INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY 1 Trusted Computing Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University.
Advertisements

INSTITUTE FOR CYBER SECURITY 1 The ASCAA * Principles Applied to Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: What You Need to Know Prof. Ravi Sandhu Executive Director and Chief Scientist Institute for Cyber Security.
Institute for Cyber Security (ICS) Prof. Ravi Sandhu Executive Director and Lutcher Brown Endowed Chair
1 Speculations on the Future of Cyber Security in 2025 Prof. Ravi Sandhu Executive Director and Chief Scientist Institute for Cyber Security University.
1 Speculations on the Future of Cyber Security in 2025 Prof. Ravi Sandhu Executive Director January 2010
INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for.
Stale-Safe Security Properties for Secure Information Sharing Ram Krishnan (GMU) Jianwei Niu (UT San Antonio) Ravi Sandhu (UT San Antonio) William Winsborough.
Institute for Cyber Security
1 Privacy Prof. Ravi Sandhu Executive Director and Endowed Chair March 8, © Ravi Sandhu World-Leading Research.
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 Access Control Models Prof. Ravi Sandhu Executive Director and Endowed Chair January 25, 2013 & February 1, 2013
1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
Future of Access Control: Attributes, Automation, Adaptation
1 A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC Prof. Ravi Sandhu Executive Director and Endowed Chair DBSEC July 11, 2012.
Attribute-Based Access Control Models and Beyond
1 Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done? Ravi Sandhu Executive Director and Endowed Professor December 2010.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Privacy and Access Control: How are These Two Concepts Related? Prof. Ravi Sandhu Executive Director and Endowed Chair SACMAT Panel June 3, 2015
11 World-Leading Research with Real-World Impact! Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS (Invited Paper) Xin.
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 The Challenge of Data and Application Security and Privacy (DASPY) Ravi Sandhu Executive Director and Endowed Professor March 23, 2011
11 World-Leading Research with Real-World Impact! A Group-Centric Model for Collaboration with Expedient Insiders in Multilevel Systems Khalid Zaman Bijon,
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
INSTITUTE FOR CYBER SECURITY © Ravi Sandhu11 Group-Centric Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber.
1 Big Data Applications in Cloud and Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Professor UTSA COB Symposium on Big Data, Big Challenges.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
11 World-Leading Research with Real-World Impact! Group-Centric Secure Information Sharing: A Lattice Interpretation Institute for Cyber Security Ravi.
INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for.
1 The Quest for Single-Sign On Prof. Ravi Sandhu Executive Director and Endowed Chair February 8, © Ravi Sandhu.
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for Group-Centric Secure Information Sharing (g-SIS) Co-authored with Ram Krishnan, PhD Candidate,
1 Group-Centric Models for Secure Information Sharing Prof. Ravi Sandhu Executive Director and Endowed Chair March 30, 2012
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
Application-Centric Security Models
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Panel on Data Usage Management: Technology or Regulation? Prof. Ravi Sandhu Executive Director and Endowed Chair DUMA 2013 May 23, 2013
1 Cyber Security A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 15, 2016
1 Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair CODASPY 2013 February.
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
INSTITUTE FOR CYBER SECURITY 1 Enforcement Architecture and Implementation Model for Group-Centric Information Sharing © Ravi Sandhu Ram Krishnan (George.
1 Secure Cloud Computing: A Research Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair Texas Fresh Air Big Data and Data Analytics Conference.
INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security.
Institute for Cyber Security
Institute for Cyber Security
Past, Present and Future
World-Leading Research with Real-World Impact!
Cyber Security Research: Applied and Basic Combined*
Challenge-Response Authentication
Cyber Security Research: Applied and Basic Combined*
Security and Privacy in the Age of the Internet of Things:
Intersection of Data, Policy and Privacy
Authentication and Authorization Federation
Identity and Access Control in the
Big Data and Privacy Panel Prof. Ravi Sandhu
Executive Director and Endowed Chair
Institute for Cyber Security Overview
Challenge-Response Authentication
Application-Centric Security
ASCAA Principles for Next-Generation Role-Based Access Control
Assured Information Sharing
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Attribute-Based Access Control (ABAC)
Cyber Security R&D: A Personal Perspective
Presentation transcript:

INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August © Ravi Sandhu ICS: World-leading research with real-world impact

INSTITUTE FOR CYBER SECURITY Institute for Cyber Security Founded June 2007: still in start-up mode World leading security modeling and analysis research  Role-Based Access Control (RBAC) Model: Commercially dominant model today  Usage Control (UCON) Model: Attribute-Based Access Control on Steroids  PEI Framework: Policy (what), Enforcement (how), Implementation (how exactly)  Group-Centric Information Sharing: Sharing metaphor of meeting room  Security for Social Networks  Botnet Analysis, Detection and Mitigation  Multilevel Secure Architectures  Secure Cloud Computing World-leading research infrastructure  FlexCloud  FlexFarm © Ravi Sandhu2 ICS: World-leading research with real-world impact

INSTITUTE FOR CYBER SECURITY Cyber Security Objectives 3 INTEGRITY authenticity AVAILABILITY access CONFIDENTIALITY disclosure © Ravi Sandhu ICS: World-leading research with real-world impact

INSTITUTE FOR CYBER SECURITY Cyber Security Objectives 4 INTEGRITY authenticity AVAILABILITY access CONFIDENTIALITY disclosure USAGE purpose © Ravi Sandhu ICS: World-leading research with real-world impact

INSTITUTE FOR CYBER SECURITY Cyber Security Objectives 5 INTEGRITY authenticity AVAILABILITY access CONFIDENTIALITY disclosure USAGE purpose USAGE © Ravi Sandhu ICS: World-leading research with real-world impact

INSTITUTE FOR CYBER SECURITY Cyber Security: Major Trends 6© Ravi Sandhu ICS: World-leading research with real-world impact Major driver is the Internet which itself is in continuous transition Attackers: Morphed from A nuisance to Highly organized criminal ecosystem motivated by money Stealthy infiltrators, spies and saboteurs driven by nation states and terrorists Defenders: Morphed from Closed Enterprise-Centric era to Open Application-Centric/Technology-Centric era Dinosaurs: Mired in old-think Industry: mired in FUD (fear, uncertainty, doubt) Academia: mired in fairy tales

INSTITUTE FOR CYBER SECURITY Internet Architecture 7© Ravi Sandhu ICS: World-leading research with real-world impact Layer 2 Layer 1 Ethernet WiFi Cable-modem Wide-area network …… Layer 4 Layer 3 Transport: TCP, UDP Routing: IP Layer 5+IM web social nw VOIP collaboration twitter ……

INSTITUTE FOR CYBER SECURITY Internet Architecture 8© Ravi Sandhu ICS: World-leading research with real-world impact Layer 2 Layer 1 Ethernet WiFi Cable-modem Wide-area network …… Layer 4 Layer 3 Transport: TCP, UDP Routing: IP Layer 5+IM web social nw VOIP collaboration twitter …… INNOVATIONINNOVATION

INSTITUTE FOR CYBER SECURITY Internet Architecture 9© Ravi Sandhu ICS: World-leading research with real-world impact Layer 2 Layer 1 Ethernet WiFi Cable-modem Wide-area network …… Layer 4 Layer 3 Transport: TCP, UDP Routing: IP Layer 5+IM web social nw VOIP collaboration twitter …… Security Infrastructure Centric Firewalls, Encryption INNOVATIONINNOVATION

INSTITUTE FOR CYBER SECURITY Internet Architecture 10© Ravi Sandhu ICS: World-leading research with real-world impact Layer 2 Layer 1 Ethernet WiFi Cable-modem Wide-area network …… Layer 4 Layer 3 Transport: TCP, UDP Routing: IP Layer 5+IM web social nw VOIP collaboration twitter …… Security Infrastructure Centric Firewalls, Encryption Security Application Centric INNOVATIONINNOVATION

INSTITUTE FOR CYBER SECURITY Policy (What) Group-Centric Information Sharing Metaphor: Secure Meeting Room Operational aspects  What is authorized by join, add, etc.? Administrative aspects  Who authorizes join, add, etc.? Multiple groups  Inter-group relationship Group Can user u read object o? join leave add remove Users Objects © Ravi Sandhu11 ICS: World-leading research with real-world impact

INSTITUTE FOR CYBER SECURITY g-SIS Enforcement (How?) CC GA Group Subjects TRM … 1. Read Objects 5.1 Request Refresh 5.2 Update Attributes 3.1 Subject Leave (s) 4.1 Object Remove (o) 3.2 Set Leave-TS (s) 4.2 Add o to ORL CC: Control Center GA: Group Administrator Subject Attributes: {id, Join-TS, Leave- TS, ORL, gKey} ORL: Object Revocation List gKey: Group Key Object Attributes: {id, Add- TS} Refresh Time (RT): TRM contacts CC to update attributes © Ravi Sandhu12 Practical reality 1. Trusted servers 2. Approximation ICS: World-leading research with real-world impact

INSTITUTE FOR CYBER SECURITY Implementation (How Exactly?) Detailed protocol and algorithm specifications © Ravi Sandhu13 ICS: World-leading research with real-world impact

INSTITUTE FOR CYBER SECURITY Conclusion PAST, PRESENT Cyber security is a young and immature field The attackers are more innovative than defenders Defenders are mired in FUD and fairy tales FUTURE Cyber security will become a scientific discpline Cyber security will be application and technology centric Cyber security will never be “solved” © Ravi Sandhu14 ICS: World-leading research with real-world impact