World-Leading Research with Real-World Impact!

Slides:



Advertisements
Similar presentations
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
Advertisements

INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: What You Need to Know Prof. Ravi Sandhu Executive Director and Chief Scientist Institute for Cyber Security.
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
Institute for Cyber Security (ICS) Prof. Ravi Sandhu Executive Director and Lutcher Brown Endowed Chair
1 Speculations on the Future of Cyber Security in 2025 Prof. Ravi Sandhu Executive Director and Chief Scientist Institute for Cyber Security University.
1 Speculations on the Future of Cyber Security in 2025 Prof. Ravi Sandhu Executive Director January 2010
1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for.
1 Towards a Discipline of Mission-Aware Cloud Computing (A Position Paper) Ravi Sandhu Executive Director and Endowed Professor October 2010
1 New Trends and Challenges in Computer Network Security Ravi Sandhu Executive Director and Endowed Professor September 2010
© 2006 Ravi Sandhu Cyber-Identity, Authority and Trust Systems Prof. Ravi Sandhu Professor of Information Security and Assurance Director,
1 Cyber Security Research: A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 18, 2013
1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11
1 Grand Challenges in Data Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
Future of Access Control: Attributes, Automation, Adaptation
1 Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done? Ravi Sandhu Executive Director and Endowed Professor December 2010.
GOVERNMENT OF UGANDA PLANS FOR INFORMATION SECURITY ASSURANCE PETER KAHIIGI, CISSP®. DIRECTOR INFORMATION SECURITY 30th JANUARY 2013 Directorate of Information.
E NGINEERING & P UBLIC P OLICY AT UOIT Expand the engineering degree | Expand the opportunities.
Company LOGO Broader Impacts Sherita Moses-Whitlow 07/09/09.
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
1 Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director and Endowed Professor Nov. 9, 2012
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
Center for Cybersecurity Research and Education (CCRE)
1 Cyber Security A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 15, 2016
Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering.
Department of Computer and Information Sciences
Center of Excellence in Cyber Security
Strategic Planning Process
UNIT I INTRODUCTION Growing IT Security Importance and New Career Opportunities – Becoming an Information Security Specialist – Conceptualizing.
DISA Global Operations
Strategic Planning Process
World-Leading Research with Real-World Impact!
An Access Control Perspective on the Science of Security
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
UTSA's New Center Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director of ICS and C-SPECC Professor.
Introduction to Cyber Security
Introduction and Basic Concepts
Institute for Cyber Security: Research Vision
Attribute-Based Access Control: Insights and Challenges
ACM/IEEE-CS Computer Science Curriculum
Cyber Security Research: Applied and Basic Combined*
Csilla Farkas Cybersecurity Csilla Farkas
Cyber Security Research: Applied and Basic Combined*
Institute for Cyber Security: Research Vision
Security and Privacy in the Age of the Internet of Things:
Intersection of Data, Policy and Privacy
UTSA Cyber Security Ecosystem
Cyber Education & Research
Smart Learning concepts to enhance SMART Universities in Africa
Attribute-Based Access Control: Insights and Challenges
Big Data and Privacy Panel Prof. Ravi Sandhu
Cyber Security Trends and Challenges
World-Leading Research with Real-World Impact!
Views of Cloud Computing
Institute for Cyber Security Overview
Institute for Cyber Security
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
World-Leading Research with Real-World Impact!
Access Control Evolution and Prospects
Cyber Security R&D: A Personal Perspective
World-Leading Research with Real-World Impact!
IT Applications with Emerging Techniques: Security Solutions
Institute for Cyber Security Overview
Access Control Evolution and Prospects
Presentation transcript:

World-Leading Research with Real-World Impact! CS 6393: Cyber Security Models and Systems CS 4593: Cyber Security Models and Systems (cross-listed) Course Introduction and Cyber Security Overview Ravi Sandhu L190118 Spring 2019 © Ravi Sandhu World-Leading Research with Real-World Impact!

Institute for Cyber Security Cyber Security at UTSA Academic Colleges Human Development School of Data Science Sciences Business Engineering Arts Education ……. Research Centers Institute for Cyber Security Center for Infrastructure Assurance … Cyber Center for Security Analytics Open Cloud Institute National Security Collaboration Center NSA/DHS Certifications Human Development Cyber Operations Cyber Defense Research Cyber Defense Education A strategic priority since 2000 © Ravi Sandhu World-Leading Research with Real-World Impact!

ICS & C-SPECC Institute for Cyber Security (ICS) Scope: All of Cyber Security NSF Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Scope: Secure Cloud Computing © Ravi Sandhu World-Leading Research with Real-World Impact!

ICS Mission and History Sustained excellence in graduate-level sponsored research 2012-2017 Graduated to a self-sustaining operation 2007-2012 Founded by start-up funding from State of Texas 2017-2022 Major expansion by winning NSF C-SPECC grant In collaboration with: College of Engineering College of Business College of Education Open Cloud Institute Cyber Center for Security & Analytics Partnership with 4 NISD High Schools: Harlan, Woodson, Taft, Business Careers Established world class laboratories for: Secure cloud computing & Malware research © Ravi Sandhu World-Leading Research with Real-World Impact!

Natural vs Cyber Science Elephant Problem Cyber-Elephant Problem Applied vs Foundational Science: Cyber-elephants require applied and foundational combined Present vs Future Focus: Rapidly evolving cyber-elephants require future focus © Ravi Sandhu World-Leading Research with Real-World Impact!

Holistic Cyber Security Objectives POLICY ATTACKS What? Why? Enforce Enable Defend Respond PROTECT DETECT Complement How? Mechanisms © Ravi Sandhu World-Leading Research with Real-World Impact!

Control of read and write is fundamental to all three Security Objectives Control of read and write is fundamental to all three INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure © Ravi Sandhu World-Leading Research with Real-World Impact!

Covers privacy and intellectual property protection Security Objectives USAGE purpose Covers privacy and intellectual property protection INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure © Ravi Sandhu World-Leading Research with Real-World Impact!

World-Leading Research with Real-World Impact! Security Objectives USAGE purpose USAGE INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure © Ravi Sandhu World-Leading Research with Real-World Impact!

World-Leading Research with Real-World Impact! Security is Dynamic “My dear, here we must run as fast as we can, just to stay in place. And if you wish to go anywhere you must run twice as fast as that.” ― Lewis Carroll, Alice in Wonderland © Ravi Sandhu World-Leading Research with Real-World Impact!

World-Leading Research with Real-World Impact! Low Assurance Systems The ATM (Automatic Teller Machine) system is secure enough global in scope Similarly on-line banking e-commerce payments © Ravi Sandhu World-Leading Research with Real-World Impact!

High Assurance Systems US President’s nuclear football Secret formula for Coca-Cola © Ravi Sandhu World-Leading Research with Real-World Impact!

World-Leading Research with Real-World Impact! Limits to Security Analog hole Inference Side channels Insider threat Detection is impossible Protection is impossible ….. © Ravi Sandhu World-Leading Research with Real-World Impact!

ICS Major Research Thrusts TECHNOLOGIES Access Control Policy Malware Detection and Forensics Blockchain Artificial Intelligence Machine Learning Data Provenance …. APPLICATION DOMAINS Cloud Computing Internet of Things (IoT) Social Networks Big Data Mobile Platforms Enterprise Insider Threat Scientific Infrastructure …. Goal: Broaden and Deepen © Ravi Sandhu World-Leading Research with Real-World Impact!