Cybersecurity and Collaborative Research Projects. Hiroto Yasuura Executive Vice President Kyushu University



Similar documents
Cyber security Country Experience: Establishment of Information Security Projects.

TUSKEGEE CYBER SECURITY PATH FORWARD

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Introduction to Cyber Security / Information Security

INFORMATION SECURITY AWARENESS & TRAINING PROGRAM

Bellevue University Cybersecurity Programs & Courses

Cyber Security Education: My Personal Thoughts. Bharat Doshi

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Certificate in Cyber Security

Information security education for students in Japan

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

BUY ONLINE FROM:

Protecting critical infrastructure from Cyber-attack

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0

Chapter 1: Introduction

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

University of Maryland Cybersecurity Center (MC 2 )

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

VISA International Security Summit. Dr. Colonel Tran Van Hoa Deputy Director Viet Nam Hightech Crime Police Department

Dept. of Financial Information Security

Security in ST : From Company to Products

Cyber Security and Privacy

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Secure System Solution and Security Technology

Project 2020: Preparing Your Organization for Future Cyber Threats Today

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

U. S. Attorney Office Northern District of Texas March 2013

Hackers: Detection and Prevention

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

EC-Council. Certified Ethical Hacker. Program Brochure

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley

Certified Cyber Security Analyst VS-1160

The Information Security Problem

National Cyber Security Policy -2013


Capabilities for Cybersecurity Resilience

SSL BEST PRACTICES OVERVIEW

CESG Certification of Cyber Security Training Courses

Into the cybersecurity breach

The Cyber Security Crisis

CHAPTER 10: COMPUTER SECURITY AND RISKS

Monitoring for network security and management. Cyber Solutions Inc.

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

M-Shield mobile security technology

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

SecureAge SecureDs Data Breach Prevention Solution

Cyril Onwubiko Networking and Communications Group ncg.kingston.ac.

NETWORK SECURITY ASPECTS & VULNERABILITIES

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Gold Lock Desktop White Paper

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Transformational Smart Cities: cyber security and resilience

i-safe K 12 CURRICULUM SCOPE 06-07

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Cyber Security a Global Challenge; What and how Thailand is doing

CNT Computer and Network Security Review/Wrapup

OCR LEVEL 3 CAMBRIDGE TECHNICAL

How are we keeping Hackers away from our UCD networks and computer systems?

Principles of ICT Systems and Data Security

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

[STAFF WORKING DRAFT]

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Security aspects of e-tailing. Chapter 7

Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro

Cybersecurity Initiatives

Cybersecurity for the C-Level

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

White Paper. Enhancing Website Security with Algorithm Agility

Moderator Shigeki Goto, Professor, Department of Computer Science and Engineering, Waseda University

ONE TO ONE LAPTOP PROGRAMME POLICY

Promoting a cyber security culture and demand compliance with minimum security standards;

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

INFORMATION SECURITY FOR YOUR AGENCY

Research Topics in the National Cyber Security Research Agenda

CS Matters in Maryland CS Principles Course

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Active Loss Prevention. Active Loss Prevention initiative. initiative. initiative. Ian Lloyd Director of the Active Loss Prevention

ADVANCEMENT OF CYBER SECUIRTY THROUGH PUBLIC PRIVATE PARTENERSHIP ICT WEEK AUC 4-6 DEC 2013

Educational Requirement Analysis for Information Security Professionals in Korea

Hardware Trojans Detection Methods Julien FRANCQ

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Guidelines for Establishment of Contract Areas Computer Science Department

Strategic Plan On-Demand Services April 2, 2015

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Participants: Introduction:

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends

Meeting Cyber Security Challenges

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

Longmai Mobile PKI Solution

Transcription:

Cybersecurity and Collaborative Research Projects Hiroto Yasuura Executive Vice President Kyushu University

Systems become more complicated and hard to control. 1

ICT Used Anywhere Embedded Systems in a Car Source:Gartner Research 2

Our Society Depends on Information Infrastructure Technologies Environment Energy Security Reliability Stability Productivity Efficiency Social Systems Governmental Services, Economic Activities Transportation Services, Communication Services Lifelines Communication Network Technology Hardware (VLSI) Technology Software Technology Information Infrastructure Technology 3

Social Information Infrastructure Social Information Infrastructure (SII) is a Basic Infrastructure of the Modern Society. SII is related various our daily activities. Life: Transportation System, Health Care System, Life-line Systems Property: e-commerce, e-banking, e-money Privacy: Authentication System, Communication System SII should be dependable for users. Secure and reliable operation Stable operation in many years Failure free operation with allowance of some performance degradation Easy to maintenance Gradual and sustainable improvements 4

Dependability is the 4-th Value of ICT Cost of Systems Performance of Systems Energy Consumption Dependability: Reliability and Security 5

SII as an Operating System of Society 6

Threats of Dependability in IIS Safety from Natural Disasters Physical Malfunctions of Devices Variation of Natural Conditions Soft Errors by Particles ( Neutrons etc.) Cross Talks of Communication Channels Incomplete Specification and Misunderstanding of Semantics Mismatches System Specifications and Social Rules Errors of Operators Design Bugs in HW and SW Incomplete Testing and Verification Terrorism and Military Attacks Theft of Information and Devices Virus, Worms and Hacking Malicious Attacks in System Design, Fabrication and Test Unintentional Attacks Natural Phenomena Human Errors Malicious Attacks 7

Threats of Security Terrorism and Military Attacks Theft of Information and Devices Virus, Worms and Hacking Malicious Attacks in System Design, Fabrication and Test Unintentional Attacks 8

Possible Threats : Automobile Systems Plan Design Natural Threats Human Errors Attack Misunderstanding of Assumption of Usage Design Errors Bug in Specification Theft of Plan Design Bugs, Errors in Assumptions Fabrication Fabrication Errors Errors in Fabrication Test Distribution Operation Abandonment Intermittent Faults Coverage of Environments Variation in Environments Ageing and Maintenance Accidents Errors in Test Mixture of Defectives and buggy SW Errors of Drivers and Maintenance Miss-Arrangement in Replacement Theft of Design Illegal Operations and Parts Illegal Operations Mixture of Counterfeits Attack by ICT Theft of Logged Information 9

Difficulty of Security Maintenance Complexity of Systems No Information on Total systems Connections of Various Systems Hard to Classify Attacks, Errors and Natural Faults Rapid Improvements of Attacking Techniques Wars in Cyber Spaces Crackers and New Crimes Mismatches of Social Systems and ICT Unfamiliarity of Users of ICT Walls of Laws and Privacy Protections 10

Hard to Trace the Cause global system fault error failure system Attacks (virus and warm) subsystem fault error failure error Physical faults failure Human Error (in Operation) Human Errors(in Design, Production, Test) 11

Difficulty of Security Maintenance Complexity of Systems No Information on Total systems Connection of Various Systems Hard to Classify Attacks, Errors and Natural Faults Rapid Improvements of Attacking Techniques Wars in Cyber Spaces Crackers and New Crimes Mismatches of Social Systems and ICT Unfamiliarity of Users of ICT Walls of Laws and Privacy Protections 12

Increase of Malwares 3,000,000/Month Source: McAfee 13

Difficulty of Security Maintenance Complexity of Systems No Information on Total systems Connection of Various Systems Hard to Classify Attacks, Errors and Natural Faults Rapid Improvements of Attacking Techniques Wars in Cyber Spaces Crackers and New Crimes Mismatches of Social Systems and ICT Unfamiliarity of Users of ICT Walls of Laws and Privacy Protections 14

Problem of e-money How to handle Credit, Value and Property on ICT. 1,000$ on a 10$ Device. 2,000 years 1,000 years Metal Coins (before BC 10th C) Value: Gold or Silver Conservation: Metals Paper Bill (10th C) Value: Printed information guaranteed by governments and/or banks. Conservation: Paper Electric Money Bit Coin (21st C) Value: Digital Information. Conservation: Digital Information? 15 15

Kids Knew the Problems Can we securely treat values as copy-free digital information? In the game world Illegal copy of PIKACHU Virtual money in online games 16

Technologies for Security in Cyber Space Social Systems Legal Systems Social Fabric Hardware Tech. Secure LSI Chips Physical Protection Unique IDs Software Tech. Cryptography Cipher System Digital Signature PKI 17 17

Researches on Cybersecurity Cryptography Public key system (RSA, Elliptic Curve etc.) Design and Analysis Techniques Applications and Standardization Secure Information System Protection from Attacks (Fire walls, Network Structure) Security in Communication Secure Protocols Security for Software Protections from virus and warms Security for Hardware Anti-tampering Protection from Side Channel Attack Quantum telecommunication 18

Collaborations are Required Social System and Structure Social System Design, Regulation by Laws Service and Operation Communication Service, Computing and Data Service Product and Work Mobile Devices, Sensors, Wireless Systems, Software, Data Contents, Cryptography Design and Production Technology Design Technology, Software Engineering, Device Manufacturing Natural Phenomenon and Law Physics, Information Theory, Mathematics Politician Social Scientists Ethics Government Business Economics Telecom. Industries Electronics Software VLSI Manufacturing Natural Scientists Mathematician 19

Collaboration with Various Sectors Academic Sectors Governments Business and Industrial Sectors Social Infrastructure Operators Lawyers and Public Security Sectors Educational Sectors International Organizations Military 20

Backgrounds l Japan initiated National Cybersecurity Strategy program and is committed to lead world as Cybersecurity Nation. l Cybersecurity Basic Act (Nov.12, 2014) l However, the number of cybersecurity professional is dangerously lacking, and Japanese universities have been offering very few programs and producing very few professionals. l Kyushu University (KU) is committed to develop comprehensive cybersecurity research and education program. l KU started BYOD (Bring Your Own Device) system for all undergraduate students from 2013. Cybersecurity education is urgent for all students. 21

Kyushu University Cybersecurity Center Body of the Center Research Institute for Information Technology Graduate School of Information Science and Electrical Engineering The Faculty of Arts and Science Institute for Mathematics for Industry The Faculties of law and Economics Collaborative Internal Organizations Information Infrastructure Initiative, Innovation Center for Education Resources, KU Hospital Medical Information Center Collaboration Partner University of Maryland Baltimore County Industrial Collaborators Companies in telecom, power supply, data business area. 22

UMBC: Our First and Promising Partner 23

Collaboration of Cybersecurity Center Stakeholders Citizens Academia Social Infrastructures Cyber Business Security Agency Kyushu Univ. Students, Professors and Staffs Schools, Faculties, Research Institute and SeSe Hospital Administration Office Service Divisions Cybersecurity Center Research Institute for Information Technologies Information Infrastructure Initiative School of ISEE Institute Math. For Industry Law School Economic School Art and Science Center for Education Resource Medical Inf. Center Education And Research Security Education for All Security Specialist Education Researches Secure Information Services Collaboration Internal Collaborations Other Academic Organization Goverment Industries International UMBC 24

Model of Cybersecurity Education Cybersecurity for All (2014- ) Define basic literacy of cybersecurity for all citizens Teach all freshmen about basic cybersecurity literacy Cybersecurity literacy as a core curriculum for all students Cybersecurity for Professionals(2015- ) Professional course for cybersecurity talents Undergraduate and Graduate courses in Computer Science, Electrical Engineering and Mathematics Starting from as minor course with certification Leader education in School of International Arts and Science Advanced Research and Education on Cybersecurity Involving social scientists and researchers in various fields 25

Collaboration with Maryland University 26

Collaboration between UMS and KU Kyushu University University of Maryland 1. Cyber Security: Education and Research Exchange of Students, Teaching Staffs and Researchers Sharing Teaching environment and Materials On-Line Cause Exchange Research Exchanges 2. Data Science: for Life Science, Engineering, Social Sciences, Natural Sciences Collaborative Researches Exchange of students 3. Creation of Innovation: Collaboration with Industries in U.S. and Japan Development of New Education for Innovation Social Experiments in Practical Fields 27

Conclusions l ICT is changing the world. l Cybersecurity has become risk of serious and global scale, and has become national security issue. l It is necessary to develop security technology from application/device level to network/national system level. l Cybersecurity research and education must be done by multi-aspect and multi-group efforts. 28

Thank You for Your Collaborations CCyybbeerrsseeccuurriittyy aass aa bbaassiicc aanndd iinnnnoovvaattiivvee tteecchhnnoollooggyy ttoo kkeeeepp ppeeaaccee aanndd ssaaffeettyy ooff tthhee ffuuttuurree wwoorrlldd!! 29