The Science, Engineering, and Business of Cyber Security



Similar documents
The Science, Engineering, and Business of Cyber Security

Cyber Security Research: A Personal Perspective

Cyber Security: What You Need to Know

The Future of Cyber Security

The Future of Access Control: Attributes, Automation and Adaptation

The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It?

Security Models: Past, Present and Future

Cyber Security: Past, Present and Future

Institute for Cyber Security

Cyber Innovation and Research Consortium

How To Secure Cloud Computing

Research Topics in the National Cyber Security Research Agenda

Big 4 Information Security Forum

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Foundations Applications Technologies

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Institute for Cyber Security. A Multi-Tenant RBAC Model for Collaborative Cloud Services

The Protection Mission a constant endeavor

Making our Cyber Space Safe

The Strategic Importance, Causes and Consequences of Terrorism

One Hundred Twelfth Congress of the United States of America

Cyber-Security. FAS Annual Conference September 12, 2014

Offensive capabilities

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

Privacy and Security in Healthcare

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Subject: Critical Infrastructure Identification, Prioritization, and Protection

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

Introduction to Cybersecurity Overview. October 2014

Security & privacy in the cloud; an easy road?

ARI 26/2013 (Translated from Spanish) 17 September Cyber cells: a tool for national cyber security and cyber defence

Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

Digital Evidence and Threat Intelligence

Cyber Security VTT and the Finnish Approach

INFRAGARD.ORG. Portland FBI. Unclassified 1

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao

SEC.. DEFENSE CYBER CRIME CENTER: AUTHORITY TO ADMIT PRIVATE SECTOR CIVILIANS TO CYBER SECURITY COURSES.

Cloud Computing Technologies Achieving Greater Trustworthiness and Resilience

2. Cyber security research in the Netherlands

Practical Steps To Securing Process Control Networks

Palo Alto Networks. October 6

Cybersecurity Awareness. Part 1

Agenda , Palo Alto Networks. Confidential and Proprietary.

A Detailed Strategy for Managing Corporation Cyber War Security

Big Data, Big Risk, Big Rewards. Hussein Syed

How To Secure Cloud Computing

Cyber security trends & strategy for business (digital?)

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

the Council of Councils initiative

Hybrid Warfare & Cyber Defence

(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation

FERPA: Data & Transport Security Best Practices

KUDELSKI SECURITY DEFENSE.

Cybersecurity Definitions and Academic Landscape

Cyber Security Research and Development: A Homeland Security Perspective

Where Do You Draw the Creepy Line? Privacy, Big Data Analytics and the Internet of Things

Zak Khan Director, Advanced Cyber Defence

Managing Security and Privacy Risk in Healthcare Applications

The State of Industrial Control Systems Security and National Critical Infrastructure Protection

Participants: Introduction:

Analyzing HTTP/HTTPS Traffic Logs

DHS, National Cyber Security Division Overview

TUSKEGEE CYBER SECURITY PATH FORWARD

THE CHALLENGES OF CYBERSECURITY TRAINING

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Policies and Practices on Network Security of MIIT

How To Write A Cybersecurity Framework

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

Cyber Adversary Characterization. Know thy enemy!

The Next Generation of Security Leaders

Transcription:

Institute for Cyber Security The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security COS Research Conference October 18, 2013 ravi.sandhu@utsa.edu www.profsandhu.com www.ics.utsa.edu Ravi Sandhu 1

Institute for Cyber Security Founded in 2007 to be a world leader in cyber security research A unit in the College of Sciences, with strong ties to the Department of Computer Science Cyber Security in UTSA started in 2000 and is well represented in the Colleges of Science, Engineering and Business Ravi Sandhu 2

Cyberspace 2010 Department of Defense epiphanies Cyberspace is officially recognized by Department of Defense as a new warfare domain akin to land, sea, air and space Department of Defense officially admits having and using offensive cyber weapons Department of Defense officially admits malware penetrations in its classified networks Ravi Sandhu 3

Cyber Security Objectives INTEGRITY modification misdirection AVAILABILITY access CONFIDENTIALITY disclosure Ravi Sandhu 4

Cyber Security Objectives USAGE purpose disposal INTEGRITY modification misdirection CONFIDENTIALITY disclosure AVAILABILITY access Ravi Sandhu 5

Security versus Privacy Security Privacy Ravi Sandhu 6

Cyber Security Evolution Computer Security Communications Security Information Security Information Assurance Mission Assurance Ravi Sandhu 7

Cyber Security Techniques Prevent Detect Accept Ravi Sandhu 8

Cyber Security Goal Enable system designers and operators to say: This system is secure Not attainable There is an infinite supply of attacks Ravi Sandhu 9

Cyber Security Goal Enable system designers and operators to say: This system is secure enough Many successful examples Mass scale, not very high assurance ATM network On-line banking E-commerce Engineering Science One of a kind, extremely high assurance US President s nuclear football Business Ravi Sandhu 10

Why is Cyber Security so Hard? Halting problem Inference Weakest link Analog hole Insider Human element Usability Cyber innovation Covert channels Side channels Ravi Sandhu 11

Cyber Security Prognosis Not too bad About as good as it is going to get The criminal enterprise can only defraud so many Big government and big business are a real threat Highly asymmetric Offense component Clandestine Dual goals: strong offense, strong defense Mankind has somehow kept nuclear, chemical and biological in control. Cyber is different but should be controllable. Ravi Sandhu 12

ICS Research Thrusts Application-centric Secure Information Sharing Social Computing Security Secure Provenance-aware Systems Privacy Policies and Enforcement Foundational Research Trustworthy Cloud Computing Secure Multi-Tenants in Cloud Technology-centric Big Data Security and Privacy Security in Internet of Things Attack-centric Malware Detection and Analysis Botnet Analysis and Defense Ravi Sandhu 13

ICS FlexCloud Lab Research Attribute-based Access Control Secure Data Provenance Secure Information Sharing Secure Cloud Computing FlexCloud/FlexFarm -1000 cores -19TB mirrored RAID - 35TB SAN Commercial Collaboration/Support Education Cloud Computing Courses Big Data OpenStack Training Malware Detection and Analysis Rackspace Joyent High Performance Computing Ravi Sandhu 14