Enterprise Data Decentralized Control, Data Security and Privacy Data Encryption Data Encryption Information Sharing/Protection of Research Data Information.

Slides:



Advertisements
Similar presentations
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Advertisements

OVERVIEW & LIBRARY SUPPORT FOR DATA MANAGEMENT/SHARING Jim Van Loon, MSME/MLIS Science Librarian.
Donna Tatro Bill Clebsch CSG – May 15, 2008 Michael Pickett.
Background Chronopolis Goals Data Grid supporting a Long-term Preservation Service Data Migration Data Migration to next generation technologies Trust.
TDL Labs Partnerships for Exploration Luis Francisco-Revilla, Unmil P. Karadkar School of Information The University of Texas at Austin.
Cyberinfrastructure for the SBE Sciences – Prospects for the Future Myron Gutmann Assistant Director, National Science Foundation Directorate for the Social,
The Imperial College Tissue Bank A searchable catalogue for tissues, research projects and data outcomes Prof Gerry Thomas - Dept. Surgery & Cancer The.
What’s Next What We believe Who We Are Cloud Computing Big data Mobility Social Enterprise.
Data Management Plans PAUL H. BERN, PH.D. APRIL 3, 2014.
Password?. Project CLASP: Common Login and Access rights across Services Plan
Final Presentation Presented By: Gal Leibovich Liran Manor Supervisor: Hai Vortman.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
Data Management What? Why? How?. 2 What do we mean by … Managing your Research (aka Data) … Ensuring physical integrity of files and helping to preserve.
NSF Data Management Plan Requirements Alex Kanous
May 23, 2007 Archiving ACE: A Novel Software Platform to Ensure the Integrity of Digital Archives Sangchul Song and Joseph JaJa Institute for Advanced.
Open Dialogue on Digital Data management
Office of Acquisition and Logistics Management Simplified Acquisitions Committee (SAC) NITAAC Overview – ECS III Contract Charles Hicks, Supervisory Contracting.
Securing a Wireless Network
Solution Briefing Flexible Workstyle. Solution Briefing work-life blur more mobile tech savvy multiple devices digital generation fast paced Consumerization.
Tyler O. Walters, Associate Director, Technology & Resource Services Library & Information Center, Georgia Institute of Technology For NSF Site Visit to.
DMPTool Expert Resources and Support for Data Management Planning Tao Zhang Michael Witt Purdue University Libraries 1.
Technologies that Facilitate Assessment: E-Portfolios AMICAL Conference, May 5, 2008 Rebecca Davis, NITLE.
An introduction to PDCC the Portable Data Collection Center.
Social Science Data and ETDs: Issues and Challenges Joan Cheverie Georgetown University Myron Gutmann ICPSR – University of Michigan Austin McLean ProQuest.
Presenter: Karla Strieb Assistant Executive Director Transforming Research Libraries June 3, 2010 Supporting E-science: Progress at Research Institutions.
Open for ^ Business Research Data Services & Data Management Planning Ryan Schryver Wendt Commons is our.
Data Management Plans Bill Michener University Libraries and Biology Dept. University of New Mexico.
Making Grey Literature Available through Institutional Repositories LeRoy J. LaFleur, Social Sciences Bibliographer Nathan A. Rupp, Metadata Librarian.
Working Group: Practical Policy Rainer Stotzka, Reagan Moore.
ACCESS for VALIDITY ACCESS for INNOVATION. Starting January 2011 for NEW proposals Not voluntary – “integral part” of proposal and FastLane Required for.
Elements of a Data Management Plan Bill Michener University Libraries University of New Mexico Data Management Practices for.
SEC303 Assessing and Managing Privacy in the Enterprise JC Cannon Privacy Strategist.
Designing a library data service Brad Gulliford, MS/IRM University of Texas at Arlington Libraries.
UVa Library Research Data Services
ARGOS Global Conference: Parallel Session 1 – VPH May 11 th, 2011 Budapest.
Data Management 101 for Earth Scientists Data Management Plans Robert Cook Environmental Sciences Division Oak Ridge National Laboratory.
Michael Witt Interdisciplinary Research Librarian & Assistant Professor Purdue Libraries & Distributed Data Curation Center (D2C2) Eliciting.
Preserving eScholarship and Digitized Special Collections Distributed Digital Preservation Bill Donovan
University Libraries/ITS Content Stewardship Program Mairéad Martin, Sr. Director, ITS Digital Library Technologies Presentation to FACAC March 1, 2011.
Changing Implementation of NSF Data Policy Dr. Jennifer M. Schopf, NSF OD/OIA/EPSCoR On behalf of the NSF Data Working Group March 17, 2011 CASC Spring.
File System Security Robert “Bobby” Roy And Chris “Sparky” Arnold.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES 1 The Technical Services Stuff in IT Services A brief tour of the technical and service offering plethora.
Data Management & the Library. FACT #1 Research is increasingly digital and produces digital data.
DRAFT EDMC Procedural Directives NOAA Environmental Data Management Committee 12/3/2015 1
Collaborative Services The Centralization Process at Duke Michael Pickett Duke University CSG
Wireless and Mobile Security
Millman—Nov 04—1 An Update on Digital Libraries David Millman Director of Research & Development Academic Information Systems Columbia University
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
How Not to Be the Only One Who Knows About Your Research Sharing and Archiving for Posterity Melanie Radik and Raphael Fennimore Library & Technology Services.
Data Management Lesley A. Brown Director of Proposal Development.
Data Management Plans PAUL H. BERN, PH.D. APRIL 3, 2014.
Infrastructure Breakout What capacities should we build now to manage data and migrate it over the future generations of technologies, standards, formats,
Grants Management Update George O. Strawn NSF Chief Information Officer Advisory Committee for Business and Operations Spring 2006 Meeting.
Working with Data at its Source: Partnering with Researchers to Share Their Data for Archiving and Discovery Ron Nakao – Stanford University Libraries.
Library Efforts and IT Infrastructure Services Paul Conway & Mike Pickett Duke University
U N C L A S S I F I E D LA-UR Exchange 2007 Pilot at LANL Anil Karmel Technical Staff Member
© 2012 IBM Corporation IBM Linear Tape File System (LTFS) Overview and Demo.
Preservation Data Services Persistent Archive Research Group Reagan W. Moore October 1, 2003.
Data Stewardship Lifecycle A framework for data service professionals Protectors of data.
ICPSR Data Fair November 8, 2010 Katherine McNeill, MIT Libraries
Joseph JaJa, Mike Smorul, and Sangchul Song
Research Data Management
The Institute of Quantitative Social Science
BIS 221 MENTOR Lessons in Excellence- -bis221mentor.com.
BIS 221 Education for Service-- tutorialrank.com
Horizon 2020: Open data pilots and lessons learnt
Research Data Management at the University of Pittsburgh
Critical - thinking Assessment Test (CAT)
A Tale of Two Archives: Notes from the Dark Side
Client/Server And Peer-to-Peer
Presentation transcript:

Enterprise Data Decentralized Control, Data Security and Privacy Data Encryption Data Encryption Information Sharing/Protection of Research Data Information Sharing/Protection of Research Data Next Steps Next Steps Michael Pickett - Duke Michael Pickett - Duke

Data Encryption – Some Tools Linux EncFS AES-128/256 or Blowfish Linux EncFS AES-128/256 or Blowfish Mac FileVault – AES-128 Mac FileVault – AES Windows (XP SP1+) Encrypting File System – AES-256 or 3DES Windows (XP SP1+) Encrypting File System – AES-256 or 3DES oes_EFS_Fit_into_your_Security_Plan.html oes_EFS_Fit_into_your_Security_Plan.html oes_EFS_Fit_into_your_Security_Plan.html oes_EFS_Fit_into_your_Security_Plan.html

Information Sharing/Protection of Research Data NSB - LONG-LIVED DIGITAL DATA COLLECTIONS NSB - LONG-LIVED DIGITAL DATA COLLECTIONS DDC_report.pdf DDC_report.pdf DDC_report.pdf DDC_report.pdf

NSB - LONG-LIVED DIGITAL DATA COLLECTIONS What data do we not want to lose? What data do we not want to lose? Data deemed useful over long period (data we would desire to migrate across tech generations) Data deemed useful over long period (data we would desire to migrate across tech generations) Importance defined by peers (e.g. Protein Data Bank) Importance defined by peers (e.g. Protein Data Bank) Metadata required to make the raw data useful and to replicate findings (derived data?) Metadata required to make the raw data useful and to replicate findings (derived data?) Are we worried about intruders altering data that our researchers collect or use? Are we worried about intruders altering data that our researchers collect or use?

Current Policy Examples Earth/Ocean Sciences – 2 yrs to deposit in national data center Earth/Ocean Sciences – 2 yrs to deposit in national data center Cognitive Brain Science – 1 year to deposit in library or data archive Cognitive Brain Science – 1 year to deposit in library or data archive NIH – grant must include data sharing plan if > $500K (data to replicate – not summaries) & PI keeps data for 3 years after grant ends NIH – grant must include data sharing plan if > $500K (data to replicate – not summaries) & PI keeps data for 3 years after grant ends

The Future Recommendation 4: The NSF should require that research proposals for activities that will generate digital data, especially long-lived data, should state such intentions in the proposal so that peer reviewers can evaluate a proposed data management plan. Recommendation 4: The NSF should require that research proposals for activities that will generate digital data, especially long-lived data, should state such intentions in the proposal so that peer reviewers can evaluate a proposed data management plan. Building policy and infrastructure to help researchers do this will be a competitive advantage (for securing faculty and grants) Building policy and infrastructure to help researchers do this will be a competitive advantage (for securing faculty and grants)

Next Steps Are security breaches at colleges and universities on the rise? Are security breaches at colleges and universities on the rise? What are we doing to address the protection (privacy, security, integrity) of information? What are we doing to address the protection (privacy, security, integrity) of information? Are there things we should be doing differently than industry and government? Are there things we should be doing differently than industry and government? What infrastructure (technology, procedures, policy, templates) should we provide for our schools? What infrastructure (technology, procedures, policy, templates) should we provide for our schools?