Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2021 | 42 | 4 | 97-109

Article title

Zero identity - the new cybersecurity paradigm

Content

Title variants

Languages of publication

Abstracts

EN
Global cybercrime is exploding geometrically. The traditional methods of securing cyber systems via complex passwords frequently fail, exposing the computer systems to many types of cybercrimes. Cybercrime of all kinds is a growing concern for individuals, government and business organizations, and society. Zero Identity is a new technology that "bubbles, cloaks, and hides" computers and their contents from cybercriminals. Zero Identity is a mature and proven military-based technology with over a 20-year history. Cylentium, a cybersecurity startup, is adapting Zero Identity technology to consumers and civilian organizations. Market and technological acceptance of Zero Identity may lead to a cybersecurity paradigm shift in the next decade. This paper explores the history of Zero Identity, what it does, how it works, and its future prognosis. One of the original developers (Rob Langhorne) of the Zero Identity concept was interviewed, as was the concurrent entrepreneur (Wayne Ronhaar). Both Langhorne and Ronhaar became coauthors of this article to contribute their first-hand historical perspectives, challenges, and insights to transform technology into a commercial product in a series of articles.

Year

Volume

42

Issue

4

Pages

97-109

Physical description

Dates

published
2021

Contributors

author
  • Pepperdine University CEO-Cylentium 24255 Pacific Coast Highway, Malibu, CA 90263
  • St. Edward's University 3001 South Congress Ave, Austin, TX 78704
  • VP & CTO — Cylentium 2002 Brushfire Court, Arlington, Tx 76001

References

  • AP (June 2, 2021). Getting Back online After Cyberattack. https://www.cnbc.com/ 2021/06/02/jbs-worlds-largest-meat-producer-getting-back-online-aftercyberattack. html
  • Cohen-Almagor (April 2011). Internet History. International Journal of Techno ethics. https://ieeexplore.ieee.org/abstract/document/5622061
  • Jang-Jaccard, J. and Nepal, S. (August 2014). A survey of emerging threats in cybersecurity. Journal of Computer and Systems Sciences, 80, 5, pp. 973–993. https://doi.org/10.1016/j.jcss.2014.02.005
  • Krigman, A. (October 22, 2020). Cyber Autopsy Series: Ukraine Power Grid Attack Makes History. https://www.globalsign.com/en/blog/cyber-autopsy-series-ukranianpowergrid-attack-makes-history
  • Morgan, S. (November 13, 2020). Cybercrime to Cost the World $10.5 Trillion Annually by 2025. Cybersecurity Ventures. https://cybersecurityventures.com/cybercrime-willcostthe-world-16-4-billion-a-day-in-2021
  • Nield, D. (December 10, 2015). Google's Quantum Computer is 100 million Times Faster Than Your Laptop. Science Alert. https://www.sciencealert.com/google-s-quantumcomputeris-100-million-times-faster-than-your-laptop
  • Norton (2020). Norton Cyber Security Insights Report: Global Results, Symantec. https://www.nortonlifelock.com/us/en/newsroom/press-kits/2021-norton-cyber-safetyinsightsreport/
  • Okereafor, K. and Adelaiye, O. (July 2020). Randomized Cyber Attacks Simulation Model: A Cyber Security Mitigation Proposal for Post Covid-19 Digital Era. International Journal of Recent Engineering Research and Development, 5, 7, pp. 61–72.
  • Pagliery, J. (August 5, 2015). The Inside Story of the Biggest Hack in History. https://money.cnn.com/2015/08/05/technology/aramco-hack/index.html
  • Perlroth, N. (June 6, 2021). Are We Waiting for Everyone to Get Hacked? New York Times.
  • Riley, T. (December 7, 2020). Cybersecurity 202: Global Losses from Cybercrime Skyrocketed to nearly $1 Trillion in 2020. The Washington Post.
  • Stewart, T. and Strausbaugh, S. (September 26, 2017). The 8 Character Password is Dead. Protiviti, https://tcblog.protiviti.com/2017/09/26/the-8-character-password-is-dead
  • Turton, W. and Mehrotra, K. (June 4, 2021). Hackers Breach Colonial Pipeline Using Compromised Password. Bloomberg, https://www.bloomberg.com/news/articles/202106-04/hackers-breached-colonial-pipeline-using-compromised-password
  • So, H.K., Kwok, S.H.M., Lam, E.Y., and Lui, K. (2010). Zero-Configuration IdentityBased Signcryption Scheme for Smart Grid. 2010 First IEEE International Conference on Smart Grid Communications, pp. 321–326. Doi: 10.1109/SMARTGRID.2010.5622061.
  • Vailshery, L. (January 22, 2021). Average Number of Devices in the Typical American Home. Statista, https://www.statista.com/statistics/1107206/average-number-ofconnecteddevices-us-house

Document Type

Publication order reference

Identifiers

Biblioteka Nauki
11236507

YADDA identifier

bwmeta1.element.ojs-doi-10_2478_minib-2021-0023
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.