Information Stewardship: Systems Perspectives, Systems Solutions David Pym University of Aberdeen Information Security Leaders, Edinburgh, 10/02/2011.

Slides:



Advertisements
Similar presentations
Prepared for [xxxx] – Commercial in Confidence connect transform protect A Cloudy Cyberspace? Tony Roadknight – Technical Architect.
Advertisements

CS5038: The Electronic Society Security 2: Concepts of Security.
5038/2009: The Electronic Society Systems Thinking.
FIA Prague Preparation February 6, Scenario planning approach We cannot predict the future We cannot predict the future We do understand the drivers.
Unit 2 : Macroeconomics National Council on Economic Education Macroeconomic Questions Why does output fluctuate? What determines.
Chapter 1 Preliminaries. Chapter 1: PreliminariesSlide 2 Preliminaries Microeconomics deals with: Behavior of individual units  When Consuming How we.
1 What is the Game in Cyber Security? Ravi Sandhu Executive Director and Endowed Professor February 2011
Trust, Privacy, and Security Moderator: Bharat Bhargava Purdue University.
Trust, Privacy, and Security Moderator: Bharat Bhargava 1 Coordinators: Bharat Bhargava 1, Csilla Farkas 2, and Leszek Lilien 1 1 Purdue University and.
Managerial Economics in a Global Economy
Lecture 1: PreliminariesSlide 1 Topics to be Discussed The Themes of Microeconomics What Is a Market? Why Study Microeconomics?
Business Cycle Changes in Business Activity © 2012, TESCCCEconomics Unit 7, Lesson 2.
The Nature and Scope of Managerial Economics
Class 6_1 Today’s topic: More on engineering analysis and modeling Your “computer modeling” assignment.
Word Splash Warm Up  How can central banks help/hurt a country transitioning from command to market? Answer using all the terms below and be ready to.
Where’re Clouds Headed? Indranil Gupta Department of Computer Science University of Illinois at Urbana-Champaign 1 Distributed Protocols Research Group:
Morals Justice Property Rights Concepts: Economics First Economic Revolution Division of Labour Money The Market Concepts: Retailing/ wholesaling 1. Study.
Macroeconomic model and stability analysis Osvald Vašíček Faculty of Economics and Administration of Masaryk University Department of Applied Mathematics.
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
An Introduction to Software Engineering. Communication Systems.
CIS 4930/6930: Systems Security Instructor: Xinming “Simon” Ou TA: Xiaolong “Daniel” Wang Class time: MW 2-3:15 1.
Macroeconomics. Chapter One Introduction Macroeconomics : 1. Definition - macroeconomics is concerned with the behavior of the economy as a whole-----booms.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Managerial Economics Defined The application of economic theory and the tools of decision science to examine how an organization can achieve its aims or.
CYBER SECURITY IN A BORDERLESS GLOBAL ARENA Avi Hasson | Chief Scientist, Ministry of Industry, Trade and Labor Herzeliya Conference,
What is Economics? It is a social science that studies the economic behaviour of people.
A vision of water for food challenges and opportunities beyond 2020 Jonathan Woolley, Director CPWF.
Alternative Theories of the Firm. Problems with Traditional Theory n Difficulties in maximising profit < non-use of opportunity cost < difficulties in.
David M. Harrison, Ph.D. Real Estate Finance Texas Tech University Finance Theory and Real Estate Goal – Asset Valuation: Risk vs. Uncertainty.
ACCOUNTING JOBS By: Alex Blecker. Actuary As an actuary it is your job predict how long a person will live. You will need a bachelor's degree and major.
Financial Management. Agricultural Finance THE ECONOMIC STUDY OF THE ACQUISITION AND USE OF CAPITAL IN AGRICULTURE TWO TYPES OF CAPITAL: EQUITY BORROWED.
Privacy Protection Techniques & Security B. Claerhout.
© GfK 2014 | January CONSUMER CLIMATE 2014 – OPPORTUNITIES AND RISKS OF DIGITIZATION Matthias Hartmann, CEO GfK SE Vienna, Hofburg | January 29,
AP Economics Mr. Gill ext 69522
Principle #1: People Face Tradeoffs Principle #2: The Cost of Something Is What You Give Up to Get It.
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
Recent Developments in the Japanese Economy (1) Real Economic Growth and Productivity (2) Unemployment and Labor Market Conditions (3) Inflation and Asset.
ADDRESS BY MINISTER OF COMMUNICATIONS Dr Ivy Matsepe-Casaburri LAUNCH OF ELECTRONIC COMMERCE POLICY July 1999.
ECO 372 Week 1 DQ 3 Identify economic factors that affect the real GDP, the unemployment rate, the inflation rate, and a key interest rate. How do you.
Big Data Security and Privacy
CIS 4930/6930: Systems Security
Security in Internet of Things Begins with the Data
(business Administration) NooraAl-musailem (Finance)
CIS 4930/6930: Systems Security
General Data Protection Regulations and the IoT
ECO 11 Introduction to Macroeconomics
Monetary and Fiscal Policy in the Keynesian Model
Using Analytics to Find Influencers for Power Grid Security Failure
The protection of the computing device has become the primary focus of the users. With the advancement in technology computer and its threats are also.
Big Oil, Big Prices FTE.
Background 2010 DNI/IC CIO Meeting
A Global Perspective on Greening the Transport Sector
Macroeconomic Questions
I UNDERSTAND CONCEPTS OF CYBERSECURITY
KNIGHTON & CHURN CREEK COMMONS RETAIL CENTER
Big Data and Privacy Panel Prof. Ravi Sandhu
Digital Policy -Transformation Towards Society 5.0-
Computer Science and Engineering
Introduction to Modeling
Cyber Security Research: A Personal Perspective
MATH TALK Power of 0 and 1.
MATH TALK POWER EXTREMES.
MATH TALK POWER NUMBER 64 Set 1.
MATH TALK POWER NUMBER 27.
MATH TALK POWER NUMBER 36.
MATH TALK POWER NUMBER 25.
MATH TALK POWER NUMBER 64 Set 2.
MATH TALK POWER NUMBER 16.
Wk 7.5 Portfolio Project Reflection
Presentation transcript:

Information Stewardship: Systems Perspectives, Systems Solutions David Pym University of Aberdeen Information Security Leaders, Edinburgh, 10/02/2011

Information Stewardship Information stewardship is one of the next two big challenges for security/assurance research Stewardship goes beyond protecting CIA Adding/protecting value; complying with and upholding values; obligation; trust The other one is the convergence of physical and information security concepts in the Internet of Things (airport security as an information processor)

Information Stewardship Lifecycle Security Analytics Environment: threat, economic, investment Policy: people, process, technology, operations (Trusted) infrastructureAssurance/situational awareness Governanc e Design Analysis Revise

Stewardship Economics It’s all about trade-offs For example, confidentiality and availability trade off, just like inflation and unemployment Cost also trades off Use utility theory to understand security trade-offs and system design This is done for real in Security Analytics: utility theory and mathematical systems modelling yield predictive simulations in security management

Satisficing Cloud Stewardship Sharing Service level Due diligence Target zone

Summary We’re making security management into a science HP’s Security Analytics is the first (commercial) step Stewardship presents huge challenges, in the Cloud, in the Internet of Things, … Getting it right means doing the math, doing the economics, capturing behaviour, predicting design/investment consequences