SlideShare a Scribd company logo
DATA SOVEREIGNTY
& CYBER SECURITY
Dr Anupam Tiwari
Data Protection in a Connected World: Sovereignty and Cyber Security
IS DATA SOVEREIGNTY
EVEN POSSIBLE?
IS DATA SOVEREIGNTY
EVEN POSSIBLE?

Recommended for you

Wireless Applications Corp 2010 Overview
Wireless Applications Corp 2010 OverviewWireless Applications Corp 2010 Overview
Wireless Applications Corp 2010 Overview

The document describes the services and capabilities of Wireless Applications Corp., a company that provides customized software, GIS consulting, and FCC/FCC filing services for the wireless telecommunications industry. It summarizes their SiteSync platform which includes tools for structure searching, RF propagation modeling, microwave path analysis, and demographic analysis. It also describes their new SiteSync Pro and API suite products which allow automated batch processing and integration with other systems.

rf coveragemicrowave designmicrowave software
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...

The document discusses Cisco's SD-WAN solution with Viptela. It provides an overview of the key components of Cisco's SD-WAN architecture including the management plane (vManage), control plane (vSmart), data plane (vEdge), and orchestration plane (vBond). It also summarizes capabilities like zero touch provisioning, VPN segmentation, application policies, and centralized management.

cisco connect halifax 2018
IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017

This document discusses Internet of Things (IoT) technology. It provides an overview of what IoT is, noting that it involves connecting devices to the internet to transfer data without human interaction. It then discusses some of the key issues around IoT, including security challenges and the need for protocols like OTrP to help protect connected devices. It also briefly summarizes some industry perspectives on IoT spending trends and how companies like IBM, GE, and others are applying IoT technology.

iotsensorsmonitoring
WHAT MAKES ME THINK
SO?
Number of Factors and Vectors effect into
Directly-Indirectly effecting into DATA
sovereignty
DATA SOVEREIGNTY
Refers to the idea that a country or jurisdiction
has the authority and right to govern and control
the data generated within its borders.
Source: https://www.cloudflare.com/en-gb/learning/privacy/what-is-data-sovereignty/
OPERATING SYSTEMS

Recommended for you

100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности

Ixia provides network testing and security solutions. Some key points: - Ixia solutions are used by over 74 Fortune 100 companies, 45 of the top 50 service providers, and 15 of the top network equipment manufacturers. - Their portfolio includes network testing, security, visibility, and traffic generation solutions that work across infrastructure, platforms, and network types from mobile to data center. - Their intelligent monitoring solutions provide tools for network operations, application monitoring, and security through network packet brokers that aggregate, filter, and load balance traffic to monitoring tools.

Keynote at ISCRAM-China2008: Next generation of Safety Networks
Keynote at ISCRAM-China2008: Next generation of Safety NetworksKeynote at ISCRAM-China2008: Next generation of Safety Networks
Keynote at ISCRAM-China2008: Next generation of Safety Networks

The document discusses next generation safety networks and the transition from IPv4 to IPv6. It provides the following key points: 1) IPv6 is needed to power the next generation of smart transportation, e-society, e-commerce, and other advanced applications that require more addresses and capabilities than IPv4 can provide. 2) China has undertaken major initiatives like CNGI to build out IPv6 infrastructure nationwide in preparation for IPv4 address exhaustion and to promote next generation applications. 3) The 2008 Beijing Olympics demonstrated the first large-scale use of IPv6 for applications like visual surveillance and facility management across multiple venues.

keynoteiscram-china2008iscram
Mission Possible: Future of IT Support
Mission Possible: Future of IT SupportMission Possible: Future of IT Support
Mission Possible: Future of IT Support

IT systems evolve at a rapid pace. What does it take to keep these mission-critical systems supported now and in the future? Learn how field service technicians are keeping pace with high-stakes, high-availability environments. In this presentation, CompTIA’s own Dr. James Stanger interviews Bob Marlatt, information systems operations manager for the Washington State Patrol. Marlatt has worked in IT for two decades, both as a consultant and IT manager. His current responsibilities include managing the IT infrastructure for law enforcement in Washington State. You’ll learn more about how he helps ensure system uptime and how his systems make it possible for law enforcement to share vital information in real-time. He’ll also share some of the tips, tricks and traps for supporting evolving IT systems that can have an impact in your business. Plus you can view the full webinar online at http://www.comptia.org/events/webinars/webinars-on-demand and earn CE Credit toward renewal of your CompTIA A+ certification.

comptiainformation technologycertification
CRYPTOGRAPHY STANDARDS
ENCRYPTION STANDARDS
AADHAR ON ANDROID & iPHONE
UPI ON ANDROID & iPHONE

Recommended for you

Agile fractal grid 7-11-14
Agile fractal grid   7-11-14Agile fractal grid   7-11-14
Agile fractal grid 7-11-14

The document discusses several initiatives related to securing critical infrastructure systems: - The Security Fabric Alliance aims to deploy security solutions for the power grid through collaboration between utilities, technology companies, and standards bodies. - The Industrial Internet Consortium works to accelerate development and adoption of technologies connecting industrial systems for security and productivity. - The OMG process establishes market standards to certify conformity and interoperability of the Security Fabric for critical infrastructure. - Initiatives are described to utilize hybrid cloud/device services, protected by the Security Fabric, to support rural electric co-ops across the U.S.

Agile Fractal Grid - 7-11-14
Agile Fractal Grid - 7-11-14Agile Fractal Grid - 7-11-14
Agile Fractal Grid - 7-11-14

The document discusses several initiatives related to securing critical infrastructure systems: - The Security Fabric Alliance aims to deploy security solutions for the power grid through collaboration between utilities, technology companies, and standards bodies. - The Industrial Internet Consortium works to accelerate development and adoption of technologies connecting industrial systems for security and productivity. - The OMG process establishes market standards to certify that solutions meet requirements for interoperability and security in critical infrastructure systems. - The document outlines a vision for an "Agile Fractal Grid" with cloud services, advanced analytics, and end-to-end security protections to achieve grid reliability and resiliency.

M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx

The document provides information about building a small network including devices, applications, protocols, and connectivity verification. It discusses selecting devices for a small network based on factors like cost and speed. Common network applications and protocols used in small networks are also identified, including protocols for real-time voice and video. The document explains how a small network design can scale to support larger networks as business needs grow. Methods for verifying connectivity between devices using commands like ping and traceroute are presented. Finally, commands for viewing host IP configurations on Windows and Linux systems are covered.

News you see, the facts you see and
even the maps you see change
depending on WHERE YOU ARE
AI MODELS
Regional versions of LLMs?
Data Protection in a Connected World: Sovereignty and Cyber Security

Recommended for you

17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf

The document provides information about building a small network including devices, applications, protocols, and connectivity verification. It discusses [1] selecting common devices for a small network like routers, switches, and end devices, [2] applications and protocols used in small networks such as HTTP, SMTP, and DHCP, and [3] using the ping and traceroute commands to verify connectivity between devices and troubleshoot connectivity issues.

educacion
What's new in web standards?
What's new in web standards?What's new in web standards?
What's new in web standards?

This document summarizes recent developments in web standards. Key points include: the rise of mobile and JavaScript, new real-time communication technologies like WebRTC, debates around DRM extensions, advances in offline capabilities and push notifications, evolving system application APIs, and work on payments, HTTP 2.0, and securing the web. It also discusses upcoming elections for the W3C Technical Architecture Group and encourages getting involved in W3C working groups.

ietfw3cwebstandards
Attobahn_Reduced_Angel_070915
Attobahn_Reduced_Angel_070915Attobahn_Reduced_Angel_070915
Attobahn_Reduced_Angel_070915

Attobahn is developing a new wireless network called the Quantum Speed Network that will provide ultra-fast internet speeds of up to 20 Gbps per user through a unique architecture of protonic switching nodes, nucleus switches, and V-Rover base stations. The network aims to address the exponential growth in mobile data usage and provide highly secure dedicated bandwidth to support technologies like virtual reality and the internet of things. Attobahn has filed patents on its breakthrough transmission technology and plans to generate revenue through network access fees and partnerships.

Data Protection in a Connected World: Sovereignty and Cyber Security
FRONTIER : Speed of 1685 PETAFLOPS
AIRAWAT : Speed of 13.17 PETAFLOPS
SUPERCOMPUTERs
DO WE HAVE A TRULY INDIGENOUS INDIAN FOOT PRINT HERE OR WE ARE HAPPY
BEING USERS?
AR – VR –ER - MR
• Theoretically reduced risk of built-in functionalities that could gather user data for foreign entities.
• Alignment with government regulations or data residency requirements for data sovereignty.
BROWSERs

Recommended for you

IPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be IgnoredIPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be Ignored

While IPv6 has been a defined standard since 1998, the end-user adoption of this standard is minimal. Less than 1% of Internet peers utilize IPv6 in the course of normal operation. However, IPv6 support within operating systems and network routers is becoming commonplace. While IT personnel continue to be focused on IPv4, IPv6 capabilities may already be active by default on many Internet connected systems within an IT professional's environment. These IPv6 interfaces generate traffic which can bypass traditional controls based on IPv4 technology. Although IPv6 is likely to eclipse IPv4 as the dominant Internet protocol, the path to this state is disorganized and unclear. This state indicates that as IPv6 gains inertia as a legitimate Internet protocol, IT administrators need to be aware of and manage IPv6 traffic on their network with as much vigilance as they would apply to the more commonplace IPv4. Kevin D. Wilkins, CISSP, Senior Network Engineer, iSecure LLC After coursework at the Rochester Institute of Technology, Kevin’s professional experience includes ISP and VOIP operations. Kevin has 10 years of industry experience in system and network engineering and platform management. In the last few years, a focus on information security has brought his experiences together into a consolidated viewpoint of enterprise-wide security policy and implementation. Peter Rounds, Senior Network Engineer, Syracuse University Peter has been a Sr. Network Engineer at Syracuse University for 11 years. He is responsible for maintaining core network infrastructure consisting of Internet edge traffic identification/management, Internet BGP routing and security profile management, campus OSPF and security profile management, and data center network and security profile management. He is responsible for numerous security technologies for the University.

rss2010
ONF & iSDX Webinar
ONF & iSDX WebinarONF & iSDX Webinar
ONF & iSDX Webinar

The presentation discussed software-defined internet exchange points (SDXs) and the iSDX platform. SDXs can help solve internet routing problems by offering more flexible traffic control and innovative services compared to traditional Border Gateway Protocol (BGP)-based internet exchanges. The iSDX project developed an industrial-scale SDX that can support the data plane performance and scalability required for a major internet exchange through optimization techniques. It is deployed via an open source software stack and several organizations are working to adopt iSDX in public internet exchanges and enterprise networks.

ixpinbound tedata plane
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework

Originally presented on January 17, 2017 Watch replay: https://vts.inxpo.com/Launch/QReg.htm?ShowKey=35540&AffiliateData=rti

STORAGE SSD/HDD/RAMs
• Hardware Backdoors: Theoretical risk that foreign governments could introduce hardware
backdoors during production
• Supply Chain Vulnerabilities: Supply chain for foreign-made HDDs can be complex, making it
harder to track and potentially introducing vulnerabilities where malicious actors could tamper with the
drives.
• Enterprise routers/switches: Smaller process (14nm-7nm) for better performance
and lower power consumption.
• Home routers/basic switches: Larger process (28nm+) for lower cost.
MODEM / ROUTER / SWITCHES
ASIC/ FPGA/ TPU/ GPU
Potential vulnerabilities or backdoors built into the chips during manufacturing
SEMI CONDUCTORS & PROCESSORS
Semiconductors play a role in bigger picture of Data
Sovereignty
Potential vulnerabilities or backdoors built into the chips during manufacturing

Recommended for you

Unit 2
Unit 2Unit 2
Unit 2

The document discusses the network infrastructure needed for electronic commerce (e-commerce). It describes how the information superhighway (I-way) provides the network infrastructure for all types of e-commerce activities through its ability to deliver integrated voice, data, and video services. The I-way has changed how businesses advertise, market, and sell products and services. The document then goes on to discuss various components that make up the I-way infrastructure including internet protocols, intranets, extranets, switches, routers, and gateways. It also covers mobile commerce and technologies like wireless networks that further enable e-commerce through mobile devices.

e commerce
SDI to IP 2110 Transition Part 1
SDI to IP 2110 Transition Part 1SDI to IP 2110 Transition Part 1
SDI to IP 2110 Transition Part 1

This document outlines an educational course on audio and video over IP. The course covers IP networking fundamentals and standards including TCP/IP, OSI models, and SMPTE ST 2110. It also examines IP infrastructure, routing, timing issues, switching, compression techniques and case studies for broadcast facilities transitioning to IP. The document provides an in-depth outline of topics covered in each session, from IP basics to designing and integrating both hybrid and fully IP-based outside broadcast trucks. The goal is to educate on best practices for implementing audio and video over IP workflows and infrastructure.

osi and tcp/ip model mpeg-2 transport stream andip technology trend and motivations ip basics netstandard audio and video over ip standardization
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre timesBlockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times

Explore robust defense strategies at the intersection of blockchain technology and cybersecurity. This presentation delves into proactive measures and innovative approaches to safeguarding blockchain networks against evolving cyber threats. Discover how secure blockchain implementations can enhance resilience, protect data integrity, and ensure trust in digital transactions. Gain insights into cutting-edge security protocols and best practices essential for mitigating risks in the blockchain ecosystem.

blockchain technologycybersecuritydefense strategies
SEMI CONDUCTORS & PROCESSORS
Number of countries involved in new generation nm chip
manufacturing is indeed difficult due to the complex and
global nature of the supply chain…any GUESSES?
15 to 25 countries
MAIN FRAME OS
• Unisys
• IBM
• Fujitso
• HP
• BULL
• Vendor Lock-in
• Limited Customization
• Potential Backdoors
ZERO CLICK
THREATS

Recommended for you

Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum ThreatsNavigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats

In the rapidly evolving landscape of blockchain technology, the advent of quantum computing poses unprecedented challenges to traditional cryptographic methods. As quantum computing capabilities advance, the vulnerabilities of current cryptographic standards become increasingly apparent. This presentation, "Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats," explores the intersection of blockchain technology and quantum computing. It delves into the urgent need for resilient cryptographic solutions that can withstand the computational power of quantum adversaries. Key topics covered include: An overview of quantum computing and its implications for blockchain security. Current cryptographic standards and their vulnerabilities in the face of quantum threats. Emerging post-quantum cryptographic algorithms and their applicability to blockchain systems. Case studies and real-world implications of quantum-resistant blockchain implementations. Strategies for integrating post-quantum cryptography into existing blockchain frameworks. Join us as we navigate the complexities of securing blockchain networks in a quantum-enabled future. Gain insights into the latest advancements and best practices for safeguarding data integrity and privacy in the era of quantum threats.

quantum computingblockchain technologycryptographic standards
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESTALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES

The presentation is one unique presentation peculiar to TALLINN MANUAL version 1.0 and 2.0. Along with is discussed cyber policy attempts of other countries.The Tallinn Manual has long been the flagship research initiative of the NATO CCDCOE. The original Tallinn Manual (published in 2013 by Cambridge University Press) addressed the most severe cyber operations followed by version 2.0. The presentation cover the origin details of why this manual arrived at the global scene and what followed around at the global attempts for framing the global cyber policy.

cybercrimescyber lawstallinn manual
Cyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand itCyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand it

his presentation is a simple take on with respect to the statistics and maths involved behind the IT giants.It discusses the strange patents of likes of FB and then concludes its way through certain small cyber hygiene measures.

cyber securityprivacysecurity
AD TECH
FMRI-AI
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
Total length of operational undersea cables
is estimated to be around 1.4 million
kilometers (nearly 870,000 miles) & carries
vast majority(~99 %) of internet traffic
across oceans.
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf

Recommended for you

IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...

While anyone of us discusses cryptocurrency, we invariably hover around BITCOIN only , but as on date we have 2000+ cryptocurrencies in the world and the sad thing is CRYPTOCURRENCY CRIMES ARE RISING FAST undeterred.This presentation, given at the IETE mid term symposium on 23rd May 2020 ,brings a brief over view of how cryptocrimes work and what are the challenges around?

ieteanupam tiwaribitcoin
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challenges

IoT and Blockchain are two evolving technologies which are gradually realizing immense potential to be a decisive part of future of mankind ecosystem. Blockchain and IoT, both are envisaged to bring in a plethora of advantages including better control, communication, transparency and more significantly realizing digital trust without any third party intervention. Both of these technologieshave immense potential for exploitation in a smart nation concept. The advantages being realized are potent enough for definite implementation ahead but they come with an austere package of security concerns which if not taken care at the design stage can lead to pandemonium beyond control because of the billion plus connected things. Even atdesign stage, one can appreciate that it will be envisaging beyond control to close all security vulnerabilities and zero day’s exploits of future. But then Blockchain is an inexpugnable solution to shut all these securities imperils. This paper builds upon the advantages of the union of these two evolving technology behemoths, their union and solutions vide Blockchain to the challenges in the way ahead

iotblockchaindistributed
Proof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE GeneralsProof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE Generals

Proof of Work (PoW) is the original blockchain consensus algorithm, and is used in projects such as Bitcoin. It is the mechanism that enables users on a blockchain network to reach an agreed ‘truth’. A proof of work is essentially an answer to a complex mathematical problem. It takes a lot of work to find the Nonce but is easy for others to validate.PoW solves the Byzantine Generals Problem as it achieves a majority agreement without any central authority, in spite of the presence of unknown/potentially untrustworthy parties and despite the network not being instantaneous.This presentation brings out the concept Byzantine Generals proof and its connect with Bitcoin.

bitcoinblockchainproof of work
Cognyte & Septier
Who is Sniffing!!!!!
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
Individual undersea cables systems
(over 550)
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
Individual undersea cables systems
(over 550)
Chinese state-owned have sought a greater stake in the
global submarine cable network, almost certainly increasing
China’s ability to Manipulate, Surveil, and Interfere with
worldwide data flows.
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
Individual undersea cables systems
(over 550)
Chinese state-owned have sought a greater stake in the
global submarine cable network, almost certainly increasing
China’s ability to Manipulate, Surveil, and Interfere with
worldwide data flows.
Huawei Marine Systems, now owns ~10% of the cable laying
market, and 3 state-owned Chinese telecom providers have
ownership stakes in nearly 40 cables.
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf

Recommended for you

BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIMEBLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME

The world of Blockchain and Cryptocurrencies is undeniably amazing and has infinity to explore at hands.Recently I took on a 4 hour session at the prestigious Central Bureau of Investigations,CBI Academy ,Ghaziabad, vide Indian Technical and Economic Cooperation Programme organised by Ministry of External Affairs , to cover right from scratch to overview of mechanics and architecture of how this world works.Sharing here the presentation for info and awareness of anyone who is interested to take a dip in this domain and related cyber crime activities.

cryptocurrencycryptographybitcoin
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies

Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies was held at G D Goenka University, Sohna Road,Gurgaon on 22nd Feb 2018.Sharing here the presentation I gave for info.Readers may contact me for any clarifications on the subject content please.

bitcoinblockchaincryptocurrency
BITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi ConferenceBITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi Conference

This document discusses Bitcoin and blockchain technology. It begins with an introduction to Bitcoin, including its use as a digital currency and the blockchain network that underlies it. It then provides definitions of key Bitcoin and blockchain terms, such as wallets, addresses, mining, blocks, and hashes. The document also discusses tools and techniques related to Bitcoin forensics, such as analyzing blockchain data and artifacts from seized computers and devices.

anupam tiwaribitcoinblockchain
Individual undersea cables systems
(over 550)
Chinese companies have increased their involvement in
deploying cables globally, especially in Southeast Asia, the
Middle East, and Africa, as part Belt and Road Initiative (BRI),
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
Source: https://www.submarinecablemap.com/
China Company’s had built or repaired almost
25% of the world’s cables
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
Recently completed the Pakistan & East Africa Connecting
Europe (PEACE) submarine cable, bridging Singapore,
Pakistan, Kenya, Egypt, and France, among other countries.
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf

Recommended for you

Hashgraph : An over view with example
Hashgraph : An over view with exampleHashgraph : An over view with example
Hashgraph : An over view with example

This document provides examples to explain the Swirlds hashgraph consensus algorithm. It shows a hashgraph growing over time as members create events and gossip with each other. Each event contains cryptographic hashes linking it to previous events. Rounds are defined, with each member's first event in a round being a "witness." Elections are held for witnesses to determine if they are "famous," with later witnesses counting votes. The goal is for all members to reach consensus on the order and timestamps of all events.

hashgraphblockchaincryptocurrency
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCEBITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCE

Presentation I gave at 4th International Information Security Meet in the Hakon 2017 conference on 08th Oct 2017.Covers technical overview of the concept and take off essentials for Bitcoin crime investigators.Details at http://www.hakonindia.org/hakon-2017-speakers/

technologybitcoincryptocurrency
Webinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALKWebinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALK

Presentation I gave at BRIGHTTALK webinar in the BLOCKCHAIN SUMMIT on 10th Oct 2017.Covers technical overview of the concept and take off essentials for Bitcoin crime investigators.Details at https://www.brighttalk.com/webcast/1570/272431/bitcoin-forensics

bitcoindigital forensicscryptocurrency
Recently completed the Pakistan & East Africa Connecting
Europe (PEACE) submarine cable, bridging Singapore,
Pakistan, Kenya, Egypt, and France, among other countries.
Recently completed the Hong Kong landing of the Asia Direct
Cable, which will link mainland China, Japan, the Philippines,
Singapore, Thailand, and Vietnam
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
Recently completed the Pakistan & East Africa Connecting
Europe (PEACE) submarine cable, bridging Singapore,
Pakistan, Kenya, Egypt, and France, among other countries.
Recently completed the Hong Kong landing of the Asia Direct
Cable, which will link mainland China, Japan, the Philippines,
Singapore, Thailand, and Vietnam
Global ownership consortium of the 2 Africa cable project,
which will connect 46 cable landing stations in 33 countries
across Africa, Asia, and Europe
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
Data Protection in a Connected World: Sovereignty and Cyber Security
PRISM
PATRIOT
TEMPORA

Recommended for you

Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensics

The increased use of cryptocurrencies such as Bitcoin among an increasing user base has opened a new avenue of research in the field of digital forensics ie Bitcoin Forensics. Since the creation of Bitcoin in 2008, cryptocurrencies have begun to make a presence in the world of e-commerce. Cryptography serves as the underlying foundation for Bitcoin, which gives it the benefits of confidentiality, integrity, non repudiation and authentication. Having been designed and built upon the foundation of these four objectives makes Bitcoin an attractive alternative to mainstream currency and provides users with the benefits of payment freedom, security, very low fees, and fewer risks for merchants.But with a pleothra of advantages that it offers,there is a definete side to worry too and thats the money laundering transactions.On an average it is estimated that around 3 lakh bitcoin transactions happen inside a day and its not an easy task any day for a forensic investigator to trace the origins here.This presentation will bring out the technical overview and evolving forensics developments in the domain.

bitcoincryptocurrencycryptography
Blockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical OverviewBlockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical Overview

Blockchain is a distributed database that is used to maintain a continuously growing list of records, called blocks. Each block contains a timestamp and a link to a previous block and is typically managed by a peer-to-peer network collectively adhering to a protocol for validating new blocks.Bitcoin is a proven application that runs on BLOCKCHAIN.This ppt gives the reader an over view of the concept of BLOCKCHAIN.The same was presented by self on 20th June 2017 at Gurgaon Commissioner of Police office during Summer Internship Program under aegis of Shri Rakshit Tandon

bitcoincryptocurrencyblockchain
Equation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage GroupEquation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage Group

The Equation Group is a highly advanced secretive computer espionage group, suspected by security expert Claudio Guarnieri and unnamed former intelligence operatives of being tied to the United States National Security Agency (NSA). Because of the group's predilection for strong encryption methods in their operations, the name Equation Group was chosen by Kaspersky Lab, which discovered this operation and also documented 500 malware infections by the group's tools in at least 42 countries.This presentation gives an over view in brief based on the Kaspersky Report.

cyber securitycyber espionagecyber attack
NTP
Accurate timestamps from NTP are crucial in legal
settings to validate electronic records, impacting data
sovereignty during legal scrutiny or disputes.
ANTIVIRUS-UTMs-FIREWALLS
WELCOME QUANTUM & POST
QUANTUM TIMES!!!

Recommended for you

Quanity your Web Safety Score
Quanity your Web Safety ScoreQuanity your Web Safety Score
Quanity your Web Safety Score

This small presentation wil sail through a set of questions for any web/Internet user and will mark for every question as the user decides to answer.The safety score as it ends up lets the user know of where he stands in terms of IT SECURITY on the web!!!!

cyber espionagecyber securityit security
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening

This document provides a checklist for hardening an Android device with various security settings and recommendations. It suggests forgetting unused Wi-Fi networks, turning off location services and Bluetooth when not in use, limiting saved SMS/MMS messages, updating to the latest OS version, and not rooting or installing apps from untrusted sources. It also recommends enabling encryption, auto-lock, and the Android Device Manager for remote wiping a lost device. Additional security measures mentioned include disabling network notifications and form auto-fill, and showing security warnings for visited sites.

configuredeviceandroid
Harden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity NowHarden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity Now

Most of us are part of various Social Engineering Sites and keep updating ourselves via status updates, pictures and tweeting small life updates. Related privacy and security issues in respect of these social engineering sites available is already a serious concern among users. Additionally for these all social engineering sites/applications whether accessible on a desktop or a mobile, we all are not so serious responding and interacting but that’s the difference when we see viz-a-viz LinkedIn. When it is LinkedIn…we are mostly serious…no jokes, no clips, no tagging, no personal comments, no WOWs…it’s all professional. And when most of us take it seriously, we also feed serious inputs on it. But do we take necessary precautions too?...I have mostly seen a negated curve amongst my friend circle….hardly anyone has spared time to configure LinkedIn Privacy and Security settings. In this post I bring you out basic and necessary configuration steps involved to harden your LinkedIn interface to the world.

securitycyber securitymanage
ICANN
● Generic Names Supporting Organization (GNSO) - The GNSO is responsible for developing and
recommending to the ICANN Board global policies related to generic top-level domains (gTLDs). The GNSO
includes stakeholder groups representing business, intellectual property interests, non-commercial users, and
Internet service providers.
● Country Code Names Supporting Organization (ccNSO) - The ccNSO is responsible for developing policies
related to country-code top-level domains (ccTLDs) and representing the interests of ccTLD operators in ICANN's
decision-making processes.
● Address Supporting Organization (ASO) - The ASO is responsible for advising the ICANN Board on global IP
address allocation policies and representing the interests of the Regional Internet Registries (RIRs).
● At-Large Advisory Committee (ALAC) - The ALAC is responsible for representing the interests of individual
Internet users in ICANN's decision-making processes. The ALAC is composed of members who are appointed by
regional At-Large organizations.
● Governmental Advisory Committee (GAC) - The GAC provides advice to the ICANN Board on issues related
to public policy and government concerns.
● Root Server System Advisory Committee (RSSAC) - The RSSAC advises the ICANN Board on matters related
to the operation, administration, security, and integrity of the root server system, which is a critical part of the
Internet's infrastructure.
● Security and Stability Advisory Committee (SSAC) - The SSAC advises the ICANN community and Board on
issues related to the security and stability of the Internet's naming and address allocation systems.
ICANN
● Generic Names Supporting Organization (GNSO) - The GNSO is responsible for developing and
recommending to the ICANN Board global policies related to generic top-level domains (gTLDs). The GNSO
includes stakeholder groups representing business, intellectual property interests, non-commercial users, and
Internet service providers.
● Country Code Names Supporting Organization (ccNSO) - The ccNSO is responsible for developing policies
related to country-code top-level domains (ccTLDs) and representing the interests of ccTLD operators in ICANN's
decision-making processes.
● Address Supporting Organization (ASO) - The ASO is responsible for advising the ICANN Board on global IP
address allocation policies and representing the interests of the Regional Internet Registries (RIRs).
● At-Large Advisory Committee (ALAC) - The ALAC is responsible for representing the interests of individual
Internet users in ICANN's decision-making processes. The ALAC is composed of members who are appointed by
regional At-Large organizations.
● Governmental Advisory Committee (GAC) - The GAC provides advice to the ICANN Board on issues related
to public policy and government concerns.
● Root Server System Advisory Committee (RSSAC) - The RSSAC advises the ICANN Board on matters related
to the operation, administration, security, and integrity of the root server system, which is a critical part of the
Internet's infrastructure.
● Security and Stability Advisory Committee (SSAC) - The SSAC advises the ICANN community and Board on
issues related to the security and stability of the Internet's naming and address allocation systems.
ICANN
CLOUD HARDWARE LEADING COMPANIES
• Dell Technologies
• Hewlett Packard Enterprise (HPE)
• Lenovo
• Cisco
• Inspur (Chinese company)
• Huawei (Chinese company)
• Gigabyte
• Supermicro
• NetApp
• NVIDIA
CLOUD SOFTWARE/APIs LEADING COMPANIES
• Microsoft Azure
• Amazon Web Services
• Google Cloud Platform
• VMware (Software)
• Red Hat (Software)
• OpenStack
• CloudBees
• Chef
• Puppet
• Ansible
CLOUD INFRASTRUCTURE
INSERT PIC ZERO DAY- SIDE CHANNEL ETC

Recommended for you

APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?

Russia may be behind a long-standing, careful campaign designed to steal sensitive data relating to governments, militaries and security firms worldwide.This presentation based on a report made public by FireEye brings an over view of their opinion.....uploaded here just for general info to understand how its all happening!!!!

russiamalwareapt
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL

Blockchain technology is transforming industries and reshaping the way we conduct business, manage data, and secure transactions. Whether you're new to blockchain or looking to deepen your knowledge, our guidebook, "Blockchain for Dummies", is your ultimate resource.

blockchainweb3blockchain technology
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...

Jindong Gu, Zhen Han, Shuo Chen, Ahmad Beirami, Bailan He, Gengyuan Zhang, Ruotong Liao, Yao Qin, Volker Tresp, Philip Torr "A Systematic Survey of Prompt Engineering on Vision-Language Foundation Models" arXiv2023 https://arxiv.org/abs/2307.12980

NATIONAL E-MAIL??
DATA EMBASSIES?
DATA EMBASSIES?
• India to establish "Data Embassies": Indian government will facilitate the creation
of data embassies to help countries with digital continuity solutions.
• Digital continuity solutions: Involve storing copies of critical data in a secure
location outside a country's borders, in case the main servers are compromised.
• Initial rollout in GIFT City: Initially, data embassies will be set up only in Gujarat
International Finance Tec-City (GIFT), a financial services center in India.
• Nationwide rollout possible: in future
• Snapdeal
• Swiggy
• Udaan
• Zomato
• Dream 11
• Flipkart
• Hike
• MakeMyTrip
• Byju's
• Ola
• Oyo
• Paytm Mall
• Paytm.com
• PolicyBazaar
• Quikr
• Rivigo
• Snapdeal
• BigBasket
Source: https://sundayguardianlive.com/news/chinese-investments-deep-rooted-
india#:~:text=These%2018%20Unicorn%20companies%20in,of%20dollars%20in%20Chinese%20investments.
18 Unicorn companies
in India have over
$3,500 million of
Chinese investments

Recommended for you

Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides

If you’ve ever had to analyze a map or GPS data, chances are you’ve encountered and even worked with coordinate systems. As historical data continually updates through GPS, understanding coordinate systems is increasingly crucial. However, not everyone knows why they exist or how to effectively use them for data-driven insights. During this webinar, you’ll learn exactly what coordinate systems are and how you can use FME to maintain and transform your data’s coordinate systems in an easy-to-digest way, accurately representing the geographical space that it exists within. During this webinar, you will have the chance to: - Enhance Your Understanding: Gain a clear overview of what coordinate systems are and their value - Learn Practical Applications: Why we need datams and projections, plus units between coordinate systems - Maximize with FME: Understand how FME handles coordinate systems, including a brief summary of the 3 main reprojectors - Custom Coordinate Systems: Learn how to work with FME and coordinate systems beyond what is natively supported - Look Ahead: Gain insights into where FME is headed with coordinate systems in the future Don’t miss the opportunity to improve the value you receive from your coordinate system data, ultimately allowing you to streamline your data analysis and maximize your time. See you there!

BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf

Presented at Gartner Data & Analytics, London Maty 2024. BT Group has used the Neo4j Graph Database to enable impressive digital transformation programs over the last 6 years. By re-imagining their operational support systems to adopt self-serve and data lead principles they have substantially reduced the number of applications and complexity of their operations. The result has been a substantial reduction in risk and costs while improving time to value, innovation, and process automation. Join this session to hear their story, the lessons they learned along the way and how their future innovation plans include the exploration of uses of EKG + Generative AI.

neo4jneo4j webinarsgraph database
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf

As a popular open-source library for analytics engineering, dbt is often used in combination with Airflow. Orchestrating and executing dbt models as DAGs ensures an additional layer of control over tasks, observability, and provides a reliable, scalable environment to run dbt models. This webinar will cover a step-by-step guide to Cosmos, an open source package from Astronomer that helps you easily run your dbt Core projects as Airflow DAGs and Task Groups, all with just a few lines of code. We’ll walk through: - Standard ways of running dbt (and when to utilize other methods) - How Cosmos can be used to run and visualize your dbt projects in Airflow - Common challenges and how to address them, including performance, dependency conflicts, and more - How running dbt projects in Airflow helps with cost optimization Webinar given on 9 July 2024

apache airflowdbtdbt-core
DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........
DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........
OPERATING SYSTEMS
USA - WINDOWS/iOS
RUSSIA - Astra Linux, Mandriva, Sailfish
China - HarmonyOS
GPS
USA - NAVSTAR
RUSSIA - GLONASS
China - BeiDou
CRYPTOGRAPHY
USA - NIST
RUSSIA - GOST
(Gosudarstvennyĭ Standart)
China - SCA (State Cryptography
Administration)
INTERNET
USA - ICANN(Non Govt)
RUSSIA - RuNET
China - GFW
GFW IN CHINA
RuNET 2020

Recommended for you

DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition

The DealBook is our annual overview of the Ukrainian tech investment industry. This edition comprehensively covers the full year 2023 and the first deals of 2024.

20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024

Everything that I found interesting last month about the irresponsible use of machine intelligence

quantumfaxmachine
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry

Are you interested in dipping your toes in the cloud native observability waters, but as an engineer you are not sure where to get started with tracing problems through your microservices and application landscapes on Kubernetes? Then this is the session for you, where we take you on your first steps in an active open-source project that offers a buffet of languages, challenges, and opportunities for getting started with telemetry data. The project is called openTelemetry, but before diving into the specifics, we’ll start with de-mystifying key concepts and terms such as observability, telemetry, instrumentation, cardinality, percentile to lay a foundation. After understanding the nuts and bolts of observability and distributed traces, we’ll explore the openTelemetry community; its Special Interest Groups (SIGs), repositories, and how to become not only an end-user, but possibly a contributor.We will wrap up with an overview of the components in this project, such as the Collector, the OpenTelemetry protocol (OTLP), its APIs, and its SDKs. Attendees will leave with an understanding of key observability concepts, become grounded in distributed tracing terminology, be aware of the components of openTelemetry, and know how to take their first steps to an open-source contribution! Key Takeaways: Open source, vendor neutral instrumentation is an exciting new reality as the industry standardizes on openTelemetry for observability. OpenTelemetry is on a mission to enable effective observability by making high-quality, portable telemetry ubiquitous. The world of observability and monitoring today has a steep learning curve and in order to achieve ubiquity, the project would benefit from growing our contributor community.

cloudcloud native observabilitycloud native
CAMBRIDGE ANALYTICA
Windows AI Feature
Data Protection in a Connected World: Sovereignty and Cyber Security
• Laplace Mechanism
• Gaussian Mechanism
• Randomized Response
• Smoothing
• Clipping
• Quantization
• Privacy-Preserving Data Synthesis
Differential Privacy
Data Sovereignty + Differential Privacy = Stronger Protection

Recommended for you

RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx

Your comprehensive guide to RPA in healthcare for 2024. Explore the benefits, use cases, and emerging trends of robotic process automation. Understand the challenges and prepare for the future of healthcare automation

rpa in healthcarerpa in healthcare usarpa in healthcare industry
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses

CIO Council Cal Poly Humboldt September 22, 2023

national research platformdistributed supercomputerdistributed systems
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx

This is a slide deck that showcases the updates in Microsoft Copilot for May 2024

microsoftmicrosoft copilot
•FedAvg (Federated Averaging)
•FedSGD (Federated Stochastic
Gradient Descent)
•FedProx (Federated Proximal)
•Differential Private Federated Learning
•Secure Aggregation Techniques
Federated Learning
Trust | Third party Negation |Hash Cash| Public Keys | Private Keys | y2 = x3 + 7 | RIPEMD-160 | SHA-256 | Finite
Fields | Secp256k1 standard | Distributed Ledger | 03 Jan 2009 | Satoshi Nakamoto | ASIC | Mining | Proof of work
| Consensus | ECDSA| Prime Numbers| Immutability | Cryptography | Transactions | Wallets | Wallet file | data
extraction | Linux system | Bitcoin Core | Bitcoin Scripts | Bloom filters | BIP0037 Bloom filters | Getting Merkle
blocks | getting transactions of interest | Using multiple hash functions | Gossip Protocol | GPU |FPGA | The
transaction lifecycle | The transaction data structures | Types of scripts | Coinbase transactions | Transaction
validations |Transaction bugs | Difficulty adjustment and retargeting algorithms | Kimoto Gravity Well Difficulty
adjustment and retargeting algorithms | Kimoto Gravity Well | Dark Gravity Wave | Bitcoin limitations | Privacy and
anonymity | Extended protocols on top of Bitcoin |Colored coins | Hashing algorithms | Difficulty adjustment
algorithms | Inter-block time | Block rewards | Reward halving rate |Block size and transaction size | Dark Gravity
Wave| DigiShield | Difficulty adjustment algorithms | Inter-block time | Block rewards | Reward halving rate | Block
size and transaction size | Bitcoin Development Environment | Compiling Bitcoin Core from the Source Code |
Selecting a Bitcoin Core Release | Configuring the Bitcoin Core Build | Building the Bitcoin Core Executables |
Running a Bitcoin Core Node | Running Bitcoin Core for the First Time | Configuring the Bitcoin Core Node |Bitcoin
Core Application Programming Interface (API) | Getting Information on the Bitcoin Core Client Status | Exploring and
Decoding Transactions | Exploring Blocks | Using Bitcoin Core’s Programmatic Interface | Advanced Transactions and
Scripting | Multisignature | Pay-to-Script-Hash (P2SH) | P2SH Addresses | Benefits of P2SH | Redeem Script and
Validation | Data Recording Output (RETURN) | Timelocks | Transaction Locktime (nLocktime) | Check Lock Time
Verify (CLTV) | Relative Timelocks | Relative Timelocks with nSequence | Relative Timelocks with CSV | Median-
Time-Past | Timelock Defense Against Fee Sniping | Scripts with Flow Control (Conditional Clauses) | Conditional
Clauses with VERIFY Opcodes | Using Flow Control in Scripts | Block Header | Block Identifiers: Block Header Hash
and Block Height | The Genesis Block | Linking Blocks in the Blockchain
PQ BLOCKCHAIN
Homomorphic
Encryption
Retrieval
Augmented
Generation

Recommended for you

INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf

These fighter aircraft have uses outside of traditional combat situations. They are essential in defending India's territorial integrity, averting dangers, and delivering aid to those in need during natural calamities. Additionally, the IAF improves its interoperability and fortifies international military alliances by working together and conducting joint exercises with other air forces.

air force fighter planebiggest submarinezambia port
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure

Recent advancements in the NIST-JARVIS infrastructure: JARVIS-Overview, JARVIS-DFT, AtomGPT, ALIGNN, JARVIS-Leaderboard

jarvisjarvis-dftalignn
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024

This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator. Link to presentation recording and transcript: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/ Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.

a11yaccessibilityalt text
PALAPA RING INDONESIA
Data Protection in a Connected World: Sovereignty and Cyber Security

More Related Content

Similar to Data Protection in a Connected World: Sovereignty and Cyber Security

Activities of Smart Ship Application Platform 2 Project (SSAP2)
Activities of Smart Ship Application Platform 2 Project (SSAP2)Activities of Smart Ship Application Platform 2 Project (SSAP2)
Activities of Smart Ship Application Platform 2 Project (SSAP2)
MTI Co., Ltd.
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Honeywell
 
WAC, Its Dirt Simple
WAC, Its Dirt SimpleWAC, Its Dirt Simple
WAC, Its Dirt Simple
Wireless Applications Corp.
 
Wireless Applications Corp 2010 Overview
Wireless Applications Corp 2010 OverviewWireless Applications Corp 2010 Overview
Wireless Applications Corp 2010 Overview
TadBeckelman
 
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...
Cisco Canada
 
IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017
paul young cpa, cga
 
100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности
Альбина Минуллина
 
Keynote at ISCRAM-China2008: Next generation of Safety Networks
Keynote at ISCRAM-China2008: Next generation of Safety NetworksKeynote at ISCRAM-China2008: Next generation of Safety Networks
Keynote at ISCRAM-China2008: Next generation of Safety Networks
global
 
Mission Possible: Future of IT Support
Mission Possible: Future of IT SupportMission Possible: Future of IT Support
Mission Possible: Future of IT Support
CompTIA
 
Agile fractal grid 7-11-14
Agile fractal grid   7-11-14Agile fractal grid   7-11-14
Agile fractal grid 7-11-14
Charles "Chuck" Speicher Jr.
 
Agile Fractal Grid - 7-11-14
Agile Fractal Grid - 7-11-14Agile Fractal Grid - 7-11-14
Agile Fractal Grid - 7-11-14
Charles "Chuck" Speicher Jr.
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
Angel Garcia
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
PhiliphaHaldline
 
What's new in web standards?
What's new in web standards?What's new in web standards?
What's new in web standards?
Daniel Appelquist
 
Attobahn_Reduced_Angel_070915
Attobahn_Reduced_Angel_070915Attobahn_Reduced_Angel_070915
Attobahn_Reduced_Angel_070915
Darryl Gray
 
IPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be IgnoredIPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be Ignored
Rochester Security Summit
 
ONF & iSDX Webinar
ONF & iSDX WebinarONF & iSDX Webinar
ONF & iSDX Webinar
Katie Hyman
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
Real-Time Innovations (RTI)
 
Unit 2
Unit 2Unit 2
SDI to IP 2110 Transition Part 1
SDI to IP 2110 Transition Part 1SDI to IP 2110 Transition Part 1
SDI to IP 2110 Transition Part 1
Dr. Mohieddin Moradi
 

Similar to Data Protection in a Connected World: Sovereignty and Cyber Security (20)

Activities of Smart Ship Application Platform 2 Project (SSAP2)
Activities of Smart Ship Application Platform 2 Project (SSAP2)Activities of Smart Ship Application Platform 2 Project (SSAP2)
Activities of Smart Ship Application Platform 2 Project (SSAP2)
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
 
WAC, Its Dirt Simple
WAC, Its Dirt SimpleWAC, Its Dirt Simple
WAC, Its Dirt Simple
 
Wireless Applications Corp 2010 Overview
Wireless Applications Corp 2010 OverviewWireless Applications Corp 2010 Overview
Wireless Applications Corp 2010 Overview
 
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...
 
IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017
 
100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности
 
Keynote at ISCRAM-China2008: Next generation of Safety Networks
Keynote at ISCRAM-China2008: Next generation of Safety NetworksKeynote at ISCRAM-China2008: Next generation of Safety Networks
Keynote at ISCRAM-China2008: Next generation of Safety Networks
 
Mission Possible: Future of IT Support
Mission Possible: Future of IT SupportMission Possible: Future of IT Support
Mission Possible: Future of IT Support
 
Agile fractal grid 7-11-14
Agile fractal grid   7-11-14Agile fractal grid   7-11-14
Agile fractal grid 7-11-14
 
Agile Fractal Grid - 7-11-14
Agile Fractal Grid - 7-11-14Agile Fractal Grid - 7-11-14
Agile Fractal Grid - 7-11-14
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 
What's new in web standards?
What's new in web standards?What's new in web standards?
What's new in web standards?
 
Attobahn_Reduced_Angel_070915
Attobahn_Reduced_Angel_070915Attobahn_Reduced_Angel_070915
Attobahn_Reduced_Angel_070915
 
IPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be IgnoredIPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be Ignored
 
ONF & iSDX Webinar
ONF & iSDX WebinarONF & iSDX Webinar
ONF & iSDX Webinar
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
 
Unit 2
Unit 2Unit 2
Unit 2
 
SDI to IP 2110 Transition Part 1
SDI to IP 2110 Transition Part 1SDI to IP 2110 Transition Part 1
SDI to IP 2110 Transition Part 1
 

More from anupriti

Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre timesBlockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
anupriti
 
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum ThreatsNavigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
anupriti
 
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESTALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
anupriti
 
Cyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand itCyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand it
anupriti
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...
anupriti
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challenges
anupriti
 
Proof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE GeneralsProof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE Generals
anupriti
 
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIMEBLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
anupriti
 
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
anupriti
 
BITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi ConferenceBITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi Conference
anupriti
 
Hashgraph : An over view with example
Hashgraph : An over view with exampleHashgraph : An over view with example
Hashgraph : An over view with example
anupriti
 
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCEBITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
anupriti
 
Webinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALKWebinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALK
anupriti
 
Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensics
anupriti
 
Blockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical OverviewBlockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical Overview
anupriti
 
Equation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage GroupEquation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage Group
anupriti
 
Quanity your Web Safety Score
Quanity your Web Safety ScoreQuanity your Web Safety Score
Quanity your Web Safety Score
anupriti
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
anupriti
 
Harden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity NowHarden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity Now
anupriti
 
APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?
anupriti
 

More from anupriti (20)

Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre timesBlockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
 
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum ThreatsNavigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
 
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESTALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
 
Cyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand itCyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand it
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challenges
 
Proof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE GeneralsProof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE Generals
 
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIMEBLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
 
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
 
BITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi ConferenceBITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi Conference
 
Hashgraph : An over view with example
Hashgraph : An over view with exampleHashgraph : An over view with example
Hashgraph : An over view with example
 
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCEBITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
 
Webinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALKWebinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALK
 
Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensics
 
Blockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical OverviewBlockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical Overview
 
Equation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage GroupEquation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage Group
 
Quanity your Web Safety Score
Quanity your Web Safety ScoreQuanity your Web Safety Score
Quanity your Web Safety Score
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
Harden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity NowHarden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity Now
 
APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?
 

Recently uploaded

BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
Liveplex
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
Toru Tamaki
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
Yevgen Sysoyev
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
Matthew Sinclair
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
SynapseIndia
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
Larry Smarr
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
Stephanie Beckett
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
KAMAL CHOUDHARY
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
BookNet Canada
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Erasmo Purificato
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
Matthew Sinclair
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
welrejdoall
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
SynapseIndia
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
ScyllaDB
 

Recently uploaded (20)

BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
 

Data Protection in a Connected World: Sovereignty and Cyber Security

  • 1. DATA SOVEREIGNTY & CYBER SECURITY Dr Anupam Tiwari
  • 5. WHAT MAKES ME THINK SO?
  • 6. Number of Factors and Vectors effect into Directly-Indirectly effecting into DATA sovereignty DATA SOVEREIGNTY
  • 7. Refers to the idea that a country or jurisdiction has the authority and right to govern and control the data generated within its borders. Source: https://www.cloudflare.com/en-gb/learning/privacy/what-is-data-sovereignty/
  • 11. AADHAR ON ANDROID & iPHONE
  • 12. UPI ON ANDROID & iPHONE
  • 13. News you see, the facts you see and even the maps you see change depending on WHERE YOU ARE
  • 18. FRONTIER : Speed of 1685 PETAFLOPS AIRAWAT : Speed of 13.17 PETAFLOPS SUPERCOMPUTERs
  • 19. DO WE HAVE A TRULY INDIGENOUS INDIAN FOOT PRINT HERE OR WE ARE HAPPY BEING USERS? AR – VR –ER - MR
  • 20. • Theoretically reduced risk of built-in functionalities that could gather user data for foreign entities. • Alignment with government regulations or data residency requirements for data sovereignty. BROWSERs
  • 21. STORAGE SSD/HDD/RAMs • Hardware Backdoors: Theoretical risk that foreign governments could introduce hardware backdoors during production • Supply Chain Vulnerabilities: Supply chain for foreign-made HDDs can be complex, making it harder to track and potentially introducing vulnerabilities where malicious actors could tamper with the drives.
  • 22. • Enterprise routers/switches: Smaller process (14nm-7nm) for better performance and lower power consumption. • Home routers/basic switches: Larger process (28nm+) for lower cost. MODEM / ROUTER / SWITCHES
  • 23. ASIC/ FPGA/ TPU/ GPU Potential vulnerabilities or backdoors built into the chips during manufacturing
  • 24. SEMI CONDUCTORS & PROCESSORS Semiconductors play a role in bigger picture of Data Sovereignty Potential vulnerabilities or backdoors built into the chips during manufacturing
  • 25. SEMI CONDUCTORS & PROCESSORS Number of countries involved in new generation nm chip manufacturing is indeed difficult due to the complex and global nature of the supply chain…any GUESSES?
  • 26. 15 to 25 countries
  • 27. MAIN FRAME OS • Unisys • IBM • Fujitso • HP • BULL • Vendor Lock-in • Limited Customization • Potential Backdoors
  • 32. Total length of operational undersea cables is estimated to be around 1.4 million kilometers (nearly 870,000 miles) & carries vast majority(~99 %) of internet traffic across oceans. Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
  • 33. Cognyte & Septier Who is Sniffing!!!!! Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
  • 34. Individual undersea cables systems (over 550) Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
  • 35. Individual undersea cables systems (over 550) Chinese state-owned have sought a greater stake in the global submarine cable network, almost certainly increasing China’s ability to Manipulate, Surveil, and Interfere with worldwide data flows. Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
  • 36. Individual undersea cables systems (over 550) Chinese state-owned have sought a greater stake in the global submarine cable network, almost certainly increasing China’s ability to Manipulate, Surveil, and Interfere with worldwide data flows. Huawei Marine Systems, now owns ~10% of the cable laying market, and 3 state-owned Chinese telecom providers have ownership stakes in nearly 40 cables. Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
  • 37. Individual undersea cables systems (over 550) Chinese companies have increased their involvement in deploying cables globally, especially in Southeast Asia, the Middle East, and Africa, as part Belt and Road Initiative (BRI), Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
  • 39. China Company’s had built or repaired almost 25% of the world’s cables Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
  • 40. Recently completed the Pakistan & East Africa Connecting Europe (PEACE) submarine cable, bridging Singapore, Pakistan, Kenya, Egypt, and France, among other countries. Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
  • 41. Recently completed the Pakistan & East Africa Connecting Europe (PEACE) submarine cable, bridging Singapore, Pakistan, Kenya, Egypt, and France, among other countries. Recently completed the Hong Kong landing of the Asia Direct Cable, which will link mainland China, Japan, the Philippines, Singapore, Thailand, and Vietnam Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
  • 42. Recently completed the Pakistan & East Africa Connecting Europe (PEACE) submarine cable, bridging Singapore, Pakistan, Kenya, Egypt, and France, among other countries. Recently completed the Hong Kong landing of the Asia Direct Cable, which will link mainland China, Japan, the Philippines, Singapore, Thailand, and Vietnam Global ownership consortium of the 2 Africa cable project, which will connect 46 cable landing stations in 33 countries across Africa, Asia, and Europe Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
  • 45. NTP
  • 46. Accurate timestamps from NTP are crucial in legal settings to validate electronic records, impacting data sovereignty during legal scrutiny or disputes.
  • 48. WELCOME QUANTUM & POST QUANTUM TIMES!!!
  • 49. ICANN
  • 50. ● Generic Names Supporting Organization (GNSO) - The GNSO is responsible for developing and recommending to the ICANN Board global policies related to generic top-level domains (gTLDs). The GNSO includes stakeholder groups representing business, intellectual property interests, non-commercial users, and Internet service providers. ● Country Code Names Supporting Organization (ccNSO) - The ccNSO is responsible for developing policies related to country-code top-level domains (ccTLDs) and representing the interests of ccTLD operators in ICANN's decision-making processes. ● Address Supporting Organization (ASO) - The ASO is responsible for advising the ICANN Board on global IP address allocation policies and representing the interests of the Regional Internet Registries (RIRs). ● At-Large Advisory Committee (ALAC) - The ALAC is responsible for representing the interests of individual Internet users in ICANN's decision-making processes. The ALAC is composed of members who are appointed by regional At-Large organizations. ● Governmental Advisory Committee (GAC) - The GAC provides advice to the ICANN Board on issues related to public policy and government concerns. ● Root Server System Advisory Committee (RSSAC) - The RSSAC advises the ICANN Board on matters related to the operation, administration, security, and integrity of the root server system, which is a critical part of the Internet's infrastructure. ● Security and Stability Advisory Committee (SSAC) - The SSAC advises the ICANN community and Board on issues related to the security and stability of the Internet's naming and address allocation systems. ICANN
  • 51. ● Generic Names Supporting Organization (GNSO) - The GNSO is responsible for developing and recommending to the ICANN Board global policies related to generic top-level domains (gTLDs). The GNSO includes stakeholder groups representing business, intellectual property interests, non-commercial users, and Internet service providers. ● Country Code Names Supporting Organization (ccNSO) - The ccNSO is responsible for developing policies related to country-code top-level domains (ccTLDs) and representing the interests of ccTLD operators in ICANN's decision-making processes. ● Address Supporting Organization (ASO) - The ASO is responsible for advising the ICANN Board on global IP address allocation policies and representing the interests of the Regional Internet Registries (RIRs). ● At-Large Advisory Committee (ALAC) - The ALAC is responsible for representing the interests of individual Internet users in ICANN's decision-making processes. The ALAC is composed of members who are appointed by regional At-Large organizations. ● Governmental Advisory Committee (GAC) - The GAC provides advice to the ICANN Board on issues related to public policy and government concerns. ● Root Server System Advisory Committee (RSSAC) - The RSSAC advises the ICANN Board on matters related to the operation, administration, security, and integrity of the root server system, which is a critical part of the Internet's infrastructure. ● Security and Stability Advisory Committee (SSAC) - The SSAC advises the ICANN community and Board on issues related to the security and stability of the Internet's naming and address allocation systems. ICANN
  • 52. CLOUD HARDWARE LEADING COMPANIES • Dell Technologies • Hewlett Packard Enterprise (HPE) • Lenovo • Cisco • Inspur (Chinese company) • Huawei (Chinese company) • Gigabyte • Supermicro • NetApp • NVIDIA CLOUD SOFTWARE/APIs LEADING COMPANIES • Microsoft Azure • Amazon Web Services • Google Cloud Platform • VMware (Software) • Red Hat (Software) • OpenStack • CloudBees • Chef • Puppet • Ansible CLOUD INFRASTRUCTURE INSERT PIC ZERO DAY- SIDE CHANNEL ETC
  • 55. DATA EMBASSIES? • India to establish "Data Embassies": Indian government will facilitate the creation of data embassies to help countries with digital continuity solutions. • Digital continuity solutions: Involve storing copies of critical data in a secure location outside a country's borders, in case the main servers are compromised. • Initial rollout in GIFT City: Initially, data embassies will be set up only in Gujarat International Finance Tec-City (GIFT), a financial services center in India. • Nationwide rollout possible: in future
  • 56. • Snapdeal • Swiggy • Udaan • Zomato • Dream 11 • Flipkart • Hike • MakeMyTrip • Byju's • Ola • Oyo • Paytm Mall • Paytm.com • PolicyBazaar • Quikr • Rivigo • Snapdeal • BigBasket Source: https://sundayguardianlive.com/news/chinese-investments-deep-rooted- india#:~:text=These%2018%20Unicorn%20companies%20in,of%20dollars%20in%20Chinese%20investments. 18 Unicorn companies in India have over $3,500 million of Chinese investments
  • 57. DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY DEFAULT ? USA-RUSSIA-CHINA...........
  • 58. DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY DEFAULT ? USA-RUSSIA-CHINA........... OPERATING SYSTEMS USA - WINDOWS/iOS RUSSIA - Astra Linux, Mandriva, Sailfish China - HarmonyOS GPS USA - NAVSTAR RUSSIA - GLONASS China - BeiDou CRYPTOGRAPHY USA - NIST RUSSIA - GOST (Gosudarstvennyĭ Standart) China - SCA (State Cryptography Administration) INTERNET USA - ICANN(Non Govt) RUSSIA - RuNET China - GFW
  • 64. • Laplace Mechanism • Gaussian Mechanism • Randomized Response • Smoothing • Clipping • Quantization • Privacy-Preserving Data Synthesis Differential Privacy Data Sovereignty + Differential Privacy = Stronger Protection
  • 65. •FedAvg (Federated Averaging) •FedSGD (Federated Stochastic Gradient Descent) •FedProx (Federated Proximal) •Differential Private Federated Learning •Secure Aggregation Techniques Federated Learning
  • 66. Trust | Third party Negation |Hash Cash| Public Keys | Private Keys | y2 = x3 + 7 | RIPEMD-160 | SHA-256 | Finite Fields | Secp256k1 standard | Distributed Ledger | 03 Jan 2009 | Satoshi Nakamoto | ASIC | Mining | Proof of work | Consensus | ECDSA| Prime Numbers| Immutability | Cryptography | Transactions | Wallets | Wallet file | data extraction | Linux system | Bitcoin Core | Bitcoin Scripts | Bloom filters | BIP0037 Bloom filters | Getting Merkle blocks | getting transactions of interest | Using multiple hash functions | Gossip Protocol | GPU |FPGA | The transaction lifecycle | The transaction data structures | Types of scripts | Coinbase transactions | Transaction validations |Transaction bugs | Difficulty adjustment and retargeting algorithms | Kimoto Gravity Well Difficulty adjustment and retargeting algorithms | Kimoto Gravity Well | Dark Gravity Wave | Bitcoin limitations | Privacy and anonymity | Extended protocols on top of Bitcoin |Colored coins | Hashing algorithms | Difficulty adjustment algorithms | Inter-block time | Block rewards | Reward halving rate |Block size and transaction size | Dark Gravity Wave| DigiShield | Difficulty adjustment algorithms | Inter-block time | Block rewards | Reward halving rate | Block size and transaction size | Bitcoin Development Environment | Compiling Bitcoin Core from the Source Code | Selecting a Bitcoin Core Release | Configuring the Bitcoin Core Build | Building the Bitcoin Core Executables | Running a Bitcoin Core Node | Running Bitcoin Core for the First Time | Configuring the Bitcoin Core Node |Bitcoin Core Application Programming Interface (API) | Getting Information on the Bitcoin Core Client Status | Exploring and Decoding Transactions | Exploring Blocks | Using Bitcoin Core’s Programmatic Interface | Advanced Transactions and Scripting | Multisignature | Pay-to-Script-Hash (P2SH) | P2SH Addresses | Benefits of P2SH | Redeem Script and Validation | Data Recording Output (RETURN) | Timelocks | Transaction Locktime (nLocktime) | Check Lock Time Verify (CLTV) | Relative Timelocks | Relative Timelocks with nSequence | Relative Timelocks with CSV | Median- Time-Past | Timelock Defense Against Fee Sniping | Scripts with Flow Control (Conditional Clauses) | Conditional Clauses with VERIFY Opcodes | Using Flow Control in Scripts | Block Header | Block Identifiers: Block Header Hash and Block Height | The Genesis Block | Linking Blocks in the Blockchain PQ BLOCKCHAIN