The global and independent platform for the SAP community.

The final technologies to solve all IT security problems

Whether touted as the "Holy Grail," the "Egg-Laying Wooly Pig" or the "Silver Bullet: Every year, new technologies are presented at IT security trade fairs that supposedly solve all security problems better and more cost-effectively than anything before.
Raimund Genes, Trend Micro
November 1, 2016
Content:
it security header
avatar
This text has been automatically translated from German to English.

But just as theory differs from practice, one must distinguish between technology and its implementation.

A technology that is recognized as "safe" according to the current state of research may nevertheless be unsafe in a concrete implementation.

This is what happens with public key infrastructures (PKI). The theory behind it - i.e. symmetrical and asymmetric encryption, digital Signatures and certificates - are established and proven technologies.

Nevertheless, the implementation of PKI has weak points. In this specific case, two "certificate authorities", namely Startcom and Wosign, issued false or at least questionable certificates.

The technology behind it worked flawlessly.

Nevertheless, the incorrect or improper use or implementation created a security problem.

So if you limit yourself to just the technology view, everything was flawless - yet there were gaps in the implementation and thus security problems.

Insecure certificates despite secure cryptography. Now cryptographic algorithms and PKI, at least in our IT age, very old. So to speak from the stone age of computer science...

So the current technology buzzword is "Machine Learning"especially in the IT security sector. If you believe some marketing statements, this makes machine learning all other technologies obsolete.

But also ML is "only" a technology. And strictly speaking, it's not even new: Many basic algorithms and procedures have been known for decades.

Even though ML as a technology has a lot of potential, especially in detecting new unknown threats, it is well worth looking at the implementation.

One of the most important factors in implementing ML is training. This includes the amount and quality of training data as well as the training method.

The quality of an ML implementation thus depends directly on the quality - and to some extent the quantity - of the training data. It is therefore not enough to have a good command of the pure technology ML.

Rather, external factors, in this case the training data, also play a - if not "the" - decisive role. To put it casually: "Garbage in, garbage out."

Machine Learning vs. Training

In addition to the "technology" dimension, there is suddenly another dimension to consider when evaluating ML implementations: the "training set."

This is an example of how a technology must always be evaluated in the context of its implementation.

Another aspect that implementation can throw a spanner in the works is "false positives". That is, legitimate content that is incorrectly classified as undesirable.

Many ML algorithms historically suffer from this problem. They may very efficiently detect new threats that other technologies do not, but at the same time report a lot of harmless content as dangerous.

In the context of an optimization, therefore, further noise reduction measures are often used.

The influence of new technologies is indispensable for IT security. If only to be able to meet the creativity of cybercriminals on an equal footing.

However, technology affiliation does not lead to the desired results. The implementation and its context must always be considered.

If this is not done, there is always the danger of creating the impression of a "perfect" technology. A theory that is all too often disenchanted by practical implementation.

https://e3magpmp.greatsolution.dev/partners/trend-micro-deutschland-gmbh/

Download as PDF only for members. Please create an account Here

avatar
Raimund Genes, Trend Micro

Raimund Genes was CTO at Trend Micro.


Write a comment

Work on SAP Basis is crucial for successful S/4 conversion. This gives the so-called Competence Center strategic importance among SAP's existing customers. Regardless of the operating model of an S/4 Hana, topics such as automation, monitoring, security, application lifecycle management, and data management are the basis for the operative S/4 operation. For the second time already, E3 Magazine is hosting a summit in Salzburg for the SAP community to get comprehensive information on all aspects of S/4 Hana groundwork. With an exhibition, expert presentations, and plenty to talk about, we again expect numerous existing customers, partners, and experts in Salzburg. E3 Magazine invites you to Salzburg for learning and exchange of ideas on June 5 and 6, 2024.

Venue

Event Room, FourSide Hotel Salzburg,
At the exhibition center 2,
A-5020 Salzburg

Event date

June 5 and 6, 2024

Tickets

Early Bird Ticket - Available until 29.03.2024
EUR 440 excl. VAT
Regular ticket
EUR 590 excl. VAT

Secure your Early Bird ticket now!

Venue

Event Room, Hotel Hilton Heidelberg,
Kurfürstenanlage 1,
69115 Heidelberg

Event date

28 and 29 February 2024

Tickets

Regular ticket
EUR 590 excl. VAT
The organizer is the E3 magazine of the publishing house B4Bmedia.net AG. The presentations will be accompanied by an exhibition of selected SAP partners. The ticket price includes the attendance of all lectures of the Steampunk and BTP Summit 2024, the visit of the exhibition area, the participation in the evening event as well as the catering during the official program. The lecture program and the list of exhibitors and sponsors (SAP partners) will be published on this website in due time.