Data Protection in a Connected World: Sovereignty and Cyber Security
anupriti
379 views
70 slides
Jun 30, 2024
Slide 1 of 70
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
About This Presentation
Delve into the critical intersection of data sovereignty and cyber security in this presentation. Explore unconventional cyber threat vectors and strategies to safeguard data integrity and sovereignty in an increasingly interconnected world. Gain insights into emerging threats and proactive defense ...
Delve into the critical intersection of data sovereignty and cyber security in this presentation. Explore unconventional cyber threat vectors and strategies to safeguard data integrity and sovereignty in an increasingly interconnected world. Gain insights into emerging threats and proactive defense measures essential for modern digital ecosystems.
Size: 1.99 MB
Language: en
Added: Jun 30, 2024
Slides: 70 pages
Slide Content
DATA SOVEREIGNTY
& CYBER SECURITY
Dr AnupamTiwari
ISDATA SOVEREIGNTY
EVEN POSSIBLE?
IS DATA SOVEREIGNTY
EVEN POSSIBLE?
WHAT MAKES ME THINK
SO?
NumberofFactorsandVectorseffectinto
Directly-IndirectlyeffectingintoDATA
sovereignty
DATA SOVEREIGNTY
•Enterprise routers/switches: Smaller process (14nm-7nm) for better performance
and lower power consumption.
•Home routers/basic switches: Larger process (28nm+) for lower cost.
MODEM / ROUTER / SWITCHES
ASIC/ FPGA/ TPU/ GPU
Potential vulnerabilities or backdoors built into the chips during manufacturing
SEMI CONDUCTORS & PROCESSORS
Semiconductors play a role in bigger picture of Data
Sovereignty
Potential vulnerabilities or backdoors built into the chips during manufacturing
SEMI CONDUCTORS & PROCESSORS
Number of countries involved in new generation nmchip
manufacturing is indeed difficult due to the complex and
global nature of the supply chain…any GUESSES?
15 to 25 countries
MAIN FRAME OS
•Unisys
•IBM
•Fujitso
•HP
•BULL
•Vendor Lock-in
•Limited Customization
•Potential Backdoors
Individual undersea cables systems
(over 550)
Chinesestate-ownedhavesoughtagreaterstakeinthe
globalsubmarinecablenetwork,almostcertainlyincreasing
China’sabilitytoManipulate,Surveil,andInterferewith
worldwidedataflows.
HuaweiMarine Systems, now owns ~10% of the cable laying
market, and 3state-owned Chinese telecom providers have
ownership stakes in nearly 40cables.
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
RecentlycompletedthePakistan&EastAfricaConnecting
Europe(PEACE)submarinecable,bridgingSingapore,
Pakistan,Kenya,Egypt,andFrance,amongothercountries.
Recently completed the Hong Kong landing of the Asia Direct
Cable, which will link mainland China, Japan, the Philippines,
Singapore, Thailand, and Vietnam
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
RecentlycompletedthePakistan&EastAfricaConnecting
Europe(PEACE)submarinecable,bridgingSingapore,
Pakistan,Kenya,Egypt,andFrance,amongothercountries.
Recently completed the Hong Kong landing of the Asia Direct
Cable, which will link mainland China, Japan, the Philippines,
Singapore, Thailand, and Vietnam
Global ownership consortium of the 2 Africa cable project,
which will connect 46cable landing stations in33 countries
across Africa, Asia, and Europe
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........
DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........
OPERATINGSYSTEMS
USA -WINDOWS/iOS
RUSSIA -Astra Linux, Mandriva, Sailfish
China -HarmonyOS
GPS
USA -NAVSTAR
RUSSIA -GLONASS
China -BeiDou
CRYPTOGRAPHY
USA -NIST
RUSSIA -GOST
(GosudarstvennyĭStandart)
China -SCA (State Cryptography
Administration)
INTERNET
USA -ICANN(Non Govt)
RUSSIA -RuNET
China -GFW