20140603

Information security has an Open and Agile history.


Information security had four major historical events.  The first was PGP/PKI encryption, and the second was the sub-OS security hypervisor both developed in the later 20th century.  Early in the 21st century the third development was ubiquitous personal multi-factor biometric devices with Open-standards.  The fourth was the development of community keyed lockout Open-standards for all information infrastructure and personal devices.

 

The total lockdown of our personal information with MUlti-FActor BIometric (MUFABI) devices required early 21st century corporate bosses direct Congressional a/o Parliamentary ... servants to order Open-standards compliance for COmmunity KEyed LOckout (COKELO).

 

MuFaBi devices are linked to owners embedded chips, when out of range, all owner personal information, music, documents ... are wiped.  MuFaBi will reset to owner defaults (cloud services) when owner is again in range and can be MuFaBi authenticated.  Any crack attempts to access MuFaBi applications, OS, services after a wipe automatically resets the device to factory defaults removing all account identifications and functionality.  MuFaBi standards are not warrant cracking tolerant, any attempts to crack a MuFaBi device results in immediate wipe and reset assuring any search and seizures of personal information is prevented.  MuFaBi prevents personal activities tracking by generating transient avatar financial transactions, location information, digital A/V session modification and encryption.  MuFaBi devices due to cost/availability did not quickly gain global usage.  Magic is extremely well applied technology; IOW, the user does not appreciate or notice the technology (it is just a user device).

 

CoKeLo is a security model that allows communities (....Com, ....Gov, ....Mil ...) to lock all community information infrastructure and user devices to a unique spectrum of keys and key-change time/sequence.  CoKeLo security manages very frequent, complete, and fast key changes across the total community.  Malicious external attacks automatically initiates unique defensive CoKeLo managed key-spectrum jumps for external attack lockout.  Literally the attacker objective (your community) does a virtual vanishing act.  Other CoKeLo defense measures kick-in collecting forensics and preventing discovery from the malicious source.  When forensics indicates internal threats CoKeLo will manage multiple sub-communities under various key-sets until the threat can be detected and removed.  CoKeLo key changes result in network IPs, NIEM keys, MAC IP association updates ... user signatures.

No comments:

Post a Comment