Intelligent CIO Middle East Issue 14 | Page 24

COMMENT

My microwave is just one of millions, even billions, of“ smart”, connected devices that are out there‘ listening’ to the Internet and as dangerously trusting as the average toddler. Obviously, that’ s a problem. But it’ s more than just a concern, because“ trust” – or to be more precise, the right kind of trust – is at the heart of a functioning internet or network.

The only way the Internet can properly function is when computers, software, devices and programmes can do things quickly, can communicate instantaneously, and can adapt immediately to changing inputs. That’ s how the Internet works.
But my microwave’ s brain is comprised of a simple, low-cost, low-security chip and operating system that use“ inherited” trust, the primary and still dominant form of establishing trust across the Internet today. Basically this means that if you present me with an ID and password that match, I’ m forced to trust you.
Hackers in the recent distributed denial of service( DDoS) attack against Dyn in the US exploited vulnerabilities in millions of IT systems and WiFi networks to steal IDs and passwords, then leverage the frailty of inherited trust to create the botnet used in the attack.
While we’ ve already seen the risks inherent in Internet of Things( IoT) devices relying on inherited trust, what’ s more concerning is that the system that controls the routing infrastructure that represents the backbone of the internet – BGP( border
STEPHEN BRENNAN, SENIOR VICE PRESIDENT, CYBER NETWORK DEFENCE, DARKMATTER
gateway protocol) and other dynamic routing protocols also use a similar idea of inherited trust.
It is clear we need to implement a new trust protocol. One of the concepts currently being developed is to shift from inherited trust to authenticated trust through public key infrastructure( PKI). Rather than inherit trust directly from an entity presenting a user name and password, we can use PKI, or in this case, routing PKI( RPKI). With RPKI, a trusted third-party confirms that the person, entity or device presenting itself is, in fact, who it says it is.
This would mean that the packets of data travelling across the internet that underpin the flow of video, text, sound, databases and documents could contain a certificate that could be validated using PKI infrastructure.
RPKI is a viable solution, though it relies on a centralised structure and cascading series of authentications flowing from a series of Certification
DRIVING THIS DUAL FOCUS IS THE PUBLIC CLOUD’ S“ SHARED RESPONSIBILITY MODEL,” IN WHICH SERVICE PROVIDERS AND ENTERPRISES DIVVY UP VARIOUS LEVELS OF PROTECTION ACROSS THE IT STACK. THESE RESPONSIBILITIES – AND THE REQUISITE SKILLS – VARY DEPENDING ON THE TYPE OF PUBLIC CLOUD SERVICE
24 INTELLIGENTCIO www. intelligentcio. com