IT Applications with Emerging Techniques: Security Solutions

Slides:



Advertisements
Similar presentations
Preparing Graduate Students to Lead and Manage Cyber Security Kevin A. Barton Asst Prof, CISS (210) ext 2213.
Advertisements

Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Information Security and Assurance Center 1 Address: 615 McCallie Avenue Phone: Chattanooga TN 37403
Department of Mathematics and Computer Science
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
DATA SECURITY AND PRIVACY IN WIRELESS BODY AREA NETWORKS MING LI AND WENJING LOU, WORCESTER POLYTECHNIC INSTITUTE KUI REN, ILLINOIS INSTITUTE OF TECHNOLOGY.
AFCEA/AFA July 23,  There are 35 colleges and universities across the state that are members of the University System of Georgia.  All of them.
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
Dell Connected Security Solutions Simplify & unify.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Center for Cybersecurity Research and Education (CCRE)
Excellence in Research Ram B. Gupta, Ph.D. Associate Dean for Research
 Explore fundamental issues in computing and develop theories and models to address those issues  Help scientists and engineers solve complex computing.
+ Lec#1: Planning, Designing, and Operating Local Area Networks 1 st semester CT.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Undergraduate Research in Information Assurance SOUNDARARAJAN EZEKIEL COMPUTER SCIENCE DEPARTMENT INDIANA UNIVERSITY OF PENNYLVANIA INDIANA, PA
Windows Azure Backup Speaker Name Date Agenda Data protection challenges Introducing Windows Azure Backup How it works Security When to choose Windows.
Department of Mathematics and Computer Science
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
WEB API AND CLOUD DEVELOPMENT BY TRAWEX TECHNOLOGIES.
Department of Computer and Information Sciences
Information Technology Proprietary and Confidential © Copyright 2007 – Peralta Community College District.
Use Wireless WiFi Home Monitoring Camera For Home Security.
CS457 Introduction to Information Security Systems
COMPUTER SCIENCE Mercer University College of Liberal Arts
Department of Computer and Information Sciences
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Security in Internet of Things Begins with the Data
Mechanical & Manufacturing Engineering Program
Data and database administration
COMPUTER SCIENCE Mercer University College of Liberal Arts
Naval Postgraduate School
COMPUTER SCIENCE Mercer University College of Liberal Arts
ASSET - Automotive Software cyber SEcuriTy
Information Technology (IT) Department
Cloud Computing By P.Mahesh
2017 CSU Counselor Conference
Information Security at Florida State University
Information Security at Florida State University
Cloud Testing Shilpi Chugh.
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
I have many checklists: how do I get started with cyber security?
CyberPaths Interdisciplinary Modules
Institute for Cyber Security: Research Vision
Information Security at Florida State University
Institute for Cyber Security: Research Vision
Information Security at Florida State University
Student: Ying Hong Course: Database Security Instructor: Dr. Yang
Perspectives on Defense Cyber Issues
CREAM Scholarship Program in Secure Embedded Systems
The Graduate College Travel Summary Presentation
UNM Information Assurance Scholarship for Service (SFS) Program
TrinityIoT Premises Monitoring.
CREAM Scholarship Program in Secure Embedded Systems
World-Leading Research with Real-World Impact!
COMPUTER SCIENCE Mercer University College of Liberal Arts
Institute for Cyber Security Overview
Technology Convergence
Computer Services Business challenge
UNM Information Assurance Scholarship for Service (SFS) Program
COMPUTER SCIENCE Mercer University College of Liberal Arts
CyberPaths Interdisciplinary Modules
Discussion Government Private Business Tools for prevention Congress
Cybersecurity Simplified: Ransomware
Computer Science Dr Hwang Chair, Computer Science Department
UNM Information Assurance Scholarship for Service (SFS) Program
Cloud Computing for Wireless Networks
Presentation transcript:

IT Applications with Emerging Techniques: Security Solutions Xin-Wen Wu Indiana University of Pennsylvania Department of Mathematical and Computer Sciences Email: xwu@iup.edu

Agenda IT Applications & Opportunities Data Storage in Clouds – Security Wireless Sensor Networks – Security Cyber Security Programs at IUP Institute of Cyber Security of IUP

IT Applications & Opportunities You may have already applied IT in your business: well developed information system, IT facilities, etc. You plan to expand your business? Process an increased amount of data? Save costs from hiring additional IT staff? Concerned about upgrading your system?

Save Your Data in Clouds Cloud Services: Excellent for data storage ! A lot of benefits: Usability & accessibility Disaster recovery Cost saving Easy sharing Scalability

IT Applications & Opportunities SOHO Networks (Small Office/Home Office Networks)

Beyond Traditional IT Applications Smart home/smart building, IoT, wireless sensor networks, etc.

Security Challenges Facing security threats against: Confidentiality Integrity Availability

Confidentiality for Data in Clouds Before being sent to the cloud, data may be encrypted using secure encryption algorithms (ciphers) AES (advanced encryption standard) Many other available ciphers You may choose the best one for your business You may have a huge amount of data Data are at different levels of sensitivity Your may have data for different users Users are in different roles With different access rights Need many keys for data encryption !

Confidentiality for Data in Clouds Before being sent to the cloud, data may be encrypted using secure encryption algorithms (ciphers) AES (advanced encryption standard) Many other available ciphers You may choose the best one for your business Question: How do you manage the keys? Need to store them properly, Maintain the secrecy of keys Require an efficient and secure key management scheme !

Confidentiality for Data in Clouds Question: How do you manage the keys? Need to store them properly, Maintain the secrecy of keys Require an efficient and secure key management scheme !

Wireless Attacks Rogue AP / Evil twin Many other attacks: Behind a firewall (set up by an insider) / mimic an authorized AP Many other attacks: Replay attack RF jamming

IoT Security Devices and sensors may be deployed in outdoor or even hostile environments – no physical protection ! While we enjoy the IoT applications, cyber-physical systems, wireless sensor networks, how do we ensure the security? The devices may not afford the existing security procedures – not enough capabilities !

IoT Security Devices and sensors may be deployed in outdoor or even hostile environments – no physical protection ! Require efficient (lightweight) security mechanisms ! The devices may not afford the existing security procedures – not enough capabilities !

IoT Security Also, security may be enhanced by running: anomaly detection for IoT applications

Security: Educational Solutions However, technical mechanisms alone do not completely solve the security issues Educational Programs help

Cyber security programs of IUP IUP has been providing cyber security education for almost two decades We are designated by the DHS/NSA as National Center of Academic Excellence in Cyber Defense Education

Cyber security programs of IUP Department of Mathematical & Computer Sciences Computer Science, B.A. Computer Science, B.S., with tracks in Software Engineering Cyber Security Language and Systems Currently offers two Master’s degrees, and is developing a new program: M.S. in Computer Science with emphasis in Cyber Security

About the Department Department Chair: Dr. Francisco Alarcón The second largest department, with 36 tenured and tenure-track faculty Fall 2019, the department has 339 students enrolled in the various programs Also provides courses for more than 2,500 students enrolled in other programs each semester

Institute for Cyber Security The Institute ICS Director: Dr. Waleed Farag Has been very successful over the past years: DOD Cyber Scholarship Program (https://www.iup.edu/DoDScholarship/) IUP GenCyber summer programs funded by the National Science Foundation (NSF) & the National Security Agency (NSA), (www.iup.edu/iupgencyber) Expansion of CAE-C Education Program (www.iup.edu/caecexpansion)

Cybersecurity Education Research