3/30/04Sergio Caltagirone Human/Computer Interaction Security and Privacy in the Digital Age Sergio Caltagirone University of Idaho 3/30/04.

Slides:



Advertisements
Similar presentations
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 8 04/11/2011 Security and Privacy in Cloud Computing.
Advertisements

The study and demonstration on SIP security vulnerabilities Mahidhar Penigi Vamsi Krishna Karnati.
1 Network Security Ola Flygt Växjö University
Anonymous, Liberal and User-Centric Electronic Identity Supports Citizen Privacy Protection in e-Government OASIS eGov Workshop - 1 May 2008 Libor Neumann.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
Information System Security Engineering and Management Risk Analysis and System Security Engineering Homework (#2, #3) Dr. William Hery
Chapter 1  Introduction 1 Overview  What is a secure computer system?  Concerns of a secure system o Data: Privacy, Integrity, Availability o Users:
Blekinge Institute of Technology, Sweden
CS470, A.SelcukAuthentication Systems1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CS795/895.NET Passport1. NET PASSPORT &TRUSTBRIDGE SHRIPAD PATIL CS795/895 SECURITY IN DISTRIBUTED SYSTEMS.
Henric Johnson1 Network Security /. 2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork.
Bazara Barry1 Security on Networks and Information Systems Bazara I. A. Barry Department of Computer Science – University of Khartoum
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
Information Networking Security and Assurance Lab National Chung Cheng University Yaha.
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Multi-faceted Cyber Security Research Group edited strategy.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
CSIAC is a DoD Information Analysis Center (IAC) sponsored by the Defense Technical Information Center (DTIC) Presentation to: Insider Threat SOAR Workshop.
References  Cranor & Garfinkel, Security and Usability, O’Reilly  Sasse & Flechais, “Usable Security: Why Do We Need It? How Do We Get It?”  McCracken.
P RIVACY I N SOCIAL NETWORKING SITES Presented by Shikha Saini u
Data Fusion & Multi-Sensors in Power Grids Rabinder N. Madan FIEEE Program Manager, Systems Theory Office of Naval Research.
1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is.
CYBERSIM Dec Client: Information Assurance Center Advisor: Dr. Doug Jacobson Group Members: Ryan ApplegateCprE Saddam KhattakCprE Dan NguyenCprE/JLMC.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Chapter 4 Application Level Security in Cellular Networks.
Copyright 2014 Open Networking User Group. All Rights Reserved Confidential Not For Distribution Six Steps To A Common Open Networking Ecosystem Common.
Privacy, Confidentiality, and Security Unit 8: Professional Values and Medical Ethics Lecture 2 This material was developed by Oregon Health & Science.
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
Telecom and Informatics 1 Security and Privacy in Distributed Services Trial lecture: Security and Privacy in Distributed Services Richard Torbjørn Sanders.
Privacy, Confidentiality, and Security Component 2/Unit 8c.
Wireless Network Security. How Does Wireless Differ? Wireless networks are inherently insecure because data is transmitted over a very insecure medium,
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Chapter 6 An Introduction to System Software and Virtual Machines.
12/5/2003Sergio Caltagirone University of Idaho An Active Defense Decision Model Sergio Caltagirone Major Professor: Deborah Frincke, PhD University of.
Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
Ingredients of Security
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
ADAM: Active Defense Algorithm and Model Sergio Caltagirone University of Idaho
Internet of Things in Industries
Pertemuan 16 Materi : Buku Wajib & Sumber Materi :
CSC 386 – Computer Security Scott Heggen. Agenda The Foundations of Computer Security.
Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim.
Network Security and Cryptography
Security Issues and Challenges in High Performance Grid Computing SASA SUBOTIC SASA SUBOTIC University of Pretoria.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
KERBEROS. Introduction trusted key server system from MIT.Part of project Athena (MIT).Developed in mid 1980s. provides centralised private-key third-party.
Alina Oprea Associate Professor, CCIS Northeastern University
WEP & WPA Mandy Kershishnik.
The study and demonstration on SIP security vulnerabilities
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
What Makes a Network Vulnerable?
CLIENT/SERVER COMPUTING ENVIRONMENT
CS 465 Terminology Slides by Kent Seamons Last Updated: Sep 7, 2017.
Fundamentals of Human Computer Interaction (HCI)
Network Security Ola Flygt Växjö University
Computer Security Introduction
Challenge-Response Authentication
ITU-T Workshop on Security, Seoul (Korea), May 2002
Session 1 – Introduction to Information Security
LM 7. Cellular Network Security
Presentation transcript:

3/30/04Sergio Caltagirone Human/Computer Interaction Security and Privacy in the Digital Age Sergio Caltagirone University of Idaho 3/30/04

Sergio Caltagirone Human/Computer Interaction Introduction to Security Three Components of Security –Availability –Integrity –Confidentiality

3/30/04Sergio Caltagirone Human/Computer Interaction Contemporary Security Threats Availability –Denial of Service Attacks (and distributed) Integrity –Man in the middle attacks Confidentiality –Data mining –Snooping (eavesdropping)

3/30/04Sergio Caltagirone Human/Computer Interaction Security and HCI Examining end-user interfaces in security systems –How many unsuccessful login attempts –Best way for user to authenticate themselves Challenge question, password, biometrics –Design interface to set privacy preferences –Design interface for security tools Data Mining –How users can aggregate data from a number of sources

3/30/04Sergio Caltagirone Human/Computer Interaction Solutions “Transparency” – make security invisible Task allocation – current authentication requires too much user memorization –Biometrics, graphical passwords Visualization can be used in network defense applications Readjust user valuation of trustworthiness Explanation at decision points must be user understandable Greater formal analysis of data mining

3/30/04Sergio Caltagirone Human/Computer Interaction Current State of Security and HCI Workshop on integrating HCI and Security –CHI 2003 (Ft. Lauderdale) NSA recently added HCI to list of necessary research