World-Leading Research with Real-World Impact!

Slides:



Advertisements
Similar presentations
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director February © Ravi Sandhu.
Advertisements

1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
1 Towards a Discipline of Mission-Aware Cloud Computing (A Position Paper) Ravi Sandhu Executive Director and Endowed Professor October 2010
1 New Trends and Challenges in Computer Network Security Ravi Sandhu Executive Director and Endowed Professor September 2010
1 Cyber Security Research: A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 18, 2013
Project Wrap Up / Post Mortem
1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
1 Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done? Ravi Sandhu Executive Director and Endowed Professor December 2010.
1 Big Data Applications in Cloud and Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Professor UTSA COB Symposium on Big Data, Big Challenges.
Why do we tell stories?. Why do we exchange stories? Stories help us pull our life into a pattern Hearing about someone else’s life gives us perspective.
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
1 Panel on Data Usage Management: Technology or Regulation? Prof. Ravi Sandhu Executive Director and Endowed Chair DUMA 2013 May 23, 2013
Bell Work: Graph on a number line I x I > 0. Answer: All reals.
Cyber Insurance Collecting and Storing Cyber attack data using a Cyber Security Surveillance System (CS3) Presenter: Kasturi Balakrishnan.
1 Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair CODASPY 2013 February.
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
IAEA International Atomic Energy Agency IAEA Training Course on Conducting Computer Security Assessments Presented by: Donald D. Dudenhoeffer.
1 Secure Cloud Computing: A Research Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair Texas Fresh Air Big Data and Data Analytics Conference.
STAYER CIS 500 Week 6 Case Study Cyber Security in Business Organizations NEW Check this A+ tutorial guideline at
CMGT 411 Week 2 DQ 1 Why is managing technical vulnerabilities so important to an organization managing their security environment? Check this A+ tutorial.
BSHS 471 Week 2 DQ 1 Check this A+ tutorial guideline at 471/BSHS-471-Week-2-DQ-1 Why is primary prevention preferable.
How to Run a Successful RFP
Institute for Cyber Security
Bid/No-Bid Recommendation(s)
USA Final Project Report
Planning for Usability
Security and Privacy in the Networked World
Cyber Security coordination in Europe CERT-EU’s perspective
UTSA's New Center Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director of ICS and C-SPECC Professor.
COMMUNICATION.
BACK SOLUTION:
Introduction to Cyber Security
Introduction and Basic Concepts
NRC Cyber Security Regulatory Overview
Institute for Cyber Security: Research Vision
Identity and Access Control in the
Cyber Security Research: Applied and Basic Combined*
On the Value of Access Control Models
Challenge-Response Authentication
فرایند تسهیلگری در مددکاری جامعه ای
Cyber Security Research: Applied and Basic Combined*
Institute for Cyber Security: Research Vision
Security and Privacy in the Age of the Internet of Things:
Empirical Research Reports
Intersection of Data, Policy and Privacy
Authentication and Authorization Federation
The Research Proposal How to Write It.
Cyber Security and Privacy: An Optimist’s Perspective
Identity and Access Control in the
Group Meeting Ming Hong Tsai Date :
CS 1L Spring
Big Data and Privacy Panel Prof. Ravi Sandhu
Executive Director and Endowed Chair
World-Leading Research with Real-World Impact!
Crisis Response Task Force (CRTF) Proposal
World-Leading Research with Real-World Impact!
Community Health Needs Assessment
Why are they significant?
Views of Cloud Computing
Challenge-Response Authentication
Planning for Usability
Institute for Cyber Security
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
CYBER SECURITY SPACE OPERATIONS AND RESILIENCY.
Migration Articles First, get into a group of people who read the same article that you read. Practice summarizing your migration and review possible effects.
LO1 - Know about aspects of cyber security
Decision-making processes
Sequence/HowTo Format
World-Leading Research with Real-World Impact!
Presentation transcript:

World-Leading Research with Real-World Impact! CS 6393: Cyber Security Models and Systems CS 4593: Cyber Security Models and Systems (cross-listed) Project Guidelines 2 Ravi Sandhu Spring 2019 © Ravi Sandhu World-Leading Research with Real-World Impact!

Attack/Vulnerability Outline What is it? When? Why is it impactful? What is technically novel? Incident response, by an organization, by the community Technical mitigation: new or previously known Mitigation limits Lessons learned Anything else you consider significant List of references used: Primary, Secondary, Recommended reading © Ravi Sandhu World-Leading Research with Real-World Impact!

World-Leading Research with Real-World Impact! Technology Outline What is it? When? Maturity? Scope (important) Why is it impactful? What is technically novel? What is important from a security perspective? From whose viewpoint? What is novel from a security perspective Technical solutions: new or previously known Limits to how secure we can make this Future outlook Anything else you consider significant List of references used: Primary, Secondary, Recommended reading © Ravi Sandhu World-Leading Research with Real-World Impact!