How To Protect Your Digital Infrastructure From Cyber Threats



Similar documents
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

Big Data R&D Initiative

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

Big Data, Big Risk, Big Rewards. Hussein Syed

Good morning. It is a pleasure to be with you here today to talk about the value and promise of Big Data.

The Importance of Cybersecurity Monitoring for Utilities

The Comprehensive National Cybersecurity Initiative

Bellevue University Cybersecurity Programs & Courses

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Smart Grid Security: A Look to the Future


NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

THE EXPERT SYSTEMS ANALYSIS USING THE CONCEPT OF BIG DATA AND CLOUD COMPUTING SERVICES

Big Data Driven Knowledge Discovery for Autonomic Future Internet

Cybersecurity and internal audit. August 15, 2014

Metrics that Matter Security Risk Analytics

Enhancing Cybersecurity with Big Data: Challenges & Opportunities

Panel Session: Lessons Learned in Smart Grid Cybersecurity

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Update On Smart Grid Cyber Security

Associate Prof. Dr. Victor Onomza Waziri

Feature. SCADA Cybersecurity Framework

Statistical Analysis and Visualization for Cyber Security

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

September 4, appearing before you today. I am here to testify about issues and challenges in providing for

The Resilient Smart Grid Workshop Network-based Data Service

Cloud Resilient Architecture (CRA) -Design and Analysis. Hamid Alipour Salim Hariri Youssif-Al-Nashif

Effective Information Sharing and Analysis Process

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Connected Cities Research Program

Conceptual Integrated CRM GIS Framework

Cyber Security and Privacy - Program 183

Communicating the Threat

Integrating Cyber Security into Nuclear Power Plant Safety Systems Design

RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information

Cybersecurity Delivering Confidence in the Cyber Domain

A Systems Approach to Protecting the U.S. Air Traffic Control System Against Cyber-Terrorism

National and Transnational Security Implications of Big Data in the Life Sciences

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Security Analytics for Smart Grid

Information Visualization WS 2013/14 11 Visual Analytics

BIG DATA AND CYBERSECURITY:

Situational Awareness A Discussion

locuz.com Big Data Services

S. ll IN THE SENATE OF THE UNITED STATES

Workshop on Building international cooperation WG2 : Network Information Security / cyber security

Washington Metropolitan Area Transit Authority Board Action/Information Summary

Cyber Security Collaboration: A Critical Ingredient for Worldwide Security

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

TUSKEGEE CYBER SECURITY PATH FORWARD

The UK cyber security strategy: Landscape review. Cross-government

2016 Outlook of the Global Security Industry

Healthcare and IT Working Together KY HFMA Spring Institute

Cloud security architecture

Cisco Advanced Services for Network Security

BIG DATA Funding Opportunities

Cyber security guide for boardroom members

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

COMP9321 Web Application Engineering

Big Data and Complex Networks Analytics. Timos Sellis, CSIT Kathy Horadam, MGS

Emerging SCADA and Security Solutions Presented by; Michael F. Graves, P.E. Chris Murphy, CISSP

DHS. CMSI Webinar Series

IBM Data Warehousing and Analytics Portfolio Summary

Cyber Security VTT and the Finnish Approach

Cyber security in an organization-transcending way

Lakeside. Lakeside Software and IBM: Statement of Fact. SysTrack. A Lakeside Software White Paper November 2011

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

CIP 2016 Project Outline

Security Implications Associated with Mass Notification Systems

National Institute of Standards and Technology Smart Grid Cybersecurity

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Il Ruolo delle Università nelle politiche di sicurezza cibernetica e di protezione delle infrastrutture critiche per il Paese

MEASURES TO ENHANCE MARITIME SECURITY. Industry guidelines on cyber security on board ships. Submitted by ICS, BIMCO, INTERTANKO and INTERCARGO

On the European experience in critical infrastructure protection

New Design Principles for Effective Knowledge Discovery from Big Data

Demystifying Big Data Government Agencies & The Big Data Phenomenon

U.S. Cyber Security Readiness

In December 2011, the White House Office of Science. Introducing the federal cybersecurity R&D strategic plan. Leaping ahead on cybersecurity

Research Note The Fight to Define U.S. Cybersecurity and Information Sharing Policy

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

CONSULTING IMAGE PLACEHOLDER

CYBER SECURITY WORKFORCE

The Computerworld Honors Program

Lessons from Defending Cyberspace

The National Cybersecurity Workforce Framework Delaware Cyber Security Workshop September 29, 2015

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2%

M2M Technologies The future is upon us. Is this stuff secure?

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Dealer Member Cyber-security

Big Data and Analytics: Challenges and Opportunities

The Trend Toward Convergence of Physical and Logical (Cyber) Security

ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT

Overcoming the Technical and Policy Constraints That Limit Large-Scale Data Integration

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

National Cyber Security Strategies: United States

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act

National Initiative for Cyber Security Education

Transcription:

Critical Cyber Infrastructure Center (C 3 ) George Markowsky School of Computing & Information Science

Cybersecurity and the Protection of Critical Digital Infrastructure The Problem Digital infrastructures, e.g., electric power grids, high speed networks, health information systems, mobile devices, have become as critical ii to our economy as physical infrastructures. However they lackseveral protective measures needed to However they lack several protective measures needed to maintain productivity, security and openness in a networked digital world.

CyberSecurity Relevance to Maine Protection of our international and marine borders ports and borders and the flow of goods and information across these involve digital infrastructures vulnerable to cyberthreats. Rural networks sparse internet and telecommunications links have increased vulnerability due to lack of redundancy Smart Grid new technologies for an efficient electrical grid create new risks from cyber threats. Agingpopulation a population desiring to age in place will increasingly depend on new health infrastructures for support. Health networks need to be secure to support privacy and confidentiality of interactions with health care providers.

Cybersecurity Research An Interdisciplinary Perspective Software Human factors innovative hardware solutions Cybersecurity innovative software an understanding of cognitivescience andhuman factors economics and policy making collection & protection of big data Hardware Policy

Hardware Research Develop measures to identify and protect against malicious network devices. Conceptual watermarks or signatures for devices hidden functionality for devices to identify tampering. Network architecture design for resiliency and redundancy. Software Research Privacy and Security Concerns Software and networking to protect mobile device security Protections for electronic medical and health record systems Identification of system manipulations as patterns Cyberprotection of dynamic intelligent signs

Cognitive Science and Human Factors Investigate role of human factors and incorporate human behavior in design and development of cyber security technology Policy Issues US and Canada recently announced a joint cybersecurity action plan NSA Centers of Academic Excellence Investigate bilateral cyber security y polices to protect vital digital infrastructure and increase both countries ability to respond jointly and effectively to cyber incidents.

Big Data is a Big Deal Extracting knowledge and insights from large and complex datasets is critical for security, science and engineering However, nowadays data comes with three V s: Vs: large Volume, high Velocity, and wide Variety Big data is challenging due to its heterogeneity, scale, timeliness, complexity, and privacy. Data management, collection and storage Data security Data analytics: knowledge discovery Big data presents unprecedented opportunities Accelerate scientific discovery and innovation Improve decision making and security Better understand the synergy between humans, the environment and society Big data is a national priority White House launched Big Data Research and Development Initiative, March 29, 2012 NSF launched BIGDATA initiative: Core Techniques and Technologies for Advancing Big Data Science and Engineering, 2012

Very Rich Research Environment Develop techniques for hardening existing Develop techniques for hardening existing critical cyberinfrastructure while minimizing downtime and disruptions. Address the problems that vulnerable populations face when critical infrastructure fails. Focus on secure and reliable communication. Huge opportunities in sensor networks and wide area communication

Research Team UMFK USM School of Computing & Information Science Department of Electrical & Computer Engineering Margaret Chase Smith Center UMaine Law School Bangor Hydro Central Maine Power Unet Mi Maine State Government BWISE EMMC MMC Mi Maine Cybersecurity Cluster

Questions?