1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY 1 Trusted Computing Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University.
Advertisements

INSTITUTE FOR CYBER SECURITY 1 The ASCAA * Principles Applied to Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director February © Ravi Sandhu.
1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for.
Stale-Safe Security Properties for Secure Information Sharing Ram Krishnan (GMU) Jianwei Niu (UT San Antonio) Ravi Sandhu (UT San Antonio) William Winsborough.
© 2006 Ravi Sandhu Secure Information Sharing Enabled by Trusted Computing and PEI * Models Ravi Sandhu (George Mason University and TriCipher)
© 2006 Ravi Sandhu Cyber-Identity, Authority and Trust Systems Prof. Ravi Sandhu Professor of Information Security and Assurance Director,
1 Cyber Security Research: A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 18, 2013
1 Privacy Prof. Ravi Sandhu Executive Director and Endowed Chair March 8, © Ravi Sandhu World-Leading Research.
1 Access Control Models Prof. Ravi Sandhu Executive Director and Endowed Chair January 25, 2013 & February 1, 2013
1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11
1 Grand Challenges in Data Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair
1 The Future of Access Control: Attributes, Automation and Adaptation Prof. Ravi Sandhu Executive Director and Endowed Chair S&P Symposium IIT Kanpur March.
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
Future of Access Control: Attributes, Automation, Adaptation
Attribute-Based Access Control Models and Beyond
1 What is the Game in Cyber Security? Ravi Sandhu Executive Director and Endowed Professor February 2011
1 Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done? Ravi Sandhu Executive Director and Endowed Professor December 2010.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Cyber Security Grand Challenges and Prognosis Prof. Ravi Sandhu Executive Director and Endowed Chair
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 The Challenge of Data and Application Security and Privacy (DASPY) Ravi Sandhu Executive Director and Endowed Professor March 23, 2011
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
1 Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director and Endowed Professor Nov. 9, 2012
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
11 World-Leading Research with Real-World Impact! Group-Centric Secure Information Sharing: A Lattice Interpretation Institute for Cyber Security Ravi.
INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for.
1 Group-Centric Models for Secure and Agile Information Sharing Ravi Sandhu Executive Director and Endowed Professor October 2010
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for Group-Centric Secure Information Sharing (g-SIS) Co-authored with Ram Krishnan, PhD Candidate,
1 Group-Centric Models for Secure Information Sharing Prof. Ravi Sandhu Executive Director and Endowed Chair March 30, 2012
1 Group-Centric Models for Secure and Agile Information Sharing Ravi Sandhu Executive Director and Endowed Professor April 2010
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
Application-Centric Security Models
1 © Ravi Sandhu OM-AM and PEI Prof. Ravi Sandhu. 2 © Ravi Sandhu THE OM-AM WAY Objectives Model Architecture Mechanism What? How? AssuranceAssurance.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Panel on Data Usage Management: Technology or Regulation? Prof. Ravi Sandhu Executive Director and Endowed Chair DUMA 2013 May 23, 2013
1 Cyber Security A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 15, 2016
1 Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair CODASPY 2013 February.
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
INSTITUTE FOR CYBER SECURITY 1 Enforcement Architecture and Implementation Model for Group-Centric Information Sharing © Ravi Sandhu Ram Krishnan (George.
1 Understanding Which New Threats Operators Can Expect To Face Within The Next Two To Five Years To Improve The On- Going Management Of Security Systems.
INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security.
Past, Present and Future
Security and Privacy in the Networked World
Introduction to Cyber Security
Introduction and Basic Concepts
Cyber Security Research: Applied and Basic Combined*
Security and Privacy in the Age of the Internet of Things:
Intersection of Data, Policy and Privacy
Big Data and Privacy Panel Prof. Ravi Sandhu
Cyber Security Trends and Challenges
World-Leading Research with Real-World Impact!
Application-Centric Security
Assured Information Sharing
Institute for Cyber Security
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Access Control Evolution and Prospects
Cyber Security R&D: A Personal Perspective
Access Control Evolution and Prospects
Presentation transcript:

1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu World-Leading Research with Real-World Impact! Institute for Cyber Security

 Cyber technologies and systems have evolved  Cyber security goals have evolved  Computer security  Computer security + Communications security  Separate and never shall meet TO  Coupled and integrated  Information assurance  Mission assurance  Cyber security research/practice have not kept up  The gap is growing © Ravi Sandhu 2 World-Leading Research with Real-World Impact! Cyber Security Status

 Mission assurance = Application assurance  Latest technology: Cloud Computing Dominant issues:  Cost and productivity  Focus on core competence  Availability  Security  Latest lesson (April-May 2011):  Amazon outage  100s of companies with hours downtime  Netflix unaffected © Ravi Sandhu 3 World-Leading Research with Real-World Impact! Cyber Security Status

 Old think: protect the network, protect the information, protect the content  Design to isolate and protect the network in face of system and security failures  New think: protect the mission, protect the application, protect the service  Design to operate through system and security failures  Not possible without application context  Most important recommendation  Cyber security needs to be a proactive rather than reactive discipline © Ravi Sandhu 4 World-Leading Research with Real-World Impact! Cyber Security Doctrine

 Cyber security is all about trade-offs  confidentiality  integrity  availablity  usage  privacy  cost  usability  productivity  Application context is necessary for trade- offs © Ravi Sandhu 5 World-Leading Research with Real-World Impact! Fundamental Premise

Productivity-Security  Cyber Security is all about tradeoffs © Ravi Sandhu 6 World-Leading Research with Real-World Impact! ProductivitySecurity Let’s build it Cash out the benefits Next generation can secure it Let’s not build it Let’s bake in super-security to make it unusable/unaffordable Let’s sell unproven solutions There is a middle ground We don’t know how to predictably find it

 The ATM (Automatic Teller Machine) system is  secure enough  global in scope  Not attainable via current cyber security science, engineering, doctrine  not studied as a success story  Similar paradoxes apply to  on-line banking  e-commerce payments © Ravi Sandhu 7 World-Leading Research with Real-World Impact! The ATM Paradox

 Monetary loss is easier to quantify and compensate than information loss  Security principles  stop loss mechanisms  audit trail (including physical video)  retail loss tolerance with recourse  wholesale loss avoidance  Technical surprises  no asymmetric cryptography  no annonymity © Ravi Sandhu 8 World-Leading Research with Real-World Impact! Why is the ATM System Secure? Application Centric

9 PEI Models Security and system goals (objectives/policy) Policy models Enforcement models Implementation models Necessarily informal Specified using users, subjects, objects, admins, labels, roles, groups, etc. in an ideal setting. Security analysis (objectives, properties, etc.). Approximated policy realized using system architecture with trusted servers, protocols, etc. Enforcement level security analysis (e.g. stale information due to network latency, protocol proofs, etc.). Technologies such as Cloud Computing, Trusted Computing, etc. Implementation level security analysis (e.g. vulnerability analysis, penetration testing, etc.) Software and Hardware Concrete System © Ravi Sandhu World-Leading Research with Real-World Impact! PEIMODELSPEIMODELS WHAT HOW

10 Secure Information Sharing (SIS) Goal: Share but protect  Containment challenge  Client containment  Ultimate assurance infeasible (e.g., the analog hole)  Appropriate assurance achievable  Server containment  Will typically have higher assurance than client containment  Policy challenge  How to construct meaningful, usable, agile SIS policy  How to develop an intertwined information and security model © Ravi Sandhu World-Leading Research with Real-World Impact! Secure but insecure

11 Group-Centric Secure Information Sharing Policy Models  Operational aspects  Group operation semantics o Add, Join, Leave, Remove, etc o Multicast group is one example  Object model o Read-only o Read-Write (no versioning vs versioning)  User-subject model o Read-only Vs read-write  Policy specification  Administrative aspects  Authorization to create group, user join/leave, object add/remove, etc. © Ravi Sandhu World-Leading Research with Real-World Impact! Users Objects Group Authz (u,o,r)? join leave add remove

12 Group-Centric Secure Information Sharing Enforcement Models © Ravi Sandhu World-Leading Research with Real-World Impact! CC 5.2 Set Leave-TS (u) = Current Time 6.2 Update: a. Remove_TS (o) = Current Time b. ORL = ORL U {id, Add_TS (o), Remove_TS (o)} GA Group Users TRM … 3. Read Objects Non-Group User TRM 1.1 Request Join {AUTH = FALSE} 1.2 Authz Join {AUTH = TRUE} 1.4 Provision Credentials {id, Join_TS, Leave_TS, ORL, gKey, N} 1.3 User Join {AUTH=TRUE}, Integrity Evidence Object Cloud 2.1 Add Object o 2.2 Distribute o 4.1 Request Refresh 4.2 Update Attributes 5.1 Remove User (id) 6.1 Remove Object (o) Obtain Object o User Attributes: {id, Join-TS, Leave-TS, ORL, gKey} Object Attributes: {id, Add-TS} ORL: Object Revocation List gKey: Group Key

© Ravi Sandhu 13 World-Leading Research with Real-World Impact! Trusted Computing  Basic premise  Software alone cannot provide an adequate foundation for trust  Old style Trusted Computing (1970 – 1990’s)  Multics system  Capability-based computers  Intel 432 vis a vis Intel 8086  Trust with security kernel based on military-style security labels  Orange Book: eliminate trust from applications  What’s new (2000’s)  Hardware and cryptography-based root of trust  Trust within a platform  Trust across platforms  Rely on trust in applications  Mitigate Trojan Horses and bugs by legal and reputational recourse

© Ravi Sandhu 14 World-Leading Research with Real-World Impact! Trusted Computing  Basic principles  Protect cryptographic keys  At rest  In motion  In use  Control which software can use the keys  Marriage of cryptography and access control

 Foundations  Security Models  Formal methods  Cryptography  Application-Centric  Secure information sharing  Social computing  Health care  Data provenance  Critical infrastructure  Technology-Centric  Cloud computing  Smart grid  Trusted computing  Mission-aware diversity  Attack-Centric  Botnet and malware analysis  Complex systems modeling  Zero-day defense  Moving target defense © Ravi Sandhu 15 World-Leading Research with Real-World Impact! Cyber Security Research

 Most cyber security thinking is microsec  Most big cyber security threats are macrosec  Microsec  Retail attacks vs Targeted attacks  99% of the attacks are thwarted by basic hygiene and some luck  1% of the attacks are difficult and expensive, even impossible, to defend or detect  Rational microsec behavior can result in highly vulnerable macrosec © Ravi Sandhu 16 World-Leading Research with Real-World Impact! Microsec vs Macrosec

Cyber Security as a Discipline © Ravi Sandhu 17 World-Leading Research with Real-World Impact! Computer Science Cyber Security

Cyber Security as a Discipline © Ravi Sandhu 18 World-Leading Research with Real-World Impact! Computer Science Cyber Security

 Wisdom from the past:  “Generally, security is a system problem. That is, it is rare to find that a single security mechanism or procedure is used in isolation. Instead, several different elements working together usually compose a security system to protect something.” R. Gaines and N. Shapiro  The challenge is how to develop a systems perspective on cyber security © Ravi Sandhu 19 World-Leading Research with Real-World Impact! The Cyber Security System Challenge