Challenges in Database Security. Elisa Bertino CERIAS Purdue University
|
|
- Nathan Austin
- 8 years ago
- Views:
Transcription
1 Challenges in Database Security Elisa Bertino CERIAS Purdue University
2 Why Today is Database Security more Challenging Data security concerns are evolving We have massive amounts of data Data is very valuable Internet has resulted in disintermediation of data access The democratization of ubiquitous computing has resulted in requirements to access data anywhere, anytime, anyhow New computing paradigms and applications, like grid-based computing and on-demand business, are emerging Security policies, and especially access control policies, are becoming more complex
3 Classical Security Concerns Confidentiality Data is only available to authorized subjects Integrity Data is only modified by authorized subjects Availability Data is available when needed
4 New Data Security Concerns Data quality and completeness Is the data complete and correct with respect to the external world? Is the data up-to-date? How do we make sure that users receive all information they are entitled to access? How does one show proof of compliance with respect to policies concerning data release to users?
5 New Data Security Concerns Data Provenance, Ownership and IPR From which information sources are the data in a database coming from? Have the data been modified while being copied from a database into another database? How does one enforce data ownership and protect IPR?
6 Large Data Volumes It is estimated that the amount of information in the world is doubling every 20 months, and the size and number of databases are increasing even faster [Rakesh Agrawal, VLDB Conf. 2002]
7 Large Data Volumes & Large Data Variety Multimedia data This makes content-based access control much more difficult GIS data GIS data are increasingly being used in a variety of governmental applications (see for example the INSPIRE initiative of EU) GIS data models are fairly complex
8 Much More Valuable Data Any e-activitity like e-business, e-government, e-learning, e-medicine relies not only on making relevant information accessible outside the enterprise, it also depends on making the best, most up-to-date information available to users when they need
9 Much More Valuable Data The value of data is not only monetary Data is particularly sensitive when referring to individuals Personal data privacy is becoming a main concern for citizens
10 Much More Valuable Data Improving the value of data available to legitimate users generally improves its value to intruders as well Highly valuable data increases the potential rewards to be gained from unauthorized access and the potential damage that can done if the data were corrupted
11 Data Access Disintermediation By disintermediation we mean that intermediate information processing steps, typically carried out by the corporate employees like typing an order received over the phone, are removed Users who are outside the traditional corporate boundary can have direct and immediate online access to business information which pertains them
12 Data Access Disintermediation In a traditional environment, any access to sensitive information is through employees Although employees are not always reliable, at least They are known Their access to sensitive data is limited by their function Employees violating access policies may be subject to disciplinary actions
13 Data Access Disintermediation When activities are moved to Internet, the environment drastically changes Companies may know little or nothing about the users (including, in many cases, employees) accessing their systems It is very difficult for companies to deter users from accessing information contrary to company policies
14 Ubiquitous Computing Data must be available to users in a number of different systems (PDA, cell phones) In a large number of applications, data are collected through sensors The limited processing of these devices makes very difficult to deploy security
15 Grid-Based Computing Grid-based systems are today attracting large commercial interests In a grid-based system, computing resources are dynamically combined to execute large computations issued by the grid users Grid-based systems may also be used to store massive databases
16 Grid-Based Computing Today grid-based systems are typically untrusted environments and only rudimentary security techniques are used Issues: How to protect computations from malicious grid hosts? How to protect grid hosts from malicious computations?
17 On-Demand Business An on-demand business is an enterprise whose business processes are integrated end-to-end across the company and key partners, suppliers and customers so it can respond with speed to any customer demand, market opportunity or external threat [Nelson Mattos, VLDB Conf. 2003]
18 On-Demand Business Information integration plays a crucial role in creating on-demand operating environments It enables integrated, real-time access to traditional and emerging data sources, transforms information to support data analysis, and manages data placement for performance, currency, and availability
19 On-Demand Business Even though the field of federated databases has been widely investigated, we still need to understand how to deploy a uniform privacy and security model across a multitude of systems
20 Complex Access Control Policies Flexible access control policies exceptions and explicit denials Wide range of protection object granularities Access control depending on: Temporal and contextual conditions History Subject properties
21 Database Security Challenges 1. Data quality and completeness - Metrics for data quality and completeness - Methodologies and techniques for evaluation and assurance of data quality and completeness 2. Privacy-preserving databases - How do we engineer hippocratic databases [Agrawal 2002] - How do we achieve both privacy and accountability?
22 Database Security Challenges 3. Sophisticated access control models and mechanisms - How do we extend access control models of DBMS so that they can directly support complex application-dependent access control policies? - Tools for access control administration
23 Database Security Challenges 4. Security for large scale dynamically federated databases - Models for multi-domain security - Rich and flexible security mediator languages - Support for evolution of access control policies 5. Security for multimedia databases - Security-relevant metadata schema - Content-based access control - Real-time access control for video data
24 Database Security Challenges 6. Security for GIS and spatial databases - Techniques for access control and integrity specifically tailored to spatial data and GIS 7. Data security in pervasive computing environments 8. Integration of DB access control systems with trust negotiation systems and identity management schemes
Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America
1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:
More informationMIT Sloan School of Management
MIT Sloan School of Management Working Paper 4259-02 October 2002 Directions for Web and E-Commerce Applications Security Bhavani Thuraisingham, Chris Clifton, Amar Gupta, Elisa Bertino, Elena Ferrari
More informationLeveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
More informationOverview of Information Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Information Security Murat Kantarcioglu Pag. 1 Purdue University Outline Information Security: basic concepts Privacy: basic
More informationNSF Workshop on Big Data Security and Privacy
NSF Workshop on Big Data Security and Privacy Report Summary Bhavani Thuraisingham The University of Texas at Dallas (UTD) February 19, 2015 Acknowledgement NSF SaTC Program for support Chris Clifton and
More informationProtecting Official Records as Evidence in the Cloud Environment. Anne Thurston
Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after
More informationEvolution of Cyber Security and Cyber Threats with focus on Cloud Computing
Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing Igor Nai Fovino-Head of Research GCSEC The last two years will surely enter in the history of IT Security. 2010 was the year
More informationArnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 The Big Data Working Group (BDWG) will be identifying scalable techniques for data-centric security and privacy problems. BDWG s investigation
More informationChapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
More informationSecurity and privacy for multimedia database management systems
Multimed Tools Appl (2007) 33:13 29 DOI 10.1007/s11042-006-0096-1 Security and privacy for multimedia database management systems Bhavani Thuraisingham Published online: 1 March 2007 # Springer Science
More informationSaleem G. Zoughbi. UN Expert and IEEE Computer Society e-government STC
Saleem G. Zoughbi UN Expert and IEEE Computer Society e-government STC The ICT-driven security indispensable to the security of individuals, properties, institutions, states and the entire world ICT AS
More informationMonitoring Database Management System (DBMS) Activity for Detecting Data Exfiltration by Insiders
CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Monitoring Database Management System (DBMS) Activity for Detecting Data Exfiltration by Insiders Northrop Grumman Information Systems Donald Steiner,
More informationIoT Business Solutions
IoT Business Solutions Re-thinking Re-shaping Business Good Reasons for Businesses and Organizations to look into M2M / IoT now Become more efficient Actions based on real data from the field Avoid cost
More informationDeploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
More informationICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE
OVERVIEW Critial infrastructures are increasingly dependent on information and communication technology. ICT-systems are getting more and more complex, and to enable the implementation of secure applications
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationSeminar: Security Metrics in Cloud Computing (20-00-0577-se)
Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions
More informationOIT Cloud Strategy 2011 Enabling Technology Solutions Efficiently, Effectively, and Elegantly
OIT Cloud Strategy 2011 Enabling Technology Solutions Efficiently, Effectively, and Elegantly 10/24/2011 Office of Information Technology Table of Contents Executive Summary... 3 The Colorado Cloud...
More information1. Introduction. 2. Background. 2.1. Cloud computing in a nutshell
Title: Towards new access control models for Cloud computing systems Category: 'In the Cloud' - Security Author name: Gouglidis Antonios City, Country: Thessaloniki, Greece Year of study, Course Title:
More informationUnlocking the Benefits of Cloud Computing For Emerging Economies
Unlocking the Benefits of Cloud Computing For Emerging Economies Peter Cowhey, Dean and Qualcomm Professor Michael Kleeman, Senior Fellow School of International Relations and Pacific Studies University
More informationToday s Best Practices: How smart business is protecting enterprise data integrity and employee privacy on popular mobile devices. Your Device Here.
Securing Business Mobility Today s Best Practices: How smart business is protecting enterprise data integrity and employee privacy on popular mobile devices Your Device Here. Good supports hundreds of
More informationINTRODUCTORY NOTE TO THE G20 ANTI-CORRUPTION OPEN DATA PRINCIPLES
INTRODUCTORY NOTE TO THE G20 ANTI-CORRUPTION OPEN DATA PRINCIPLES Open Data in the G20 In 2014, the G20 s Anti-corruption Working Group (ACWG) established open data as one of the issues that merit particular
More informationECS 165A: Introduction to Database Systems
ECS 165A: Introduction to Database Systems Todd J. Green based on material and slides by Michael Gertz and Bertram Ludäscher Winter 2011 Dept. of Computer Science UC Davis ECS-165A WQ 11 1 1. Introduction
More informationPlanning in Transport and Logistics Future Internet Solutions for Improved Integration and Collaboration
Planning in Transport and Logistics Future Internet Solutions for Improved Integration and Collaboration Prof. Dr. Rod Franklin, P.E. Vice President, Product Development Kuehne + Nagel Management AG Adjunct
More informationSta t te of ark ansas Video e Str ateg e y
State of Ark ansas Video Str ategy Executive Summary The State of Arkansas is embarking on a major project to realize the video needs of tomorrow, today. Video is a powerful technology for learning. Anyone
More informationJust Net Coalition statement on Internet governance
Just Net Coalition statement on Internet governance (Just Net Coalition is a global coalition of civil society actors working on Internet governance issues) All states should work together to provide a
More informationQuestion 3: Is cloud based SDI an opportunity or a threat for European SMEs?
Question 3: Is cloud based SDI an opportunity or a threat for European SMEs? Workshop: Open Data for stimulation of SME businesses in Agriculture, Transport, Tourism and Environment Miguel Ángel Esbrí,
More informationTransform how government engages with customers through digital experiences
Transform how government engages with customers through digital experiences The digital landscape is constantly evolving, and these changes offer agencies new ways to deliver services more cost-effectively,
More informationSecurity and Privacy for Web Databases and Services
Security and Privacy for Web Databases and Services Elena Ferrari 1 and Bhavani Thuraisingham 2 1 Università dell Insubria, 22100 Como, Italy 2 The National Science Foundation, Arlington, VA, USA Abstract.
More informationHow To Govern Data Governance At The Australian Primary Health Care Research Institute
GRAPHC Data Governance Policy Document Control Document Title: Data Governance Policy Summary: This document defines the policies of GRAPHC regarding GRAPHC s data governance management system. Date of
More informationIBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Protecting your business value from
More informationIngate Firewall/SIParator SIP Security for the Enterprise
Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...
More informationWeb Access Management. RSA ClearTrust. Enhancing control. Widening access. Driving e-business growth. SSO. Identity Management.
RSA ClearTrust Web Access Management Enhancing control. Widening access. Driving e-business growth. Identity Management Authentication Centralized Security Policy SSO Access Management RSA ClearTrust Web
More informationCOMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY,
COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY, 28-29 JUNE 2011 The Seoul Declaration on the Future of the Internet Economy adopted at the 2008 OECD
More informationWith DDN Big Data Storage
DDN Solution Brief Accelerate > ISR With DDN Big Data Storage The Way to Capture and Analyze the Growing Amount of Data Created by New Technologies 2012 DataDirect Networks. All Rights Reserved. The Big
More informationCloud Based E-Government: Benefits and Challenges
Cloud Based E-Government: Benefits and Challenges Saleh Alshomrani 1 and Shahzad Qamar 2 1 Faculty of Computing and IT, King Abdulaziz University, Jeddah, Saudi Arabia 2 Faculty of Computing and IT, North
More informationReinventing the Network Infrastructure
Reinventing the Network Infrastructure To build a network infrastructure that can fully utilize resources in response to fluctuating demands, careful planning, development, design, and architecture will
More informationWhite paper. Four Best Practices for Secure Web Access
White paper Four Best Practices for Secure Web Access What can be done to protect web access? The Web has created a wealth of new opportunities enabling organizations to reduce costs, increase efficiency
More informationData Security Best Practices & Reasonable Methods
Data Security Best Practices & Reasonable Methods September 2013 Mike Tassey Technical Security Advisor Privacy Technical Assistance Center (PTAC) http://ptac.ed.gov/ E-mail: PrivacyTA@ed.gov Phone: 855-249-3072
More informationFraud Detection for Next-Generation Networks
Fraud Detection for Next-Generation Networks Name of company/ies submitting case study: University of Deusto Web links to company/ies submitting case studies: http://www.deusto.es http://www.fundacion-deusto.deusto.es/
More informationWhite Paper The Identity & Access Management (R)evolution
White Paper The Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 A New Perspective on Identity & Access Management Executive Summary Identity & Access Management
More informationSOPHISTICATED COLLABORATION MADE SIMPLE. TELSTRA ivision AUDIO VISUAL ROOM SOLUTIONS
TELSTRA ivision AUDIO VISUAL ROOM SOLUTIONS SOPHISTICATED COLLABORATION MADE SIMPLE Enhance your discussions and decision making with our range of fully managed audio visual and video conferencing solutions
More informationIBM InfoSphere Optim Test Data Management Solution
IBM InfoSphere Optim Test Data Management Solution Highlights Create referentially intact, right-sized test databases Automate test result comparisons to identify hidden errors Easily refresh and maintain
More informationFIRST DATA CORPORATION SUMMARY: BINDING CORPORATE RULES FOR DATA PRIVACY AND PROTECTION
FIRST DATA CORPORATION SUMMARY: BINDING CORPORATE RULES FOR DATA PRIVACY AND PROTECTION SUMMARY: BINDING CORPORATE RULES FOR DATA PRIVACY AND PROTECTION v 1.3 Supersedes: v 1.2 Summary Owner: Corporate
More informationE-Payment gateways. Opportunities & Threats. Saleem Zoughbi
E-Payment gateways Opportunities & Threats Saleem Zoughbi 2/18 Lexicon! e-payment The action of submitting a value of money from one source to another electronically e-payment Gateway The framework (including
More informationThe Benefits of ICT. June 2007 GP.C.PDF.07.E.1115.1
The Benefits of ICT June 2007 GP.C.PDF.07.E.1115.1 The Benefits of ICT Help You Connect, Collaborate and Compete A strong ICT (information and communications technology) strategy is pivotal to competitive
More informationProvide access control with innovative solutions from IBM.
Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business
More informationSeamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.
Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues
More informationHow To Write A Privacy Preserving Firewall Optimization Protocol
Asia-pacific Journal of Multimedia Services Convergence with Art, Humanities and Sociology Vol.1, No.2 (2011), pp. 93-100 http://dx.doi.org/10.14257/ajmscahs.2011.12.06 Secure Multi-Party Computation in
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationThe Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013
The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh May 20 th, 2013 Companies are leveraging mobile computing today Three major consumption models: 1. Improving productivity Improving employee
More informationSingle Sign On: Are we there yet?
Single Sign On: Are we there yet? Work In Progress Annual Computer Security Applications Conference December 08,2004 Rafae Bhatti, Elisa Bertino, Arif Ghafoor Electrical and Computer Engineering, And CERIAS
More informationPrivacy Policy. February, 2015 Page: 1
February, 2015 Page: 1 Revision History Revision # Date Author Sections Altered Approval/Date Rev 1.0 02/15/15 Ben Price New Document Rev 1.1 07/24/15 Ben Price Verify Privacy Grid Requirements are met
More informationand Deployment Roadmap for Satellite Ground Systems
A Cloud-Based Reference Model and Deployment Roadmap for Satellite Ground Systems 2012 Ground System Architectures Workshop February 29, 2012 Dr. Craig A. Lee The Aerospace Corporation The Aerospace Corporation
More information4Motion. End-to-end 4G Wireless Broadband
4Motion End-to-end 4G Wireless Broadband Meeting your 4G needs with freedom of choice 4Motion is Alvarion s end-to-end 4G wireless broadband solution, connecting people and businesses everywhere for a
More informationHow can Content Aware Identity and Access Management give me the control I need to confidently move my business forward?
SOLUTION BRIEF Content Aware Identity and Access Management May 2010 How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward? we can CA Content
More informationIBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems
IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems Proactively address regulatory compliance requirements and protect sensitive data in real time Highlights Monitor and audit data activity
More informationCLOUD MIGRATION STRATEGIES
CLOUD MIGRATION STRATEGIES Faculty Contributor: Dr. Rahul De Student Contributors: Mayur Agrawal, Sudheender S Abstract This article identifies the common challenges that typical IT managers face while
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK BIG DATA HOLDS BIG PROMISE FOR SECURITY NEHA S. PAWAR, PROF. S. P. AKARTE Computer
More informationEndpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments
Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically
More informationSecurity Practices for Online Collaboration and Social Media
Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.
More informationIBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and
More informationPersonalization of Digital Information Services
Personalization of Digital Information Services Yaşar Tonta Hacettepe University Department of Information Management Ankara, Turkey tonta@hacettepe.edu.tr yunus.hacettepe.edu.tr/~tonta/tonta.html.t. Outline
More informationSECURITY THREATS TO CLOUD COMPUTING
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD
More informationSafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud
SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across
More informationSafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud
SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across
More informationUnlocking IoT data value
World s first search engine for the public Internet of Things thingful.net Unlocking IoT data value Smart Systems Summit, London 2nd October 2014 www.hvm-uk.com Data and its value Growth in the emerging
More informationApplication Visibility and Monitoring >
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
More informationDeploying an Information Sharing Solution that Promotes Cross-Enterprise Collaboration without Compromise
Deploying an Information Sharing Solution that Promotes Cross-Enterprise Collaboration without Compromise October 2010 V I J A Y T A K A N T I V I C E P R E S I D E N T, S E C U R I T Y & C O L L A B O
More informationCisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media
January 2012 Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 All contents are Copyright 1992 2012 Cisco Systems, Inc. All rights reserved. This document
More informationBrainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
More informationRocket CorVu NG. Rocket. Independence from Engineering. Powerful Data Visualization for Critical Decision-Making. brochure
Rocket CorVu NG Powerful Data Visualization for Critical Decision-Making With Rocket CorVu NG, Business Intelligence (BI) technical users create applications that unlock the power of data to arm users
More informationThe Guardian Digital Control and Policy Enforcement Center
Protects Against The Guardian Digital Control and Policy Enforcement Center P R O T E C T S A G A I N S T : Viruses Unsolicited Junk Email Malicious Code Internet Fraud & Phishing Hazardous File Attachments
More informationPrivacy and security in the cloud
Privacy and security in the cloud Challenges and solutions for our future information society Panel Building trust the technical challenges World Summit on the Information Society Forum 25-29 May 2015
More informationFSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
More informationBig Data, Cloud Computing, Spatial Databases Steven Hagan Vice President Server Technologies
Big Data, Cloud Computing, Spatial Databases Steven Hagan Vice President Server Technologies Big Data: Global Digital Data Growth Growing leaps and bounds by 40+% Year over Year! 2009 =.8 Zetabytes =.08
More informationA SECURE ONLINE MEDICAL INFORMATION SYSTEM IN DISTRIBUTED AND HETEROGENEOUS COMPUTING ENVIRONMENT
++ I&S A SECURE ONLINE MEDICAL INFORMATION SYSTEM IN DISTRIBUTED AND HETEROGENEOUS COMPUTING ENVIRONMENT Muhammad Nabeel TAHIR Abstract: The objective of this article is to analyze the importance and the
More informationCyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
More informationdata driven government
Position paper data driven government preparing for the age of the citizen Insights for tomorrow s world Governments are awash with information, and they face a deluge of data as far into the future as
More informationSecure Thinking Bigger Data. Bigger risk?
Secure Thinking Bigger Data. Bigger risk? MALWARE HACKERS REPUTATION PROTECTION RISK THEFT There has always been data. What is different now is the scale and speed of data growth. Every day we create 2.5
More informationCISCO WIRELESS CONTROL SYSTEM (WCS)
CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform
More informationReport on the Dagstuhl Seminar Data Quality on the Web
Report on the Dagstuhl Seminar Data Quality on the Web Michael Gertz M. Tamer Özsu Gunter Saake Kai-Uwe Sattler U of California at Davis, U.S.A. U of Waterloo, Canada U of Magdeburg, Germany TU Ilmenau,
More informationService Oriented Networks Security. David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008
Service Oriented Networks Security David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008 While empowering new business models, SON leads to a proliferation of application networks
More informationCisco Security IntelliShield Alert Manager Service
Data Sheet Cisco Security IntelliShield Alert Manager Service The Cisco Security IntelliShield Alert Manager Service provides a comprehensive, cost-effective solution for delivering the security intelligence
More informationNetwork Services in the SDN Data Center
Network Services in the SDN Center SDN as a Network Service Enablement Platform Whitepaper SHARE THIS WHITEPAPER Executive Summary While interest about OpenFlow and SDN has increased throughout the tech
More informationChapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
More informationChicago State University Computer Usage Policy
Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services
More informationSecurity standards for the semantic web B
Computer Standards & Interfaces 27 (2005) 257 268 www.elsevier.com/locate/csi Security standards for the semantic web B Bhavani Thuraisingham*,1 Data and Applications Security, The National Science Foundation,
More informationBig Data - Security and Privacy
Big Data - Security and Privacy Elisa Bertino CS Department, Cyber Center, and CERIAS Purdue University Cyber Center! Big Data EveryWhere! Lots of data is being collected, warehoused, and mined Web data,
More informationIs backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure
Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure The LTE backhaul challenge Communication Service Providers (CSPs) are adopting LTE in rapid succession.
More informationSTRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
More informationExecutive s Guide to Cloud Access Security Brokers
Executive s Guide to Cloud Access Security Brokers Contents Executive s Guide to Cloud Access Security Brokers Contributor: Amy Newman 2 2 Why You Need a Cloud Access Security Broker 5 You Can t Achieve
More informationCloud Computing, Grids, and the coming IT Cambrian Explosion
Cloud Computing, Grids, and the coming IT Cambrian Explosion Irving Wladawsky-Berger Chairman Emeritus, IBM Academy of Technology Visiting Professor, Engineering Systems, MIT Adjunct Professor, Tanaka
More informationUnified Charging and Billing Solution. Unified Next Generation of Charging Systems in Mobile Networks
Unified Charging and Solution. Unified Next Generation of Charging Systems in Mobile Networks Daniel Donhefner Nokia Siemens Networks Business Support Systems Research and Development 1 Motivation and
More informationMobile Commerce and Ubiquitous Computing. Chapter 6
Mobile Commerce and Ubiquitous Computing Chapter 6 Learning Objectives 1. Discuss the value-added attributes, benefits, and fundamental drivers of m-commerce. 2. Describe the mobile computing infrastructure
More informationE-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY
E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY Oana Dolea 7 th Annual Leg@l.IT Conference March 26th, 2013 Montreal, Canada INTRODUCTION Mobile e-commerce vs. E-commerce Mobile e-commerce:
More informationBUSINESS INTELLIGENCE. Keywords: business intelligence, architecture, concepts, dashboards, ETL, data mining
BUSINESS INTELLIGENCE Bogdan Mohor Dumitrita 1 Abstract A Business Intelligence (BI)-driven approach can be very effective in implementing business transformation programs within an enterprise framework.
More informationPrivacy Engineering Objectives and Risk Model - Discussion Deck. Objective-Based Design for Improving Privacy in Information Systems
Privacy Engineering Objectives and Risk Model - Discussion Deck Objective-Based Design for Improving Privacy in Information Systems Purpose and Scope This discussion deck describes initial draft components
More informationIBM InfoSphere Optim Test Data Management
IBM InfoSphere Optim Test Data Management Highlights Create referentially intact, right-sized test databases or data warehouses Automate test result comparisons to identify hidden errors and correct defects
More informationCollaboration solutions for midsized businesses Buyer s guide
Collaboration solutions for midsized businesses Buyer s guide Increase productivity by improving collaboration across and beyond your business. Give employees access to the information, people and resources
More information