IT Applications with Emerging Techniques: Security Solutions Xin-Wen Wu Indiana University of Pennsylvania Department of Mathematical and Computer Sciences Email: xwu@iup.edu
Agenda IT Applications & Opportunities Data Storage in Clouds – Security Wireless Sensor Networks – Security Cyber Security Programs at IUP Institute of Cyber Security of IUP
IT Applications & Opportunities You may have already applied IT in your business: well developed information system, IT facilities, etc. You plan to expand your business? Process an increased amount of data? Save costs from hiring additional IT staff? Concerned about upgrading your system?
Save Your Data in Clouds Cloud Services: Excellent for data storage ! A lot of benefits: Usability & accessibility Disaster recovery Cost saving Easy sharing Scalability
IT Applications & Opportunities SOHO Networks (Small Office/Home Office Networks)
Beyond Traditional IT Applications Smart home/smart building, IoT, wireless sensor networks, etc.
Security Challenges Facing security threats against: Confidentiality Integrity Availability
Confidentiality for Data in Clouds Before being sent to the cloud, data may be encrypted using secure encryption algorithms (ciphers) AES (advanced encryption standard) Many other available ciphers You may choose the best one for your business You may have a huge amount of data Data are at different levels of sensitivity Your may have data for different users Users are in different roles With different access rights Need many keys for data encryption !
Confidentiality for Data in Clouds Before being sent to the cloud, data may be encrypted using secure encryption algorithms (ciphers) AES (advanced encryption standard) Many other available ciphers You may choose the best one for your business Question: How do you manage the keys? Need to store them properly, Maintain the secrecy of keys Require an efficient and secure key management scheme !
Confidentiality for Data in Clouds Question: How do you manage the keys? Need to store them properly, Maintain the secrecy of keys Require an efficient and secure key management scheme !
Wireless Attacks Rogue AP / Evil twin Many other attacks: Behind a firewall (set up by an insider) / mimic an authorized AP Many other attacks: Replay attack RF jamming
IoT Security Devices and sensors may be deployed in outdoor or even hostile environments – no physical protection ! While we enjoy the IoT applications, cyber-physical systems, wireless sensor networks, how do we ensure the security? The devices may not afford the existing security procedures – not enough capabilities !
IoT Security Devices and sensors may be deployed in outdoor or even hostile environments – no physical protection ! Require efficient (lightweight) security mechanisms ! The devices may not afford the existing security procedures – not enough capabilities !
IoT Security Also, security may be enhanced by running: anomaly detection for IoT applications
Security: Educational Solutions However, technical mechanisms alone do not completely solve the security issues Educational Programs help
Cyber security programs of IUP IUP has been providing cyber security education for almost two decades We are designated by the DHS/NSA as National Center of Academic Excellence in Cyber Defense Education
Cyber security programs of IUP Department of Mathematical & Computer Sciences Computer Science, B.A. Computer Science, B.S., with tracks in Software Engineering Cyber Security Language and Systems Currently offers two Master’s degrees, and is developing a new program: M.S. in Computer Science with emphasis in Cyber Security
About the Department Department Chair: Dr. Francisco Alarcón The second largest department, with 36 tenured and tenure-track faculty Fall 2019, the department has 339 students enrolled in the various programs Also provides courses for more than 2,500 students enrolled in other programs each semester
Institute for Cyber Security The Institute ICS Director: Dr. Waleed Farag Has been very successful over the past years: DOD Cyber Scholarship Program (https://www.iup.edu/DoDScholarship/) IUP GenCyber summer programs funded by the National Science Foundation (NSF) & the National Security Agency (NSA), (www.iup.edu/iupgencyber) Expansion of CAE-C Education Program (www.iup.edu/caecexpansion)
Cybersecurity Education Research