Csilla Farkas farkas@cec.sc.edu Cybersecurity Csilla Farkas farkas@cec.sc.edu.

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Cyber and Maritime Infrastructure
1 6 - Outsourcing Outsourcing. © Robert G Parker – UW-CISA 2010 Dealing with issues when a portion or all of the provision of technology services is performed.
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Legal and Ethical Issues in Computer Security
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Legal and Ethical Issues in Computer Security Csilla Farkas
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Finance and Governance Workshop Data Protection and Information Management 10 June 2014.
Legal and Ethical Issues in Computer Security
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
CSCE 727 Information Warfare
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
Computer Science and Engineering 1 Future of Cyber Security.
Training and Certification. Who needs digital forensic training and professional certification? Forensic examiners Investigators Crime scene specialists.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
ETHICS, POLICY & SECURITY ISSUES
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Center for Cybersecurity Research and Education (CCRE)
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Csilla Farkas Department of Computer Science and Engineering University of South Carolina
CSCE 824 Secure (and Distributed) Database Management Systems FarkasCSCE
Group 7 CIS03 June 09, Socially responsible computing is a major concern because of the many ways an information worker’s work can affect other.
Legal and Ethical Issues in Computer Security Csilla Farkas
Ethics. What are ethics Ethics is the study of our notions of right and wrong In essence ethics are our moral compass.
Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Mohssen Mohammed Sakib Pathan Building Customer Trust in Cloud Computing with an ICT-Enabled Global Regulatory Body Mohssen Mohammed Sakib Pathan.
Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering.
Ensuring Test Data Integrity Tracy Cerda Cheryl Alcaya Minnesota Assessment Conference August 5, 2015 “Leading for educational excellence and equity. Every.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Internal Audit Agency Integrity + Professionalism INTERNAL AUDIT AGENCY ISACA Presentation 15 July, 2013 Alisa Hotel, ACCRA.
Information Security in Laurier Grant Li Wilfrid Laurier University.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Security and resilience for Smart Hospitals Key findings
Law Firm Data Security: What In-house Counsel Need to Know
Information Security Program
Presenter: Mohammed Jalaluddin
Master’s Degree Program in Business Compliance Assurance
Cybersecurity - What’s Next? June 2017
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Legal and Ethical Issues in Computer Security
GDPR Awareness and Training Workshop
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Chapter 1 Overview Part 1: Process of Ethical Decisions
Download Latest CompTIA CAS-002 Exam Dumps PDF Questions - CAS-002 Best Study Material - Realexamdumps.com
National Cyber Strategy Preparedness: 8 Preparatory Questions
1.00 Understand Ethics And Ethical Decision-making.
1.00 Understand Ethics And Ethical Decision-making.
Attacks on The Manufacturing Industry
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
UTSA Cyber Security Ecosystem
Chapter 8 Developing an Effective Ethics Program
Chapter 5: Will Your Future Be in Cybersecurity?
UW System Information Security
Introduction to Information Assurance
Stretch Your Budget With Organizational Membership
World-Leading Research with Real-World Impact!
November AUL Open House
Institute for Cyber Security Overview
Managing IT Risk in a digital Transformation AGE
Standard 6: Educational Leaders understand the social, legal, and ethical issues related to technology and model responsible decision-making related to.
World-Leading Research with Real-World Impact!
Presentation transcript:

Csilla Farkas farkas@cec.sc.edu Cybersecurity Csilla Farkas farkas@cec.sc.edu

Who is Impacted by Cyber Attacks? Source: http://www.cagle.com/2010/05/internet-privacy/

The Scary Future!

“A ship in port is safe, but that's not what ships are built for.” Grace Hopper

What is Cyber Security? Highly Technical People, processes, and technology Legislation and Regulation Risk management

Understanding Cyber Security Risk Cyber Security Threats Mobile Malware Virtual currencies Stealth attacks by state actors Social attack New PC and server attacks Cloud-based attacks Source: McAfee Labs 2014 Treats Predictions dreamsmademe.wordpress.com 

Optimal level of security Risk Assessment Business Policy Decision Communication between technical and administrative employees Internal vs. external resources Legal and regulatory requirements Developing security capabilities Cost Security level 0 % 100% Optimal level of security at a minimum cost Security Investment Cost of Breaches

Law and Computer Security International, national, state, and city laws: affect privacy and secrecy Laws: regulate the use, development, and ownership of data and programs Laws: affect actions that can be taken to protect the secrecy, integrity, and availability of computing resources

Lack of Legislation Reactive procedures Not addressed improper acts Lack of technical expertise of legal personnel

Question 1. If you see someone shoplifting a bicycle what would you do? Report it Create diversion to ensure s/he is not detected Ask if you can borrow it sometime Turn away

Question 2. If you see someone making a copy of a computer game what would you do? Report it Create diversion to ensure s/he is not detected Ask if you can borrow it sometime Turn away

Copyright: http://sdtimes. com/top-20-countries-software-piracy/ Nov Copyright: http://sdtimes.com/top-20-countries-software-piracy/ Nov. 2014

Ethics vs. Law Law Ethics Formal, written document Unwritten principles Interpreted by courts Interpreted by each individual Established by legislatures Presented by philosophers, religious, professional groups Applicable to everyone Personal choice Priority decided by court Priority determined by individual Court makes final decision No external decision maker Enforceable by police and courts Limited enforcement

National Center of Academic Excellence in Information Assurance Education National Training Standards: CNSS 4011, 4013, 4014

CIAE Mission OUTREACH EDUCATION RESEARCH

Peer-reviewed publications CIAE Mission OUTREACH EDUCATION RESEARCH External funding Peer-reviewed publications Ph.D. graduates

Graduate IA Certificate CIAE Mission OUTREACH EDUCATION IA courses IA specialization Applied Computing Graduate IA Certificate RESEARCH

CIAE Mission OUTREACH Collaborations Academia Government Industry EDUCATION RESEARCH

Center for Information Assurance Engineering http://www. cse. sc Center for Information Assurance Engineering http://www.cse.sc.edu/isl Online activities: https://cse.sc.edu/~farkas/PMECS.htm