WORKSHOP ON "NETWORK AND INFORMATION SECURITY: RESEARCH IDEAS"

Size: px
Start display at page:

Download "WORKSHOP ON "NETWORK AND INFORMATION SECURITY: RESEARCH IDEAS""

Transcription

1 EUROPEAN COMMISSION Information Society and Media Directorate-General Emerging Technologies and Infrastructures Trust and Security WORKSHOP ON "NETWORK AND INFORMATION SECURITY: RESEARCH IDEAS" WORKSHOP REPORT 22 nd September BRUSSELS

2 EUROPEAN COMMISSION Information Society and Media Directorate-General Emerging Technologies and Infrastructures Trust and Security TABLE OF CONTENTS 1 INTRODUCTION SCOPE, MOTIVATION AND GOALS AGENDA NETWORK AND INFORMATION SECURITY: RESEARCH IDEAS Workshop content Research items identified SUMMARY... 9 The views expressed in this report are those of the participants and do not necessarily reflect the official European Commission s view on the subject.

3 1 INTRODUCTION A workshop on "Network and Information security: Future Research Ideas, organised by the Trust and Security Unit of DG INFSO, was held on 22nd September 2011 in Brussels. The aim of the workshop was to have an open discussion and exchange of ideas on future network and information security challenges requiring research in the short, medium, and longer terms. The workshop identified many future research topics, and the discussions enabled further elaboration on these topics included in this report. 2 SCOPE, MOTIVATION AND GOALS The workshop was designed to include a mixture of presentations, questions and answer periods with an emphasis on interactive discussions where the participants could openly exchange their ideas and views. The workshop results would be used for the preparation of the future research programmes, which would undoubtedly have an element on trustworthy ICT including Horizon 2020, for which the European Commission will make a proposition before the end of this year to the Council of the European Union and the European Parliament. The workshop was divided into 3 sections, each with a dedicated chair. These included Future challenges for Trust and Security research Network, Systems and Services technologies for a Trustworthy ICT CyberSecurity and Emerging Cyberthreats A wrap up took place at the end of the workshop. Workshop on Network and Information Security: Research ideas Page 1

4 3 AGENDA 9:30 Welcome and Introduction Mario Scillia, European Commission 10:15 Future challenges for Trust and Security research Chair: Nick Wainwright Speakers: Nick Wainwright, Jean-Pierre Seifert, Demosthenes Ikonomou, Philippe Massonet 11:05 Q&A Discussions 11:25 Coffee break 11:40 Network, Systems and Services technologies for a Trustworthy ICT Chair: Javier Lopez Speakers: Javier Lopez, Sotiris Ioannidis, Roberto Baldoni/Giorgia Lodi, Ulrich Seldeslachts, Karima Boudaoud and Martin Gaedke 12:40 Q&A Discussions 13:00 Lunch break 14:00 CyberSecurity and Emerging Cyberthreats Chair: Evangelos Markatos Speakers: Evangelos Markatos, Piotr Kijewski, Salvatore D'Antonio, Peter Matthews and Orestis Tsigkas 14:50 Q&A Discussions 15:10 Coffee break 15:25 Wrap-up Jim Clarke 15:45-16:00 Closing European Commission Workshop on Network and Information Security: Research ideas Page 2

5 4 NETWORK AND INFORMATION SECURITY: RESEARCH IDEAS 4.1 Workshop content The workshop was supported by the following presentations made by researchers engaged in Network and Information management research. Session 1. Future Challenges for Trust and security research Nick Wainwright (Chair), HP Labs: Future challenges for Trust and security research associated with the enterprise perspective Jean-Pierre Seifert, Deutsche Telekom Laboratories: Research challenges related to network and information security Demosthenes Ikonomou, ENISA: Research challenges related to network and information security Philippe Massonet, CETIC: Research challenges associated with Trustworthy Infrastructure clouds (moving towards a cloud utility) Session 2. Network, Systems and Services technologies for a Trustworthy ICT Javier Lopez (Chair), University of Malaga: Securing the Internet of Things (IoT) Sotiris Ioannidis, FORTH: Future Threats in Networked systems Giorgia Lodi, Consorzio Interuniversitario Nazionale per l'informatica: Progressive security for Critical cloud services Ulrich Seldeslachts, LSEC Belgium made a presentation entitled Challenges and Ideas from the European Security Innovation Network partners Karima Boudaoud, University of Nice: Human oriented vision to security management Martin Gaedke, Chemnitz University of Technology, Dept. of Computer science: Technological foundation for making a Social Web without borders a reality Session 3. CyberSecurity and Emerging Cyberthreats Piotr Kijewski, NASK: Security research from a CERT perspective Salvatore D'Antonio, University of Naples Parthenope: Security Information and Event Management for Critical Infrastructure Protection Peter Matthews, CA Labs: Research areas required related to Network and Information security Workshop on Network and Information Security: Research ideas Page 3

6 Orestis Tsigkasm, Informatics and Telematics Institute / Centre for Research and Technology: Malicious attacks detection and prevention in Cognitive Radio Networks Evangelos Markatos (Chair), FORTH: Detecting polymorphic cyberattacks. 4.2 Research items identified Based on these presentations and discussions at the end of each session, a significant number of research items for Network and Information security were elaborated by the participants. Security of open source based systems e.g. smart phones An area that needs research is examining the security of systems that are built based upon open source (e.g. smart phones). The current trend of the combination of open source and cellular phones/equipment brings significant security issues and raises a dilemma between the requirements to have closed access to the network whilst at the same time having devices on the networks developed based on openness. This dilemma must be solved in research by looking at the development of low cost systems that will bridge the gap between openness and closed systems, especially critical infrastructures. Cloud A number of research needs were raised on trust, security and privacy of the Cloud that were essential before government or other users will move their business to the cloud. There is a need to address both the services cloud and its infrastructure whether separately or together and need to examine the consumer/business IT convergence to enable people operate safely in multiple domains from the same device. In order to put together a secure, trustworthy cloud system, there is a need for coherent set of models, architecture, ontologies, taxonomies, and standards. Further research-needs to be undertaken on virtual private clouds (VPCs) were identified. The VPC environment may incorporate private clouds on public cloud infrastructures consisting of storage and computation, and include isolation mechanisms for multiple security layers. Some possible lines of research on VPCs include categorisation of services, taxonomies of cloud services based on confidentiality, integrity and availability requirements, interoperability of security and QoS policies and monitoring intrusions, including different levels of intelligent monitoring (e.g. coarse and fine grained monitoring) according to different protection levels are required. Service management index is a way of comparing cloud services and the security and threat characteristics, making those characteristics available so that it can be carried as part of the cloud service compliance metrics e.g. without the use of ontologies. More information can be found at Resilience Research is required on ontologies and taxonomies for resilience in order to adopt an end-to-end resilience concept. The aim is to provide a classification scheme for resilience of communications networks and offer a basis for further work on technical standardisation of means for providing and managing resilient networks. Future Workshop on Network and Information Security: Research ideas Page 4

7 networks requirements in terms of governance, unification, service orientation, autonomicity, etc., should be taken into account when addressing this redefinition of resilience. The ontology will categorise the main elements for an attack, effectively grouping them in conceptual blocks, which can be used by operators when they manage, maintain and upgrade their networks. There are ongoing discussions whether these ontologies could be standardised. Resilience must be systematically addressed and to do that we need to understand the properties in the systems that will need to be addressed. If there are conceptual blocks for the systems, there would be no need to standardise each and every item within the systems. Further details will be elaborated on this topic during a workshop Ontologies and taxonomies for resilience in cooperation with DGINFSO and ENISA in Brussels on 17 th October Cryptography There should be research on advanced cryptographic techniques assuring end to end encryption and there should be a Pan-European approach to set acceptable minimum levels of requirements for governmental applications. There are already examples of this in the US (NIST) and Japan (CRYPTREC). In addition, there is a need for an increased understanding that encryption is not just about the initial configuration, but also about the long-term management of the encryption keys. Additional research should also be focussed on the interfaces between the cryptographic mechanisms and the systems themselves. This will become extremely important when adapting cryptographic algorithms and Internet security protocols to the Internet of Things. Internet of Things/Security Protocols There are significant trust, security and privacy research needs for the adaptation of Internet security protocols to the Internet of Things. A number of areas for IoT security research including protocol and network security with cryptography developed (smaller, faster) to deal with the large number of objects with significant heterogeneity. Data and information privacy should be dealt with by the use of Privacy by design and transparency for IoT users. New approaches are needed for identity management of objects and things, trust and governance for objects, and the need to determine what is meant by with fault tolerance in IoT and how to address it, whether at the level of small objects or of the systems. Future and emerging threats Research and solutions are required to handle future threats at various levels, examining both defensive and offensive options. An immediate threat is from the underground economy where the goals and models of attackers has shifted dramatically from hacking-for-fun to making huge profits. It poses serious threats to social networks, which are now attractive targets due to the large number of users, with large trust among them. Detailed information profiles of users are available, increasing potential opportunities for fraud and spreading malware. There are threats due to complexity and parallelism of multi-core, multi-threaded technologies and an order of hundreds of hardware threads on a single chip. This will require building new secure languages, apps, libraries and OS s designed with parallelism in mind. Virtualisation and hardware isolation can also help in this regard. New threats arise from the scale of the Internet has grown to a 100 million node network, not even counting the IoT or weak devices. Research is required to study and understand interdependencies between systems, to Workshop on Network and Information Security: Research ideas Page 5

8 model larger systems in security evaluations and to form boundaries that can be studied more easily. An emerging threat is mobile device malware, where the devices have comparable hardware to regular computers so mobile devices will be facing similar threats to personal computers. Research is required on multiple fronts: outsourcing part of the security solution to the network itself; application analysis in the sandbox; intrusion detection in the network; and server replication of phone states. Social Internet Social internet requires more research as it will form part of the core Internet of the future. Controls ultimately need to transcend location and the need of users to discover where their data is at any given time requires investigation. Research challenges to exploit the social Internet include: massive computing capacity; real time virtualisation and massive prototyping; real time monitoring, detection, and response; real time enand de-ciphering; self detective and self healing networks; personal anonymiser and IDbased networks; digital footprint remover; information tagging and automated classification; user interfacing and behavioural psychology. Future research should be undertaken on collaborative problem solving where people and machines are brought together to solve problems that could not be solved in isolation. This has been described recently in IEEE Internet Computing: "Social Router by Dustdar and Gaedke. Some opportunities in collaborative problem-solving were presented including standardising the way that social networks interact in start creating integrated social networks. For this to work, we need better identity concepts in order to have integrated social webs (examples such as 4sq, Facebook, ); Some work has been done on this already but significantly more research is required. A social Internet of Things to make machines talk to people and vice versa in a trustworthy way requires us to figure out what protocols are needed to bring together social networks, IoT, and trustworthiness. Federated wisdom for social webs needs policies, privacy and social semantics for federating them, eg., smart grids used to connect neighbourhoods, towns, cities, etc. Future research should look at how to model these social webs and their connections to enable the co-location of physical entities. Federated social communities need interactive approaches that transcend organisational and social boundaries. If successful, this will likely create new markets. Human Oriented approaches There is a need to examine human-oriented security solutions as the generation of users is changing as they are born and raised with ICT. Studies show they would be more open to use security solutions, and the security designers need to listen and adapt. Security solutions could be based on language and visual clues for the users. There were discussions about the level of evidence about young people caring more about security and privacy. While there is mainly anecdotal evidence on whether users will or won t care about these issues, there are considerable levels of users that care about their security and privacy. The point agreed was that as a research community, we should not take as a starting point that young people do not care about security and privacy: this would be a big mistake; moreover, we should study all points of view from the sociological perspectives and involve the right stakeholders in our research projects. There should be more research in the transitivity of trust in social networks. For example, if we put information into a social network, there is no way to see how you Workshop on Network and Information Security: Research ideas Page 6

9 can control the trust that you are delegating or transferring to other persons. There are three potential research topics in this area: 1. Enforcement: When you provide data to other companies and the data has a life-time and they have to delete it, the big challenge is what happens if they don t delete it? This is a problem where we need a solution involving built in intelligence where this issue can be dealt with properly; 2. User control: Where is the data located and who has access to it? Many of today s applications build significant profiling information on users. As a strong research community, can we utilise our many different expertises to take the decentralised spirit of the web into European applications and have the same potential that social computing provides within our own applications; and 3. Local storage: Is it possible to store the data on our own servers? Can we create or arrange servers to store our own data instead of the applications storing it. This concept is currently being discussed in the incubator unit in the W3C committee looking at web servers attached to your browser only. It could be a safe means of storing personal data on your own server and providing it on request to external applications. Analysis of Security Data Research lines of interest related to the analysis of large security data sets are needed. While there is large amounts of data collected e.g. in Poland, this needs to be taken further by looking at algorithms for meaningful analysis. A difficulty is encountered when sharing data as usually some of the data comes from vendors for specific purposes but not for research. It was pointed out that the Inco-trust and BIC projects have identified international data exchange architectures specifically for cybersecurity (EU- US) as a cooperation topic and this work in Poland could be very synergistic. (ref. ). Other areas could include DNS research to detect malicious domains at the registry level, botnet research to see what are they targeting and research into ways of automating analysis of them, and research into automating ways of detection and analysis of malware on smartphone software (cf. above). Critical Infrastructure Future research into detecting, monitoring and preventing attacks on SCADA systems is very important, and research based on SIEM (Security Information and Event Management) based approach to critical infrastructure security must be continued and extended to especially include monitoring and control of the overall critical infrastructure network. Monitoring and detection enables collection of data from servers and network devices and sensors (wired and wireless) and gives the ability to perform very good detection process; for this, emerging attacks (stealth attacks) that are difficult to detect must be considered. Privacy In the research areas of privacy in relation to network and information security, the strict regulation must be addressed in conjunction with: taking care of privacy within the development of loosely connected entities; fragmentation and need for global regulations; dealing with corporations losing control of their data; privacy in mobile computing and social computing and businesses; insider threat detection; prediction; log analysis and user profiling. Research is needed into reputation management and role Workshop on Network and Information Security: Research ideas Page 7

10 discovery including data mining roles and identities, graph optimisation and heuristics. Standardisation There were discussions at the workshop on the role of standards in the auditing process and improvements needed here. There are around twenty different standards related to auditing of computing, making it extremely difficult, if not impossible, for auditors to learn or comply. In addition, standards are mainly vendor-driven and in some cases, the auditors themselves are not in the loop. In other cases, the auditors are developing standards themselves. For the future, we should be looking at a convergence model for standards and determine who would be involved in driving this or how would it could done. A suggestion was made to examine the NIST model of standards, which is based on capture the requirements of the standards and alignment of people involved in composing the standards. Wireless Security An area of future research is malicious attacks detection and prevention in Cognitive Radio Networks (CRN), which are becoming an increasingly important part of the wireless networking landscape due to the ever increasing scarcity of spectrum resources. The physical layer security for wireless communications must ensure the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies and exploiting the wireless communication medium to develop secret keys over public channels. Detection and prevention of DNS and malicious attacks against the reasoning engine and the learning engine of the CR is also very important as in this case, we may see an attack that could be a virus or bad information or resultant beliefs for users that is continually propagating unless properly dealt with. Self Detection and Protection Research is required into self code detection and buffer overflows especially when dealing with polymorphic attacks (self modifying shell-code). Attackers need compromised computers to carry out malicious activities such as spamming, extortion, phishing, illegal content, phishing DDoS, and code injection. Through code injection attacks, they compromise computers by exploiting design deficiencies (e.g. buffer overflow overriding the return address by writing code into it), changing the code payload from one execution to another. At this point, the attacker has control over the remote machine. To make matters worse, they change the payload code from one execution to another (polymorphic) by sending the encrypted messages they send. They encrypt the sent message as self decrypting code where the actual shell code is not revealed until run time. If you look at the network data, you do not realise an attack is going on as the self-modifying code can hide the real malicious code. Therefore, pattern matching/static analysis is not enough for dealing with highly polymorphic and selfmodifying code. A solution proposed for detecting self-modifying polymorphic shellcode on the network is network-level emulation, where each packet received from the network is not processed by the ordinary TCP/IP stack but is executed as if it is executable code enabling the identify of remote code injection attacks, which are still a threat to the deployment. In summary, attackers have also turned their attention to less widely used services and third-party applications and these must also be protected. Workshop on Network and Information Security: Research ideas Page 8

11 5 SUMMARY The workshop on "Network and Information security: Future Research Ideas, organised by the Trust and Security Unit of DG INFSO, held on 22nd September 2011 was successful in highlighting a significant number of future research topics across the three sessions: Session 1. Future Challenges for Trust and security research Session 2. Network, Systems and Services technologies for a Trustworthy ICT Session 3. CyberSecurity and Emerging Cyberthreats The following table highlights and maps the findings of the workshop according to the sessions. Research Topic Workshop Sessions Session 1. Future Challenges for Trust and security research Session 2. Network, Systems and Services technologies for a Trustworthy ICT Session 3. CyberSecurity and Emerging Cyberthreats Smart phone Cloud Resilience Cryptography Internet of Things/ Security Protocols Future and emerging threats Social Networks and Human Contribution to Security Analysis of Security Data Critical Infrastructure Privacy Standardization Wireless Security Self Detection and Protection Workshop on Network and Information Security: Research ideas Page 9

Security Challenges for the Future Internet. Evangelos Markatos Distr. Computing Systems Laboratory FORTH ICS

Security Challenges for the Future Internet. Evangelos Markatos Distr. Computing Systems Laboratory FORTH ICS Security Challenges for the Future Internet Evangelos arkatos Distr. Computing Systems Laboratory FORT ICS 11 Roadap of the talk Security Challenges: What is the problem? ackers are getting more sophisticated

More information

Cloud Computing Security Considerations

Cloud Computing Security Considerations Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction

More information

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts. Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:

More information

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT

More information

Big Data and Cyber Security A bibliometric study Jacky Akoka, Isabelle Comyn-Wattiau, Nabil Laoufi Workshop SCBC - 2015 (ER 2015) 1 Big Data a new generation of technologies and architectures, designed

More information

The Cyber Threat Profiler

The Cyber Threat Profiler Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

NOS for Network Support (903)

NOS for Network Support (903) NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure

More information

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

Trust areas: a security paradigm for the Future Internet

Trust areas: a security paradigm for the Future Internet Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany Carsten.Rudolph@sit.fraunhofer.de

More information

Critical Controls for Cyber Security. www.infogistic.com

Critical Controls for Cyber Security. www.infogistic.com Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability

More information

How to ensure control and security when moving to SaaS/cloud applications

How to ensure control and security when moving to SaaS/cloud applications How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk

More information

Management of Security Information and Events in Future Internet

Management of Security Information and Events in Future Internet Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency ENISA s Study on the Evolving Threat Landscape European Network and Information Security Agency Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 2 ENISA The

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

Great Now We Have to Secure an Internet of Things. John Pescatore SANS Director, Emerging Security Trends @John_Pescatore

Great Now We Have to Secure an Internet of Things. John Pescatore SANS Director, Emerging Security Trends @John_Pescatore Great Now We Have to Secure an Internet of Things John Pescatore SANS Director, Emerging Security Trends @John_Pescatore 1 What the Heck is That?? 2 Different Views of the Internet of Things 3 Different

More information

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex

More information

ITL BULLETIN FOR JANUARY 2011

ITL BULLETIN FOR JANUARY 2011 ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

Preface Introduction

Preface Introduction Preface Introduction Cloud computing is revolutionizing all aspects of technologies to provide scalability, flexibility and cost-effectiveness. It has become a challenge to ensure the security of cloud

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask Everything You Wanted to Know about DISA STIGs but were Afraid to Ask An EiQ Networks White Paper 2015 EiQ Networks, Inc. All Rights Reserved. EiQ, the EiQ logo, the SOCVue logo, SecureVue, ThreatVue,

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system

More information

ICT WP 09-10 Obj. 1.3 Internet of Things and Enterprise Environments

ICT WP 09-10 Obj. 1.3 Internet of Things and Enterprise Environments Call 5 NCP briefing 12th May 2009 ICT WP 09-10 Obj. 1.3 Internet of Things and Enterprise Environments Peter Friess, Project officer, Head of Cluster Alain Jaume, Deputy Head of Unit D4 Cristina Martinez,

More information

CompTIA Security+ (Exam SY0-410)

CompTIA Security+ (Exam SY0-410) CompTIA Security+ (Exam SY0-410) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment

More information

Attacks from the Inside

Attacks from the Inside Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

Central Agency for Information Technology

Central Agency for Information Technology Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage

More information

CONTROLLING DATA IN THE CLOUD: OUTSOURCING COMPUTATION WITHOUT OUTSOURCING CONTROL

CONTROLLING DATA IN THE CLOUD: OUTSOURCING COMPUTATION WITHOUT OUTSOURCING CONTROL CONTROLLING DATA IN THE CLOUD: OUTSOURCING COMPUTATION WITHOUT OUTSOURCING CONTROL Paper By: Chow, R; Golle, P; Jakobsson, M; Shai, E; Staddon, J From PARC & Masuoka, R And Mollina From Fujitsu Laboratories

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

Securing Smart City Platforms IoT, M2M, Cloud and Big Data

Securing Smart City Platforms IoT, M2M, Cloud and Big Data SESSION ID: SSC-W10 Securing Smart City Platforms IoT, M2M, Cloud and Big Data Ibrahim Al Mallouhi Vice President - Operations Emirates Integrated Telecommunication Company (du) Roshan Daluwakgoda Senior

More information

Information Security: Cloud Computing

Information Security: Cloud Computing Information Security: Cloud Computing Simon Taylor MSc CLAS CISSP CISMP PCIRM Director & Principal Consultant All Rights Reserved. Taylor Baines Limited is a Registered Company in England & Wales. Registration

More information

Cyberspace Situational Awarness in National Security System

Cyberspace Situational Awarness in National Security System Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, r.piotrowski@wil.waw.pl, j.sliwa@wil.waw.pl

More information

Hands on, field experiences with BYOD. BYOD Seminar

Hands on, field experiences with BYOD. BYOD Seminar Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl

More information

Networked Systems Security

Networked Systems Security Unit 32: Networked Systems Security Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose J/601/7332 BTEC National The aim of this unit is to ensure learners know about the

More information

WWRF Cloud Implications to Security, Privacy, and Trust

WWRF Cloud Implications to Security, Privacy, and Trust ITU-T Workshop on Addressing security challenges on a global scale 06.+07.12.2010, Geneva WWRF Cloud Implications to Security, Privacy, and Trust Mario Hoffmann Chair WWRF Working Group 7 Security & Trust

More information

Testing Intelligent Device Communications in a Distributed System

Testing Intelligent Device Communications in a Distributed System Testing Intelligent Device Communications in a Distributed System David Goughnour (Triangle MicroWorks), Joe Stevens (Triangle MicroWorks) dgoughnour@trianglemicroworks.com United States Smart Grid systems

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical

More information

Enterprise Security Architecture Concepts and Practice

Enterprise Security Architecture Concepts and Practice Enterprise Architecture Concepts and Practice Jim Whitmore whitmore@us.ibm.com Presentation to Open Group Oct 22, 2003 Enterprise Architecture Abstract In the early 90 s IBM Global Services created a Consultancy

More information

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY Dean Frye Sourcefire Session ID: SEC-W05 Session Classification: Intermediate Industrialisation of Threat Factories Goal: Glory,

More information

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.

More information

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile

More information

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro Staying Secure After Microsoft Windows Server 2003 Reaches End of Life Trevor Richmond, Sales Engineer Trend Micro Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock)

More information

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things. Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?

More information

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

CYBERSECURITY: ISSUES AND ISACA S RESPONSE CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services

More information

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

Post-Access Cyber Defense

Post-Access Cyber Defense Post-Access Cyber Defense Dr. Vipin Swarup Chief Scientist, Cyber Security The MITRE Corporation November 2015 Approved for Public Release; Distribution Unlimited. 15-3647. 2 Cyber Security Technical Center

More information

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1 Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

Basics of Internet Security

Basics of Internet Security Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational

More information

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and

More information

How can the Future Internet enable Smart Energy?

How can the Future Internet enable Smart Energy? How can the Future Internet enable Smart Energy? FINSENY overview presentation on achieved results Prepared by the FINSENY PMT April 2013 Outline Motivation and basic requirements FI-PPP approach FINSENY

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

KEY TRENDS AND DRIVERS OF SECURITY

KEY TRENDS AND DRIVERS OF SECURITY CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures

More information

Defending the Internet of Things

Defending the Internet of Things Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity

More information

The Hillstone and Trend Micro Joint Solution

The Hillstone and Trend Micro Joint Solution The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

BlackRidge Technology Transport Access Control: Overview

BlackRidge Technology Transport Access Control: Overview 2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service

More information

Email Management and Security Good Practice Guide. August 2009

Email Management and Security Good Practice Guide. August 2009 Email Management and Security Good Practice Guide August 2009 contents 1 Introduction to Good Practice Guides 3 2 Email Management and Security Overview 3 2.1 Understanding Good and Better Practice 4 3

More information

future data and infrastructure

future data and infrastructure White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal

More information

Technology Risk Management

Technology Risk Management 1 Monetary Authority of Singapore Technology Risk Guidelines & Notices New Requirements for Financial Services Industry Mark Ames Director, Seminar Program ISACA Singapore 2 MAS Supervisory Framework Impact

More information

ThreatSpike Dome: A New Approach To Security Monitoring

ThreatSpike Dome: A New Approach To Security Monitoring ThreatSpike Dome: A New Approach To Security Monitoring 2015 ThreatSpike Labs Limited The problem with SIEM Hacking, insider and advanced persistent threats can be difficult to detect with existing product

More information

Draft v0.7 July 27th. The Nature of Cloud

Draft v0.7 July 27th. The Nature of Cloud Global Security Challenges of Cloud Computing Extended Abstract Sadie Creese and Paul Hopkins International Digital Laboratory, WMG, University of Warwick, UK There is no doubt that cloud computing is

More information

Cyber Security and Privacy

Cyber Security and Privacy Cyber Security and Privacy Jovan Golić CySeP Winter School, Stockholm, 2014 EIT ICT Labs EIT ICT Labs is one of the first Knowledge and Innovation Communities set up in 2010 by the European Institute of

More information

Augmented Search for Software Testing

Augmented Search for Software Testing Augmented Search for Software Testing For Testers, Developers, and QA Managers New frontier in big log data analysis and application intelligence Business white paper May 2015 During software testing cycles,

More information

This is a preview - click here to buy the full publication

This is a preview - click here to buy the full publication TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems

More information

Brainloop Cloud Security

Brainloop Cloud Security Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is 1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the

More information

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012 ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 christoffer.karsberg@enisa.europa.eu 1 Who we are ENISA was

More information

Cloud-Security: Show-Stopper or Enabling Technology?

Cloud-Security: Show-Stopper or Enabling Technology? Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics

More information

Next-Generation Firewalls: Critical to SMB Network Security

Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more

More information

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking Agenda BYOD challenges A solution for BYOD Network Protector SDN matched with industry leading service How it works In summary BYOD challenges

More information

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer Symantec Vision 2014 - Big Data

More information

05.0 Application Development

05.0 Application Development Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development

More information

Click to edit Master title style

Click to edit Master title style CISSP SSCP ISSEP What is Changing? There are three (ISC) 2 certifications that have had changes posted in Candidate Information Bulletins (CIBs) for 2012 CISSP One domain name change order re-arranged

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

Internet of Things (IoT): A vision, architectural elements, and future directions

Internet of Things (IoT): A vision, architectural elements, and future directions SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: wkaqhsk0@seoultech.ac.kr Table of contents Open challenges

More information

The NREN s core activities are in providing network and associated services to its user community that usually comprises:

The NREN s core activities are in providing network and associated services to its user community that usually comprises: 3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of

More information

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance

More information

Implementing VoIP monitoring solutions. Deployment note

Implementing VoIP monitoring solutions. Deployment note Implementing VoIP monitoring solutions Deployment note Introduction With VoIP being an integral part of modern day business communications, enterprises are placing greater emphasis on the monitoring and

More information

Use of The Information Services Active Directory Service (AD) Code of Practice

Use of The Information Services Active Directory Service (AD) Code of Practice Use of The Information Services Active Directory Service (AD) Code of Practice Introduction This code of practice is intended to support the Information Security Policy of the University and should be

More information

Network Security in Building Networks

Network Security in Building Networks Network Security in Building Networks Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is) Westphalian University of Applied Sciences Gelsenkirchen, Germany www.if-is.net Content

More information

Enterprise Cybersecurity: Building an Effective Defense

Enterprise Cybersecurity: Building an Effective Defense Enterprise Cybersecurity: Building an Effective Defense Chris Williams Oct 29, 2015 14 Leidos 0224 1135 About the Presenter Chris Williams is an Enterprise Cybersecurity Architect at Leidos, Inc. He has

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Thales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg

Thales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg Thales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg Challenges of Future Internet Internet as a starting point Was defined for asynchronous services (web pages, file transfer

More information

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and

More information

How to Secure Your Environment

How to Secure Your Environment End Point Security How to Secure Your Environment Learning Objectives Define Endpoint Security Describe most common endpoints of data leakage Identify most common security gaps Preview solutions to bridge

More information

SCADA SYSTEMS AND SECURITY WHITEPAPER

SCADA SYSTEMS AND SECURITY WHITEPAPER SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of

More information