Towards A Theory Of Insider Threat Assessment Authors: Ramkumar Chinchani, Anusha Iyer Hung Q Ngo, Shambhu Upadhyaya International Conference on Dependable.

Slides:



Advertisements
Similar presentations
1 Interdisciplinary Research: Opportunities and Challenges Nancy Amato Department of Computer Science and Engineering Texas A&M University Lori Clarke.
Advertisements

QROAD to learning… Its about taking control of your learning. Become an independent learner! Follow the following steps to get more out of your lessons!
What incident makes a good personal narrative?
Welcome to the seminar course
Relating research to practice Heather King Department of Education King’s College London.
Research Papers Social Sciences and Humanities. The Ethos of Writing Research Papers Share comments at your table regarding the following: What do you.
ELEC 490/498 Electrical / Computer Engineering Project Poster Title (96-point Times Roman) Group #NN (put your group# here): John Doe, Jane Smith, and.
Three grades of literature review Grade C Grade B Grade A.
Training Challenge (draft)1 TRAINING CHALLENGE the business acumen simulation for training consultants.
© 2005 Illinois Mathematics and Science Academy 1 Illinois Learning Standards Information from
The Future of STEM Education? MAST-MSELA Conference November 13, 2014.
AS Level Philosophy and Ethics Mrs Joanne Collins Mrs Hannah White.
How to Publish in an International Journal Joel Huber Kunming University of Science and Technology 20 September 2009.
Finding sources, reading strategies and note taking Finding and identifying useful sources Finding and identifying useful sources Reading strategies Reading.
Maisrul Drama Maisrul
Systematic Approaches to Literature Reviewing. The Literature Review ? “Literature reviews …… introduce a topic, summarise the main issues and provide.
What Makes a Good Poster? Readable from 1-2 meters Has introduction and summary Key ideas apparent within a 5 minute read Attractive Targeted at the right.
IB Credit Students earn their IB science course grade based on three written examinations and an independent investigation. This investigation is called.
Software Obfuscation from Crackers’ viewpoint Y, Hiroki; K, Yuichiro; M Akito, N Masahide; M Ken-ichi Proceedings of the IASTED International Conference.
Chris Luszczek Biol2050 week 3 Lecture September 23, 2013.
Southern Regional Education Board MMGW Middle Grades SC A Comparative Study of High- and Low- implementation Middle Grades Schools Gene Bottoms.
Graph Data Management Lab, School of Computer Science Add title here: Large graph processing
SUMMARY WRITING A skill required for all students at all levels of education.
Technical paper writing for journal and conference submission III Zhen Jiang Department of Computer Science Information Security Center West Chester University.
Stage-426-Feb-991 Ways to Excel as a Stage-4 Student Professor Clark Thomborson Computer Science Department Auckland University.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Common Core Reading Standards for Science. CCSS.ELA-Literacy.RST CITE specific textual evidence to support analysis of science and technical texts.
An Efficient Software Protection Scheme Antonio Maña, Ernesto Pimentel Antonio Maña, Ernesto Pimentel University of Málaga, SPAIN in Trusted Information:
Intro to Critiquing Research Your tutorial task is for you to critique several articles so that you develop skills for your Assignment.
Christoph F. Eick: ML Project Post-Analysis 1 Project2 Post Analysis —General Things Reviewing is about voicing your opinion about the paper! Reviews.
An Overview of Inquiry Learning in Science. Classroom strategies used in inquiry learning Should encourage student interaction Should encourage students.
Review of: All You Can Eat or Breaking a Real-World Contactless Payment System Timo Kasper, Michael Silbermann, and Christof Paar Financial Cryptography.
Name (s) of Presenter(s) Date Attending. Title of Research Studied What did you study? Who assisted you? What questions were you asking? Tips for Presentation:
10/1/20071 Automatic Evaluation of Intrusion Detection Systems F. Massicotte, F. Gagnon, Y. Labich, L. Briand, Computer Security Applications Conference,
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South.
CONFERENCE EVALUATION REPORTING.  The written report is often the “main” output of your evaluation so it needs time and attention  Consider other alternatives.
Professional Development Session Literacy K-5 Close Reading Instructional Strategy Presenter: Dr. Wendy Perry.
Research Methods School of Economic Information Engineering Dr. Xu Yun :
Modeling Complex Systems by Separating Application and Security Concerns H. Gomaa, M. Shin, "Modeling Complex Systems by Separating Application and Security.
1 How to Present a Paper Jun Dong Cho, Sungkyunkwan University Jun Dong Cho, Sungkyunkwan University03/31/2007.
SE 521 Dr. Lola Taylor Unit one. INTRODUCTION This week's seminar will focus on getting acquainted and understanding the expectations for the course.
Writing Exercise Try to write a short humor piece. It can be fictional or non-fictional. Essay by David Sedaris.
Unit 7 AO5.  Describe what you had to produce  Describe what information you had to include Refer to the design brief.
Analysis and Critical Thinking in Assessment 1. What is the problem? Gathering information Using information to inform decisions/ judgment Synthesising.
3 STUDENT ASSESSMENT DEPARTMENT
Student name: Current level: Target level: Year 9 Cycle 4 Romeo and Juliet: You will be reading and analysing key sections of Romeo and Juliet. You will.
Paragraph #1-Introduction
Cover slide Project, course, team, date. Outline welcome  1 slide introducing the key sections/ information items in this presentation.
Assessment and the Scholarship of Teaching and Learning Dr. Anne Marchant, Director Center for Teaching and Learning.
Social Polices and Social Welfare Administration
Your fancy scientific title goes here
How to Write a High-Quality Technical Paper for Publication
Writing a response paper
Writing for Academic Journals
Here is the graph of a function
Lab Write-ups.
Paper One: Answering Question 3
College of Engineering Cherthala
Dr. Zhen Jiang Computer Science Department West Chester University
Parts of an experiment review
Writing reports Wrea Mohammed
Critically Critiquing
Academic Debate and Critical Thinking
Academic Debate and Critical Thinking
Table of Contents 8th Grade Honors Science Class
Learning Strategies: Daily Literacy Activity
Annotated Bibliography Learning Goals: By the end of class, you will recognize the components of an annotated bibliography and will demonstrate this by.
Lab Write-ups.
GCSE.
GCSE.
Presentation transcript:

Towards A Theory Of Insider Threat Assessment Authors: Ramkumar Chinchani, Anusha Iyer Hung Q Ngo, Shambhu Upadhyaya International Conference on Dependable Systems and Networks 2005 (DSN 2005), pp , 2005 Present by : Zhongxia Ma Department of Computer Science University of Auckland

Summary  Gives readers some background information about insider threat  Introduces the authors’ model(key challenge graph)  Uses key challenge graph to simulate the insider threat  Analyses the possible insider attack strategies  Compares and contrasts the key challenge graph with other relevant models

Appreciative Comment Paper gives enough background information about insider threat  Explains what insider threats are, what damages the insider threats can cause, and why detect insider threats is hard.  Readers get a very clear idea of what the paper is going to talk about.  Readers also get some basic knowledge about insider threats.  The words like “FBI/CSI” also attract readers’ attention.

Appreciative Comment T he key challenge graph model is good  Easy to understand, easy to remember  Widely used (simulate social engineering attacks)  Compare with other relevant models, the key challenge graph is batter for the insider threat problem key Key Start vertex Target vertex Middle vertex Key challenge

Critical Comment Misleading terminology  Key (here means information on a vertex not the cryptographic key)  Key challenge, a authorization process. (key means an cryptographic key )  The key to the key challenge key Key Start vertex Target vertex Middle vertex key challenge

Question?  If a student plan to hack into Clark's computer to change his grade from a lab computer, do you think he can success? key Key Start vertex Target vertex Middle vertex Key challenge