INSTITUTE FOR CYBER SECURITY 1 Cyber Security: What You Need to Know Prof. Ravi Sandhu Executive Director and Chief Scientist Institute for Cyber Security.

Slides:



Advertisements
Similar presentations
Copyright © Jigsaw 1 Marketing Cloud Manifesto First Draft Submitted by Kevin Akeroyd COO/CMO JigsawOctober 21, 2009.
Advertisements

1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
INSTITUTE FOR CYBER SECURITY 1 Industry-Academia Research Synergy: Fantasy or Reality? Ravi Sandhu Executive Director and Endowed Professor Institute for.
1 PANEL Solving the Access Control Puzzle: Finding the Pieces and Putting Them Together Ravi Sandhu Executive Director Endowed Professor June 2010
Institute for Cyber Security (ICS) Prof. Ravi Sandhu Executive Director and Lutcher Brown Endowed Chair
1 Speculations on the Future of Cyber Security in 2025 Prof. Ravi Sandhu Executive Director and Chief Scientist Institute for Cyber Security University.
1 Speculations on the Future of Cyber Security in 2025 Prof. Ravi Sandhu Executive Director January 2010
Sandhus Laws of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio Chief.
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director February © Ravi Sandhu.
1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
Managing Cyber-Identity, Authorization and Trust (and their inter-relationships) Prof. Ravi Sandhu Laboratory for Information Security Technology George.
Institute for Cyber Security ASCAA Principles for Next- Generation Role-Based Access Control Ravi Sandhu Executive Director & Endowed Professor Institute.
INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for.
Institute for Cyber Security
1 Towards a Discipline of Mission-Aware Cloud Computing (A Position Paper) Ravi Sandhu Executive Director and Endowed Professor October 2010
1 Laws of Cyber Security Ravi Sandhu Executive Director and Endowed Professor September 2010
1 New Trends and Challenges in Computer Network Security Ravi Sandhu Executive Director and Endowed Professor September 2010
© Ravi Sandhu Introduction to Information Security Ravi Sandhu.
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
1 Cyber Security Research: A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 18, 2013
SECURITY AND INFORMATION SYSTEMS THE EVOLUTION OF SECURITY SYSTEMS Created By: Jamere Hill Instructor: Kyhia Bostic Section University of Houston.
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
Future of Access Control: Attributes, Automation, Adaptation
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
1 What is the Game in Cyber Security? Ravi Sandhu Executive Director and Endowed Professor February 2011
1 Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done? Ravi Sandhu Executive Director and Endowed Professor December 2010.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Security Chapter What Should I Ask Santa Claus For? spoofing: fraudulent activity in which the sender address and other parts of the.
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
Presented by: Dr. Munam Ali Shah
1 Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director and Endowed Professor Nov. 9, 2012
The Beneficent the MERCIFUL In the NAME of. “ASSURING RELIABLE AND SECURE IT SERVICES”
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
1 Cyber Security A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 15, 2016
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
1 Understanding Which New Threats Operators Can Expect To Face Within The Next Two To Five Years To Improve The On- Going Management Of Security Systems.
1 Secure Cloud Computing: A Research Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair Texas Fresh Air Big Data and Data Analytics Conference.
Lecture 8. Cyber Security, Ethics and Trust
Network security threats
Security in the Workplace: Information Assurance
UTSA's New Center Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director of ICS and C-SPECC Professor.
Introduction to Cyber Security
Introduction and Basic Concepts
Institute for Cyber Security: Research Vision
Attribute-Based Access Control: Insights and Challenges
Protecting Online Identity™
Cyber Security Research: Applied and Basic Combined*
Challenge-Response Authentication
Institute for Cyber Security: Research Vision
UTSA Cyber Security Ecosystem
Encryption and Hacking
Attribute-Based Access Control: Insights and Challenges
Cyber Security Trends and Challenges
World-Leading Research with Real-World Impact!
Institute for Cyber Security Overview
Challenge-Response Authentication
Computer Security By: Muhammed Anwar.
Cyber Security Research: A Personal Perspective
Cyber Security R&D: A Personal Perspective
World-Leading Research with Real-World Impact!
ISDC 2018 Malware dynamics: how to develop a successful anti-malware defense reference architecture policy Speaker: Sander Zeijlemaker, PhD Student Authors:
Presentation transcript:

INSTITUTE FOR CYBER SECURITY 1 Cyber Security: What You Need to Know Prof. Ravi Sandhu Executive Director and Chief Scientist Institute for Cyber Security University of Texas at San Antonio October © Ravi Sandhu 1 World-Leading Research with Real-World Impact!

INSTITUTE FOR CYBER SECURITY 99-1 Principle (Roughly) 99% of the attacks are thwarted by basic hygiene and some luck DO Think before you click etcetera Up-to-date anti-virus, firewall and site advisor BUT Some new attacks may get through. However, attacker may only use your machine to attack others and not attack you per se. Will not prevent data loss by merchants and other servers. However, still have safety in numbers. Attackers can steal a lot of account numbers but can exploit much fewer. 1% of the attacks are difficult and expensive to defend or detect For most individuals We are simply not an attractive enough target. For the US Department of Defense and its contractors A huge target. Current score: 50-1 in favor of attackers (roughly) For companies in less sensitive businesses A serious threat to be taken seriously © Ravi Sandhu 2 World-Leading Research with Real-World Impact!

INSTITUTE FOR CYBER SECURITY Weakest Link: Password Reset Typically done via secret questions and to preferred account Mothers maiden name? Fathers middle name? Favorite pets name? etcetera As detailed in the postings, the Palin hack didnt require any real skill. Instead, the hacker simply reset Palins password using her birthdate, ZIP code and information about where she met her spouse the security question on her Yahoo account, which was answered (Wasilla High) by a simple Google search. Password reset on preferred account itself done via secret questions Conundrum Real answers easy to remember but discoverable via Google False answers hard to remember but safe from Google © Ravi Sandhu 3 World-Leading Research with Real-World Impact!

INSTITUTE FOR CYBER SECURITY Crystal Ball: In the Year 2025 PRIVACY Expectation (and delivery) of privacy is close to zero E-COMMERCE SECURITY Close to perfect NATIONAL AND CORPORATE SECURITY The nation-state threat should be better contained The asymmetric non-nation-state threat will remain © Ravi Sandhu 4 World-Leading Research with Real-World Impact!

INSTITUTE FOR CYBER SECURITY Crystal Ball: In the Year 2025 PAST, PRESENT Cyber security is a young and immature field The attackers are more innovative than defenders Defenders are mired in FUD (fear, uncertainty and doubt) and fairy tales Attack back is illegal or classified FUTURE Cyber security will become a scientific discipline Cyber security will be application and technology centric Cyber security will never be solved but will be managed Attack back will be a integral part of cyber security © Ravi Sandhu 5 World-Leading Research with Real-World Impact!

INSTITUTE FOR CYBER SECURITY Cyber Security: Major Trends Security Objectives: Black-and-white to shades of grey Attackers: Innovative beyond belief Defenders: Need new doctrine © Ravi Sandhu 6 World-Leading Research with Real-World Impact!

INSTITUTE FOR CYBER SECURITY Cyber Security: Major Trends Security Objectives: Black-and-white to shades of grey Attackers: Innovative beyond belief Defenders: Need new doctrine © Ravi Sandhu 7 World-Leading Research with Real-World Impact!

INSTITUTE FOR CYBER SECURITY Cyber Security Objectives INTEGRITY authenticity AVAILABILITY access CONFIDENTIALITY disclosure © Ravi Sandhu 8 World-Leading Research with Real-World Impact!

INSTITUTE FOR CYBER SECURITY Cyber Security Objectives INTEGRITY authenticity AVAILABILITY access CONFIDENTIALITY disclosure USAGE purpose © Ravi Sandhu 9 World-Leading Research with Real-World Impact!

INSTITUTE FOR CYBER SECURITY Cyber Security Objectives INTEGRITY authenticity AVAILABILITY access CONFIDENTIALITY disclosure USAGE purpose USAGE © Ravi Sandhu 10 World-Leading Research with Real-World Impact!

INSTITUTE FOR CYBER SECURITY Cyber Security: Major Trends Security Objectives: Black-and-white to shades of grey Attackers: Innovative beyond belief Defenders: Need new doctrine © Ravi Sandhu 11 World-Leading Research with Real-World Impact!

INSTITUTE FOR CYBER SECURITY Attackers: Innovative Beyond Belief Major Innovations Botnets Robust underground economy and supply chain Targeted attacks Stealthy attacks Some Examples Drive by downloads Scareware Doctored online statements Long-lived stealth attacks Status Attackers have sizable inventory of known but unused or rarely used tricks Innovation will continue © Ravi Sandhu 12 World-Leading Research with Real-World Impact!

INSTITUTE FOR CYBER SECURITY Cyber Security: Major Trends Security Objectives: Black-and-white to shades of grey Attackers: Innovative beyond belief Defenders: Need new doctrine © Ravi Sandhu 13 World-Leading Research with Real-World Impact!

INSTITUTE FOR CYBER SECURITY Defenders: Need New Doctrine OLD: Cyberspace is a supporting infrastructure NEW: Cyberspace is a war-fighting domain on par with land, sea, air and space OLD: Its all defense, no attack back or preemptive attack NEW: Alls fair in war OLD: Defend the entire network to the same degree NEW: Defend selectively and dynamically OLD: Blame and harass the end user NEW: The user is part of the solution OLD: Defend against yesterdays attacks NEW: Be proactive, get ahead of the curve, future-proof © Ravi Sandhu 14 World-Leading Research with Real-World Impact!

INSTITUTE FOR CYBER SECURITY Institute for Cyber Security (ICS) Founded 2001 Research Excellence Secure Information Sharing Social Computing Security Cloud Computing Security Malware Mitigation Military Grade Security Infrastructure Assurance and Security Research Laboratories FlexCloud: cloud platform FlexFarm: malware honeyfarm Community exercises: the real real-world Core Differentiators We are the flagship for cyber security research at UTSA We are unique amongst the myriad academic cyber security centers in the country due to our demonstrable emphasis on real-world impact © Ravi Sandhu 15 World-Leading Research with Real-World Impact! 50+ people and growing A jewel in UTSAs drive to tier I status