SERC Security. By Jennifer Bayuk
|
|
|
- Byron Cox
- 9 years ago
- Views:
Transcription
1 SERC Security By Jennifer Bayuk Annual SERC Research Review October 5 6, 2011 University of Maryland MarrioF Inn and ConvenHon Center HyaFsville, MD Annual SERC Research Review, October 5 6,
2 SERC Security Research Tasks RT8 System Security Roadmap Our foundahon RT28 System Aware Security Currently achve PI is Barry Horowitz, UVA RT32 System Security Metrics Proposed PI is Jennifer Bayuk If accepted will require mulhple security SME collaborators RT38 Cyber Security Decision Support Proposed PI is Barry Horowitz Builds on RT28 Annual SERC Research Review, October 5 6,
3 RT 8: System Security Roadmap The SERC system security roadmap was motivated by the fact that current defensive strategies add tremendously to cost and do not respond effectively to the growing sophistication of attacks, as well as the recognition that today s systems engineers are inadequately prepared to address system security requirements. RT8 was a 8-month effort with representation from the majority of the SERC members, as well as a larger community of invited security subject matter experts. The final report emphasized that progress in system security research must follow a scientific process that includes clear problem statements, thorough problem background descriptions including a full literature review, clearly defined solution criteria, and proposed hypothesis formulated to shed light on a solution and how it may be proven or disproven. As security luminary and roadmap reviewer Peter G. Neumann said in his response to the final draft, the roadmap was a very worthy step forward in security research. Annual SERC Research Review, October 5 6,
4 RT 28: System Aware Security Successful security design patterns should yield metrics that relate increases in security to corresponding impacts on system performance. Such metrics provide much needed information required by the engineering trade-space. Building on RT8: Systems Security Engineering Roadmap, RT28 research in architecture frameworks will devise systems security engineering methods that integrate fault tolerant and automatic control system technologies with cyber security technologies, processes, and tools to develop System-Aware security services that will be transferable between systems with common functionality. Key Deliverables: Description of system-aware security as an architectural concept, to include a prototype of system-aware security services architecture to demonstrate integration of services to dynamically adapt performance based upon risk and system performance implications. Design patterns with embedded metrics regarding security/system performance tradeoffs. Annual SERC Research Review, October 5 6,
5 RT 32: System Security Metrics The state of the art and current practice in security metrics use certification and testing strategies rather than correctness and effectiveness criteria. Security requirements can be verified using well known certification techniques in combination with continuous monitoring technologies, but can be validated only with respect to system mission and purpose. Building on RT8: Systems Security Engineering Roadmap, RT32 research in security metrics shall provide the theoretical foundation to support security requirement analysis and security models for use in both security requirements verification and validation. Key Deliverables: Security framework that combines both security and systems engineering techniques from other disciplines to combine measurable systems security attributes into a working definition of systems-level security that can be measured (to include output from RT28). Evaluation report via the framework for DoD-selected case studies. Annual SERC Research Review, October 5 6,
6 The uncertainties and judgment calls surrounding cyber security call for a process through which DOD operators and procurement officers could interact with system designers in exploring the tradeoff space as a precursor to selecting and evaluating final design candidates. Building on RT28: Cyber Security Decision Support, RT-38, will build upon the security scoring system developed in RT-28. RT-38 research will focus on the design of a collaboration environment that addresses the influences of uncertainties in expert judgment and decision-maker preferences and how they influence complex decision making. This work will have a foundation in the mathematics of multi-objective decision theory under uncertainty, and will be tailored to enable practical use. Key Deliverables: RT 38: Cyber Security Decision Support A prototype distributed software system for multi-agent decision support. Analysis and documentation of results for the use of the prototype in formative experiments, initial evaluations, and technology demonstrations. Annual SERC Research Review, October 5 6,
7 Remainder of Session Agenda Summary of RT28 Rick Jones, UVA Roundtable discussion Annual SERC Research Review, October 5 6,
System Aware Cyber Security
System Aware Cyber Security Application of Dynamic System Models and State Estimation Technology to the Cyber Security of Physical Systems Barry M. Horowitz, Kate Pierce University of Virginia April, 2012
INCOSE System Security Engineering Working Group Charter
1 PURPOSE Recent data breach cases and industrial control system incidents call attention to the inadequacy of current approaches to systems security [1, 2]. Each case presents more compelling evidence
System Aware Cyber Security Architecture
System Aware Cyber Security Architecture Rick A. Jones October, 2011 Research Topic DescripAon System Aware Cyber Security Architecture Addresses supply chain and insider threats Embedded into the system
What methods are used to conduct testing?
What is testing? Testing is the practice of making objective judgments regarding the extent to which the system (device) meets, exceeds or fails to meet stated objectives What the purpose of testing? There
Assessment Criteria The learner can: 1.1 Describe the purpose of a team
Unit Title: Set objectives and provide support for team members OCR Unit No: 50 Sector Unit No: MSC B5 Level: 3 Credit value: 5 Guided learning hours: 35 Unit purpose and aim This purpose of this unit
Company Background EMAGINED SECURITY. 2014 All rights reserved. www.emagined.com
Company Background Emagined Security, a privately owned and operated company, has been helping organizations with their security needs with an excellent track record of success since 2002. The company
MBA Degree Plan in Finance. (Thesis Track)
MBA Degree Plan in Finance (Thesis Track) First: General Rules and Conditions Plan Number 2012 Thesis 1- This plan conforms to the valid regulations of the programs of graduate studies 2- Specialists allowed
GENERAL SERVICES ADMINISTRATION FEDERAL SUPPLY SERVICE AUTHORIZED FEDERAL SUPPLY SCHEDULE PRICE LIST
Management and Engineering Technologies International, Inc. (GS-10F-0349M) GENERAL SERVICES ADMINISTRATION FEDERAL SUPPLY SERVICE AUTHORIZED FEDERAL SUPPLY SCHEDULE PRICE LIST On-line access to contract
STUDENT OUTCOMES ASSESSMENT PLAN (SOAP)
MS PROGRAM IN C OMPUTER SCIENCE DEPARTMENT OF C OMPUTER SCIENCE College of Science and Mathematics STUDENT OUTCOMES ASSESSMENT PLAN (SOAP) I. Mission Statement The mission of the Department of Computer
U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview
U.S. Army Research, Development and Engineering Command Cyber Security CRA Overview Dr. Ananthram Swami, ST Network Science 18FEB 2014 Cyber Security Collaborative Research Alliance A Collaborative Venture
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU
How To Design A Cyber Security Architecture
A System-Aware Cyber Security Architecture Rick A. Jones and Barry Horowitz* Regular Paper Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904 A SYSTEM-AWARE CYBER SECURITY
Enterprise Security Tactical Plan
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise
The Role of ITIL in IT Governance
The Role of ITIL in IT Governance Leveraging IT Governance around IT Service Management Presented By: Rick Leopoldi RL Information Consulting LLC Q2 2005 People Process Technology Why Focus on IT Governance
U.S. Defense Priorities OSD PA&E
1 U.S. Defense Priorities Deter potential adversaries and defend America and American interests Counter asymmetric threats including terrorism, cyber attacks and ballistic and cruise missiles Fight and
Session 4. System Engineering Management. Session Speaker : Dr. Govind R. Kadambi. M S Ramaiah School of Advanced Studies 1
Session 4 System Engineering Management Session Speaker : Dr. Govind R. Kadambi M S Ramaiah School of Advanced Studies 1 Session Objectives To learn and understand the tasks involved in system engineering
Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment
Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Project Management Self-Assessment Contents Introduction 3 User Guidance 4 P3M3 Self-Assessment Questionnaire
Program Management: Opportunity or CLM?
Program Management: Opportunity or CLM? Agenda It s a game do you know the rules? So who wants to be a Program Manager? Definitions Check list for what it REALLY takes Questions 2 It s a game do you know
An Introduction to Organizational Maturity Assessment: Measuring Organizational Capabilities
International Public Management Association Assessment Council An Introduction to Organizational Maturity Assessment: Measuring Organizational Capabilities Selena Rezvani, M.S.W. Objectives Define and
The Application Readiness Level Metric
The Application Readiness Level Metric NASA Application Readiness Levels (ARLs) The NASA Applied Sciences Program has instituted a nine-step Application Readiness Level (ARL) index to track and manage
Copyright 2014 by ABET. Proposed revisions to ABET Criterion 3 (Student outcomes [a-k]) and Criterion 5 (Curriculum)
Proposed revisions to ABET Criterion 3 (Student outcomes [a-k]) and Criterion 5 (Curriculum) What are Student outcomes [a-k]? 2 a) an ability to apply knowledge of mathematics, science, and engineering
CHALLENGER INSTITUTE OF TECHNOLOGY. Applied Engineering
CHALLENGER INSTITUTE OF TECHNOLOGY Applied Engineering 2 Applied Engineering Graduates with real opportunities Challenger Institute s engineering training capitalises on its close liaison with industry
NASA OFFICE OF INSPECTOR GENERAL
NASA OFFICE OF INSPECTOR GENERAL OFFICE OF AUDITS SUITE 8U71, 300 E ST SW WASHINGTON, D.C. 20546-0001 April 14, 2016 TO: SUBJECT: Renee P. Wynn Chief Information Officer Final Memorandum, Review of NASA
Project Management Professional (PMP)
Project Management Professional (PMP) Duration: 5 days Course Objectives: PMI s Project Management Professional (PMP) credential is the most important industry-recognized certification for project managers.
Procurement Innovation for Cloud Services in Europe
Procurement Innovation for Cloud Services in Europe Author: Bob Jones (CERN) on behalf of the PICSE consortium www.picse.eu/ @PICSEPROCURE Focus: cloud service procurement and the Digital Single Market
Faculty of Organizational Sciences
Faculty of Organizational Sciences Management EC TS: 60/ L anguage of instruc tion: Serbian/ degree: M A S TER The Master s degree study program of Management is the continuation of undergraduate studies
Springer SUPPLY CHAIN CONFIGURATION CONCEPTS, SOLUTIONS, AND APPLICATIONS. Cham Chandra University of Michigan - Dearborn Dearborn, Michigan, USA
SUPPLY CHAIN CONFIGURATION CONCEPTS, SOLUTIONS, AND APPLICATIONS Cham Chandra University of Michigan - Dearborn Dearborn, Michigan, USA Jänis Grabis Riga Technical University Riga, Latvia Springer Contents
Correlation between competency profile and course learning objectives for Full-time MBA
Correlation between competency and course for Full-time MBA Competency management in the Organizational Behavior and Leadership Managing Sustainable Corporations Accounting Marketing Economics Human Resource
HKITPC Competency Definition
HKITPC Competency Definition for the Certification copyright 2011 HKITPC HKITPC Competency Definition Document Number: HKCS-CD-L1L2 Version: 1.0 Date: June 2011 Prepared by Hong Kong IT Professional Certification
P3M3 Portfolio Management Self-Assessment
Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Portfolio Management Self-Assessment P3M3 is a registered trade mark of AXELOS Limited Contents Introduction
1. What is PRINCE2? Projects In a Controlled Environment. Structured project management method. Generic based on proven principles
1. What is PRINCE2? Projects In a Controlled Environment Structured project management method Generic based on proven principles Isolates the management from the specialist 2 1.1. What is a Project? Change
What is a life cycle model?
What is a life cycle model? Framework under which a software product is going to be developed. Defines the phases that the product under development will go through. Identifies activities involved in each
Lecture 8. Systems engineering L E C T U R E. SIMILAR process. Zuzana Bělinová. Faculty of Transportation Sciences, CTU in Prague
L E C T U R E 8 SIMILAR process LECTURE 8 - OVERVIEW Theoretical foundations of many methodologies - Typical SE process SYSTEMS ENGINEERING BASIC FACTS Systems Engineering is responsible for creating a
Space project management
ECSS-M-ST-80C Space project management Risk management ECSS Secretariat ESA-ESTEC Requirements & Standards Division Noordwijk, The Netherlands Foreword This Standard is one of the series of ECSS Standards
Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy
Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee
CAPABILITY FOR DEFENCE IN TURKEY
NETWORK ENABLED CAPABILITY FOR DEFENCE IN TURKEY Mr. Mete ARSLAN, [email protected] Presentation Plan Introduction of SSM SSM point of view for NEC concept and National motivation NEC Technical Feasibility
Measurement Information Model
mcgarry02.qxd 9/7/01 1:27 PM Page 13 2 Information Model This chapter describes one of the fundamental measurement concepts of Practical Software, the Information Model. The Information Model provides
Methods for Assessing Student Learning Outcomes
Methods for Assessing Student Learning Outcomes Dr. Jennifer E. Roberts Coordinator of Academic Assessment Office of Institutional Research, Planning, and Assessment Northern Virginia Community College
Cybersecurity and Oversight of Information System Security (CDSE ED 514)
Cybersecurity and Oversight of Information System Security (CDSE ED 514) Defense Security Service (DSS) Center for Development of Security Excellence (CDSE) Education Division SAMPLE COURSE SYLLABUS* 1
The United States Department of Defense Revitalization of System Security Engineering Through Program Protection
The United States Department of Defense Revitalization of System Security Engineering Through Program Protection Kristen Baldwin Principal Deputy, DASD, Systems Engineering United States Department of
Digital Marketing Specialist
v Digital Marketing Specialist Our Vision To be the best company our employees ever work for, the best bank our customers ever do business with and the best investment for our shareholder. Our Mission
NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing
NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing Purpose of the Workshop In October 2014, the President s Council of Advisors on Science
INTERNATIONAL ASSOCIATION OF INSURANCE SUPERVISORS
Standard No. 13 INTERNATIONAL ASSOCIATION OF INSURANCE SUPERVISORS STANDARD ON ASSET-LIABILITY MANAGEMENT OCTOBER 2006 This document was prepared by the Solvency and Actuarial Issues Subcommittee in consultation
AC 2011-109: ENGINEERING MANAGEMENT PROGRAM ACCREDI- TATION: COMPARING AACSB AND ABET
AC 2011-109: ENGINEERING MANAGEMENT PROGRAM ACCREDI- TATION: COMPARING AACSB AND ABET Amy K. Zander, Ph.D., P.E., Clarkson University Amy K. Zander is a professor and the Director of the Engineering &
Following is a discussion of the Hub s role within the health insurance exchanges, the results of our review, and concluding observations.
Testimony of: Kay Daly Assistant Inspector General for Audit Services Office of Inspector General, U.S. Department of Health and Human Services Hearing Title: The Threat to Americans Personal Information:
AS9100 B to C Revision
AS9100 B to C Revision Key: Additions Deletions Clarifications 1.2 Application AS9100C Key Additions This standard is intended for use by organizations that design, develop and/or produce aviation, space
Security Considerations for the Spiral Development Model
Security Considerations for the Spiral Development Model Loye Lynn Ray University of Maryland University College 3501 University Blvd East Adelphi, MD 20783 [email protected] 717-718-5727 Abstract
Supervisor of Banks: Proper Conduct of Banking Business [9] (4/13) Sound Credit Risk Assessment and Valuation for Loans Page 314-1
Sound Credit Risk Assessment and Valuation for Loans Page 314-1 SOUND CREDIT RISK ASSESSMENT AND VALUATION FOR LOANS Principles for sound credit risk assessment and valuation for loans: 1. A banking corporation
State of Minnesota IT Governance Framework
State of Minnesota IT Governance Framework June 2012 Table of Contents Table of Contents... 2 Introduction... 4 IT Governance Overview... 4 Process for Developing the New Framework... 4 Management of the
Software Architecture Professional Certificate
Software Architecture Professional Certificate The Software Architecture Professional Certificate program will equip you with state-of-the-art architecture practices and concepts. You will gain experience
UNCLASSIFIED. R-1 Program Element (Number/Name) PE 0601228D8Z / Historically Black Colleges and Universities and Minority Institutions
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 1: Basic Research COST ($ in Millions)
INDECO Management Solutions
INDECO Management Solutions Learning to manage projects as though they mattered: implementing strategy, adding value, and delivering benefits through project management Peter W.G. Morris Professor of Construction
Best Practices for the Acquisition of COTS-Based Software Systems (CBSS): Experiences from the Space Systems Domain
GSAW 2004 Best Practices for the Acquisition of COTS-Based Software Systems (CBSS): Experiences from the Space Systems Domain Richard J. Adams and Suellen Eslinger Software Acquisition and Process Office
Practical Experience Requirements Initial Professional Development for Professional Accountants
International Accounting Education Standards Board AGENDA ITEM 2-3 Revised Draft of IEPS(Clean Version) Proposed International Education Practice Statement Practical Experience Requirements Initial Professional
Assessing a Scientific Data Center as a Trustworthy Digital Repository
Assessing a Scientific Data Center as a Trustworthy Digital Repository Robert R. Downs 1 and Robert S. Chen 2 1 [email protected] 2 [email protected] NASA Socioeconomic Data and Applications
Space Ground Services in the Joint Information Environment (JIE)
Space Ground Services in the Joint Information Environment (JIE) Scott Niebuhr, Jeremy Burton, Judy Kerner, Sky Troyer The Aerospace Corporation 2015 The Aerospace Corporation Space Ground Services in
TALENT SCORECARD. Evaluating And Measuring Talent Strategy Outcomes
TALENT SCORECARD Evaluating And Measuring Talent Strategy Outcomes DELIVERING ON STRATEGY Organisations that are recognised as high performers make talent management a strategic priority that is central
Introduction to Systems Analysis and Design
Introduction to Systems Analysis and Design What is a System? A system is a set of interrelated components that function together to achieve a common goal. The components of a system are called subsystems.
EST.03. An Introduction to Parametric Estimating
EST.03 An Introduction to Parametric Estimating Mr. Larry R. Dysert, CCC A ACE International describes cost estimating as the predictive process used to quantify, cost, and price the resources required
Intellectual Property& Technology Law Journal
Intellectual Property& Technology Law Journal Edited by the Technology and Proprietary Rights Group of Weil, Gotshal & Manges LLP VOLUME 26 NUMBER 6 JUNE 2014 A Practical Approach to Working with Open
Six Sigma Leadership Guide for Program Success: S-SLEF Framework
Six Sigma Leadership Guide for Program Success: S-SLEF Framework Governance Sandy L. Furterer, PhD, MBA ASQ Certified Six Sigma Black Belt, ASQ Certified Quality Engineer, ASQ Fellow, Harrington Institute
System/Data Requirements Definition Analysis and Design
EXECUTIVE SUMMARY This document provides an overview of the Systems Development Life-Cycle (SDLC) process of the U.S. House of Representatives. The SDLC process consists of seven tailored phases that help
White Paper Operations Research Applications to Support Performance Improvement in Healthcare
White Paper Operations Research Applications to Support Performance Improvement in Healthcare Date: April, 2011 Provided by: Concurrent Technologies Corporation (CTC) 100 CTC Drive Johnstown, PA 15904-1935
Internal Quality Assurance Arrangements
National Commission for Academic Accreditation & Assessment Handbook for Quality Assurance and Accreditation in Saudi Arabia PART 2 Internal Quality Assurance Arrangements Version 2.0 Internal Quality
Office of the Chief Information Officer
Office of the Chief Information Officer Business Plan: 2012 2015 Department / Ministère: Executive Council Date: November 15, 2012 1 P a g e This Page Left Intentionally Blank 2 P a g e Contents The Business
Program Rating Sheet - Athens State University Athens, Alabama
Program Rating Sheet - Athens State University Athens, Alabama Undergraduate Secondary Teacher Prep Program: Bachelor of Science in Secondary Education with Certification, Social Science 2013 Program Rating:
Setting the Expectation for Success: Performance Management & Appraisal System
HILLSBOROUGH COUNTY CIVIL SERVICE BOARD OFFICE Setting the Expectation for Success: Performance Management & Appraisal System Supervisor s Guide PROCESS OVERVIEW Setting the Expectation for Success: Performance
Business Intelligence and Decision Support Systems
Chapter 12 Business Intelligence and Decision Support Systems Information Technology For Management 7 th Edition Turban & Volonino Based on lecture slides by L. Beaubien, Providence College John Wiley
All of these circumstances indicate that the world of tomorrow is as different as today s water utility business is from that of yesteryear.
EXECUTIVE SUMMARY PROJECT OVERVIEW Why Should We Invest in Strategic Planning? Strategic planning is a set of intentions expressed as a plan. The plan turns the intentions into reality by focusing on the
Set objectives and provide support for team members (B5) OCR Unit Number: 3
Unit Title: Set and provide support for team (B5) OCR Unit Number: 3 Unit Number: M/600/9600 Level: 3 Credit value: 5 Guided learning hours: 35 Unit purpose and aim This purpose of this unit is to provide
Set objectives and provide support for team members (B5)
Unit Title: Unit Number 25 Level: 3 Credit value: 5 Guided learning hours: 35 Unit expiry date: 28/2/2010 Unit purpose and aim Set and provide support for team (B5) This purpose of this unit is to provide
IT Consulting Proposal Template
IT Consulting Proposal Template From: John Jones IT Consulting [email protected] To: Sample Recipient Sample Company [email protected] IT CONSULTING PROPOSAL March 10, 2014 Prepared
Project management. Objectives. Topics covered. Organizing, planning and scheduling software projects DISCUSSION
Project management 1 Objectives 2 Organizing, planning and scheduling software projects DISCUSSION Project Managers? To introduce software project management and to describe its distinctive characteristics
Security Engineering Project
Security Engineering Project Part 1a System Aware Cyber Security for an Autonomous Surveillance System On Board an Unmanned Arial Vehicle Part 1b System Aware Cyber-Security Application to Unmanned Aircraft
Developing Business Architecture with TOGAF
Developing Business Architecture with TOGAF Building Business Capability 2013 Las Vegas, NV Armstrong Process Group, Inc. www.aprocessgroup.com Objectives Introduce The Open Group Architecture Framework
PROJECT MANAGEMENT PLAN CHECKLIST
PROJECT MANAGEMENT PLAN CHECKLIST The project management plan is a comprehensive document that defines each area of your project. The final document will contain all the required plans you need to manage,
STANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices
A S I S I N T E R N A T I O N A L Supply Chain Risk Management: Risk Assessment A Compilation of Best Practices ANSI/ASIS/RIMS SCRM.1-2014 RA.1-2015 STANDARD The worldwide leader in security standards
Software Project Models
INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 1, ISSUE 4 135 Software Project Models Abhimanyu Chopra, Abhinav Prashar, Chandresh Saini [email protected],
Using Your PMO to Drive Successful Organizational Change Management
Using Your PMO to Drive Successful Organizational Change Management Joe Saliunas, Booz Allen Hamilton 11 November 2012 1 Agenda Organizational change management overview Case studies PMBOK Guide processes
