1 Understanding Which New Threats Operators Can Expect To Face Within The Next Two To Five Years To Improve The On- Going Management Of Security Systems.

Slides:



Advertisements
Similar presentations
Authentication: the problem that will not go away Prof. Ravi Sandhu Chief Scientist Protecting Online Identity.
Advertisements

Sandhus Laws of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio Chief.
1 Laws of Cyber Security Ravi Sandhu Executive Director and Endowed Professor September 2010
1 New Trends and Challenges in Computer Network Security Ravi Sandhu Executive Director and Endowed Professor September 2010
1 Authentication with Passwords Prof. Ravi Sandhu Executive Director and Endowed Chair February 1, © Ravi.
1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11
1 Grand Challenges in Data Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
Future of Access Control: Attributes, Automation, Adaptation
1 Security and Trust Convergence: Attributes, Relations and Provenance Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown.
Attribute-Based Access Control Models and Beyond
1 What is the Game in Cyber Security? Ravi Sandhu Executive Director and Endowed Professor February 2011
1 Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done? Ravi Sandhu Executive Director and Endowed Professor December 2010.
1 Privacy and Access Control: How are These Two Concepts Related? Prof. Ravi Sandhu Executive Director and Endowed Chair SACMAT Panel June 3, 2015
1 Cyber Security Grand Challenges and Prognosis Prof. Ravi Sandhu Executive Director and Endowed Chair
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
1 Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director and Endowed Professor Nov. 9, 2012
1 Big Data Applications in Cloud and Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Professor UTSA COB Symposium on Big Data, Big Challenges.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 Virtualization Prof. Ravi Sandhu Executive Director and Endowed Chair February 7, © Ravi Sandhu World-Leading.
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
1 The Quest for Single-Sign On Prof. Ravi Sandhu Executive Director and Endowed Chair February 8, © Ravi Sandhu.
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Panel on Data Usage Management: Technology or Regulation? Prof. Ravi Sandhu Executive Director and Endowed Chair DUMA 2013 May 23, 2013
1 Cyber Security A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 15, 2016
1 Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair CODASPY 2013 February.
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director and Endowed Professor July 27, 2011
1 Secure Cloud Computing: A Research Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair Texas Fresh Air Big Data and Data Analytics Conference.
Proactive Incident Response
Executive Director and Endowed Chair
Executive Director and Endowed Chair
What can Technologists learn from the History of the Internet?
Security and Privacy in the Networked World
UTSA's New Center Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director of ICS and C-SPECC Professor.
Introduction to Cyber Security
Introduction and Basic Concepts
Institute for Cyber Security: Research Vision
Authentication by Passwords
Attribute-Based Access Control: Insights and Challenges
Identity and Access Control in the
Protecting Online Identity™
Cyber Security Research: Applied and Basic Combined*
Challenge-Response Authentication
ABAC Panel Prof. Ravi Sandhu Executive Director and Endowed Chair
Cyber Security Research: Applied and Basic Combined*
Institute for Cyber Security: Research Vision
Security and Privacy in the Age of the Internet of Things:
Intersection of Data, Policy and Privacy
Authentication and Authorization Federation
UTSA Cyber Security Ecosystem
Attribute-Based Access Control: Insights and Challenges
Cyber Security and Privacy: An Optimist’s Perspective
Big Data and Privacy Panel Prof. Ravi Sandhu
Executive Director and Endowed Chair
Cyber Security Trends and Challenges
Institute for Cyber Security Overview
Challenge-Response Authentication
Application-Centric Security
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Access Control Evolution and Prospects
World-Leading Research with Real-World Impact!
Access Control Evolution and Prospects
Presentation transcript:

1 Understanding Which New Threats Operators Can Expect To Face Within The Next Two To Five Years To Improve The On- Going Management Of Security Systems Prof. Ravi Sandhu Executive Director and Endowed Chair Cyber Security For Process Control: Remote Oil & Gas Assets CSPC16 Houston, Texas June 23, © Ravi Sandhu World-Leading Research with Real-World Impact!

 Computer security  Computer security + Communications security  Information security  Information assurance  Mission assurance  Larger than cyber security © Ravi Sandhu 2 World-Leading Research with Real-World Impact! Cyber Security Evolution

 Computer security  Computer security + Communications security  Information security  Information assurance  Mission assurance  Larger than cyber security © Ravi Sandhu 3 World-Leading Research with Real-World Impact! Cyber Security Evolution Things that can go boom is a game changer

 Segregate  Authenticate  Authorize  Monitor  Contain  Adapt © Ravi Sandhu 4 World-Leading Research with Real-World Impact! Cyber Security Foundations

 Segregate  Authenticate  Authorize  Monitor  Contain  Adapt © Ravi Sandhu 5 World-Leading Research with Real-World Impact! Cyber Security Foundations ● Data Access versus System Access ● Human Users versus Machine Users

© Ravi Sandhu 6 World-Leading Research with Real-World Impact! Threat Matrix Examples High Skill Low Skill Opportunistic Targeted Default passwords Spear phishing Zero-day attack Stuxnet

© Ravi Sandhu 7 World-Leading Research with Real-World Impact! Threat Matrix Defenses High Skill Low Skill Opportunistic Targeted Basic hygiene Security awareness Be better than your neighbor ??

ALLOW GOOD GUYS IN KEEP BAD GUYS OUT  IP Spoofing predicted in Bell Labs report ≈ 1985  Unencrypted Telnet with passwords in clear  1st Generation firewalls deployed ≈ 1992  IP Spoofing attacks proliferate in the wild ≈ 1993  VPNs emerge ≈ late 1990’s  Vulnerability shifts to accessing end-point  Network Admission Control ≈ 2000’s  Persists as a Distributed Denial of Service (DDoS) mechanism ≈ 2010’s © Ravi Sandhu 8 World-Leading Research with Real-World Impact! IP Spoofing Story

© Ravi Sandhu 9 World-Leading Research with Real-World Impact! Ravi’s Laws Attackers exist You will be attacked 2.Attackers have sharply escalating incentive Money, terrorism, warfare, espionage, sabotage, … 3.Attackers are lazy (follow path of least resistance) Attacks will escalate BUT no faster than necessary 4.Attackers are innovative (and stealthy) Eventually all feasible attacks will manifest 5.Attackers are copycats Known attacks will proliferate widely 6.Attackers have asymmetrical advantage Need one point of failure

© Ravi Sandhu 10 World-Leading Research with Real-World Impact! Cyber Security Principles A. Prepare for tomorrow’s attacks, not just yesterday’s Good defenders strive to stay ahead of the curve, bad defenders forever lag B. Take care of tomorrow’s attacks before next year’s attacks Researchers will and should pursue defense against attacks that will manifest far in the future BUT these solutions will deploy only as attacks catch up C. Use future-proof barriers Defenders need a roadmap and need to make adjustments D. It’s all about trade-offs Security, Convenience, Cost