Copyright The New Yorker Cybersecurity Incident Reports and Repairs Office.

Slides:



Advertisements
Similar presentations
The NeTS Program Dr. Joseph B. Evans Program Director Computer and Network Systems Computer & Information Science & Engineering National Science Foundation.
Advertisements

W ashington A rea T rustworthy C omputing H our
14th WATCH: Medical Device Cybersecurity: The First 164 Years Kevin Fu University of Massachusetts Amherst. THURSDAY November 15 th, Noon, Room 110 W ashington.
Network Science and Engineering (NetSE) Research Agenda: v1.0 5 th GENI Engineering Conference Seattle, WA 21 July 2009 Ellen Zegura, Georgia Tech.
Bill Newhouse Two Government Cybersecurity Initiatives NIST.
Funding Opportunities at NSF Jane Silverthorne International Arabidopsis Consortium Workshop January 15, 2011.
EInfrastructures (Internet and Grids) US Resource Centers Perspective: implementation and execution challenges Alan Blatecky Executive Director SDSC.
Science of Science and Innovation Policy (SciSIP) Presentation to: SBE Advisory Committee By: Dr. Kaye Husbands Fealing National Science Foundation November.
Social, Political and Financial Issues of Connecting GeoData In and Between Governmental Agencies NSF GeoData Workshop June 17-19, 2014 Boulder, CO Sara.
Secure and Trustworthy Cyberspace (SaTC) Program Sam Weber Program Director March 2012.
29th WATCH: Cybersecurity for the Internet of Everything (IoE) Bret Hartman Cisco Systems, Inc. Thursday June 18, Noon, Room 110 W ashington A rea T rustworthy.
SING* and ToNC * Scientific Foundations for Internet’s Next Generation Sirin Tekinay Program Director Theoretical Foundations Communication Research National.
(Geneva, Switzerland, September 2014)
1 Algorithmic Foundations of the Internet Alejandro Lopez-Ortiz (Waterloo) Jennifer Rexford (Princeton) Rebecca Wright (Stevens)
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
SKA-cba-ase NSF and Science of Design Avogadro Scale Engineering Center for Bits & Atoms November 18-19, 2003 Kamal Abdali Computing & Communication.
The Social, Behavioral, and Economic (SBE) Perspective in Secure and Trustworthy Cyberspace (SaTC) Aug 17, 2014 Heng Xu SaTC Program Director Directorate.
1 Building National Cyberinfrastructure Alan Blatecky Office of Cyberinfrastructure EPSCoR Meeting May 21,
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
Patricia A. Muoio Chief National Information Assurance Research Lab.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Secure and Trustworthy Cyberspace (SaTC) Program Presentation to NSF/DIMACS Workshop for Aspiring PIs in SaTC SaTC Program Directors National Science Foundation.
Research at Department of Computer and Systems Sciences – DSV.
26th WATCH: Differential Privacy: Theoretical and Practical Challenges Salil Vadhan Harvard University THURSDAY Jan. 15, Noon, Room 110 W ashington A rea.
High Confidence Medical Device Software and Systems Workshop: Government Participants and their Expectations June 2 – 3, 2005 Sally E. Howe, Ph.D. Associate.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
5th WATCH: So what if I take over a botnet to do my research? An examination of the current state of Ethics in Information and Communications Technology.
Sept 29-30, 2005 Cambridge, MA 1 Grand Challenges Workshop for Computer Systems Software Brett D. Fleisch Program Director National Science Foundation.
1 Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director and Endowed Professor Nov. 9, 2012
Wireless Networks Breakout Session Summary September 21, 2012.
Cyber Security Nevada Businesses Overview June, 2014.
Research Recommendations for the Broadband Taskforce Agenda November 23, 2009.
1 Delay Tolerant Network Routing Sathya Narayanan, Ph.D. Computer Science and Information Technology Program California State University, Monterey Bay.
DOE 2000, March 8, 1999 The IT 2 Initiative and NSF Stephen Elbert program director NSF/CISE/ACIR/PACI.
May 28, 2009Great Plains Network meeting, Kansas City 1 Some NSF funding opportunities Terry Langendoen (703) Expert, Robust.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
National Science Foundation (NSF). Directorate for Computer and Information Science and Engineering (CISE)
Understanding Technology Stakeholders: Their Progress and Challenges John M. Gilligan Software Assurance Forum November 4, 2009.
"The views expressed in this presentation are those of the author and do not necessarily reflect the views of the European Commission“ Future Internet.
Secure and Trustworthy Cyberspace (SaTC) “Top 10” Tips for SaTC Proposals One program director’s observations Sol Greenspan.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
NSF Cybersecurity Funding Opportunities Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure September 2015.
Cybersecurity Challenges and Opportunities Anita Nikolich Program Director, Advanced Cyberinfrastructure October 2015.
1 Cyber-Enabled Discovery and Innovation Michael Foster May 11, 2007.
NITRD Networking and ITRD IT R&D CIC computing, info and comm HPCC and communication HPC high-performance computing George O. Strawn NITRD co-chair and.
FFIEC Cybersecurity Assessment Tool Maine Credit Union League September 23, 2015 Patrick Truett, Information Systems Officer National Credit Union Administration.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Cyber Security – An Existential Threat? (IIC, Singapore)
Priorities for International Development of e-Infrastructure and Data Management in Global Change Research Presentation by Robert Gurney, University of.
Educause/Internet 2 Computer and Network Security Task Force
Strategic Planning Process
Strategic Planning Process
5G Security Training
CyberPaths Interdisciplinary Modules
Cambridge National Certificate in Information Technologies
Cybersecurity in Elections Infrastructure: Risks and Mitigations
TRUST:Team for Research in Ubiquitous Secure Technologies
I UNDERSTAND CONCEPTS OF CYBERSECURITY
Cybercrime and Canadian Businesses
Managing IT Risk in a digital Transformation AGE
BCoN Data Integration Workshop, University of Kansas, Feb 13-14, 2018
CyberPaths Interdisciplinary Modules
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Copyright The New Yorker Cybersecurity Incident Reports and Repairs Office

Copyright The New Yorker

NSF Trustworthy Computing Program and Economic Incentives Presentation for WEIS June 2011 Carl Landwehr Director, Trustworthy Computing Program Computer and Information Science and Engineering (CISE) Directorate National Science Foundation

Cyber Threats: 2011 and Beyond  Visible escalation of the security and privacy threats  Proliferation of attacks spurred by financial gains (Sony Playstation hack/outage, Citigroup, …)  Focused value (e.g. cloud) draws attacks  Stuxnet  Confusion about privacy (e.g. iPhone, Android location reporting)  Still to come: as automation pervades new platforms, vulnerabilities will be found in them (e.g. in automotive systems this past year)  Distributed attacks (botnets) increasing in size and sophistication, targeting specific applications.  Proliferation of wireless devices and social media platforms open new avenues for hackers and bring evolving security challenges.

Developing Scientific Foundations Maximizing Research Impact Accelerating Transition to Practice Tailored Trustworthy Spaces Moving Target Cyber Economic Incentives NCO-NITRD* Game-Change Strategy Inducing Change: 3 themes * NCO/NITRD = National Coordination Office for Networking and Information Technology Research and Development Four thrusts

6 What is Trustworthy Computing? (from FY11 solicitation)  “Envisions a future pervasive cyber infrastructure that supports a wide range of requirements for trustworthy operation, despite known and future threats and an increasingly complex operating environment. Trustworthy operation requires security, reliability, privacy, and usability. ”  Supports approaches from theoretical to experimental to human centric  Theories, models, cryptography, algorithms, methods, architectures, languages, tools, systems, and evaluation frameworks  Studies of tradeoffs among security, privacy, usability  Methods to assess, reason about, and predict system trustworthiness  Methods to increase attacker cost, enable tailored security environments, and incentivize security deployment, socially responsible behavior, and deter cyber crimes  Multi-disciplinary work incorporating legal, social, and ethical implications strongly encouraged Small / Medium / Large (to $500K / $1.2M / $3M) awards totaling $55M expected in FY11 NITRD themes

NSF Cyber Security Investments Active Research Grants Broad range of awards addressing cyber security foundations and technologies; – –over 500 active awards – –Trustworthy Computing, Future Internet Architecture, Networking Technology and Systems, Cyber Physical Systems, Smart Health and Well-Being, Office of Cyberinfrastructure (OCI) and a wide range of disciplinary programs contributing – –Trustworthy Computing cuts across CISE divisions and addresses a broad spectrum of topics Hardware, software, networking, applications Human-centric security, privacy, usability Theoretical models, algorithms, cryptography Security in complex control systems

NSF Trustworthy Computing Investments 4 Sample TC Awards with Economics/Incentives components NSF # Collaborative Research: CT-M: Understanding and Exploiting Economic Incentives in Internet-based Scams. UCSD, ICSI, PIs: S. Savage, G. Voelker, V. Paxson – –“Spamalytics” work recently revealed choke points in underground economy for spam distribution NSF # CAREER: Control of Information Security Risk Using Economic Incentives, UCSD, PI: Terrence August – –paper in this workshop on comparative analysis of liability policies NSF # CT-ISG: Collaborative Research: Incentives, Insurance and Audited Reputation: An Economic Approach to Controlling Spam. UT-Austin, PI Andrew Whinston – –applying economic theory, game theory to model/modify organizational structure of the Internet to combat spam NSF # TC: Small: Deployment Incentives for Secure Internet Routing. Boston U, PI S. Goldberg. – –Treat deployment of secure Internet routing protocols as a problem of incentives. Upcoming SIGCOMM paper: "Let the Market Drive Deployment: A Strategy for Transitioning to BGP Security."

New: WATCH Monthly Seminar at NSF WATCH = Washington Area Trustworthy Computing Hour WATCH = Washington Area Trustworthy Computing Hour Scope: Trustworthy Computing, embracing CISE, SBE, OCI perspectives Scope: Trustworthy Computing, embracing CISE, SBE, OCI perspectives When: First Thursday of each month, pm When: First Thursday of each month, pm Where: NSF Room 110 (no badge needed) Where: NSF Room 110 (no badge needed) Start: 2 June, 2011: Start: 2 June, 2011: – Prof. Fred Schneider, Cornell University : “Cybersecurity Doctrine: Towards Public Cybersecurity” see paper: – Next: 7 July, 2011, Prof. Paul Harris, Harvard U.: “Selective Credulity” Talks to be recorded, captioned, posted, see: Talks to be recorded, captioned, posted, see: – 9

For more information… About the Trustworthy Computing program history and directions: About the Trustworthy Computing program history and directions: NSF Workshop on the Future of Trustworthy Computing (full video and slides): NSF Workshop on the Future of Trustworthy Computing (full video and slides): – To receive announcements, send an from the address where you wish to receive messages to: To receive announcements, send an from the address where you wish to receive messages to: About active awards : About active awards : Many search options available Trustworthy Computing = Prog. Element 7795 Results include abstract of award and PI- Can be downloaded to spreadsheet 10

Thank you. Questions?