Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Convergence of Chaos Engineering and Revolutionary Technologies

Yury Nino
October 07, 2020

Convergence of Chaos Engineering and Revolutionary Technologies

Yury Nino

October 07, 2020
Tweet

More Decks by Yury Nino

Other Decks in Technology

Transcript

  1. Topics to COVER CHAOS ENGINEERING • Internet of Things •

    Artificial Intelligence • Human Augmentation • Cybersecurity • Conceptual Model
  2. Internet of Things Connecting people and objects. It is a

    network of physical and virtual objects with identities, attributes, personalities and interfaces that are integrated in a transparent way. Kevin Ahston
  3. Challenge 1: Resilience A key aspect that has to be

    addressed is the possibility to recover the network and its services in case of faults, without human intervention.
  4. Challenge 2: Security With current IoT architectures, once a single

    device in a network is compromised, it can be used to disrupt the behavior of other devices on the same network. https://ieeexplore.ieee.org/document/9093828
  5. Challenge 3: Reliability The reliability and availability of the IoT

    is not only a matter of a failure rate of things, but also protocols, standardization, logistics support and other influences.
  6. Use Chaos Engineering to protect networks and allow to have

    personalized data. What do we control? We need all pieces are resilient, secure and reliable ...
  7. Attack! Devices & Networks Generate Slow Responses Create Cascade Failures

    Intercept the Integration Points Test with Users
  8. Artificial Intelligence Intelligence demonstrated by machines. Area of computer science

    that studies how machines can perform tasks that would normally require a sentient agent.
  9. Challenge 1: Data Big Data is a form of AI.

    Organizations are using it to manage the customer experience, transform their products and deliver digital services. This data must be reliable!
  10. Challenge 2: Machine Learning Robust ML systems and hardware architectures

    are required to generate reliable and trustworthy results in the presence of hardware-level faults while also preserving security and privacy.
  11. Challenge 3: Natural Language Processing Since computers exist people have

    tried to teach them how to process human language, however, the inconsistency and volatility of human language turns NLP into a complex task susceptible to fail.
  12. Attack! Architectures & Models Test models injecting failures. Chaos as

    functions. Use Artificial Intelligence to classify post mortems!
  13. Cybersecurity Security and Reliability are often hidden in customers expectations.

    Cyberattacks are more about manipulating vulnerabilities in human psychology than the adversary's technological sophistication.
  14. Challenge 1: Virus Evolution Computer Viruses are evolving! It is

    hard to recognize relevant patterns that have been seen previously. The theory behind Chaos Engineering could be useful here.
  15. Challenge 2: Fuzz Testing Reliability is a core pillar of

    security testing and offensive security testers (Red Teams) will often try to exploit reliability failures to penetrate systems.
  16. Challenge 3: Human Factors Human Factors in cybersecurity are perhaps

    the biggest challenge when building an effective threat prevention strategy. Humans operate differently when they expect things to fail.
  17. Security Chaos Engineering It is the identification of security control

    failures through proactive experimentation to build confidence in the system’s ability to defend against malicious conditions in production.
  18. Attack! Security Controls Latency on security controls. Collisions in a

    shared IAM role policy. Shutdown an API gateway. Disable MFA.
  19. Human Augmentation Advanced human augmentation provides a human-centred perspective on

    technology design. It builds upon earlier technological concepts such as ubiquitous computing, wearable computing, autonomous systems and ambient intelligence. https://www.researchgate.ne
  20. Disclaimer: Automation Distinguish between automation which is defined as using

    science and technology to improve the performance of a task, and human augmentation as using science and technology to improve a human.
  21. Challenge 1: Reliability Augments go beyond what a user is

    capable of doing on their own. An exoskeleton that can lift 200 pounds must not fail while someone is wearing it.
  22. Challenge 2: Safety If someone will work closely and frequently

    with a device (or potentially wear or implant it), safety is an important concern. Augments need to be tested with rigorous safety standards in all facets.
  23. Attack! Biology & Technology Study the consequences of a wrong

    design. Establish resilience patterns for human-centric attacks.