Lawrence Livermore National Laboratory Denise Sumikawa CIAC Program Leader LLNL-PRES-403246 Lawrence Livermore National Laboratory, P. O. Box 808, Livermore,

Slides:



Advertisements
Similar presentations
1 CHALLENGES Users growing and becoming more demanding –E-learning, electronic registration and other services –Require 24x7 access to learning materials.
Advertisements

Khammar Mrabit Director Office of Nuclear Security
Lawrence Livermore National Laboratory SciDAC Reaction Theory Year-5-End plans LLNL-PRES Lawrence Livermore National Laboratory, P. O. Box 808,
Lawrence Livermore National Laboratory ROSE Compiler Project Computational Exascale Workshop December 2010 Dan Quinlan Chunhua Liao, Justin Too, Robb Matzke,
Not to be distributed or reproduced by anyone other than Qwest entities. Copyright © 2010 Qwest. All Rights Reserved. Government Services TIC from an Industry.
Network Security Attack Analysis. cs490ns - cotter2 Outline Types of Attacks Vulnerabilities Exploited Network Attack Phases Attack Detection Tools.
OSG Computer Security Plans Irwin Gaines and Don Petravick 17-May-2006.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
David A. Brown Chief Information Security Officer State of Ohio
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Separate Domains of IT Infrastructure
1 Telstra in Confidence Managing Security for our Mobile Technology.
LLNL and LANL Portal Update Cathy Aaron, Lawrence Livermore National Laboratory Katherine Norskog, Los Alamos National Laboratory Presented at InterLab.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
VisIt Software Engineering Infrastructure and Release Process LLNL-PRES Lawrence Livermore National Laboratory, P. O. Box 808, Livermore,
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
University of Maryland I.T. Security Gerry Sneeringer IT Security Officer
CYBER CRIME AND SECURITY TRENDS
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Website Hardening HUIT IT Security | Sep
Norman SecureSurf Protect your users when surfing the Internet.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Computer Crime and Information Technology Security
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Office of Campus Information Security Incident Response Briefing Jeffrey Savoy, CISSP.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Computer Defining denial of service, worm, virus and hoax. Examples of negligence or incompetence that leads to crime. CI R M E By: Megan Price.
DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor Craig Shue
August Mr. Mike Finley, CISSP Senior Security Engineer Computer Science Corporation.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Lawrence Livermore National Laboratory Centralized Desktop Management at LLNL A Major Paradigm Shift CDM David Frye This work performed under the auspices.
Presentation to the CIO PREPARED BY: JOSHUA SMITH, GARY FAULKNER, BRANDON VAN GUILDER, AND ERIC RUSCH.
Hurdles in implementation of cyber security in India.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
International Cyber Warfare & Security and B2B Conference Participation of Brazilian Cyber Defense Centre ( )
January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
Information Security: Current Threats Marc Scarborough Information Security Officer
Framework Chapter 1 Panko, Corporate Computer and Network Security Copyright 2002 Prentice-Hall.
Computer Security Mike Asoodeh & Ray Dejean Office of Technology Southeastern Louisiana University.
Safe Computing Practices. What is behind a cyber attack? 1.
Information Security in Laurier Grant Li Wilfrid Laurier University.
Cyber crime and security issues
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
DLE.LINC.overview.7/30/02.lp Pg. 1 Ron Baskett National Atmospheric Release Advisory Center Lawrence Livermore National Laboratory Department of Energy.
Surveillance and Security Systems Cyber Security Integration.
Defining your requirements for a successful security (and compliance
Securing Information Systems
Securing Information Systems
Cyber Security Zafar Sadik
State Board of Elections Computers
Security Risk Profiles – Tips and Tricks
Ministry of Health Maputo Mozambique
Data Compromises: A Tax Practitioners “Nightmare”
Introduction to the Federal Defense Acquisition Regulation
Security in the Workplace: Information Assurance
Joe, Larry, Josh, Susan, Mary, & Ken
Securing Information Systems
Out of the Breach and Into the Fire
Vendor of Solutions and Services Integrates Office 365 in Its Management Solution Partner Logo “Our new version of iQ.Suite makes safe and flexible.
Protecting Your Company’s Most Valuable Asset
Rosalyn Leitch Pacific Northwest National Laboratory
Comparison to existing state of security experimentation
Augmentation.
6. Application Software Security
Presentation transcript:

Lawrence Livermore National Laboratory Denise Sumikawa CIAC Program Leader LLNL-PRES Lawrence Livermore National Laboratory, P. O. Box 808, Livermore, CA This work performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344 DOE Computer Incident Advisory Capability (CIAC) May 7, 2008

2 Lawrence Livermore National Laboratory CIAC provides cyber security services to 96 DOE and NNSA Laboratories and Field Facilities

3 Lawrence Livermore National Laboratory CIAC offers a full range of cyber security services to protect DOE DOE-Wide CIAC Services Monitor security sites Network traffic analysis Security notifications Security architecture consulting White-hat assessments Technology watch 24x7 “on-call” incident response Response tools & scripts Malcode analysis DOE incident reporting Collaborating with Local Site Security Capabilities and Personnel Prevention Watch and WarnResponse

4 Lawrence Livermore National Laboratory CIAC culls out actionable information from network traffic data Data Volume LowHigh Analysis Query Results Analysis Reports Site and Security Notifications ~ 250 Million Sessions per Day

5 Lawrence Livermore National Laboratory CIAC’s web and application security service helps protect DOE against application layer attacks  Full or Self-serve (sites scan their own)  190 Assessments completed  C&A Web Site Testing

6 Lawrence Livermore National Laboratory DOE FY07 Incident Statistics Incident Type Percentage of FY07 total Malicious Code 32%Phishing attacks increasingly targeted Loss, Theft, or Missing 24%Laptops, PDAs, removable media Information Compromise 15%PII in unencrypted Compromise (Root & User) 12% Unauthorized Use 5%Waste, fraud, abuse Web Defacements 5% Denial of Service 4% Other 3% Critical Infrastructure 0%

7 Lawrence Livermore National Laboratory CIAC collaborates with DOE, NNSA, Federal, and International cyber security teams Partnering for a secure DOE

8 Lawrence Livermore National Laboratory Questions/Comments