--- Sep 20 - Oct 25, 2022 ---

Network Security

--- October 12, 2022 ---

Collaborative Discussion Summary: Digitalization - What are the security implications of the digital economy?

A fully digital enterprise is one that adopts new digital technologies, processes, and business models in a way to enhance productivity, reliability, efficiency, connectivity, and customer engagement and satisfaction, and cope with the world’s trend toward electrification, decarbonization, and decentralization (Wei et al., 2019).

Although this digitalization has many advantages, it comes with challenges too. Being a fully digital enterprise creates more vulnerable surfaces due to the use of more networks, devices, cloud services, etc. (Spremić & Šimunic, 2018; Gao et al., 2021). In addition, the pathway to the digital world is not easy. There must be a clear path for the enterprise to follow. This path should be paved with perseverance and dedication to increase the engagement of employees.

Being fully digital, in my opinion, may help alleviate most of the side effects of energy crises like the one that the world has been experiencing this year; 2022. This is because digital technologies and renewable energy go hand in hand due to their roles in providing clean energy, and enhancing efficiency, productivity, and reliability (Marchant, 2022; Wei et al., 2019).

References

Gao, X., et al. (2021) A Study on the Security Implications of Information Leakages in Container Clouds. IEEE Transactions on Dependable and Secure Computing 18(1): 174-191.

Marchant, N. (2022) Davos 2022: The world's first energy crisis and how to fix it. Available from: https://www.weforum.org/agenda/2022/05/first-global-energy-crisis-how-to-fix-davos-2022/ [Accessed 1 October 2022].

Spremić, M. & Šimunic, A. (2018) ‘Cyber security challenges in digital economy’.  World Congress on Engineering, 4-6 July 2018 London, U.K.

Wei, J., Sanborn, S. & Slaughter, A. (2019) Digital Innovation Creating The Utility of the Future. Available from: https://www2.deloitte.com/us/en/insights/industry/power-and-utilities/digital-transformation-utility-of-the-future.html [Accessed 28 September 2022].

--- October 21, 2022 ---

The Great Debate: Mobility First Group Arguments

Thanks, Yohay for your contribution. I will provide the following points, some of which are redundant, but with further explanation that might strengthen our discussion.

Mobility creates the following challenges and limitations for the current internet architecture:

  • Maintaining a device identifier through different networks: A change of the location and/or internet service provider leads to a change in the IP. Hence, leads to service interruption. This is inconvenient to any user who needs a reliable and continuous connection to a certain service (Internet-Class, 2016).
  • Dual homing or maintaining connectivity to different networks at the same time is not possible with the current internet architecture. This may have the advantage of leveraging the connection speed to maintain connectivity and enhance file transfer speed (Internet-Class, 2016; Seskar et al., 2011).
  • Websites that are equally viewable on small and large-screen devices. Not all websites and web applications can be browsed with the same efficiency due to limitations in screen size or processing power (Internet-Class, 2016).

MobilityFirst Architecture features that overcome the aforementioned limitations and more (Seskar et al., 2011):

  • The separation between names, globally unique identifiers (GUID), and network addresses.
  • Massively scalable global name resolution service (GNRS) with the ability to update several million records/ second to accommodate large groups of mobile internet users and networks.
  • Also, it offers verifiable GUID using encryption methods.
  • A decentralized name certification service (NCS) that offers a verifiable can be trusted by end users.
  • Generalized storage aware routing (GTSR) to overcome wireless network bandwidth limitation and disconnections, and support data unit protocols like UDP that enable hop-to-hop file transfers of up to 1 GB compared to the TCP end-to-end protocol.
  • Content and context-aware services that are cryptographically verifiable to enhance content discovery.

References:

Internet-Class (2016) What internet architecture challenges does mobility cause? Available from: https://www.youtube.com/watch?v=RpGkabE0hT8 [Accessed 21 October 2022].

Seskar, I., Nagaraja, K., Nelson, S. & Raychaudhuri, D. (2011) MobilityFirst Future Internet Architecture Project.