Cybersecurity

IT systems must build trust the same way people do

Cybersecurity threats linger over Denmark like a dark cloud. Working in this environment is cybersecurity researcher Christian Damsgaard Jensen, who is seeking to reduce the threat level. He builds secure IT systems using the same principles as people when they build trust in each other.

Most of Associate Professor Christian Damsgaard Jensen’s working life has been spent making illegal intrusions by hackers difficult to begin with. Photo: Thomas Steen Sorensen
Associate Professor Christian Damsgaard Jensen has spent most of his working life making illegal intrusions by hackers difficult to begin with. Photo: Thomas Steen Sorensen
As a student assistant at the University of Copenhagen in 1990, Christian D. Jensen witnessed firsthand one of the very first hacker attacks in Danish history. Photo: Thomas Steen Sørensen
As a student assistant at the University of Copenhagen in 1990, Christian D. Jensen witnessed firsthand one of the very first hacker attacks in Danish history. Photo: Thomas Steen Sørensen

An encounter with a hacker

His ability to understand the mindset of hackers and get to grips with alternative IT solutions can be traced back to 1990 when Christian Damsgaard Jensen was a student assistant at the University of Copenhagen (UCPH) and witnessed firsthand one of the first ever hacker attacks in Danish history.

At the time, the internet was the preserve of academic environments where everyone blindly trusted everyone else, and most people’s insight into the drawbacks of the internet was decidedly limited.

For Christian Damsgaard Jensen, this changed abruptly when a hacker in Roskilde gained access to the network at UCPH. At the time, he was working in UCPH’s computer department in the Department of Computer Science. Yet, while most other places that the hacker gained access to shut down as soon as they discovered their intruder, the computer department spotted an opportunity to be a fly on the wall in cyberspace.

“By agreement with the police, we stayed online and monitored everything that he did. Back then, hacking occurred at a pace that allowed us all to keep up, so each time he logged on we would receive an alert. We’d dash into the engine room and peer over his shoulder as we tracked his every move. It was incredibly exciting,” remembers Christian Damsgaard Jensen.

This surveillance work continued over a period of several months as the computer department at UCPH supplied the police with logs showing the hacker’s actions. Eventually, there was sufficient evidence to arrest the individual, who was later convicted for his illegal intrusion into the system. However, while the case was serious, there was no indication that the hacker had acted with malevolent intent.

“That’s what hackers were like back in the day. They were just curious—there wasn’t any great wealth to come by,” says Christian Damsgaard Jensen, before adding:

“It’s rather different these days, now that business has become such a major part of digital life, and globalization has radically changed the threats we face.”

Everyone must be seen as a potential threat

According to Christian Damsgaard Jensen, globalization is the main reason why security systems struggle to keep up. The need for digital interaction across national borders is increasing by the day, and this is also increasing hackers’ opportunities to find loopholes in existing security systems.

Christian Damsgaard Jensen notes that these systems have an out-of-date perspective on security.

“Historically, humankind has tended to build walls around whatever we wanted to protect. We did this in the Middle Ages when we built walls around our cities, and we’ve been doing it for the last 30 years online with firewalls. Just as in the Middle Ages when a guard was posted to admit or refuse people at the gate, so the firewall critically filters all traffic that approaches it,” explains Christian Damsgaard Jensen.

The problem is that the physical borders have been shifted by globalization, and these systems don’t take into account that potential hackers may also be inside the walls. This has seen the concept of zero-trust - which Christian Damsgaard Jensen’s years of research are based on - begin to really make its breakthrough.

“Zero-trust means that the system sees everyone as a potentially suspicious user who must be validated. This means that while we previously had blind trust in those who were inside the same firewall as us, we now look at every single individual as a potential threat. Everyone you interact with has to prove themselves to one extent or another,” he says.

This mindset already permeates the mechanisms found in the IT solutions that Christian Damsgaard Jensen has helped to develop on behalf of both companies and municipalities.

He believes that the paradigm shift in IT security is a significant step on the way to making cyberspace more secure. However, if the threat level is to be seriously reduced, this will require a change in the mindset of many different entities, not to mention action.

“In ten years’ time, I hope the police are equipped to get a better handle on cybercrime. What’s more, we will be in a much better place if manufacturers of IT products have to live up to certain security requirements as it would allow businesses to rest assured that the products are safe to use. The most important thing of all is that the work is actually done to solve this problem - everyone has to get involved,” says Christian Damsgaard Jensen.

Topic

Denmark is at the forefront when it comes to the use of technology and digital solutions. This brings about great opportunities – but also makes Denmark an obvious target for IT crime. Consequently, there is a great need for research and training in cyber security to ensure that technology continues to create value for people.

Read more in DTU's cyber security topic.

Contact

Christian Damsgaard Jensen

Christian Damsgaard Jensen Associate Professor Department of Applied Mathematics and Computer Science Mobile: +45 24649628