The Science of Cyber Security. Peter Weinberger (Google Inc) (based on a study for DDR&E s Steven King, with no any conneceon to Google at all)
|
|
- Jasmine Harris
- 8 years ago
- Views:
Transcription
1 The Science of Cyber Security Peter Weinberger (Google Inc) (based on a study for DDR&E s Steven King, with no any conneceon to Google at all)
2 Sponsor arranged a workshop S. King (OSD, sponsor) F. Schneider (Cornell) J. McLean (NRL) S. Forrest (UNM) G. Wagner (NSA) R. Meushaw (NSA) K. Jabbour (AFOSR) R. Rivest (MIT) D. Dean (DARPA) J. Mitchell (Stanford) J. Shamma (Georgia Tech) C. Landwehr (NSF) J. Manferdelli (MicrosoR) M. MarEn (U Penn) G. Holzmann (JPL) J. Chuang (UC Berkeley) R. Maxion (CMU) S. Savage (UCSD) P. Gallison (Harvard) 2
3 One View of the Problem Internet security problems are becoming more conspicuous with each passing day Online informaeon such as pornography and obsceniees are seriously harming the physical and mental health of minors. Criminal aceviees such as online fraud and ther are seriously harming public security. Computer viruses and hacker azacks are posing serious threats to the security of the operaeon of the Internet. Leaking of secrets via the Internet is posing serious threats to naeonal security and interests. : 关 April 29, 2010 On the development and management of the internet in our country hzp:// t _ shtm (or hric.org) 3
4 Is There a Science of Cyber Security Of course, but what sort of science? Stay tuned (but it s not going to look like relaevity) Cyber world is made by humans, as is the threat MathemaEcs will be important Will it solve the problem? Science doesn t solve problems, applying it might What problems? (definieons are key to progress) Desperate need to make research tools accessible Whose problem is this?
5 Funny Science Human adversaries AdapEve adversaries: clinical medicine, crops Analogies can be misleading; deterrence possible Can only manage the problem, never finish Human made world (mathemaecal essence) What is it about? (unpleasant surprises?) Define security? Good properees, bad properees, incomplete list
6 Issues Data and experiments The point of data is generalizability The peculiar nature of secrecy CivilizaEon vs the barbarians, the advantages: Take advantage of global knowledge Take advantage of computaeonal power
7 A few (two) recommendaeons Establish muleple cyber security base centers and projects within universiees and other research centers These programs should have a long Eme horizon and periodic reviews of accomplishments Apply the science, reduce it to pracece Review papers E.g., what problem does X not solve?
8 Good Things, e.g. Theory (clarify concepts and their relaeons) E.g., Impossibility theorems Model checking (viewed broadly) EffecEve bug finding in specificaeons at any level Machine learning (conenual adapeng)
9 Areas Where Science and Empirics Might Be Mutually Reinforcing Systems that present more uncertainty to azackers Can the defense adapt faster than azackers? (randomizaeon, virtualized rapid restart, heterogeneity) (Internal firewalls, war mode defenses) Building secure systems out of insecure components (muleple paths, audieng, checkpoints, virtualizaeon) Knowing the security state of a system by observaeon (external, embedded) (trivial: are you doing what you claim to be?) (tripwire and similar ways of looking separated in Eme or space) 9
10 New Technologies Bring New OpportuniEes New azacks, new defenses, new problems, grist for science Cell phones IP radios and ad hoc networks; WiFi access points Power meters and smart grid (not all problems are DoD problems) MulE core CPU architectures Cloud (whichever definieon you use) (new opportuniees for observaeon) Browsers and Web 2 Many nasty azacks and issues A kind of virtual machine that is sell malleable (standards based, moderate/separable backwards compaebility issues) Could apply knowledge and techniques too radical for lower layers [Akhawe, Barth, Lam et al 2010] 10
Cyber Security and Science
Cyber Security and Science Peter Weinberger pjw@googlecom Feb 9, 2011 These opinions are only mine, no one else s and even then, only today They may change at any time Protecting intellectual property
More informationUS Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST)
US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST) william.newhouse@nist.gov NITRD Structure for US Federal Cybersecurity
More informationUS Federal Cyber Security Research Program. NITRD Program
US Federal Cyber Security Research Program NITRD Program Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related
More informationScience or Security. George O. Strawn NSF & NITRD (retired)
Science or Security George O. Strawn NSF & NITRD (retired) Caveat auditor The opinions expressed in this talk are those of the speaker, not the U.S. government Outline Anecdotes about IT security Observations
More informationNSF Cyber Trust Report
NSF Cyber Trust Report For US-Japan CIIP Experts Workshop, Sept 28-29 2004 Carl Landwehr (clandweh@nsf.gov) Cyber Trust Coordinator National Science Foundation Homeland Security Critical Infrastructure
More informationCyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
More informationCyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013
Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory
More informationFirewalls. Steven M. Bellovin https://www.cs.columbia.edu/~smb. Matsuzaki maz Yoshinobu <maz@iij.ad.jp>
Firewalls Steven M. Bellovin https://www.cs.columbia.edu/~smb Matsuzaki maz Yoshinobu 1 What s a Firewall? A barrier between us and the Internet All traffic, inbound or outbound, must pass
More informationThe Changing Threat Surface in. Embedded Computing. Riley Repko. Vice President, Global Cyber Security Strategy
The Changing Threat Surface in Embedded Computing Riley Repko Vice President, Global Cyber Security Strategy Embedded Computing History First embedded system was the Apollo Guidance Computer First integrated
More informationNetwork Security in Building Networks
Network Security in Building Networks Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is) Westphalian University of Applied Sciences Gelsenkirchen, Germany www.if-is.net Content
More informationSecurity is Not a Commodity: The Road Forward for Cybersecurity Research
Security is Not a Commodity: The Road Forward for Cybersecurity Research Stefan Savage UC San Diego Fred B. Schneider Cornell University Version 4: February 3, 2009 1 Computers at Risk 2, a 1991 report
More informationToward a Federal Cybersecurity Research Agenda: Three Game-changing Themes
Toward a Federal Cybersecurity Research Agenda: Three Game-changing Themes Toward a Federal Cybersecurity Research Agenda: Three Game-changing Themes Dr. Jeannette Wing Assistant Director for Computer
More informationLASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
More informationBig Data R&D Initiative
Big Data R&D Initiative Howard Wactlar CISE Directorate National Science Foundation NIST Big Data Meeting June, 2012 Image Credit: Exploratorium. The Landscape: Smart Sensing, Reasoning and Decision Environment
More informationSunil A. Bhave Ph.D. (UC Berkeley, 2004)
Academic Roots The chain of doctoral thesis advisors over the past century: Sunil A. Bhave, Ph.D., UC Berkeley 2004 Roger T. Howe, Ph.D., UC Berkeley 1984 Richard S. Muller, Ph.D., Caltech 1962 R. David
More informationCyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu
Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu January 2014 1/29/2014 1 Our History NSA/DHS Center for Excellence in Cyber Security Education
More informationThe University of California at Berkeley. A Brief Overview July 2007 For Presentation in Tokyo by Professor Stephen Cohen
The University of California at Berkeley. A Brief Overview July 2007 For Presentation in Tokyo by Professor Stephen Cohen 1 Universities Ranked by Number of Graduate Departments in Top 10 1. Berkeley (35)
More informationCYBER INFORMATION SECURITY AWARENESS AND PROTECTION PRACTICES. Strengthening Your Community at the Organizational Level
CYBER INFORMATION SECURITY AWARENESS AND PROTECTION PRACTICES Strengthening Your Community at the Organizational Level Las Vegas, Nevada 2012 Security Awareness and Why is it Important? In today s economic
More informationPCI-DSS Penetration Testing
PCI-DSS Penetration Testing Adam Goslin, Co-Founder High Bit Security May 10, 2011 About High Bit Security High Bit helps companies obtain or maintain their PCI compliance (Level 1 through Level 4 compliance)
More informationInternet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1
P a g e 1 Internet Basics ABOUT THIS CLASS This class is designed to provide a basic introduction to accessing and navigating the internet (a.k.a. the world wide web or the web ). Throughout the class,
More information2012 Application Security Gap Study: A Survey of IT Security & Developers
2012 Application Gap Study: A Survey of IT & s Research sponsored by Innovation Independently Conducted by Ponemon Institute LLC March 2012 1 2012 Application Gap Study: A Survey of IT & s March 2012 Part
More informationModerator Shigeki Goto, Professor, Department of Computer Science and Engineering, Waseda University
Date Friday, September 21, 2012 Host USJI-DCC Venue U.S.-Japan Research Institute (USJI)/ The Waseda Digital Campus Consortium (DCC) Title The Future of Advanced Information Societies
More informationCyber Security Strategies for the Small Business Market
Cyber Security Strategies for the Small Business Market Solutions for Small Business Reports are designed to demonstrate how new technologies enabled by cable providers help small business owners and managers
More informationCyber Security Strategies for the Small Business Market
ThisIsCable for Business Report Series Cyber Security Strategies for the Small Business Market White Paper Produced by BizTechReports.com Editorial Director: Lane F. Cooper Research Assistant: Will Frey
More informationNSF Activities in Cyber Trust
NSF Activities in Cyber Trust For ACM CCS Industry/Govt Track Oct. 26, 2004 Carl Landwehr (clandweh@nsf.gov) Cyber Trust Coordinator National Science Foundation What s s the Problem? Today s s software-based
More informationDETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK.
DETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK. A Brief History of IT Security Once upon a time, IT security was simple. Viruses were written to attack any system they came in contact with. As a result,
More informationEnd to End Defense against Rootkits in Cloud Environment Sachin Shetty
End to End Defense against Rootkits in Cloud Environment Sachin Shetty Associate Professor Electrical and Computer Engineering Director, Cybersecurity Laboratory Tennessee State University Tennessee State
More informationThe Impact of Cybercrime on Business
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
More information"Industry Side Views of cyber security in Japan"
"Industry Side Views of cyber security in Japan" Event 2: Cyber Security in East Asia and Policy Cooperation between Japan and the United States USJI-Week, September 7-10, 2010 US-Japan Research Institute
More informationIn December 2011, the White House Office of Science. Introducing the federal cybersecurity R&D strategic plan. Leaping ahead on cybersecurity
Introducing the federal cybersecurity R&D strategic plan Douglas Maughan, Bill Newhouse, and Tomas Vagoun In December 2011, the White House Office of Science and Technology Policy (OSTP) released the document,
More informationCyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in
Cyber Security & Role of CERT-In Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in Web Evolution Web Sites (WWW) 1993 Web Invented and implemented 130 Nos. web sites 1994 2738 Nos.
More informationDesign Principles for Protection Mechanisms. Security Principles. Economy of Mechanism. Least Privilege. Complete Mediation. Economy of Mechanism (2)
Security Principles Design Principles for Protection Mechanisms Security is a system requirement just like performance, capability, cost, etc. Therefore, it may be necessary to trade off certain security
More informationSecurity Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
More informationSECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.
SECURITY MEETS BIG DATA Achieve Effectiveness And Efficiency 1 IN 2010 THE DIGITAL UNIVERSE WAS 1.2 ZETTABYTES 1,000,000,000,000,000,000,000 Zetta Exa Peta Tera Giga Mega Kilo Byte Source: 2010 IDC Digital
More informationTriangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
More informationWHITE PAPER Security in M2M Communication What is secure enough?
WHITE PAPER Security in M2M Communication What is secure enough? Motivation Wireless Machine-To-Machine (M2M) communication has grown dramatically over the past decade and is still growing rapidly. In
More informationPromoting Network Security (A Service Provider Perspective)
Promoting Network Security (A Service Provider Perspective) Prevention is the Foundation H S Gupta DGM (Technical) Data Networks, BSNL hsgupta@bsnl.co.in DNW, BSNL 1 Agenda Importance of Network Security
More informationEECS 588: Computer and Network Security. Introduction January 14, 2014
EECS 588: Computer and Network Security Introduction January 14, 2014 Today s Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components of your grade
More informationA Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014
A Small Business Approach to Big Business Cyber Security Brent Bettis, CISSP 23 September, 2014 1 First, a Video http://www.youtube.com/watch?v=cj8wakqwlna 2 3 Agenda Threat Landscape Strategic Initiatives
More informationThe Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
More informationCybersecurity Best Practices
Ten Essential Cybersecurity Best Practices Banking Business Employees Brought to you by: 1 Did you know? One in five small-to-medium-sized companies were the victims of cyber breaches in 2013.1 In 76%
More informationB-10: Wireshark vs. The Cloud Thursday June 17, 2010. 10:45am -12:15pm
B-10: Wireshark vs. The Cloud Thursday June 17, 2010. 10:45am -12:15pm Jasper Bongertz Senior Technical Consultant Synerity Systems / Fast Lane GmbH SHARKFEST 10 Stanford University June 14-17, 2010 Physical
More informationProject 25 Security Services Overview
Project 25 Security Services Overview Bill Janky Director, System Design Harris Corporation 1 Agenda Overview of P25 Security Services What s new; What s coming Other topics 2 If you re in Public Safety...
More informationFirewalls for small business
By James Thomas DTEC 6823 Summer 2004 What is a firewall? Firewalls for small business A firewall is either hardware, software or a combination of both that is used to prevent, block or should I say try
More informationSecurity Education for the new Generation
Security Education for the new Generation SESSION SESSION ID: ID: MASH-W02 Wednesday, Feb 26, 9:20 AM @ WEST 3018 Jacob West Chief Technology Officer HP Enterprise Security Products Matt Bishop Professor
More informationMicrogrid Technology: Enabling Energy Reliability and Security Opportunities in Campus, Commercial & Industrial Communities
Microgrid Technology: Enabling Energy Reliability and Security Opportunities in Campus, Commercial & Industrial Communities Ivette Sanchez, LEED AP MAYA Smart Energy Consulting Promoting Sustainability
More informationTECH GUYS. Protect Your Practice with a Security Risk Assessment. HCTechGuys.com. HCTechGuys.com TECH GUYS
Hill Country Protect Your Practice with a Security Risk Assessment Hill Country Protect Your Practice with a Security Risk Assessment Cyber Security in Healthcare is a Growing Problem With more healthcare
More informationEnterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3
4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3 1,2College of Mathematical
More informationTrain Like You Will Fight
Train Like You Will Fight Reliability First Workshop 1 October 2015 Dr. Joe Adams Disclaimer 2 The content of this presentation is based on personal and professional experience of the speaker. The content
More informationTRUST:Team for Research in Ubiquitous Secure Technologies
TRUST:Team for Research in Ubiquitous Secure Technologies An Overview Shankar Sastry (Berkeley), Ruzena Bajcsy (Berkeley), Sigurd Meldal (SJSU), John Mitchell (Stanford), Mike Reiter (CMU), Fred Schneider
More informationThe Internet of Things Risks and Challenges
The Internet of Things Risks and Challenges Providing the insight that enables our customers to make informed business decisions. Antony Price 03rd March 2015 Contents Internet of Things - The next threat
More informationNational Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
More informationThe FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
More informationReducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
More informationEECS 588: Computer and Network Security. Introduction
EECS 588: Computer and Network Security Introduction January 13, 2014 Today s Cass Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components of your grade
More informationHOW TO GET A PH.D. IN MATHEMATICS IN A TIMELY FASHION
HOW TO GET A PH.D. IN MATHEMATICS IN A TIMELY FASHION SARA C. BILLEY Mathematics research is fun, engaging, difficult, frustrating, and different than most 9-5 jobs. This article is meant to provide some
More informationThis session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
More informationINFORMATION OPERATIONS & SECURITY SPRING REVIEW MTG
INFORMATION OPERATIONS & SECURITY SPRING REVIEW MTG March 04, 2014 Integrity Service Excellence Dr. Robert Herklotz Program Officer INFORMATION OPERATIONS & SECURITY Air Force Office of Scientific Research
More informationOverall Network Security. Daniel J. Nealis
Overall Network Security Daniel J. Nealis Overall Network Security? What does Network mean?? Bridges/routers/hubs Firewalls Ethernet/Token Ring/Frame Relay/Switched Networks Public vs. Private Networks
More informationPlanetLab: a Petri dish for the next Internet. Timothy Roscoe Intel Research at Berkeley
: a Petri dish for the next Internet Timothy Roscoe Intel Research at Berkeley What is? An open, shared testbed for Developing Deploying Accessing - planetary-scale services. What would you do if you had
More informationTop 10 Tips to Keep Your Small Business Safe
Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,
More informationAre Second Generation Firewalls Good for Industrial Control Systems?
Are Second Generation Firewalls Good for Industrial Control Systems? Bernie Pella, CISSP Schneider Electric Cyber Security Services bernie.pella@schneider-electric.com Firewall Overview Firewalls provide
More informationCLOUD COMPUTING SECURITY
CLOUD COMPUTING SECURITY HP Labs G-Cloud A Secure Cloud Infrastructure Frederic Gittler Cloud and Security Laboratory, HP Labs Covering A few words about HP Labs An outline of Cloud Computing Business
More informationSecuring Internet Information Server (IIS) and Achieving Sarbanes-Oxley Compliance
Securing Internet Information Server (IIS) and Achieving Sarbanes-Oxley Compliance Version 5.0: December 15, 2007 Case Study: United Security Bank (NASDAQ: UFBO) Company profile FOUNDED IN 1987, UNITED
More informationPractical guide for secure Christmas shopping. Navid
Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security
More informationImplemen'ng an Enterprise Framework for Secure Health Data Exchange
Implemen'ng an Enterprise Framework for Secure Health Data Exchange Gregory Franklin, Assistant Secretary, California Technology Agency Jim Rose, Deputy CIO, Indiana Office of Technology Robert Myles,
More informationHomeland Open Security Technology HOST Program
Homeland Open Security Technology HOST Program Informational Briefing August 2011 Sponsored by: U.S. Department of Homeland Security Science and Technology Directorate Implemented by: Open Technology Research
More informationEvolution of Cyber Security and Cyber Threats with focus on Cloud Computing
Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing Igor Nai Fovino-Head of Research GCSEC The last two years will surely enter in the history of IT Security. 2010 was the year
More informationJoint Information Environment Single Security Architecture (JIE SSA)
Joint Information Environment Single Security Architecture (JIE SSA) Danielle Metz DISA JIE Special Assistant to the Mission Assurance Executive /JIE SSA Integrated Design Team Lead 12 May 2014 Problem
More informationThe Importance of Cyber Threat Intelligence to a Strong Security Posture
The Importance of Cyber Threat Intelligence to a Strong Security Posture Sponsored by Webroot Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research Report
More informationBridging the gap between COTS tool alerting and raw data analysis
Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading
More informationInformation Protection in Today s Changing Mobile and Cloud Environments
Information Protection in Today s Changing Mobile and Cloud Environments Art Gilliland, Sr. Vice President Symantec, Information Security Group Session ID: SPO1-107 Session Classification: Intermediate
More informationTHE HACKERS NEXT TARGET
Governance and Risk Management THE HACKERS NEXT TARGET YOUR WEB AND SOFTWARE Anthony Lim MBA CISSP CSSLP FCITIL Director, Security, Asia Pacific Rational Software ISC2 CyberSecurity Conference 09 Kuala
More informationSociety, Law Enforcement and the Internet
Society, Law Enforcement and the Internet Models for Give-and-Take Carter Bullard CEO/President QoSient, LLC 150 E 57th Street Suite 12D New York, New York 10022 ICCS 2010 New York, New York carter@qosient.com
More informationSOFTARE SECURTY OF WEB APPLICATION AND WEB ATTACKS
SOFTARE SECURTY OF WEB APPLICATION AND WEB ATTACKS Hanım Eken Gazi University hanim.eken@os.gazi.edu.tr Abstract Today, thousands of applications world-wide web, and mobile media applications are used
More informationGetting real about cyber threats: where are you headed?
Getting real about cyber threats: where are you headed? Energy, utilities and power generation companies that understand today s cyber threats will be in the best position to defeat them June 2011 At a
More informationSECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
More informationWHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
More informationKeeping an Unfair Advantage in a Globalized & Commoditized World
Keeping an Unfair Advantage in a Globalized & Commoditized World Douglas C. Schmidt d.schmidt@vanderbilt.edu Principal Researcher Software Engineering Institute Carnegie Mellon University Professor of
More informationFamily Leave Policy Proposal for Engineering and Public Policy Author: Rebecca Balebako
Family Leave Policy Proposal for Engineering and Public Policy Author: Rebecca Balebako Introduction Currently, Engineering and Public Policy (EPP) graduate students have no guidelines or policy for taking
More informationIS PRIVATE CLOUD A UNICORN?
IS PRIVATE CLOUD A UNICORN? With all of the discussion, adoption, and expansion of cloud offerings there is a constant debate that continues to rear its head: Public vs. Private or more bluntly Is there
More informationCloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
More information+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains
Information Security Advisor December 2015 Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains +GAMES Spot the insider & Human firewall Filtering EXerCISE Good
More informationUnderstanding and evaluating risk to information assets in your software projects
Understanding and evaluating risk to information assets in your software projects ugh.. what a mouthful Dana Epp Windows Security MVP Who am I? Microsoft Windows Security MVP Information Security Professional
More informationCyber crime. lingua house. 1 Internet crime. Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + Match the following words to their correct definitions:
A A GENERAL ENGLISH Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + 1 Internet crime Match the following words to their correct definitions: 1. hacker a. a computer program which can make copies of itself
More informationThreat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research
Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research 2 3 6 7 9 9 Issue 1 Welcome From the Gartner Files Definition:
More informationThe University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research
The University of Alabama Cyber Research Initiatives Cyber Forensics Research Cyber Security Research Cyber Forensics Research Department of Criminal Justice College of Arts and Sciences Cyber Crime Research
More informationefolder White Paper: Three Network Security Tools to Block Dropbox in the Workplace
efolder White Paper: Three Network Security Tools to Block Dropbox in the Workplace December 2014 Copyright 2014, efolder, Inc. Introduction Bring your own device (BYOD) has been on the rise as employees
More information1 Introduction. 2 What is Cloud Computing?
1 Introduction Table of Contents 1 Introduction 2 What is Cloud Computing? 3 Why is Cloud Computing important? 4 Why Cloud deployments fail? 5 Holistic Approach to cloud computing implementation 6 Conclusion
More informationHIPAA Compliance for Mobile Healthcare. Peter J. Haigh, FHIMSS Verizon peter.haigh@verizon.com
HIPAA Compliance for Mobile Healthcare Peter J. Haigh, FHIMSS Verizon peter.haigh@verizon.com Comply or Context - Privacy & Security under HIPAA Privacy is what you have already promised to do, since 4/14/2003
More informationCERT's role in national Cyber Security: policy suggestions
CERT's role in national Cyber Security: policy suggestions Subject: Legal Aspect of Cyber Security. Author: Vladimir Chitashvili Lecture: Anna-Maria Osula What is national Cyber Security is? In another
More informationManaging the Unpredictable Human Element of Cybersecurity
CONTINUOUS MONITORING Managing the Unpredictable Human Element of Cybersecurity A WHITE PAPER PRESENTED BY: May 2014 PREPARED BY MARKET CONNECTIONS, INC. 14555 AVION PARKWAY, SUITE 125 CHANTILLY, VA 20151
More informationMobile Devices and Malicious Code Attack Prevention
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Malicious Code and Mobile Devices: Best Practices for Securing Mobile Environments Sponsored
More informationCloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost
y Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost An Osterman Research White Paper Published January 2009 SPONSORED BY onsored by Phone: +1 877-21-TREND www.trendmicro.com/go/smartprotection
More informationOutline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses
Outline IT Security: General Trends and Research Directions Sherif El-Kassas Department of Computer Science The American University in Cairo Practical considerations Academic and research perspective National
More informationRealization of Your Dream: Higher Study, Partnership, Collaboration Opportunities
Realization of Your Dream: Higher Study, Partnership, Collaboration Opportunities Dr. Ashutosh Dutta, Ph.D. Lead Scientist, AT&T New Jersey, USA Email: ashutosh.dutta@ieee.org Realization of Your Dream
More informationSoftware Quality and Infrastructure Protection for Diffuse Computing
FY2001 ONR CIP/SW URI Software Quality and Infrastructure Protection for Diffuse Computing Principal Investigator: Andre Scedrov Institution: University of Pennsylvania URL: http://www.cis.upenn.edu/spyce
More informationBasic Computer Security Part 2
Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome
More informationVoice Over IP Technology. Zlatko Jovanovic. International Academy of Design and Technology
Voice Over IP Technology Zlatko Jovanovic International Academy of Design and Technology Abstract New technologies often give us new, different way of doing things, than we are used to. One of the new
More information2010 White Paper Series. Layer 7 Application Firewalls
2010 White Paper Series Layer 7 Application Firewalls Introduction The firewall, the first line of defense in many network security plans, has existed for decades. The purpose of the firewall is straightforward;
More information