Challenges in Database Security. Elisa Bertino CERIAS Purdue University

Size: px
Start display at page:

Download "Challenges in Database Security. Elisa Bertino CERIAS Purdue University"

Transcription

1 Challenges in Database Security Elisa Bertino CERIAS Purdue University

2 Why Today is Database Security more Challenging Data security concerns are evolving We have massive amounts of data Data is very valuable Internet has resulted in disintermediation of data access The democratization of ubiquitous computing has resulted in requirements to access data anywhere, anytime, anyhow New computing paradigms and applications, like grid-based computing and on-demand business, are emerging Security policies, and especially access control policies, are becoming more complex

3 Classical Security Concerns Confidentiality Data is only available to authorized subjects Integrity Data is only modified by authorized subjects Availability Data is available when needed

4 New Data Security Concerns Data quality and completeness Is the data complete and correct with respect to the external world? Is the data up-to-date? How do we make sure that users receive all information they are entitled to access? How does one show proof of compliance with respect to policies concerning data release to users?

5 New Data Security Concerns Data Provenance, Ownership and IPR From which information sources are the data in a database coming from? Have the data been modified while being copied from a database into another database? How does one enforce data ownership and protect IPR?

6 Large Data Volumes It is estimated that the amount of information in the world is doubling every 20 months, and the size and number of databases are increasing even faster [Rakesh Agrawal, VLDB Conf. 2002]

7 Large Data Volumes & Large Data Variety Multimedia data This makes content-based access control much more difficult GIS data GIS data are increasingly being used in a variety of governmental applications (see for example the INSPIRE initiative of EU) GIS data models are fairly complex

8 Much More Valuable Data Any e-activitity like e-business, e-government, e-learning, e-medicine relies not only on making relevant information accessible outside the enterprise, it also depends on making the best, most up-to-date information available to users when they need

9 Much More Valuable Data The value of data is not only monetary Data is particularly sensitive when referring to individuals Personal data privacy is becoming a main concern for citizens

10 Much More Valuable Data Improving the value of data available to legitimate users generally improves its value to intruders as well Highly valuable data increases the potential rewards to be gained from unauthorized access and the potential damage that can done if the data were corrupted

11 Data Access Disintermediation By disintermediation we mean that intermediate information processing steps, typically carried out by the corporate employees like typing an order received over the phone, are removed Users who are outside the traditional corporate boundary can have direct and immediate online access to business information which pertains them

12 Data Access Disintermediation In a traditional environment, any access to sensitive information is through employees Although employees are not always reliable, at least They are known Their access to sensitive data is limited by their function Employees violating access policies may be subject to disciplinary actions

13 Data Access Disintermediation When activities are moved to Internet, the environment drastically changes Companies may know little or nothing about the users (including, in many cases, employees) accessing their systems It is very difficult for companies to deter users from accessing information contrary to company policies

14 Ubiquitous Computing Data must be available to users in a number of different systems (PDA, cell phones) In a large number of applications, data are collected through sensors The limited processing of these devices makes very difficult to deploy security

15 Grid-Based Computing Grid-based systems are today attracting large commercial interests In a grid-based system, computing resources are dynamically combined to execute large computations issued by the grid users Grid-based systems may also be used to store massive databases

16 Grid-Based Computing Today grid-based systems are typically untrusted environments and only rudimentary security techniques are used Issues: How to protect computations from malicious grid hosts? How to protect grid hosts from malicious computations?

17 On-Demand Business An on-demand business is an enterprise whose business processes are integrated end-to-end across the company and key partners, suppliers and customers so it can respond with speed to any customer demand, market opportunity or external threat [Nelson Mattos, VLDB Conf. 2003]

18 On-Demand Business Information integration plays a crucial role in creating on-demand operating environments It enables integrated, real-time access to traditional and emerging data sources, transforms information to support data analysis, and manages data placement for performance, currency, and availability

19 On-Demand Business Even though the field of federated databases has been widely investigated, we still need to understand how to deploy a uniform privacy and security model across a multitude of systems

20 Complex Access Control Policies Flexible access control policies exceptions and explicit denials Wide range of protection object granularities Access control depending on: Temporal and contextual conditions History Subject properties

21 Database Security Challenges 1. Data quality and completeness - Metrics for data quality and completeness - Methodologies and techniques for evaluation and assurance of data quality and completeness 2. Privacy-preserving databases - How do we engineer hippocratic databases [Agrawal 2002] - How do we achieve both privacy and accountability?

22 Database Security Challenges 3. Sophisticated access control models and mechanisms - How do we extend access control models of DBMS so that they can directly support complex application-dependent access control policies? - Tools for access control administration

23 Database Security Challenges 4. Security for large scale dynamically federated databases - Models for multi-domain security - Rich and flexible security mediator languages - Support for evolution of access control policies 5. Security for multimedia databases - Security-relevant metadata schema - Content-based access control - Real-time access control for video data

24 Database Security Challenges 6. Security for GIS and spatial databases - Techniques for access control and integrity specifically tailored to spatial data and GIS 7. Data security in pervasive computing environments 8. Integration of DB access control systems with trust negotiation systems and identity management schemes

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America 1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:

More information

MIT Sloan School of Management

MIT Sloan School of Management MIT Sloan School of Management Working Paper 4259-02 October 2002 Directions for Web and E-Commerce Applications Security Bhavani Thuraisingham, Chris Clifton, Amar Gupta, Elisa Bertino, Elena Ferrari

More information

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government

More information

Overview of Information Security. Murat Kantarcioglu

Overview of Information Security. Murat Kantarcioglu UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Information Security Murat Kantarcioglu Pag. 1 Purdue University Outline Information Security: basic concepts Privacy: basic

More information

NSF Workshop on Big Data Security and Privacy

NSF Workshop on Big Data Security and Privacy NSF Workshop on Big Data Security and Privacy Report Summary Bhavani Thuraisingham The University of Texas at Dallas (UTD) February 19, 2015 Acknowledgement NSF SaTC Program for support Chris Clifton and

More information

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after

More information

Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing

Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing Igor Nai Fovino-Head of Research GCSEC The last two years will surely enter in the history of IT Security. 2010 was the year

More information

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 The Big Data Working Group (BDWG) will be identifying scalable techniques for data-centric security and privacy problems. BDWG s investigation

More information

Chapter 6: Fundamental Cloud Security

Chapter 6: Fundamental Cloud Security Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,

More information

Security and privacy for multimedia database management systems

Security and privacy for multimedia database management systems Multimed Tools Appl (2007) 33:13 29 DOI 10.1007/s11042-006-0096-1 Security and privacy for multimedia database management systems Bhavani Thuraisingham Published online: 1 March 2007 # Springer Science

More information

Saleem G. Zoughbi. UN Expert and IEEE Computer Society e-government STC

Saleem G. Zoughbi. UN Expert and IEEE Computer Society e-government STC Saleem G. Zoughbi UN Expert and IEEE Computer Society e-government STC The ICT-driven security indispensable to the security of individuals, properties, institutions, states and the entire world ICT AS

More information

Monitoring Database Management System (DBMS) Activity for Detecting Data Exfiltration by Insiders

Monitoring Database Management System (DBMS) Activity for Detecting Data Exfiltration by Insiders CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Monitoring Database Management System (DBMS) Activity for Detecting Data Exfiltration by Insiders Northrop Grumman Information Systems Donald Steiner,

More information

IoT Business Solutions

IoT Business Solutions IoT Business Solutions Re-thinking Re-shaping Business Good Reasons for Businesses and Organizations to look into M2M / IoT now Become more efficient Actions based on real data from the field Avoid cost

More information

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks. Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted

More information

ICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE

ICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE OVERVIEW Critial infrastructures are increasingly dependent on information and communication technology. ICT-systems are getting more and more complex, and to enable the implementation of secure applications

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Seminar: Security Metrics in Cloud Computing (20-00-0577-se)

Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions

More information

OIT Cloud Strategy 2011 Enabling Technology Solutions Efficiently, Effectively, and Elegantly

OIT Cloud Strategy 2011 Enabling Technology Solutions Efficiently, Effectively, and Elegantly OIT Cloud Strategy 2011 Enabling Technology Solutions Efficiently, Effectively, and Elegantly 10/24/2011 Office of Information Technology Table of Contents Executive Summary... 3 The Colorado Cloud...

More information

1. Introduction. 2. Background. 2.1. Cloud computing in a nutshell

1. Introduction. 2. Background. 2.1. Cloud computing in a nutshell Title: Towards new access control models for Cloud computing systems Category: 'In the Cloud' - Security Author name: Gouglidis Antonios City, Country: Thessaloniki, Greece Year of study, Course Title:

More information

Unlocking the Benefits of Cloud Computing For Emerging Economies

Unlocking the Benefits of Cloud Computing For Emerging Economies Unlocking the Benefits of Cloud Computing For Emerging Economies Peter Cowhey, Dean and Qualcomm Professor Michael Kleeman, Senior Fellow School of International Relations and Pacific Studies University

More information

Today s Best Practices: How smart business is protecting enterprise data integrity and employee privacy on popular mobile devices. Your Device Here.

Today s Best Practices: How smart business is protecting enterprise data integrity and employee privacy on popular mobile devices. Your Device Here. Securing Business Mobility Today s Best Practices: How smart business is protecting enterprise data integrity and employee privacy on popular mobile devices Your Device Here. Good supports hundreds of

More information

INTRODUCTORY NOTE TO THE G20 ANTI-CORRUPTION OPEN DATA PRINCIPLES

INTRODUCTORY NOTE TO THE G20 ANTI-CORRUPTION OPEN DATA PRINCIPLES INTRODUCTORY NOTE TO THE G20 ANTI-CORRUPTION OPEN DATA PRINCIPLES Open Data in the G20 In 2014, the G20 s Anti-corruption Working Group (ACWG) established open data as one of the issues that merit particular

More information

ECS 165A: Introduction to Database Systems

ECS 165A: Introduction to Database Systems ECS 165A: Introduction to Database Systems Todd J. Green based on material and slides by Michael Gertz and Bertram Ludäscher Winter 2011 Dept. of Computer Science UC Davis ECS-165A WQ 11 1 1. Introduction

More information

Planning in Transport and Logistics Future Internet Solutions for Improved Integration and Collaboration

Planning in Transport and Logistics Future Internet Solutions for Improved Integration and Collaboration Planning in Transport and Logistics Future Internet Solutions for Improved Integration and Collaboration Prof. Dr. Rod Franklin, P.E. Vice President, Product Development Kuehne + Nagel Management AG Adjunct

More information

Sta t te of ark ansas Video e Str ateg e y

Sta t te of ark ansas Video e Str ateg e y State of Ark ansas Video Str ategy Executive Summary The State of Arkansas is embarking on a major project to realize the video needs of tomorrow, today. Video is a powerful technology for learning. Anyone

More information

Just Net Coalition statement on Internet governance

Just Net Coalition statement on Internet governance Just Net Coalition statement on Internet governance (Just Net Coalition is a global coalition of civil society actors working on Internet governance issues) All states should work together to provide a

More information

Question 3: Is cloud based SDI an opportunity or a threat for European SMEs?

Question 3: Is cloud based SDI an opportunity or a threat for European SMEs? Question 3: Is cloud based SDI an opportunity or a threat for European SMEs? Workshop: Open Data for stimulation of SME businesses in Agriculture, Transport, Tourism and Environment Miguel Ángel Esbrí,

More information

Transform how government engages with customers through digital experiences

Transform how government engages with customers through digital experiences Transform how government engages with customers through digital experiences The digital landscape is constantly evolving, and these changes offer agencies new ways to deliver services more cost-effectively,

More information

Security and Privacy for Web Databases and Services

Security and Privacy for Web Databases and Services Security and Privacy for Web Databases and Services Elena Ferrari 1 and Bhavani Thuraisingham 2 1 Università dell Insubria, 22100 Como, Italy 2 The National Science Foundation, Arlington, VA, USA Abstract.

More information

How To Govern Data Governance At The Australian Primary Health Care Research Institute

How To Govern Data Governance At The Australian Primary Health Care Research Institute GRAPHC Data Governance Policy Document Control Document Title: Data Governance Policy Summary: This document defines the policies of GRAPHC regarding GRAPHC s data governance management system. Date of

More information

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Protecting your business value from

More information

Ingate Firewall/SIParator SIP Security for the Enterprise

Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...

More information

Web Access Management. RSA ClearTrust. Enhancing control. Widening access. Driving e-business growth. SSO. Identity Management.

Web Access Management. RSA ClearTrust. Enhancing control. Widening access. Driving e-business growth. SSO. Identity Management. RSA ClearTrust Web Access Management Enhancing control. Widening access. Driving e-business growth. Identity Management Authentication Centralized Security Policy SSO Access Management RSA ClearTrust Web

More information

COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY,

COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY, COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY, 28-29 JUNE 2011 The Seoul Declaration on the Future of the Internet Economy adopted at the 2008 OECD

More information

With DDN Big Data Storage

With DDN Big Data Storage DDN Solution Brief Accelerate > ISR With DDN Big Data Storage The Way to Capture and Analyze the Growing Amount of Data Created by New Technologies 2012 DataDirect Networks. All Rights Reserved. The Big

More information

Cloud Based E-Government: Benefits and Challenges

Cloud Based E-Government: Benefits and Challenges Cloud Based E-Government: Benefits and Challenges Saleh Alshomrani 1 and Shahzad Qamar 2 1 Faculty of Computing and IT, King Abdulaziz University, Jeddah, Saudi Arabia 2 Faculty of Computing and IT, North

More information

Reinventing the Network Infrastructure

Reinventing the Network Infrastructure Reinventing the Network Infrastructure To build a network infrastructure that can fully utilize resources in response to fluctuating demands, careful planning, development, design, and architecture will

More information

White paper. Four Best Practices for Secure Web Access

White paper. Four Best Practices for Secure Web Access White paper Four Best Practices for Secure Web Access What can be done to protect web access? The Web has created a wealth of new opportunities enabling organizations to reduce costs, increase efficiency

More information

Data Security Best Practices & Reasonable Methods

Data Security Best Practices & Reasonable Methods Data Security Best Practices & Reasonable Methods September 2013 Mike Tassey Technical Security Advisor Privacy Technical Assistance Center (PTAC) http://ptac.ed.gov/ E-mail: PrivacyTA@ed.gov Phone: 855-249-3072

More information

Fraud Detection for Next-Generation Networks

Fraud Detection for Next-Generation Networks Fraud Detection for Next-Generation Networks Name of company/ies submitting case study: University of Deusto Web links to company/ies submitting case studies: http://www.deusto.es http://www.fundacion-deusto.deusto.es/

More information

White Paper The Identity & Access Management (R)evolution

White Paper The Identity & Access Management (R)evolution White Paper The Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 A New Perspective on Identity & Access Management Executive Summary Identity & Access Management

More information

SOPHISTICATED COLLABORATION MADE SIMPLE. TELSTRA ivision AUDIO VISUAL ROOM SOLUTIONS

SOPHISTICATED COLLABORATION MADE SIMPLE. TELSTRA ivision AUDIO VISUAL ROOM SOLUTIONS TELSTRA ivision AUDIO VISUAL ROOM SOLUTIONS SOPHISTICATED COLLABORATION MADE SIMPLE Enhance your discussions and decision making with our range of fully managed audio visual and video conferencing solutions

More information

IBM InfoSphere Optim Test Data Management Solution

IBM InfoSphere Optim Test Data Management Solution IBM InfoSphere Optim Test Data Management Solution Highlights Create referentially intact, right-sized test databases Automate test result comparisons to identify hidden errors Easily refresh and maintain

More information

FIRST DATA CORPORATION SUMMARY: BINDING CORPORATE RULES FOR DATA PRIVACY AND PROTECTION

FIRST DATA CORPORATION SUMMARY: BINDING CORPORATE RULES FOR DATA PRIVACY AND PROTECTION FIRST DATA CORPORATION SUMMARY: BINDING CORPORATE RULES FOR DATA PRIVACY AND PROTECTION SUMMARY: BINDING CORPORATE RULES FOR DATA PRIVACY AND PROTECTION v 1.3 Supersedes: v 1.2 Summary Owner: Corporate

More information

E-Payment gateways. Opportunities & Threats. Saleem Zoughbi

E-Payment gateways. Opportunities & Threats. Saleem Zoughbi E-Payment gateways Opportunities & Threats Saleem Zoughbi 2/18 Lexicon! e-payment The action of submitting a value of money from one source to another electronically e-payment Gateway The framework (including

More information

The Benefits of ICT. June 2007 GP.C.PDF.07.E.1115.1

The Benefits of ICT. June 2007 GP.C.PDF.07.E.1115.1 The Benefits of ICT June 2007 GP.C.PDF.07.E.1115.1 The Benefits of ICT Help You Connect, Collaborate and Compete A strong ICT (information and communications technology) strategy is pivotal to competitive

More information

Provide access control with innovative solutions from IBM.

Provide access control with innovative solutions from IBM. Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business

More information

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue. Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues

More information

How To Write A Privacy Preserving Firewall Optimization Protocol

How To Write A Privacy Preserving Firewall Optimization Protocol Asia-pacific Journal of Multimedia Services Convergence with Art, Humanities and Sociology Vol.1, No.2 (2011), pp. 93-100 http://dx.doi.org/10.14257/ajmscahs.2011.12.06 Secure Multi-Party Computation in

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013 The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh May 20 th, 2013 Companies are leveraging mobile computing today Three major consumption models: 1. Improving productivity Improving employee

More information

Single Sign On: Are we there yet?

Single Sign On: Are we there yet? Single Sign On: Are we there yet? Work In Progress Annual Computer Security Applications Conference December 08,2004 Rafae Bhatti, Elisa Bertino, Arif Ghafoor Electrical and Computer Engineering, And CERIAS

More information

Privacy Policy. February, 2015 Page: 1

Privacy Policy. February, 2015 Page: 1 February, 2015 Page: 1 Revision History Revision # Date Author Sections Altered Approval/Date Rev 1.0 02/15/15 Ben Price New Document Rev 1.1 07/24/15 Ben Price Verify Privacy Grid Requirements are met

More information

and Deployment Roadmap for Satellite Ground Systems

and Deployment Roadmap for Satellite Ground Systems A Cloud-Based Reference Model and Deployment Roadmap for Satellite Ground Systems 2012 Ground System Architectures Workshop February 29, 2012 Dr. Craig A. Lee The Aerospace Corporation The Aerospace Corporation

More information

4Motion. End-to-end 4G Wireless Broadband

4Motion. End-to-end 4G Wireless Broadband 4Motion End-to-end 4G Wireless Broadband Meeting your 4G needs with freedom of choice 4Motion is Alvarion s end-to-end 4G wireless broadband solution, connecting people and businesses everywhere for a

More information

How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward?

How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward? SOLUTION BRIEF Content Aware Identity and Access Management May 2010 How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward? we can CA Content

More information

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems Proactively address regulatory compliance requirements and protect sensitive data in real time Highlights Monitor and audit data activity

More information

CLOUD MIGRATION STRATEGIES

CLOUD MIGRATION STRATEGIES CLOUD MIGRATION STRATEGIES Faculty Contributor: Dr. Rahul De Student Contributors: Mayur Agrawal, Sudheender S Abstract This article identifies the common challenges that typical IT managers face while

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK BIG DATA HOLDS BIG PROMISE FOR SECURITY NEHA S. PAWAR, PROF. S. P. AKARTE Computer

More information

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically

More information

Security Practices for Online Collaboration and Social Media

Security Practices for Online Collaboration and Social Media Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.

More information

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and

More information

Personalization of Digital Information Services

Personalization of Digital Information Services Personalization of Digital Information Services Yaşar Tonta Hacettepe University Department of Information Management Ankara, Turkey tonta@hacettepe.edu.tr yunus.hacettepe.edu.tr/~tonta/tonta.html.t. Outline

More information

SECURITY THREATS TO CLOUD COMPUTING

SECURITY THREATS TO CLOUD COMPUTING IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD

More information

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across

More information

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across

More information

Unlocking IoT data value

Unlocking IoT data value World s first search engine for the public Internet of Things thingful.net Unlocking IoT data value Smart Systems Summit, London 2nd October 2014 www.hvm-uk.com Data and its value Growth in the emerging

More information

Application Visibility and Monitoring >

Application Visibility and Monitoring > White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information

More information

Deploying an Information Sharing Solution that Promotes Cross-Enterprise Collaboration without Compromise

Deploying an Information Sharing Solution that Promotes Cross-Enterprise Collaboration without Compromise Deploying an Information Sharing Solution that Promotes Cross-Enterprise Collaboration without Compromise October 2010 V I J A Y T A K A N T I V I C E P R E S I D E N T, S E C U R I T Y & C O L L A B O

More information

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 All contents are Copyright 1992 2012 Cisco Systems, Inc. All rights reserved. This document

More information

Brainloop Cloud Security

Brainloop Cloud Security Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating

More information

Rocket CorVu NG. Rocket. Independence from Engineering. Powerful Data Visualization for Critical Decision-Making. brochure

Rocket CorVu NG. Rocket. Independence from Engineering. Powerful Data Visualization for Critical Decision-Making. brochure Rocket CorVu NG Powerful Data Visualization for Critical Decision-Making With Rocket CorVu NG, Business Intelligence (BI) technical users create applications that unlock the power of data to arm users

More information

The Guardian Digital Control and Policy Enforcement Center

The Guardian Digital Control and Policy Enforcement Center Protects Against The Guardian Digital Control and Policy Enforcement Center P R O T E C T S A G A I N S T : Viruses Unsolicited Junk Email Malicious Code Internet Fraud & Phishing Hazardous File Attachments

More information

Privacy and security in the cloud

Privacy and security in the cloud Privacy and security in the cloud Challenges and solutions for our future information society Panel Building trust the technical challenges World Summit on the Information Society Forum 25-29 May 2015

More information

FSIS DIRECTIVE 1306.3

FSIS DIRECTIVE 1306.3 UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS

More information

Big Data, Cloud Computing, Spatial Databases Steven Hagan Vice President Server Technologies

Big Data, Cloud Computing, Spatial Databases Steven Hagan Vice President Server Technologies Big Data, Cloud Computing, Spatial Databases Steven Hagan Vice President Server Technologies Big Data: Global Digital Data Growth Growing leaps and bounds by 40+% Year over Year! 2009 =.8 Zetabytes =.08

More information

A SECURE ONLINE MEDICAL INFORMATION SYSTEM IN DISTRIBUTED AND HETEROGENEOUS COMPUTING ENVIRONMENT

A SECURE ONLINE MEDICAL INFORMATION SYSTEM IN DISTRIBUTED AND HETEROGENEOUS COMPUTING ENVIRONMENT ++ I&S A SECURE ONLINE MEDICAL INFORMATION SYSTEM IN DISTRIBUTED AND HETEROGENEOUS COMPUTING ENVIRONMENT Muhammad Nabeel TAHIR Abstract: The objective of this article is to analyze the importance and the

More information

Cyber Security and Privacy - Program 183

Cyber Security and Privacy - Program 183 Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology

More information

data driven government

data driven government Position paper data driven government preparing for the age of the citizen Insights for tomorrow s world Governments are awash with information, and they face a deluge of data as far into the future as

More information

Secure Thinking Bigger Data. Bigger risk?

Secure Thinking Bigger Data. Bigger risk? Secure Thinking Bigger Data. Bigger risk? MALWARE HACKERS REPUTATION PROTECTION RISK THEFT There has always been data. What is different now is the scale and speed of data growth. Every day we create 2.5

More information

CISCO WIRELESS CONTROL SYSTEM (WCS)

CISCO WIRELESS CONTROL SYSTEM (WCS) CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform

More information

Report on the Dagstuhl Seminar Data Quality on the Web

Report on the Dagstuhl Seminar Data Quality on the Web Report on the Dagstuhl Seminar Data Quality on the Web Michael Gertz M. Tamer Özsu Gunter Saake Kai-Uwe Sattler U of California at Davis, U.S.A. U of Waterloo, Canada U of Magdeburg, Germany TU Ilmenau,

More information

Service Oriented Networks Security. David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008

Service Oriented Networks Security. David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008 Service Oriented Networks Security David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008 While empowering new business models, SON leads to a proliferation of application networks

More information

Cisco Security IntelliShield Alert Manager Service

Cisco Security IntelliShield Alert Manager Service Data Sheet Cisco Security IntelliShield Alert Manager Service The Cisco Security IntelliShield Alert Manager Service provides a comprehensive, cost-effective solution for delivering the security intelligence

More information

Network Services in the SDN Data Center

Network Services in the SDN Data Center Network Services in the SDN Center SDN as a Network Service Enablement Platform Whitepaper SHARE THIS WHITEPAPER Executive Summary While interest about OpenFlow and SDN has increased throughout the tech

More information

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

More information

Chicago State University Computer Usage Policy

Chicago State University Computer Usage Policy Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services

More information

Security standards for the semantic web B

Security standards for the semantic web B Computer Standards & Interfaces 27 (2005) 257 268 www.elsevier.com/locate/csi Security standards for the semantic web B Bhavani Thuraisingham*,1 Data and Applications Security, The National Science Foundation,

More information

Big Data - Security and Privacy

Big Data - Security and Privacy Big Data - Security and Privacy Elisa Bertino CS Department, Cyber Center, and CERIAS Purdue University Cyber Center! Big Data EveryWhere! Lots of data is being collected, warehoused, and mined Web data,

More information

Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure

Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure The LTE backhaul challenge Communication Service Providers (CSPs) are adopting LTE in rapid succession.

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

Executive s Guide to Cloud Access Security Brokers

Executive s Guide to Cloud Access Security Brokers Executive s Guide to Cloud Access Security Brokers Contents Executive s Guide to Cloud Access Security Brokers Contributor: Amy Newman 2 2 Why You Need a Cloud Access Security Broker 5 You Can t Achieve

More information

Cloud Computing, Grids, and the coming IT Cambrian Explosion

Cloud Computing, Grids, and the coming IT Cambrian Explosion Cloud Computing, Grids, and the coming IT Cambrian Explosion Irving Wladawsky-Berger Chairman Emeritus, IBM Academy of Technology Visiting Professor, Engineering Systems, MIT Adjunct Professor, Tanaka

More information

Unified Charging and Billing Solution. Unified Next Generation of Charging Systems in Mobile Networks

Unified Charging and Billing Solution. Unified Next Generation of Charging Systems in Mobile Networks Unified Charging and Solution. Unified Next Generation of Charging Systems in Mobile Networks Daniel Donhefner Nokia Siemens Networks Business Support Systems Research and Development 1 Motivation and

More information

Mobile Commerce and Ubiquitous Computing. Chapter 6

Mobile Commerce and Ubiquitous Computing. Chapter 6 Mobile Commerce and Ubiquitous Computing Chapter 6 Learning Objectives 1. Discuss the value-added attributes, benefits, and fundamental drivers of m-commerce. 2. Describe the mobile computing infrastructure

More information

E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY

E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY Oana Dolea 7 th Annual Leg@l.IT Conference March 26th, 2013 Montreal, Canada INTRODUCTION Mobile e-commerce vs. E-commerce Mobile e-commerce:

More information

BUSINESS INTELLIGENCE. Keywords: business intelligence, architecture, concepts, dashboards, ETL, data mining

BUSINESS INTELLIGENCE. Keywords: business intelligence, architecture, concepts, dashboards, ETL, data mining BUSINESS INTELLIGENCE Bogdan Mohor Dumitrita 1 Abstract A Business Intelligence (BI)-driven approach can be very effective in implementing business transformation programs within an enterprise framework.

More information

Privacy Engineering Objectives and Risk Model - Discussion Deck. Objective-Based Design for Improving Privacy in Information Systems

Privacy Engineering Objectives and Risk Model - Discussion Deck. Objective-Based Design for Improving Privacy in Information Systems Privacy Engineering Objectives and Risk Model - Discussion Deck Objective-Based Design for Improving Privacy in Information Systems Purpose and Scope This discussion deck describes initial draft components

More information

IBM InfoSphere Optim Test Data Management

IBM InfoSphere Optim Test Data Management IBM InfoSphere Optim Test Data Management Highlights Create referentially intact, right-sized test databases or data warehouses Automate test result comparisons to identify hidden errors and correct defects

More information

Collaboration solutions for midsized businesses Buyer s guide

Collaboration solutions for midsized businesses Buyer s guide Collaboration solutions for midsized businesses Buyer s guide Increase productivity by improving collaboration across and beyond your business. Give employees access to the information, people and resources

More information