Emerging and Evolving Cyber Threats Require Sophisticated Response and Protection Capabilities  Advanced Algorithms  Cyber Attack Detection and Machine.

Slides:



Advertisements
Similar presentations
Lecture 1: Overview modified from slides of Lawrie Brown.
Advertisements

Cyber Security Discussion Craig D’Abreo – VP Security Operations.
Security Controls – What Works
Advanced Metering Infrastructure AMI Security Roadmap April 13, 2007.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Computer Security: Principles and Practice
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Stephen S. Yau CSE , Fall Security Strategies.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Fraud Prevention and Risk Management
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Introduction to Network Defense
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Presentation title SUB TITLE HERE Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Dr. Emmanuel Hooper, PhD, PhD,
HIPAA COMPLIANCE WITH DELL
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
The Challenge of IT-Business Alignment
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.
CSC8320. Outline Content from the book Recent Work Future Work.
A Review by Raghu Rangan WPI CS525 September 19, 2012 An Early Warning System Based on Reputation for Energy Control Systems.
Chapter VII Security Management for an E-Enterprise -Ramyah Rammohan.
Security is not just… 1 A Compliance Exercise Certification and Accreditation FISMA.
PAGE Intelligence Meets Vulnerability Management NYC ISSA January 24, 2013.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
ISS SiteProtector and Internet Scanner LanAdmin Group Meeting 12/8/2005.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
IT Controls Global Technology Auditing Guide 1.
© 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Cyber Security and the National.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Detecting Undesirable Insider Behavior Joseph A. Calandrino* Princeton University Steven J. McKinney* North Carolina State University Frederick T. Sheldon.
111 © 2001, Cisco Systems, Inc. All rights reserved. Presentation_ID Cisco Services & Support World Class Partners Technical Support Services Advanced.
By Ramesh Mannava.  Overview  Introduction  10 secure software engineering topics  Agile development with security development activities  Conclusion.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
O AK R IDGE N ATIONAL L ABORATORY U. S. D EPARTMENT OF E NERGY A Systems Development and Implementation Study for 21st Century Software and Security Third.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Reach us at Call: | Visit:
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
CS457 Introduction to Information Security Systems
Design for Security Pepper.
Information Technology Sector
Cyber Resilient Energy Delivery Consortium
Detection and Analysis of Threats to the Energy Sector (DATES)
Security Engineering.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Multi-Step Attack Defense Operating Point Estimation via Bayesian Modeling under Parameter Uncertainty Peng Liu, Jun Dai, Xiaoyan Sun, Robert Cole Penn.
Specification of Countermeasures for CYRAIL
Enhanced alerting and collaborative incident management
AMI Security Roadmap April 13, 2007.
Coordinated Security Response
Computer Science and Engineering
PLANNING A SECURE BASELINE INSTALLATION
Final Conference 18 Set 2018.
Albeado - Enabling Smart Energy
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Emerging and Evolving Cyber Threats Require Sophisticated Response and Protection Capabilities  Advanced Algorithms  Cyber Attack Detection and Machine Speed Response  Multi-Level and Distributed Ad-Hoc Trust  Distributed Intrusion Detection and Attack Containment (DIDAC) for Organizational Cyber Security  Distributed Zero-Day Attack Detection  Data and Identity Integrity and Protection  Preventing Ex-Filtration and Corruption of Stored Data  Protection of Data (Secure, Trusted, Protected Information Sharing)  Stand-off Brain Scan Authentication and Identification

O AK R IDGE N ATIONAL L ABORATORY U. S. D EPARTMENT OF E NERGY 2 Next-Generation Validation and Response Tools for Critical Protection Mechanisms  Large-Scale Cyber Security and Network Test Bed  Software Verification and Validation  Vulnerability Assessments  Large-Scale Cyber Situation Awareness, Warnings, and Response  IAVA Compliance Enabling Technology (ICETECH)

O AK R IDGE N ATIONAL L ABORATORY U. S. D EPARTMENT OF E NERGY 3 Intrusion Prevention, Detection, and Response at the Granular Level  Multi-Level Evidence Based Intrusion Detection System Using Bayesian Network to Detect Insider Threats  Robust, flexible, and scalable distributed intrusion detection system (DIDS) overlay in an enterprise network

O AK R IDGE N ATIONAL L ABORATORY U. S. D EPARTMENT OF E NERGY 4 Designing Integrated Methods and Tools for Managing Computer Security  Logic for system security (security specification and abstraction notation)  Security certification formula, which formulates the condition under which a system (represented by its security abstraction) meets a given set of security requirements (represented by security specifications).  Security Management Tool  Supports all phases of the system life-cycle, online security monitoring (uses Baysian assessment mechanism) and codification of security preserving architecture.

O AK R IDGE N ATIONAL L ABORATORY U. S. D EPARTMENT OF E NERGY 5 Designing Integrated methods and Tools for Managing Computer Security  Recognition that security is best managed by focusing on the observable / quantifiable measures of security rather than hypothesized causes.  Derivation of a Logic for system security, which encompasses means to specify security requirements, derive security properties, and verify/ certify system against security standards.

O AK R IDGE N ATIONAL L ABORATORY U. S. D EPARTMENT OF E NERGY 6 Outcomes in terms of Methodology:  we can assess security measures/ procedures in terms of their observable/ quantifiable impact.  we can derive security strategies that deploy complementary measures, minimize redundancy, and maximize security gains.  we can use the proposed logic to deploy methods for security testing and security verification, thereby merging security concerns with other dependability concerns (reliability, safety, etc).  we can use the proposed logic to support the concept of security preserving architectures, whereby any instance of the architecture is certified to meet certain security requirements.

O AK R IDGE N ATIONAL L ABORATORY U. S. D EPARTMENT OF E NERGY 7 Outcomes in terms of Tools:  A tool that supports the management of system security by quantifying the impact of existing security measures and directing the manager to possible security gaps.  The inference mechanism of this tool can be used for online security monitoring, by analyzing various security parameters online (through bayesian analysis) and alerting the monitored system if its vulnerability reaches predefined thresholds.