Csilla Farkas farkas@cec.sc.edu Cybersecurity Csilla Farkas farkas@cec.sc.edu
Who is Impacted by Cyber Attacks? Source: http://www.cagle.com/2010/05/internet-privacy/
The Scary Future!
“A ship in port is safe, but that's not what ships are built for.” Grace Hopper
What is Cyber Security? Highly Technical People, processes, and technology Legislation and Regulation Risk management
Understanding Cyber Security Risk Cyber Security Threats Mobile Malware Virtual currencies Stealth attacks by state actors Social attack New PC and server attacks Cloud-based attacks Source: McAfee Labs 2014 Treats Predictions dreamsmademe.wordpress.com
Optimal level of security Risk Assessment Business Policy Decision Communication between technical and administrative employees Internal vs. external resources Legal and regulatory requirements Developing security capabilities Cost Security level 0 % 100% Optimal level of security at a minimum cost Security Investment Cost of Breaches
Law and Computer Security International, national, state, and city laws: affect privacy and secrecy Laws: regulate the use, development, and ownership of data and programs Laws: affect actions that can be taken to protect the secrecy, integrity, and availability of computing resources
Lack of Legislation Reactive procedures Not addressed improper acts Lack of technical expertise of legal personnel
Question 1. If you see someone shoplifting a bicycle what would you do? Report it Create diversion to ensure s/he is not detected Ask if you can borrow it sometime Turn away
Question 2. If you see someone making a copy of a computer game what would you do? Report it Create diversion to ensure s/he is not detected Ask if you can borrow it sometime Turn away
Copyright: http://sdtimes. com/top-20-countries-software-piracy/ Nov Copyright: http://sdtimes.com/top-20-countries-software-piracy/ Nov. 2014
Ethics vs. Law Law Ethics Formal, written document Unwritten principles Interpreted by courts Interpreted by each individual Established by legislatures Presented by philosophers, religious, professional groups Applicable to everyone Personal choice Priority decided by court Priority determined by individual Court makes final decision No external decision maker Enforceable by police and courts Limited enforcement
National Center of Academic Excellence in Information Assurance Education National Training Standards: CNSS 4011, 4013, 4014
CIAE Mission OUTREACH EDUCATION RESEARCH
Peer-reviewed publications CIAE Mission OUTREACH EDUCATION RESEARCH External funding Peer-reviewed publications Ph.D. graduates
Graduate IA Certificate CIAE Mission OUTREACH EDUCATION IA courses IA specialization Applied Computing Graduate IA Certificate RESEARCH
CIAE Mission OUTREACH Collaborations Academia Government Industry EDUCATION RESEARCH
Center for Information Assurance Engineering http://www. cse. sc Center for Information Assurance Engineering http://www.cse.sc.edu/isl Online activities: https://cse.sc.edu/~farkas/PMECS.htm