1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.

Slides:



Advertisements
Similar presentations
1 Speculations on the Future of Cyber Security in 2025 Prof. Ravi Sandhu Executive Director and Chief Scientist Institute for Cyber Security University.
Advertisements

1 Speculations on the Future of Cyber Security in 2025 Prof. Ravi Sandhu Executive Director January 2010
1 New Trends and Challenges in Computer Network Security Ravi Sandhu Executive Director and Endowed Professor September 2010
1 Cyber Security Research: A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 18, 2013
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11
1 Grand Challenges in Data Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair
1 The Future of Access Control: Attributes, Automation and Adaptation Prof. Ravi Sandhu Executive Director and Endowed Chair S&P Symposium IIT Kanpur March.
Future of Access Control: Attributes, Automation, Adaptation
1 Security and Trust Convergence: Attributes, Relations and Provenance Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown.
Attribute-Based Access Control Models and Beyond
1 What is the Game in Cyber Security? Ravi Sandhu Executive Director and Endowed Professor February 2011
1 Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done? Ravi Sandhu Executive Director and Endowed Professor December 2010.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Privacy and Access Control: How are These Two Concepts Related? Prof. Ravi Sandhu Executive Director and Endowed Chair SACMAT Panel June 3, 2015
1 Cyber Security Grand Challenges and Prognosis Prof. Ravi Sandhu Executive Director and Endowed Chair
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
1 Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director and Endowed Professor Nov. 9, 2012
1 Big Data Applications in Cloud and Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Professor UTSA COB Symposium on Big Data, Big Challenges.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
1 Group-Centric Models for Secure Information Sharing Prof. Ravi Sandhu Executive Director and Endowed Chair March 30, 2012
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Panel on Data Usage Management: Technology or Regulation? Prof. Ravi Sandhu Executive Director and Endowed Chair DUMA 2013 May 23, 2013
1 Cyber Security A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 15, 2016
1 Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair CODASPY 2013 February.
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 Views of Cloud Computing Prof. Ravi Sandhu Executive Director and Endowed Chair March 25, © Ravi Sandhu.
1 Understanding Which New Threats Operators Can Expect To Face Within The Next Two To Five Years To Improve The On- Going Management Of Security Systems.
1 Cyber Security Major R&D Challenges Ram Krishnan Cyber Security Research Institute (CSRI) Cyber Security R&D Workshop.
1 Secure Cloud Computing: A Research Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair Texas Fresh Air Big Data and Data Analytics Conference.
What can Technologists learn from the History of the Internet?
Security and Privacy in the Networked World
An Access Control Perspective on the Science of Security
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
UTSA's New Center Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director of ICS and C-SPECC Professor.
Introduction to Cyber Security
Introduction and Basic Concepts
Institute for Cyber Security: Research Vision
Attribute-Based Access Control: Insights and Challenges
Identity and Access Control in the
Cyber Security Research: Applied and Basic Combined*
Cyber Security Research: Applied and Basic Combined*
Institute for Cyber Security: Research Vision
Security and Privacy in the Age of the Internet of Things:
Intersection of Data, Policy and Privacy
UTSA Cyber Security Ecosystem
Attribute-Based Access Control: Insights and Challenges
Cyber Security and Privacy: An Optimist’s Perspective
Identity and Access Control in the
Big Data and Privacy Panel Prof. Ravi Sandhu
Executive Director and Endowed Chair
Cyber Security Trends and Challenges
World-Leading Research with Real-World Impact!
Institute for Cyber Security Overview
Application-Centric Security
Institute for Cyber Security
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
World-Leading Research with Real-World Impact!
Access Control Evolution and Prospects
Cyber Security R&D: A Personal Perspective
World-Leading Research with Real-World Impact!
Access Control Evolution and Prospects
Presentation transcript:

1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security COS Research Conference October 18, © Ravi Sandhu World-Leading Research with Real-World Impact! Institute for Cyber Security

 Founded in 2007 to be a world leader in cyber security research  A unit in the College of Sciences, with strong ties to the Department of Computer Science  Cyber Security in UTSA started in 2000 and is well represented in the Colleges of Science, Engineering and Business © Ravi Sandhu 2 World-Leading Research with Real-World Impact! Institute for Cyber Security

≈ 2010 Department of Defense epiphanies  Cyberspace is officially recognized by Department of Defense as a new warfare domain akin to land, sea, air and space  Department of Defense officially admits having and using offensive cyber weapons  Department of Defense officially admits malware penetrations in its classified networks © Ravi Sandhu 3 World-Leading Research with Real-World Impact! Cyberspace

© Ravi Sandhu 4 World-Leading Research with Real-World Impact! Cyber Security Objectives INTEGRITY modification misdirection AVAILABILITY access CONFIDENTIALITY disclosure

© Ravi Sandhu 5 World-Leading Research with Real-World Impact! Cyber Security Objectives CONFIDENTIALITY disclosure USAGE purpose disposal INTEGRITY modification misdirection AVAILABILITY access

© Ravi Sandhu 6 World-Leading Research with Real-World Impact! Security versus Privacy Security Privacy

© Ravi Sandhu 7 World-Leading Research with Real-World Impact! Cyber Security Evolution Computer Security Communications Security Information Security Information Assurance Mission Assurance

© Ravi Sandhu 8 World-Leading Research with Real-World Impact! Cyber Security Techniques Prevent DetectAccept

 Enable system designers and operators to say: This system is secure  There is an infinite supply of attacks © Ravi Sandhu 9 World-Leading Research with Real-World Impact! Cyber Security Goal Not attainable

 Enable system designers and operators to say: This system is secure enough  Mass scale, not very high assurance  ATM network  On-line banking  E-commerce  One of a kind, extremely high assurance  US President’s nuclear football © Ravi Sandhu 10 World-Leading Research with Real-World Impact! Cyber Security Goal Many successful examples Science EngineeringBusiness

 Halting problem  Inference  Weakest link  Analog hole  Insider  Human element  Usability  Cyber innovation  Covert channels  Side channels  ……………… © Ravi Sandhu 11 World-Leading Research with Real-World Impact! Why is Cyber Security so Hard?

© Ravi Sandhu 12 World-Leading Research with Real-World Impact! Cyber Security Prognosis  Not too bad  About as good as it is going to get  The criminal enterprise can only defraud so many  Big government and big business are a real threat  Highly asymmetric  Offense component  Clandestine  Dual goals: strong offense, strong defense  Mankind has somehow kept nuclear, chemical and biological in control. Cyber is different but should be controllable.

© Ravi Sandhu 13 World-Leading Research with Real-World Impact! ICS Research Thrusts Secure Information Sharing Social Computing Security Secure Provenance-aware Systems Privacy Policies and Enforcement Foundational Research Foundational Research Application-centric Technology-centric Attack-centric Trustworthy Cloud Computing Secure Multi-Tenants in Cloud Big Data Security and Privacy Security in Internet of Things Malware Detection and Analysis Botnet Analysis and Defense

© Ravi Sandhu 14 World-Leading Research with Real-World Impact! ICS FlexCloud Lab FlexCloud/FlexFarm cores -19TB mirrored RAID - 35TB SAN Research Attribute-based Access Control Secure Data Provenance Secure Information Sharing Malware Detection and Analysis Education Cloud Computing Courses Big Data OpenStack Training High Performance Computing Secure Cloud Computing Commercial Collaboration/Support Rackspace Joyent