LAN of Milk and Honey: Ensuring safe networks through virtualisation Suné von Solms.

Slides:



Advertisements
Similar presentations
Steps towards E-Government in Syria
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Learning Enhances Awareness LEA – IJMA Learning Enhances Awareness LEA 2008.
Enhancing the Human Layer in Organisations Please click to continue at your own pace…
Mobility in Government Consolidation & Wrap-up Lee Naik3 Oct 2013.
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
Establishing Cyber Security education, awareness, training and trust for SMEs Roger Dean, Executive Director
A Framework to Implement a National Cyber Security Structure for Developing Nations ID Ellefsen - SH von Solms - Academy.
National Cyber Security and Information (Cyber) Security Awareness Prof SH (Basie) von Solms Immediate Past President : IFIP University of Johannesburg.
© 2005 Mobile VCE Securing the Future: Device & Service Security Stephen Hope, FT R&D UK Ltd on behalf of Nigel Jefferies, Vodafone Chair.
The New World of Security for Business Travellers Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development.
29th WATCH: Cybersecurity for the Internet of Everything (IoE) Bret Hartman Cisco Systems, Inc. Thursday June 18, Noon, Room 110 W ashington A rea T rustworthy.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
The generation, storage, and movement of information are central to managing an enterprise’s business processes As a result, businesses must ensure.
1. 2 IT innovations in specialized areas where competitors will have difficulty copying Excellence in design of processes and activities and how they.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
Enhancing the Security of Corporate Wi-Fi Networks using DAIR PRESENTED BY SRAVANI KAMBAM 1.
Exploring the Network.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Wireless Networks Breakout Session Summary September 21, 2012.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Tufts University School Of Engineering Tufts Wireless Laboratory TWL Direction Almir Davis 09/28/20091.
“PMI” is a registered trade and service mark of the Project Management Institute, Inc. ©2009 Permission is granted to PMI for PMI® Marketplace use only“PMI”
Cybersecurity: Think Globally, Act Locally Dr. Peter Freeman NSF Assistant Director for CISE Educause Net2003 April 30, 2003.
Randy Beavers CS 585 – Computer Security February 19, 2009.
Cloud Networked Robotics Speaker: Kai-Wei Ping Advisor: Prof Dr. Ho-Ting Wu 2013/04/08 1.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Andrew Staniforth Chapter 17 - Securing Cyberspace: Strategic Responses for a Digital Age, Pg. 213.
A Cyber Security Curriculum for Southern African Schools By Mariska de Lange and Prof Rossouw von Solms.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
ECOGEM Cooperative Advanced Driver Assistance System for Green Cars Burak ONUR Project Coordinator R&D Support Executive
Text Davor Meersman, 28 October, 2015 Procuring the EIT Data-Driven Learning Platform.
Basics of testing mobile apps
1 An initiative developed in the framework of the START project supported by the European Commission (DG InfSo) START IST SSA.
Alex Adamec.  Any physical or virtual information system that controls, processes, transmits, receives, or stores electronic information in any form.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
B. RAMMAMURTHY Connected Vehicle Technology 6/6/2014 cse651 1.
SIMULATED CLINICAL NURSING PRACTICE: TECHNOLOGY ENHANCED LEARNING TEACHING Prof. O.N. Makhubela-Nkondo UNIVERSITY OF SOUTH AFRICA USERS:
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
HOME SCHOOL FOR NETWORK SECURITY James Coffey Network Security & Electronics Program Dept. of Applied Engineering & Technology Eastern Kentucky University.
Issues for Computer Users, Electronic Devices, Computer and Safety.
TECHNOLOGY IN THE COMMUNITY Community Center Representative EDU 620 Meeting Individual Student Needs Instructor: Dusty Clark January 21 st 2016 Amber Currie.
Connecting the Healthcare Ecosystem Evolving the Infrastructure 2013 Comcast and Juniper Networks:
OMA Secure Content Delivery for the Mobile World ODRL Workshop, Vienna Dr. Willms Buhse Vice Chair, OMA Download and DRM group.
© 2007 IBM Corporation IBM Software Strategy Group IBM Google Announcement on Internet-Scale Computing (“Cloud Computing Model”) Oct 8, 2007 IBM Confidential.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Advancing National Wireless Capability Date: March 22, 2016 Wireless Test Bed & Wireless National User Facility Paul Titus Department Manager, Communications.
Security and resilience for Smart Hospitals Key findings
Broadband Challenges 2017 Christopher Tamarin
Presented by Edith Ngai MPhil Term 3 Presentation
Internet of Things and Smart Cities
Chapter 1: Exploring the Network
Breaking Up is Hard to Do
STRATEGIC ACADEMIC UNIT “PEOPLE & TECHNOLOGIES”
Secure Hyperconnectivity with TeamViewer and Windows technologies
Information Technology 2016 Budget Presentation
Connected Vehicle Technology
Our Children and Social Media
National Mining University
Unit 27: Network Operating Systems
Smart Learning concepts to enhance SMART Universities in Africa
Matteo Merialdo RHEA Group Innovative aspects in cyber range solutions.
Community of Users.
SUSTAINABLE TOURISM HANDBOOK FOR EASTERN AFRICA: Aims and objectives
CEng progression through the IOM3
Presentation transcript:

LAN of Milk and Honey: Ensuring safe networks through virtualisation Suné von Solms

Introduction Land of Milk and Honey: Sought after land Rich in resources Safe from enemies 4000 years later, we strive for the same qualities in cyberspace: Access to people, information and systems Safe from intruders and criminals It is, however, just as hard to find today as it was back then. Please Insert photo of a green field, river etc.

Overview Technology has transformed today's society: Connect with friends and family Assist with daily assignments Simplify everyday tasks Cyberspace is so deeply embedded into society today that the users are compromised & exploited Please Insert photo of people using technology (phone, computer or tablet)

Cyber security today In South Africa: Rapid increase in bandwidth Increased use of wireless and mobile devices  highly vulnerable to cyber attacks As more people rely on technology, cybercriminals aim to exploit: Cyber security gaps Users' trusting nature

Cyber security today Critical factors to secure our cyberspace: Legislation relating to cyber crime Cyber safety initiatives Computer literacy Education These factors are failing to maintain the desired pace to keep up with the rapid technology advancement.

Cyber security research R&D can greatly assist toward making us more resilient to cyber attacks: Innovative solutions development Skills enhancement

Cyber security research Research hampered as new tools and technologies cannot be tested on live networks: Compromise network stability Create larger network vulnerabilities Large network testing infrastructure are limited to few corporations with massive server rooms and even larger budgets.

Cyber security research Recent advances in virtualisation technology: Create virtual replicas of the networks. Perform tests on virtual counterparts. It is now possible to build large network research facilities.

Cyber security R&D at CSIR The CSIR is establishing various network testing platforms: Integrated testing environment. Network performance and behaviour testing. Cyber tools and technique evaluation. Network equipment testing.

Cyber security R&D at CSIR R&D in safe environment under real-life circumstances  assists researchers to study and address network security weaknesses.

Cyber security R&D at CSIR NESL is the first of its type in South Africa: Web-accessible. Open-source platform. Emulation, simulation, virtualisation and physical devices integrated. Large-scale cyber security testing and research.

Conclusion The CSIR enabling R&D in cyber security: Assists in the advancement of SA’s cyber knowledge base. Original research. Provision of top quality graduates. These network virtualisation platforms will drive developments in theory and practice of cyber security to help create of a safe, secure and prosperous cyberspace. Please Insert photo of a green field, river etc. Same as on the second slide

Thank you