Cyber Security Research: A Personal Perspective
|
|
|
- Willa Bradford
- 10 years ago
- Views:
Transcription
1 CS 6393 Lecture 1 Cyber Security Research: A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 18, 2013 [email protected] Ravi Sandhu 1
2 Prognosis Cyberspace will become orders of magnitude more complex and confused very quickly Overall this is a very positive development and will enrich human society It will be messy but need not be chaotic! Cyber security research and practice are loosing ground Ravi Sandhu 2
3 Security Objectives INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure Ravi Sandhu 3
4 Security Objectives USAGE purpose INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure Ravi Sandhu 4
5 Security Objectives USAGE purpose INTEGRITY modification USAGE AVAILABILITY access CONFIDENTIALITY disclosure Ravi Sandhu 5
6 Security Objectives Single Enterprise owns all the information employs all the users Multiple Interacting Parties no one owns all the information no one can unilaterally impose policy on all the users Ravi Sandhu 6
7 Cyber Security Scope Computer security Information security = Computer security + Communications security Information assurance Mission assurance Includes cyber physical Ravi Sandhu 7
8 Fundamental Challenge What is fundamental to cyber security? Where are the boundaries of a cyber system? What are the goals of cyber security? Ravi Sandhu 8
9 Cyber Security Goal Enable system designers and operators to say: This system is secure Ravi Sandhu 9
10 Cyber Security Goal Enable system designers and operators to say: This system is secure Not attainable There is an infinite supply of attacks Ravi Sandhu 10
11 Cyber Security Goal Enable system designers and operators to say: This system is secure enough Many successful examples Ravi Sandhu 11
12 The ATM (Automatic Teller Machine) system is secure enough global in scope The ATM Paradox Not attainable via current cyber security science, engineering, doctrine not studied as a success story Similar paradoxes apply to on-line banking e-commerce payments Ravi Sandhu 12
13 High Assurance Cyber Security US President s nuclear football Ravi Sandhu 13
14 Cyber Security Goal Enable system designers and operators to say: This system is secure enough In an innovative ecosystem the innovation drive will ensure that the bar for enough will be fairly low Ravi Sandhu 14
15 Productivity-Security Cyber Security is all about tradeoffs Productivity Security Let s build it Cash out the benefits Next generation can secure it Let s not build it Let s bake in super-security to make it unusable/unaffordable Let s sell unproven solutions There is a middle ground We don t know how to predictably find it Ravi Sandhu 15
16 Grand Challenges Develop a scientific discipline to predictably find the sweet spots for different application and mission contexts to predictably find, incentivize and deploy microsec that leads to desirable macrosec outcomes that can be meaningfully taught in Universities at all levels: BS, MS, PhD Prognosis we shall succeed (we have no choice) but we need to change to succeed Ravi Sandhu 16
17 Butler Lampson Paraphrased (I think) Computer scientists could never have designed the web because they would have tried to make it work. But the Web does work. What does it mean for the Web to work? Security geeks could never have designed the ATM network because they would have tried to make it secure. But the ATM network is secure. What does it mean for the ATM network to be secure? Ravi Sandhu 17
The Future of Access Control: Attributes, Automation and Adaptation
Institute for Cyber Security The Future of Access Control: Attributes, Automation and Adaptation Prof. Ravi Sandhu Executive Director and Endowed Chair SERE NIST, Gaithersberg June 19, 2013 [email protected]
The Future of Cyber Security
Institute for Cyber Security The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair [email protected] www.profsandhu.com www.ics.utsa.edu Ravi Sandhu 1 Cyber Security Status
The Science, Engineering, and Business of Cyber Security
Institute for Cyber Security The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security COS
The Science, Engineering, and Business of Cyber Security
Institute for Cyber Security The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security University
Security Models: Past, Present and Future
Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 [email protected] www.profsandhu.com
The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It?
Institute for Cyber Security The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21, 2011 [email protected]
Cyber Security: What You Need to Know
Cyber Security: What You Need to Know Prof. Ravi Sandhu Executive Director and Chief Scientist Institute for Cyber Security University of Texas at San Antonio October 2009 [email protected] www.profsandhu.com
Cyber Security: Past, Present and Future
Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August 2009 [email protected] www.profsandhu.com
Lake at IPEN location
Mission Our mission is to improve the Brazilian people quality of life by producing scientific knowledge, developing technologies and services and promoting human resources for nuclear and correlated areas.
DRAFT (February 7, 2000) Bert Garza. Faculty and Office for Computing and Information Science: Administrative and Management Structure
DRAFT (February 7, 2000) Bert Garza Faculty and Office for Computing and Information Science: Administrative and Management Structure BACKGROUND The Information Revolution is transforming society creating
How to Successfully Conduct Price Negotiations in Business Markets
Institute for Market-Oriented Management Competence in Research & Management Prof. Dr. Dr. h.c. mult. Christian Homburg, Prof. Dr. Sabine Kuester IMU Research Insights # 011 How to Successfully Conduct
Cybersecurity Definitions and Academic Landscape
Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: [email protected]
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
DEBIT/ATM CARD APPLICATION
DEBIT/ATM CARD APPLICATION APPLICANT: Last Name: First Name: M.I. Street Address: Apt. # / PO Box: City: State: Zip: Day Telephone #: Evening Telephone # Debit Card ATM Card SECOND APPLICANT: Last Name:
Cyber Innovation and Research Consortium
Cyber Innovation and Research Consortium Mission Conduct, coordinate and promote cyber and cyber security innovation, research, and policy 2 Focus Basic and Applied Research Education and Curriculum Outreach
Measuring Software Security
Measuring Software Security Defining Security Metrics Dr. Bill Young Department of Computer Science University of Texas at Austin Last updated: July 1, 2014 at 14:53 Dr. Bill Young: 1 Why Is CyberSecurity
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708
Objectives: To develop the coaching and leadership skills necessary to drive sales performance in the branch
Successful Sales Leadership I for Branch Managers This three-day course teaches the branch managers how to focus on the activities that drive sales performance. Lead your team to meet the desired strategic
Establishment of a Bylaw 55 Unit in Applied Mathematics at UC Merced
Establishment of a Bylaw 55 Unit in Applied Mathematics at UC Merced Several of the faculty of the School of Natural Sciences have planned the formation of a Bylaw 55 unit in Applied Mathematics. The case
The Customer Value Proposition
The Customer Value Proposition Differentiation through the Eyes of Your Customer Pamela Hudadoff Dedicated to making expert marketing techniques more accessible Applied Product Marketing LLC Web: http://www.appliedproductmarketing.com
NRC Cyber Security Policy &
Ask SME and Learn NRC Cyber Security Policy & Guidance Development Mario R. Fernandez Jr., Security Specialist (Cyber) Cyber Security Directorate Office of Nuclear Security & Incident Response 1 Agenda
Graduate Student Orientation
Graduate Student Orientation Prof. Sanjeev Setia Chair, Department of Computer Science The Volgenau School of IT & Engineering Fall 2011 http://cs.gmu.edu Outline CS Department Overview Rules pertaining
CSM-ACE 2014 Cyber Threat Intelligence Driven Environments
CSM-ACE 2014 Cyber Threat Intelligence Driven Environments Presented by James Calder Client Services Manager, Singapore 1 CONTENTS Digital criminality Intelligence-led security Shylock case study Making
BANK B-I-N-G-O. service charge. credit card. pen. line nickel interest cash bank. ATM dollar check signature. debit card.
pen line nickel interest cash bank ATM dollar check signature teller withdraw bank withdraw penny deposit signature dime dollar pen deposit date teller line quarter check nickel interest ATM quarter dime
DEPARTMENTAL PLAN FOR ASSESSMENT OF STUDENT LEARNING
DEPARTMENTAL PLAN FOR ASSESSMENT OF STUDENT LEARNING 2014-2015 ACADEMIC YEAR Department: Mechanical Engineering Program: Bachelor of Science (B.S.) in Mechanical Engineering / Combined B.S. and Master
Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach
Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach This material is based upon work supported by the National Science Foundation under Grant No. 1516724 Project Organization University
Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative [email protected] (302) 831 1580
Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative [email protected] (302) 831 1580 The Cybersecurity Initiative was established at the University of Delaware in 2014 as an integrated learning
Computer Science at James Madison University
Computer Science at James Madison University Dr. Sharon Simmons Department Head for Computer Science Dr. Nathan Sprague and Dr. Chris Mayfield Faculty Members and CS Advisors February 14, 2015 1 WHAT IS
This focus on common themes has led to IFNA s motto of understanding through GLOBAL DIVERSITY, COOPERATION AND COLLABORATION.
IFNA Mission The International Federation of Nonlinear Analysts (IFNA) is a not-for-profit educational and research oriented organization (society), that was founded more than 25 years ago, with the ambitious
Faculty of Organizational Sciences
Faculty of Organizational Sciences Management EC TS: 60/ L anguage of instruc tion: serbian/ degree: Specialis t Specialized academic study program in Management is the continuation of Master s studies
Biomedical Engineering (MS)
Biomedical ngineering (MS) Department of Biomedical, Chemical and nvironmental ngineering (Formerly School of nergy, nvironment, Biological, and Medical ngineering) College of ngineering and Applied Science
The University of Toledo College of Medicine and Life Sciences Faculty Tracks for Academic Rank and Criteria for Promotion
The University of Toledo College of Medicine and Life Sciences Faculty Tracks for Academic Rank and Criteria for Promotion Faculty Tracks for Academic Rank. There are six tracks for full-time and part-time
Graduate Program Review of EE and CS
Graduate Program Review of EE and CS The site visit for the Graduate Program Review of Electrical Engineering and Computer Science took place on April 3-4. It included meetings with many constituencies
PC/E Monitoring ProView. Efficient IT service management for self-service networks
PC/E Monitoring ProView Efficient IT service management for self-service networks PC/E Monitoring ProView The highest possible availability of self-service systems and branch services is decisive for retail
CRITERIA FOR ACCREDITING COMPUTING PROGRAMS
CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Effective for Evaluations During the 2009-2010 Accreditation Cycle Incorporates all changes approved by the ABET Board of Directors as of November 1, 2008 Computing
ASSESSMENT REPORT: SOCIAL WORK DEGREE PROGRAM
ASSESSMENT REPORT: SOCIAL WORK DEGREE PROGRAM PROGRAM INFORMATION Academic Program: Social Work Degree: Bachelor of Social Work (BSW). Department or Program: Social Work Academic Year(s) covered by this
Mission Statement. Program Overview. PhD Program in Microbiology & Immunology (MIM)
PhD Program in Microbiology & Immunology (MIM) Mission Statement The aim of the PhD program in Microbiology and Immunology (MIM) is to recruit and train future leaders in different fields of Microbiology
WEEPAY V2 INTEGRATION DOCUMENT (BASIC INTEGRATION)
WEEPAY V2 INTEGRATION DOCUMENT (BASIC INTEGRATION) 1 Confidentiality and Usage This document and all downloadable files from the Weepay site is a property of Weepay Payment Processing Corporation. This
I n t r o d u c t i o n
and Mission Information technology is a dynamic discipline that addresses the use of computing and I n t r o d u c t i o n information technology in business, education, government, and other organizations.
Can PCI DSS Compliance Be Achieved in a Cloud Environment?
royal holloway Can Compliance Be Achieved in a Cloud Environment? Organisations are considering whether to run -based systems in a cloud environment. The security controls in the cloud may be sufficient
Subject: Critical Infrastructure Identification, Prioritization, and Protection
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,
December 17, 2003 Homeland Security Presidential Directive/Hspd-7
For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,
Use advanced techniques for summary and visualization of complex data for exploratory analysis and presentation.
MS Biostatistics MS Biostatistics Competencies Study Development: Work collaboratively with biomedical or public health researchers and PhD biostatisticians, as necessary, to provide biostatistical expertise
U.S. National Cybersecurity
U.S. National Cybersecurity Martin Casado Keith Coleman Sponsored by William J. Perry MS&E 91SI Fall 2006 Stanford University Why are we talking about cybersecurity? Case 1: Blue Security DoS May 2006,
Ensuring Great Customer Experience for ecommerce
Ensuring Great Customer Experience for ecommerce photo: Richard Masoner the future of commerce 2 photo: Richard Masoner the future of Commerce = the future of people 3 Technology has changed consumer behavior
William J. Perry International Security Fellowship
William J. Perry International Security Fellowship The William J. Perry International Security Fellowship at the Center for International Security and Cooperation (CISAC) within Stanford University is
ASSESSMENT PLAN: M.S. in Computer Science
Department of Mathematics, CSCI ASSESSMENT PLAN: M.S. in Computer Science Updated Date: Winter 2015 by Matt Johnson PROGRAM MISSION CSUEB Missions, Commitments, and ILOs, 2012 CSUEB Computer Science Program
New Account Application - Fill out the account application and bring it with your Driver s License to Grand Bank s office at 204 Westover Drive.
At Grand Bank, we re making it simple for you to switch all your accounts and use us as your primary hometown financial institution. Print and complete these forms. Bring your Driver s License and completed
Notice of Change in Terms for your Deposit Accounts. Redding Bank of Commerce Deposit Accounts Account Terms and Conditions
Notice of Change in Terms for your Deposit Accounts Terms outlined in this Change in Terms document, the enclosed Deposit Account Agreement and the enclosed Schedule of Fees and Services of Redding Bank
CYBERSECURITY CERTIFICATION PROGRAMS
CYBERSECURITY CERTIFICATION PROGRAMS Workforce Training Need 30% more computer and network workers needed from 2008 to 2018 1 ; 433 New Mexico IT job postings in 2012 for securityspecific positions 2 ;
Research Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
The Massachusetts Open Cloud (MOC)
The Massachusetts Open Cloud (MOC) October 11, 2012 Abstract The Massachusetts open cloud is a new non-profit open public cloud that will be hosted (primarily) at the MGHPCC data center. Its mission is
Ph.D. in Bioinformatics and Computational Biology Degree Requirements
Ph.D. in Bioinformatics and Computational Biology Degree Requirements Credits Students pursuing the doctoral degree in BCB must complete a minimum of 90 credits of relevant work beyond the bachelor s degree;
Biochemistry, Molecular Biology, Entomology, and Plant Pathology
Mississippi State University 1 Biochemistry, Molecular Biology, Entomology, and Plant Pathology Department Head: Dr. Jeffrey Dean 402 Dorman Hall Box 9655 Telephone: 662-325-2640 E-mail: [email protected]
Introduction to Web Science
Web Science & Technologies University of Koblenz Landau, Germany Introduction to Web Science http://west.uni-koblenz.de/teaching/ws1213/webscience Prof. Dr. 1 Web Science & Technologies University of Koblenz
CRITERIA FOR ACCREDITING COMPUTING PROGRAMS
CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Effective for Reviews During the 2015-2016 Accreditation Cycle Incorporates all changes approved by the ABET Board of Directors as of November 1, 2014 Computing
Associate College and Associate Department Approval process
Collaborative Programmes Office Quality Management Division Associate College and Associate Department Approval process The University may, from time to time, wish to confer the status of Associate College
Web-based Online Accounting System - Case Study of Cache Furniture
Web-based Online Accounting System - Case Study of Cache Furniture Project Web-based Online Accounting & Inventory System Client & Background Cache Furniture is a leading manufacturer, importer and retailer
Computational Science and Informatics (Data Science) Programs at GMU
Computational Science and Informatics (Data Science) Programs at GMU Kirk Borne George Mason University School of Physics, Astronomy, & Computational Sciences http://spacs.gmu.edu/ Outline Graduate Program
How To Become A Cybersecurity Consultant
Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College
ADVANCED PERSISTENT THREATS & ZERO DAY ATTACKS
ADVANCED PERSISTENT THREATS & ZERO DAY ATTACKS AN INFORMATION SECURITY BATTLEFIELD From Static to Dynamic Defense Cyber Security Strategies, LLC 1 2008-2010 Is The Cyber Tipping Point ESTONIA GEORGIA CABLE
The Berkeley AMPLab - Collaborative Big Data Research
The Berkeley AMPLab - Collaborative Big Data Research UC BERKELEY Anthony D. Joseph LASER Summer School September 2013 About Me Education: MIT SB, MS, PhD Joined Univ. of California, Berkeley in 1998 Current
Online (Internet) Banking Agreement and Disclosure
Online (Internet) Banking Agreement and Disclosure This Online (Internet) Banking Agreement and Disclosure ( the Agreement") explains the terms and conditions governing the basic Online Banking services
Thank you for your very kind introduction.
AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.
The College of Engineering and Applied Science
The College of and Applied Science Current Units Potentially Impacted: College of Aerospace and Mechanical Chemical & Environmental Civil and Mechanics Electrical and Computer Hydrology and Water Resources
Cybersecurity: What CFO s Need to Know
Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction
Sarah A. Rajala Ernest W. & Mary Ann Deavenport, Jr. Chair and Dean Bagley College of Engineering Mississippi State University Mississippi State, MS
Sarah A. Rajala Ernest W. & Mary Ann Deavenport, Jr. Chair and Dean Bagley College of Engineering Mississippi State University Mississippi State, MS 39762 USA November 8, 2012 Background: North Carolina
Certificate Program in Applied Big Data Analytics in Dubai. A Collaborative Program offered by INSOFE and Synergy-BI
Certificate Program in Applied Big Data Analytics in Dubai A Collaborative Program offered by INSOFE and Synergy-BI Program Overview Today s manager needs to be extremely data savvy. They need to work
Security on Embedded Systems
Cyber Security (CYS) Issue Group Activity Report Security on Embedded Systems Chair : Buheita Fujiwara Information-technology Promotion Agency With Cybersecurity Malaysia, Hitachi and III GBDe Summit 2007,
How To Teach B.S. In Biomedical Engineering At The University Of South Carolina
Agenda Item 4.02.A.2 New Program Proposal B.S. in Biomedical Engineering USC-Columbia Summary The University of South Carolina requests approval to offer a program leading to the Bachelor of Science degree
Cyber Security Education: My Personal Thoughts. Bharat Doshi [email protected]
Cyber Security Education: My Personal Thoughts Bharat Doshi [email protected] Topics Personal Background Other situations: Similarities and Differences Cyber Vulnerabilities Student Types and Education/Training
Information Schools: Traditions Growing, Morphing and Expanding. David Fenske
Information Schools: Traditions Growing, Morphing and Expanding David Fenske Standards and Traditions ALA standards Library and Information Science But these staples are already changing internally and
CSM. Biomedical Physics Program
Student Outcomes Assessment Plan (SOAP) I. Mission Statement CSM Biomedical Physics Program The mission of the Undergraduate Biomedical Physics Program at Fresno State is to provide students with a rigorous
