Data Protection in a Connected World: Sovereignty and Cyber Security

anupriti 379 views 70 slides Jun 30, 2024
Slide 1
Slide 1 of 70
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70

About This Presentation

Delve into the critical intersection of data sovereignty and cyber security in this presentation. Explore unconventional cyber threat vectors and strategies to safeguard data integrity and sovereignty in an increasingly interconnected world. Gain insights into emerging threats and proactive defense ...


Slide Content

DATA SOVEREIGNTY
& CYBER SECURITY
Dr AnupamTiwari

ISDATA SOVEREIGNTY
EVEN POSSIBLE?

IS DATA SOVEREIGNTY
EVEN POSSIBLE?

WHAT MAKES ME THINK
SO?

NumberofFactorsandVectorseffectinto
Directly-IndirectlyeffectingintoDATA
sovereignty
DATA SOVEREIGNTY

Referstotheideathatacountryorjurisdiction
hastheauthorityandrighttogovernandcontrol
thedatageneratedwithinitsborders.
Source: https://www.cloudflare.com/en-gb/learning/privacy/what-is-data-sovereignty/

OPERATINGSYSTEMS

CRYPTOGRAPHY STANDARDS

ENCRYPTIONSTANDARDS

AADHARON ANDROID & iPHONE

UPI ON ANDROID & iPHONE

Newsyousee,thefactsyouseeand
eventhemapsyouseechange
dependingonWHEREYOUARE

AI MODELS

Regional versions of LLMs?

FRONTIER: Speed of 1685 PETAFLOPS
AIRAWAT: Speed of13.17 PETAFLOPS
SUPERCOMPUTERs

DO WE HAVE A TRULY INDIGENOUS INDIAN FOOT PRINT HERE OR WE ARE HAPPY
BEING USERS?
AR –VR –ER -MR

•Theoreticallyreducedriskofbuilt-infunctionalitiesthatcouldgatheruserdataforforeignentities.
•Alignmentwithgovernmentregulationsordataresidencyrequirementsfordatasovereignty.
BROWSERs

STORAGE SSD/HDD/RAMs
•HardwareBackdoors:Theoreticalriskthatforeigngovernmentscouldintroducehardware
backdoorsduringproduction
•SupplyChainVulnerabilities:Supplychainforforeign-madeHDDscanbecomplex,makingit
hardertotrackandpotentiallyintroducingvulnerabilitieswheremaliciousactorscouldtamperwiththe
drives.

•Enterprise routers/switches: Smaller process (14nm-7nm) for better performance
and lower power consumption.
•Home routers/basic switches: Larger process (28nm+) for lower cost.
MODEM / ROUTER / SWITCHES

ASIC/ FPGA/ TPU/ GPU
Potential vulnerabilities or backdoors built into the chips during manufacturing

SEMI CONDUCTORS & PROCESSORS
Semiconductors play a role in bigger picture of Data
Sovereignty
Potential vulnerabilities or backdoors built into the chips during manufacturing

SEMI CONDUCTORS & PROCESSORS
Number of countries involved in new generation nmchip
manufacturing is indeed difficult due to the complex and
global nature of the supply chain…any GUESSES?

15 to 25 countries

MAIN FRAME OS
•Unisys
•IBM
•Fujitso
•HP
•BULL
•Vendor Lock-in
•Limited Customization
•Potential Backdoors

ZERO CLICK
THREATS

AD TECH

FMRI-AI

Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf

Totallengthofoperationalunderseacables
isestimatedtobearound1.4million
kilometers(nearly870,000miles)&carries
vastmajority(~99%)ofinternettraffic
acrossoceans.
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf

Cognyte& Septier
Who is Sniffing!!!!!
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf

Individual undersea cables systems
(over 550)
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf

Individual undersea cables systems
(over 550)
Chinesestate-ownedhavesoughtagreaterstakeinthe
globalsubmarinecablenetwork,almostcertainlyincreasing
China’sabilitytoManipulate,Surveil,andInterferewith
worldwidedataflows.
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf

Individual undersea cables systems
(over 550)
Chinesestate-ownedhavesoughtagreaterstakeinthe
globalsubmarinecablenetwork,almostcertainlyincreasing
China’sabilitytoManipulate,Surveil,andInterferewith
worldwidedataflows.
HuaweiMarine Systems, now owns ~10% of the cable laying
market, and 3state-owned Chinese telecom providers have
ownership stakes in nearly 40cables.
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf

Individual undersea cables systems
(over 550)
Chinesecompanieshaveincreasedtheirinvolvementin
deployingcablesglobally,especiallyinSoutheastAsia,the
MiddleEast,andAfrica,aspartBeltandRoadInitiative(BRI),
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf

Source: https://www.submarinecablemap.com/

ChinaCompany’shadbuiltorrepairedalmost
25%oftheworld’scables
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf

RecentlycompletedthePakistan&EastAfricaConnecting
Europe(PEACE)submarinecable,bridgingSingapore,
Pakistan,Kenya,Egypt,andFrance,amongothercountries.
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf

RecentlycompletedthePakistan&EastAfricaConnecting
Europe(PEACE)submarinecable,bridgingSingapore,
Pakistan,Kenya,Egypt,andFrance,amongothercountries.
Recently completed the Hong Kong landing of the Asia Direct
Cable, which will link mainland China, Japan, the Philippines,
Singapore, Thailand, and Vietnam
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf

RecentlycompletedthePakistan&EastAfricaConnecting
Europe(PEACE)submarinecable,bridgingSingapore,
Pakistan,Kenya,Egypt,andFrance,amongothercountries.
Recently completed the Hong Kong landing of the Asia Direct
Cable, which will link mainland China, Japan, the Philippines,
Singapore, Thailand, and Vietnam
Global ownership consortium of the 2 Africa cable project,
which will connect 46cable landing stations in33 countries
across Africa, Asia, and Europe
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf

PRISM
PATRIOT
TEMPORA

NTP

AccuratetimestampsfromNTParecrucialinlegal
settingstovalidateelectronicrecords,impactingdata
sovereigntyduringlegalscrutinyordisputes.

ANTIVIRUS-UTMs-FIREWALLS

WELCOME QUANTUM & POST
QUANTUM TIMES!!!

ICANN

●GenericNamesSupportingOrganization(GNSO)-TheGNSOisresponsiblefordevelopingand
recommendingtotheICANNBoardglobalpoliciesrelatedtogenerictop-leveldomains(gTLDs).TheGNSO
includesstakeholdergroupsrepresentingbusiness,intellectualpropertyinterests,non-commercialusers,and
Internetserviceproviders.
●CountryCodeNamesSupportingOrganization(ccNSO)-TheccNSOisresponsiblefordevelopingpolicies
relatedtocountry-codetop-leveldomains(ccTLDs)andrepresentingtheinterestsofccTLDoperatorsinICANN's
decision-makingprocesses.
●AddressSupportingOrganization(ASO)-TheASOisresponsibleforadvisingtheICANNBoardonglobalIP
addressallocationpoliciesandrepresentingtheinterestsoftheRegionalInternetRegistries(RIRs).
●At-LargeAdvisoryCommittee(ALAC)-TheALACisresponsibleforrepresentingtheinterestsofindividual
InternetusersinICANN'sdecision-makingprocesses.TheALACiscomposedofmemberswhoareappointedby
regionalAt-Largeorganizations.
●GovernmentalAdvisoryCommittee(GAC)-TheGACprovidesadvicetotheICANNBoardonissuesrelated
topublicpolicyandgovernmentconcerns.
●RootServerSystemAdvisoryCommittee(RSSAC)-TheRSSACadvisestheICANNBoardonmattersrelated
totheoperation,administration,security,andintegrityoftherootserversystem,whichisacriticalpartofthe
Internet'sinfrastructure.
●SecurityandStabilityAdvisoryCommittee(SSAC)-TheSSACadvisestheICANNcommunityandBoardon
issuesrelatedtothesecurityandstabilityoftheInternet'snamingandaddressallocationsystems.
ICANN

●GenericNamesSupportingOrganization(GNSO)-TheGNSOisresponsiblefordevelopingand
recommendingtotheICANNBoardglobalpoliciesrelatedtogenerictop-leveldomains(gTLDs).TheGNSO
includesstakeholdergroupsrepresentingbusiness,intellectualpropertyinterests,non-commercialusers,and
Internetserviceproviders.
●CountryCodeNamesSupportingOrganization(ccNSO)-TheccNSOisresponsiblefordevelopingpolicies
relatedtocountry-codetop-leveldomains(ccTLDs)andrepresentingtheinterestsofccTLDoperatorsinICANN's
decision-makingprocesses.
●AddressSupportingOrganization(ASO)-TheASOisresponsibleforadvisingtheICANNBoardonglobalIP
addressallocationpoliciesandrepresentingtheinterestsoftheRegionalInternetRegistries(RIRs).
●At-LargeAdvisoryCommittee(ALAC)-TheALACisresponsibleforrepresentingtheinterestsofindividual
InternetusersinICANN'sdecision-makingprocesses.TheALACiscomposedofmemberswhoareappointedby
regionalAt-Largeorganizations.
●GovernmentalAdvisoryCommittee(GAC)-TheGACprovidesadvicetotheICANNBoardonissuesrelated
topublicpolicyandgovernmentconcerns.
●RootServerSystemAdvisoryCommittee(RSSAC)-TheRSSACadvisestheICANNBoardonmattersrelated
totheoperation,administration,security,andintegrityoftherootserversystem,whichisacriticalpartofthe
Internet'sinfrastructure.
●SecurityandStabilityAdvisoryCommittee(SSAC)-TheSSACadvisestheICANNcommunityandBoardon
issuesrelatedtothesecurityandstabilityoftheInternet'snamingandaddressallocationsystems.
ICANN

CLOUD HARDWARE LEADING COMPANIES
•Dell Technologies
•Hewlett Packard Enterprise (HPE)
•Lenovo
•Cisco
•Inspur(Chinese company)
•Huawei(Chinese company)
•Gigabyte
•Supermicro
•NetApp
•NVIDIA
CLOUD SOFTWARE/APIs LEADING COMPANIES
•Microsoft Azure
•Amazon Web Services
•Google Cloud Platform
•VMware (Software)
•Red Hat (Software)
•OpenStack
•CloudBees
•Chef
•Puppet
•Ansible
CLOUD INFRASTRUCTURE
INSERT PIC ZERO DAY-SIDE CHANNEL ETC

NATIONAL E-MAIL??

DATA EMBASSIES?

DATA EMBASSIES?
•Indiatoestablish"DataEmbassies":Indiangovernmentwillfacilitatethecreation
ofdataembassiestohelpcountrieswithdigitalcontinuitysolutions.
•Digitalcontinuitysolutions:Involvestoringcopiesofcriticaldatainasecure
locationoutsideacountry'sborders,incasethemainserversarecompromised.
•InitialrolloutinGIFTCity:Initially,dataembassieswillbesetuponlyinGujarat
InternationalFinanceTec-City(GIFT),afinancialservicescenterinIndia.
•Nationwiderolloutpossible:infuture

•Snapdeal
•Swiggy
•Udaan
•Zomato
•Dream 11
•Flipkart
•Hike
•MakeMyTrip
•Byju's
•Ola
•Oyo
•PaytmMall
•Paytm.com
•PolicyBazaar
•Quikr
•Rivigo
•Snapdeal
•BigBasket
Source: https://sundayguardianlive.com/news/chinese-investments-deep-rooted-
india#:~:text=These%2018%20Unicorn%20companies%20in,of%20dollars%20in%20Chinese%20investments.
18Unicorncompanies
inIndiahaveover
$3,500 millionof
Chineseinvestments

DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........

DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........
OPERATINGSYSTEMS
USA -WINDOWS/iOS
RUSSIA -Astra Linux, Mandriva, Sailfish
China -HarmonyOS
GPS
USA -NAVSTAR
RUSSIA -GLONASS
China -BeiDou
CRYPTOGRAPHY
USA -NIST
RUSSIA -GOST
(GosudarstvennyĭStandart)
China -SCA (State Cryptography
Administration)
INTERNET
USA -ICANN(Non Govt)
RUSSIA -RuNET
China -GFW

GFWIN CHINA

RuNET2020

CAMBRIDGE ANALYTICA

Windows AI Feature

•Laplace Mechanism
•Gaussian Mechanism
•Randomized Response
•Smoothing
•Clipping
•Quantization
•Privacy-Preserving Data Synthesis
Differential Privacy
Data Sovereignty + Differential Privacy = Stronger Protection

•FedAvg(Federated Averaging)
•FedSGD(Federated Stochastic
Gradient Descent)
•FedProx(Federated Proximal)
•Differential Private Federated Learning
•Secure Aggregation Techniques
Federated Learning

Trust|ThirdpartyNegation|HashCash|PublicKeys|PrivateKeys|y2=x3+7|RIPEMD-160|SHA-256|Finite
Fields|Secp256k1standard|DistributedLedger|03Jan2009|SatoshiNakamoto|ASIC|Mining|Proofofwork
|Consensus|ECDSA|PrimeNumbers|Immutability|Cryptography|Transactions|Wallets|Walletfile|data
extraction|Linuxsystem|BitcoinCore|BitcoinScripts|Bloomfilters|BIP0037Bloomfilters|GettingMerkle
blocks|gettingtransactionsofinterest|Usingmultiplehashfunctions|GossipProtocol|GPU|FPGA|The
transactionlifecycle|Thetransactiondatastructures|Typesofscripts|Coinbasetransactions|Transaction
validations|Transactionbugs|Difficultyadjustmentandretargetingalgorithms|KimotoGravityWellDifficulty
adjustmentandretargetingalgorithms|KimotoGravityWell|DarkGravityWave|Bitcoinlimitations|Privacyand
anonymity|ExtendedprotocolsontopofBitcoin|Coloredcoins|Hashingalgorithms|Difficultyadjustment
algorithms|Inter-blocktime|Blockrewards|Rewardhalvingrate|Blocksizeandtransactionsize|DarkGravity
Wave|DigiShield|Difficultyadjustmentalgorithms|Inter-blocktime|Blockrewards|Rewardhalvingrate|Block
sizeandtransactionsize|BitcoinDevelopmentEnvironment|CompilingBitcoinCorefromtheSourceCode|
SelectingaBitcoinCoreRelease|ConfiguringtheBitcoinCoreBuild|BuildingtheBitcoinCoreExecutables|
RunningaBitcoinCoreNode|RunningBitcoinCorefortheFirstTime|ConfiguringtheBitcoinCoreNode|Bitcoin
CoreApplicationProgrammingInterface(API)|GettingInformationontheBitcoinCoreClientStatus|Exploringand
DecodingTransactions|ExploringBlocks|UsingBitcoinCore’sProgrammaticInterface|AdvancedTransactionsand
Scripting|Multisignature|Pay-to-Script-Hash(P2SH)|P2SHAddresses|BenefitsofP2SH|RedeemScriptand
Validation|DataRecordingOutput(RETURN)|Timelocks|TransactionLocktime(nLocktime)|CheckLockTime
Verify(CLTV)|RelativeTimelocks|RelativeTimelockswithnSequence|RelativeTimelockswithCSV|Median-
Time-Past|TimelockDefenseAgainstFeeSniping|ScriptswithFlowControl(ConditionalClauses)|Conditional
ClauseswithVERIFYOpcodes|UsingFlowControlinScripts|BlockHeader|BlockIdentifiers:BlockHeaderHash
andBlockHeight|TheGenesisBlock|LinkingBlocksintheBlockchain
PQ BLOCKCHAIN

Homomorphic
Encryption

Retrieval
Augmented
Generation

PALAPA RING INDONESIA