Our site will be undergoing maintenance from 6 a.m. - 6 p.m. ET on Saturday, May 20. During this time, Bookshop, checkout, and other features will be unavailable. We apologize for the inconvenience.
Cookies must be enabled to use this website.
Book Image Not Available Book Image Not Available
Book details
  • Genre:COMPUTERS
  • SubGenre:Security / Cryptography & Encryption
  • Language:English
  • Pages:218
  • eBook ISBN:9781667872483
  • Hardcover ISBN:9781667872476

Categorical Trust in Digitality

by Srinivas Kumar

Book Image Not Available Book Image Not Available
Overview
Categorical trust in digitality is nirvana for information technology (IT) and operational technology (OT) convergence from device manufacturing to provisioning, commissioning, and field operations in production environments. It may not require expensive hardware upgrades to legacy devices and may be achievable with cost effective software or firmware enhancements, to extend the operational lifetime and efficiency of brownfield and greenfield devices in production environments. Retrofitting trust in the minefield of unprotected devices already in existence is essential for interoperability and integrity of long-lived inter-connected systems. The traditional information technology (IT) detection and prevention methods based on threat models are inadequate to defend the billions of devices that are an intrinsic part of our daily regimen. It's essential to adopt protection models based on risk for modernization across all sectors – smart factories, smart cities, smart grids, smart transportation, smart homes, healthcare systems, aviation systems, public utility systems, defense systems, and law enforcement systems. The power of scientific and technological innovations offers opportunities to transform and reform the way things are and the way they ought to be. If the past three decades are a gauge of the power of innovation, then the next three decades will be a harbinger of the power of transformation.
Description
Categorical trust in digitality is nirvana for information technology (IT) and operational technology (OT) convergence from device manufacturing to provisioning, commissioning, and field operations in production environments. It may not require expensive hardware upgrades to legacy devices and may be achievable with cost effective software or firmware enhancements, to extend the operational lifetime and efficiency of brownfield and greenfield devices in production environments. Retrofitting trust in the minefield of unprotected devices already in existence is essential for interoperability and integrity of long-lived inter-connected systems. Smart devices designed for the Internet of Things (IoT), industrial IoT, and operational technology (OT) in the emerging era of digital transformation require protection by design for cyber resilience. Cyberattacks by nation state actors and cybercrime syndicates cause system outages and disruption of essential services. This book is a call to action – for silicon chip makers, equipment manufacturers, managed security service providers, device owners and operators, to begin the journey towards collaborative cyber protection. The traditional information technology (IT) detection and prevention methods based on threat models are inadequate to defend the billions of devices that are an intrinsic part of our daily regimen. It's essential to adopt protection models based on risk for modernization across all sectors – smart factories, smart cities, smart grids, smart transportation, smart homes, healthcare systems, aviation systems, public utility systems, defense systems, and law enforcement systems. The power of scientific and technological innovations offers opportunities to transform and reform the way things are and the way they ought to be. If the past three decades are a gauge of the power of innovation, then the next three decades will be a harbinger of the power of transformation. Over the years, there have been multiple waves of technological evolution. We've seen evolutions from analog to digital over copper, and then from copper to fiber, and fiber to wireless. Soon after that, we advanced from on-premises to cloud data centers, and then from local applications to online applications, then local storage advanced to cloud storage. All these advancements were remarkable endeavors. The second wave of inventions included virtualization, cloud computing, high speed connections, software defined networking, online applications and remote services. All these advancements have shaped a global economy. This book emphasizes that the third wave is coming. Recent advances in silicon technologies, field-programmable gate arrays, edge computing, zero trust models, artificial intelligence (AI), machine learning (ML) and deep learning (DL) collectively provide a platform for digital transformation at scale. Data is the digital currency and trustworthiness is the measurement of digital intelligence. Devices dominate every aspect of our daily living at home, in public, and at work. Digitality and Cybersecurity (digital military) will inevitably shape the future of humanity in profound ways. Even as humans are intensely "machine learning", machines are reciprocally "human learning". Therefore, categorical trust in data and devices is imperative.
About the author
Srinivas Kumar has more than 30 years of hands-on engineering and management experience in computer networking and security. Prior to joining DigiCert as the VP of IoT Solutions, he was the CTO & CPO at Mocana (acquired by DigiCert in 2022). Prior to joining Mocana in 2016, he was the CTO of TaaSera. He founded TaaSware in 2011 (acquired by TaaSera in 2012). During his time at TaaSware he served as an entrepreneur-in-residence at SRI International. Prior to that, he was a solutions architect in the networking and security business unit at VMware. He was previously the VP of engineering and solutions architect for identity-based access controls at Applied Identity (acquired by Citrix in 2010). He has served in senior project and architect roles at Nortel, Lucent and TranSwitch. Earlier in his career, as engineering manager at Firearms Training Systems (acquired by Meggitt Training Systems), he led the design and development of real time marksmanship and squad engagement simulators for training law enforcement personnel and the military. He holds 30 U.S. patents in the field of cyber-protection for IoT, cybersecurity, user and application identity-based access controls, network and endpoint security, and evidence based predictive analytics. He has led engineering efforts to certify products for common criteria, FIPS, DO-178, US DoD and NATO standards. He holds a BE degree in electrical engineering from Bombay University, and an MS degree in electrical and computer engineering from Clemson University.