Protecting Internet Infrastructure Michael M. Roberts [ ] MS&E 237 July 11, 2002 Stanford University.

Slides:



Advertisements
Similar presentations
Critical Infrastructure Protection Policy Priorities Sara Pinheiro European Commission DG Home Affairs.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
1 Overview of the 2003 Prison Rape Elimination Act (PREA) These materials were developed by The Moss Group, Inc.under cooperative agreement #03P21G1Y4.
1 Telstra in Confidence Managing Security for our Mobile Technology.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
University of WashingtonComputing & Communications Ten Minutes on Five Nines Terry Gray Associate VP, IT Infrastructure University of Washington Common.
Trust, Privacy, and Security Moderator: Bharat Bhargava Purdue University.
Trust, Privacy, and Security Moderator: Bharat Bhargava 1 Coordinators: Bharat Bhargava 1, Csilla Farkas 2, and Leszek Lilien 1 1 Purdue University and.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
The 10 Deadly Sins of Information Security Management
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
MEANS TO AN END: the OECD Approach for Effective Implementation of Public Procurement Systems Getting really strategic Paulo Magina Head of the Public.
Session 3 – Information Security Policies
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
Introduction to Network Defense
Information Technology Audit
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
WESTERN MASSACHUSETTS NETWORK TO END HOMELESSNESS Presentation to Acting Assistant Secretary Mark Greenberg July 29, 2015.
SEC835 Database and Web application security Information Security Architecture.
Management Information Systems
Program Manager, Information Sharing Environment UNCLASSIFIED ISE Enterprise Architecture and Common Standards Program.
Information Services, Griffith University Problem Management Implementation Service Desk Project Phase 2 Project
Best Practices: Aligning Process, Culture and Tools Michael Jordan Senior Project Manager - Microsoft Consulting Services
PREVENTION, PROTECTION, PROMOTION THE WORLD BANK’S EVOLVING FRAMEWORK OF SOCIAL PROTECTION IN AFRICA MILAN VODOPIVEC WORLD BANK Prepared for the conference.
Chapter 6 of the Executive Guide manual Technology.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
Social and Professional Issues in IT Roshan Chitrakar.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Defence Spending: How Much is Enough? Dr Teri McConville Cranfield Defence and Security.
Appendix C: Designing an Operations Framework to Manage Security.
Internet2 Health Sciences Mary Kratz Internet2 Health Science Manager March Spring Member Meeting International Session.
Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks.
NCR-Homeland Security Strategic Plan November 2005 Draft Initiatives Included.
S. A. Shonola & M. S. Joy Security Framework for Mobile Learning Environments.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
FBI AGENT- National Security By: Joanna Bak. Type of Work, Duties and Responsibilities Prevent terrorist attacks within the United States. Prevent terrorist.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Information Systems in Organizations 3.2 Systems Management.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SEARCH, The National Consortium for Justice Information and Statistics Melissa Nee Government Affairs Specialist SEARCH Overview Briefing.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
A Growing Profession in Uncertain Times. Actuarial Preparatory Work for High School Students.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Organizing and leading the IT function Two set of tensions guide policies for developing, deploying and managing IT systems. 1.Innovation and control a.How.
Youth employment and “Youth on the Move” ETUC Youth Committee meeting Brussels 14 June 2011 Christiane Westphal Poliy co-ordinator Youth European Commission,
Planning Planning is considered the most important element of the administrative process. The higher the level of administration, the more the involvement.
Cyber Security – An Existential Threat? (IIC, Singapore)
Crisis management related research at
Educause/Internet 2 Computer and Network Security Task Force
Micro-Insurance: A Poverty Reduction Tool
Security Risk Profiles – Tips and Tricks
Critical Infrastructure Protection Policy Priorities
CMGT 431 STUDY Education for Service- -cmgt431study.com.
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
XAHIVE International LLC Ottawa • New York
Technology Strategy ITSS will define and promote a unified technology strategy ! There will be one technology strategy plan for all ITSS. Discussions with.
Technology Strategy ITSS will define and promote a unified technology strategy ! There will be one technology strategy plan for all ITSS. Discussions with.
Technology Strategy ITSS will define and promote a unified technology strategy ! There will be one technology strategy plan for all ITSS. Discussions with.
Technology Strategy ITSS will define and promote a unified technology strategy ! There will be one technology strategy plan for all ITSS. Discussions with.
Technology Strategy ITSS will define and promote a unified technology strategy ! There will be one technology strategy plan for all ITSS. Discussions with.
Improving SME Access to Finance: the Role of Government
Presentation transcript:

Protecting Internet Infrastructure Michael M. Roberts [ ] MS&E 237 July 11, 2002 Stanford University

Changed Internet Security Environment Terrorist threat Terrorist employment of advanced technology Public expectation/demand for govt response Recognition within net community before 9/11 that security tools and deployment are not adequate

Dimensions of Internet Security Problem Network Size Million Clients & GrowingNetwork Size Million Clients & Growing Diversity of Physical Facilities/LocalesDiversity of Physical Facilities/Locales Vulnerability of Open ArchitectureVulnerability of Open Architecture Complexity of Users/UsesComplexity of Users/Uses Mastery of Security Technology = Zero to ? %Mastery of Security Technology = Zero to ? % Management Will/Capacity to Allocate Resources ?Management Will/Capacity to Allocate Resources ?

Security Action Framework Make IT Security higher and more visible priority Do better job with existing security tools incl policies Design, develop & deploy better security for future Raise level of collaboration among Govt/Industry/Education Train human resources for security jobs

Security Policy Issues Balancing individual vs organizational responsibility and accountability What level of security breach/damage is tolerable? Sanctions for security “misbehavior” Civil liberties vs law enforcement, e.g. ‘Patriot’ Act and client scanning for holes Entitlement to due process

Security Implementation Issues Managing large number of players and creating consistent set of expectations Obtaining resources for security when risk is always relative (success=nothing happens!) Preventing quick technical solutions that have adverse long term impact on net Fending off federal demands for command & control accountability Monitoring/reporting/getting credit for improved security