in Telecom for 2020
6 Trends in Telecom for 2020
 
IoT and Embedded OS Lecture - Cristian Toma and George Iosif
IoT and Embedded OS Lecture - Cristian Toma and George IosifIoT and Embedded OS Lecture - Cristian Toma and George Iosif
IoT and Embedded OS Lecture - Cristian Toma and George Iosif
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Blockchain 2Gether - EthEDU Training & Education
Blockchain 2Gether - EthEDU Training & EducationBlockchain 2Gether - EthEDU Training & Education
Blockchain 2Gether - EthEDU Training & Education
 
Hacking Point of Sale
Hacking Point of SaleHacking Point of Sale
Hacking Point of Sale
 
State of Blockchain 2017
State of Blockchain 2017State of Blockchain 2017
State of Blockchain 2017
 
Security is sexy again
Security is sexy againSecurity is sexy again
Security is sexy again
 
Securing IoT devices
Securing IoT devicesSecuring IoT devices
Securing IoT devices
 
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New AuthenticationPasswords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
 
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCOEl IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
 
Five Trends Enabled by 5G that will Change Networking Forever
Five Trends Enabled by 5G that will Change Networking ForeverFive Trends Enabled by 5G that will Change Networking Forever
Five Trends Enabled by 5G that will Change Networking Forever
 

More from Ed Pimentel

AgileCO Labs Blockchain Consortium 2018
AgileCO Labs Blockchain Consortium 2018AgileCO Labs Blockchain Consortium 2018
AgileCO Labs Blockchain Consortium 2018Ed Pimentel
 
Meetups: Event Matchmaker - Social Biz Networking Broker
Meetups: Event Matchmaker - Social Biz Networking BrokerMeetups: Event Matchmaker - Social Biz Networking Broker
Meetups: Event Matchmaker - Social Biz Networking BrokerEd Pimentel
 
Internet of Things Reverse-Pitch
Internet of Things Reverse-PitchInternet of Things Reverse-Pitch
Internet of Things Reverse-PitchEd Pimentel
 
MobileMonday(Atlanta) SmartCity IoT-Cloud Labs
MobileMonday(Atlanta) SmartCity IoT-Cloud LabsMobileMonday(Atlanta) SmartCity IoT-Cloud Labs
MobileMonday(Atlanta) SmartCity IoT-Cloud LabsEd Pimentel
 
SCaaS SmartCity As A Service
SCaaS SmartCity As A ServiceSCaaS SmartCity As A Service
SCaaS SmartCity As A ServiceEd Pimentel
 
Viasip Unwired GroundCloud IoT-WoT Ecosystem
Viasip Unwired GroundCloud IoT-WoT EcosystemViasip Unwired GroundCloud IoT-WoT Ecosystem
Viasip Unwired GroundCloud IoT-WoT EcosystemEd Pimentel
 
NarrowBand IoT Cloud
NarrowBand IoT CloudNarrowBand IoT Cloud
NarrowBand IoT CloudEd Pimentel
 
Mobile monday atlanta-smartcity-iot-for-startu_ps
Mobile monday atlanta-smartcity-iot-for-startu_psMobile monday atlanta-smartcity-iot-for-startu_ps
Mobile monday atlanta-smartcity-iot-for-startu_psEd Pimentel
 
Mobile mondayatlantaaug10 2009
Mobile mondayatlantaaug10 2009Mobile mondayatlantaaug10 2009
Mobile mondayatlantaaug10 2009Ed Pimentel
 
mCommerce NFC Payments - QrCode Payment
mCommerce NFC Payments - QrCode PaymentmCommerce NFC Payments - QrCode Payment
mCommerce NFC Payments - QrCode PaymentEd Pimentel
 
Mobile Monday Atlanta Aug10 2009v2 Short
Mobile Monday Atlanta Aug10 2009v2 ShortMobile Monday Atlanta Aug10 2009v2 Short
Mobile Monday Atlanta Aug10 2009v2 ShortEd Pimentel
 
Iptv Latino Von Mexico
Iptv Latino Von MexicoIptv Latino Von Mexico
Iptv Latino Von MexicoEd Pimentel
 

More from Ed Pimentel (12)

AgileCO Labs Blockchain Consortium 2018
AgileCO Labs Blockchain Consortium 2018AgileCO Labs Blockchain Consortium 2018
AgileCO Labs Blockchain Consortium 2018
 
Meetups: Event Matchmaker - Social Biz Networking Broker
Meetups: Event Matchmaker - Social Biz Networking BrokerMeetups: Event Matchmaker - Social Biz Networking Broker
Meetups: Event Matchmaker - Social Biz Networking Broker
 
Internet of Things Reverse-Pitch
Internet of Things Reverse-PitchInternet of Things Reverse-Pitch
Internet of Things Reverse-Pitch
 
MobileMonday(Atlanta) SmartCity IoT-Cloud Labs
MobileMonday(Atlanta) SmartCity IoT-Cloud LabsMobileMonday(Atlanta) SmartCity IoT-Cloud Labs
MobileMonday(Atlanta) SmartCity IoT-Cloud Labs
 
SCaaS SmartCity As A Service
SCaaS SmartCity As A ServiceSCaaS SmartCity As A Service
SCaaS SmartCity As A Service
 
Viasip Unwired GroundCloud IoT-WoT Ecosystem
Viasip Unwired GroundCloud IoT-WoT EcosystemViasip Unwired GroundCloud IoT-WoT Ecosystem
Viasip Unwired GroundCloud IoT-WoT Ecosystem
 
NarrowBand IoT Cloud
NarrowBand IoT CloudNarrowBand IoT Cloud
NarrowBand IoT Cloud
 
Mobile monday atlanta-smartcity-iot-for-startu_ps
Mobile monday atlanta-smartcity-iot-for-startu_psMobile monday atlanta-smartcity-iot-for-startu_ps
Mobile monday atlanta-smartcity-iot-for-startu_ps
 
Mobile mondayatlantaaug10 2009
Mobile mondayatlantaaug10 2009Mobile mondayatlantaaug10 2009
Mobile mondayatlantaaug10 2009
 
mCommerce NFC Payments - QrCode Payment
mCommerce NFC Payments - QrCode PaymentmCommerce NFC Payments - QrCode Payment
mCommerce NFC Payments - QrCode Payment
 
Mobile Monday Atlanta Aug10 2009v2 Short
Mobile Monday Atlanta Aug10 2009v2 ShortMobile Monday Atlanta Aug10 2009v2 Short
Mobile Monday Atlanta Aug10 2009v2 Short
 
Iptv Latino Von Mexico
Iptv Latino Von MexicoIptv Latino Von Mexico
Iptv Latino Von Mexico
 

Recently uploaded

VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 

Recently uploaded (20)

VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 

IoTcloud-cybersecurity-securityofthings

  • 2. Everyone today is vulnerable to security breach since it is relying on 1976 D&H old PKI Technologies When D&H created PKI, it gave birth to Alice and Bob(Key Exchange). However Alice and Bob, usually allow uninvited evil guests such as Eve, Chuck, Craig, Oscar, Sybill and Wendy, as Alice and Bob, attempt to secure IoT, M2M, Banks,ATM, EMV, Cloud, ConnectedCar, ConnectedHome, Industrial Internet, etc. Here is a short list of attacks / security issues with PKI: - Impersonation, MiTM (Main In the Middle), MiTB(Main in the Browser) - RA /VA Compromise - CA System Compromise - CA Signing Key Compromise - SideChannel, KnapSack, BruteForce http://www.reuters.com/article/2014/10/21/us-usa-justice-cybersecurity-idUSKCN0IA0BM20141021 http://www.businessinsider.in/Hackers-Are-Stealing-Millions-From-ATM-Worldwide-With-New-Malware/articleshow/44629993.cms The U.S. Department of Commerce estimates that the theft of intellectual property costs businesses more than US$250 billion and results in the loss of 750,000 jobs in the United States every year PROPOSED SOLUTION NEW GLOBAL CyberSecurity Infrastructure : Private Cloud - Hybrid Cloud forVetted Companies and their clients. Initial Tenants: Payment Processors, Banks, Financial Networks, ATM networks, Utilities,TelCOs, CableCOs, M2M, ISPs CyberSECURITY ISSUES 2014
  • 4. BEAST ATTACK CRIME ATTACK PKI - CA - SSL VULNERABILITIES Poodle SSL DOS Man In The Middle SSL, Man in the Browser, Man In the Phone, Perfect Forward Secrecy, Strict Transport Security, Keylogger. http://www.macworld.com/article/2841965/swedish-hacker-finds-serious-vulnerability-in-os-x-yosemite.html
  • 5. CERTIFICATE AUTHORITIES Can be Fake SSL KEYS Can be Broken + PKI - CA - SSL Facebook - Twitter : Edpimentl 2014
  • 6. IDENTITY STRONG KEY + CERTIFICATES & WEAK KEY ESCROW NO iSEC InternetID Secured Encryption Facebook - Twitter : Edpimentl 2014
  • 7. EXCEEDS NIST - ISO - PCI-DSS - HIPPA REQUIREMENTS Security of Things HeTNet, FOG, SDN-NFV, Secured MicroServices, eSIM,TrustZone, SmartCity, Fintech, iIoT, IoT / WoT / WebRTC. mHealth,Wearable, 2014
  • 8. M2M EXCEEDS NIST - ISO - PCI-DSS - HIPPA REQUIREMENTS Bring Your Own Cloud viasip VIRTUAL INFRASTRUCTIRE - APPLICATIONS & SERVICES over IP 1 Dynamic Network Encryption - ISP - Cloud Provider Agnostic 2- WiFi Encrypted Personal Cloud Storage (Biometric Access) 3- Corporate and Personal DATA LEAK DETECTION and PROTECTION 4- Does not use Weak - Diluted PKI - CA - SSL 5- End to End Encrypted VOIP, eMail, Data, Messaging NO MITM 6- Private WEB & Encrypted File Sharing (Intellectual Property - Legal -HIPPA) 7- Vaulted (TOKENIZED) DebitCard / CC = Recurring Billing / Payment 8- Modified FireFox & Chrome Browser No MITB Man In The Browser 9- BitCOIN Wallet - Prepaid Debit - Prepaid Minutes - P2P Payment 10- Secure Social VPN - Providers and Consumer MUST be vetted 11- Software as a Contract MiddleWare / APIs (no unauthorized BigData ) 12- Modified Android CyanogenMod OS byoc viasip 1- Cyber-Secure and Cyber-Reslient Private / Hybrid / Embedded Cloud 2- Does not use today’s Weak - Diluted - Forgeable CA and SSL/TLS 3- Corporate & Personal DATA LEAK DETECTION and PROTECTION 4 - Dynamic Personal - Device - Network Encryption - ISP Cloud Provider Agnostic 5- End to End Encrypted MetaData - Messaging - Data - Email - Voice NO MITM 6- Next Gen eMAIL .. D2D / P2P Only and not Archaic Stored-Forward email 7- Private WEB & Encrypted File Sharing (Intellectual Property - Legal - PII - EMR ) 8- Software as a Contract MiddleWare / API (no unauthorized BigData data mining) 9- Modified Firefox & Chrome Browser .. no MITB Man In The Browser 10-BlockChain xPayment / Banking / IoT-M2M ATM / MobileMoney Networks 11- Modified Android CynaogenMOD OS and Embedded SOC OS 12- MRC “ Managed Relations by Customer” and “not” CRM Ed Pimentel - TEE-TrustZone 2014
  • 9. V.Risk Management - Fraud Detection - Using BigData - Machine Learning - Augmente Intelligence - Artificial Intelligence - Predictive & Prescriptive Analytics CyberResilient Financial Transactions ( IoT / FOG / EDGE / Cognitive Radio ) Beyond PCI - EMV Disable or Enable List of Merchants(National or Intl.) that can charge your ChainAPP Issue Prepaid Card Chain-APP BLE Sensor, (Voice, Face, Finger)Biometric, Blockchain, Image & Audio Capturing. AgileCHAIN (blockchain) APP Debit Card Issuing - HCE - eSIM - TrustZone- OTA Weak 3DES, MD5, CR4, SHA1, Unsafe PKI, CA, DH, or even the latest ECDSA 2014
  • 10. IoT Cloud - CyberSecurity Infrastructure WANT TO PARTNER WITH US? CONTACT MobileMondayATL at GMAIL dot COM SECURITY of THINGS Twitter / Skype : EdPimentl2014