Comparative Analysis: |
Competitors may have an application stack with thousands of application programs - any one of them could be attacked by a criminal. Eliza is the only program that a criminal can attack - no other application program exists. |
Competitors have to do penetration tests for thousands of programs - any program may have a vulnerability. Only Eliza needs to be tested and Eliza has only five points where a criminal can attack as:- |
(1) URL: the address bar is the primary attack vector that is a fully encrypted string of digits. |
(2) Handle: SQL injection and similar attacks have been eliminated. |
(3) Email: SQL injection attacks have been eliminated. |
(4) Pass Phrase: SQL injection attacks have been eliminated. |
(5) Mode: the drop down list values are predefined. |
Benefits:. |
External penetration tests are needed on these five attack vectors - nothing else exists to be attacked. Competitors need to spend a thousand pounds a day for many weeks because every application program needs to be individually tested. Eliza is the only thing that can be tested - Eliza is the only thing that a criminal can attack. |
Internal Penetration Tests: |
The application service is provided as web pages containing reusable controls as:- |
(1) Text: data entry is sanitised to eliminate SQL injection and other attacks. |
(1b) Area: is just a multi-line text control with identical sanitation. |
(2) List: drop down list of permitted values that are encoded (as digits) to eliminate attacks. |
(2b) Date: is just a multi-list control with identical sanitation. |
No matter what data is entered, Eliza will validate it according to expected values. Eliza will accept a value and reply "saved" or will reject the value and reply "no change". Only Eliza can change a field value in the database and every such change is subject to dual-interlocking audit trails. |
Benefits:. |
Internal penetration tests are needed on a reusable text control and list control. Eliza testing can be completed in a few hours with little point in testing thousands of forms that only contain the same two controls. Competitors need to spend a thousand pounds a day for many weeks because every application program needs to be individually tested. |
New User Procedure: |
It is a business requirement for an authorized person to approve the creation of a new user. This is a high risk procedure that must be professionally managed to eliminate fraud and ensure no leak of critical information. Specifically; sign-in details must not be communicated using email or any public communication method. |
(1) An Approved Manager must sign-in and access the support dashboard to click the "new user" button - the new user form is shown. |
(2) The Approved Manager must enter all relevant new user details, and when correct, will be shown a one-time pass-phrase. |
(3) The one-time pass-phrase is valid for one hour and may be communicated to the new user by email, telephone, print or any other means. |
(4) The new user is directed to use the normal sign-in page with their assigned handle, email and one-time pass-phrase. |
(5) When the new user signs in (using encrypted communications) a first-time welcome page pops up to show their permanent pass-phrase that is never shown to any other person. |
Benefits:. |
The one-time pass-phrase may be communicated using any means because it expires within the hour. |
Where a person does not yet have an email service, they can be given a one-time pass-phrase by their manager so they can sign-in without delay. |
A new user is shown their permanent pass-phrase by the first-time welcome page using encrypted communications - nobody else can see this permanent pass-phrase. |
Warning: no two people can have the same handle and email address - it is not permitted to add a new user as a person who is already known to the application service. |
Forgotten Pass-Phrase Procedure: |
It is a business requirement for an authorized person to request to be reminded of their permanent pass-phrase. This is a high risk procedure that must be professionally managed to eliminate fraud and ensure no leak of critical information. Specifically; pass-phrase details must not be communicated using email or any public communication method. |
(1) The persons approved manager must sign-in and access the support dashboard to click the "forgotten sign-in" button - the forgotten form is shown. |
(2) The person approved manager must select the person who has forgotten their sign-in details - a one-time pass-phrase is shown. |
(3) The one-time pass-phrase is valid for one hour and may be communicated to the person by email, telephone, print or any other means. |
(4) The person is directed to use the normal sign-in page with their assigned handle, email and one-time pass-phrase. |
(5) When the person signs in (using encrypted communications) a first-time welcome page pops up to show their permanent pass-phrase that is never shown to any other person. |
Benefits:. |
The one-time pass-phrase may be communicated using any means because it expires within the hour. |
When a person forgets their pass-phrase they must request their Manager to give them a one-time pass-phrase. |
A person is shown their permanent pass-phrase by the first-time welcome page using encrypted communications - nobody else can see this permanent pass-phrase. |
Data Hierarchy: |
1. Eliza is about a knowledge base mathematically processing numbers that represent business data. Privacy-by-design means is may not be practical to reverse engineer the inner mathematics of Eliza. |
2. Business data is stored in three states as: |
(1) Displayed business data is a set of fields showing permitted values that only disclosed to an approved person using an authorised device in a known place. |
(2) Internal data is arrays of field fragments represnted by numbers. One or more numbers will represent a permitted field value. Eliza processing never needs to know the permitted display values for these numbers. Business knowledge has evolved to process numbers using the Eliza mathematical notation. Each field is encrypted using many layers of different encryption methods that are dependent on the context of how and where the data is processed. Monitoring memory dumps will not disclose passwords or encryption keys. |
(3) Stored data are fragments of encrypted field values that are scrambled and hidden as offsets inside images and photographs. Images are stored in encrypted folders that are hidden in encrypted partitions in a large number of distributed data centers. Encryption methods have multiple possible decryption solutions that are sprinkled with fake data. |
3. Privacy-by-Design has been demonstrably deployed by: |
(1) Replacing application programs with Eliza as an artificial Intelligent Assistant that cannot be hacked. |
(2) Reducing the criminal attack surface to a single authentication sign-in page. |
(3) Not permitting any application program (or malware) to run on any secure server. |
(4) Encrypting all business data, no matter of its classification or significance. |
(5) Encrypting all encrypted data with multiple layers of encryption so if one layer is cracked the other layers still protect the data. This may not be legal in the USA. |
(6) Processing and gathering business knowledge about tokens and fields that are represented by meaningless numbers. |
(7) Storing encrypted data in secret images that are hidden in a massive library of images, rather than a database that can be hacked. It is expected that the image library will be copied by agencies. |
(8) Continual monitoring 24*7 to detect and instantly stop criminal behaviour. |
(9) URL encryption to deploy one-time transactions that cannot be replayed by criminals who have recorded what an approved person did. |
(10) Ten-factor authentication so a criminal cannot reuse the pass-phrase used by an approved person. |
4. Protection-by-Design: |
(1) Encrypt all business data so readable data cannot be stolen. A reportable data breach is not possible. |
(2) Relicate all encrypted data so data cannot be lost. Encrypted data can be recreated from many different places. |
(3) Authenticate and monitor approved people so criminal behaviour is instantly stopped. |