HOMMER: Holistic Model for Minority Education & Research “The Balancing Act”: Accountability vs. Privacy by Deidre W. Evans Christy L. Chatmon Department.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Chapter 1  Introduction 1 Introduction Chapter 1  Introduction 2 The Cast of Characters  Alice and Bob are the good guys  Trudy is the bad guy 
September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Computer Crimes Chapter 9. Definition  Illegal act that involves a computer system or computer-related system  Telephone, microwave, satellite telecommunications.
Trust and the Public Key Infrastructure (PKI) Sangyoon Oh Florida State University Computer Security Projects GS Spring 2001.
1 Overview CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 8, 2004.
Chapter 1 – Introduction
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
Security+ Guide to Network Security Fundamentals
1 An Overview of Computer Security computer security.
May 22, 2002 Joint Operations Group Discussion Overview Describe the UC Davis Security Architecture Describe Authentication Efforts at UC Davis Current.
Trust, Privacy, and Security Moderator: Bharat Bhargava Purdue University.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Chapter 3 Ethics, Privacy & Security
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
SWAMI Threats, vulnerabilities & safeguards in a World of Ambient Intelligence David Wright Trilateral Research & Consulting 21 March 2006.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
Interdisciplinary Education on Smart Grids: Lessons, Challenges, and Opportunities Visvakumar Aravinthan and Vinod Namboodiri Department of Electrical.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Data Mining as Pre-EDD Investigatory Tool Team 9.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Department of Computer and Information SciencesMay 5th, 2004 HOMMER: Holistic Model for Minority Education & Research.
K E M A, I N C. Ten Steps To Secure Control Systems APPA 2005 Conference Session: Securing SCADA Networks from Cyber Attacks Memphis, TN April 18, 2005.
Lecture 11: Law and Ethics
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Privacy, Confidentiality, and Security Unit 8: Professional Values and Medical Ethics Lecture 2 This material was developed by Oregon Health & Science.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Privacy, Confidentiality, and Security Component 2/Unit 8c.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Scott Charney Cybercrime and Risk Management PwC.
Information Assurance – A Technology Transfer Success Story Deidre W. Evans, Edward L. Jones, Christy L. Chatmon Computer and Information Sciences Department.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
FBI Phoenix Computer Crime Squad SA Tom Liffiton 10/23/2003 Maricopa Association of Governments Telecommunications Advisory Group.
Mary Trauner Senior Research Scientist Georgia Institute of Technology Middleware for Video.
Health Management Information Systems Clinical Decision Support Systems Lecture b This material Comp6_Unit5b was developed by Duke University, funded by.
2014 Digital Forensics Conference. 2 Conference 3  Post-Proceedings will be published by Springer as an LNCS volume  March 14, 2014 / Aug 24, 2014.
Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Information Management System Ali Saeed Khan 29 th April, 2016.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
By: Joshua DeLong Computer Security and Privacy.
Dr. Ir. Yeffry Handoko Putra
CMIT100 Chapter 15 - Information.
Chapter 1: Introduction
Private and Secure Biometric User Authentication in the Web Master Thesis Defense Zaki Alsubhi Department of Computer Science University of Colorado.
Trends in my profession, Information Technology
Information Security at Florida State University
Information Security at Florida State University
Information Security at Florida State University
Identity & Access Management
Information Security at Florida State University
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

HOMMER: Holistic Model for Minority Education & Research “The Balancing Act”: Accountability vs. Privacy by Deidre W. Evans Christy L. Chatmon Department of Computer and Information SciencesMay 5th, 2004

Overview Introduction Research Discussion –“The Balancing Act” Goals of Research –Security Track in Curricula –Center of Educational Excellence in Information Assurance by NSA –Build Collaborations Department of Computer and Information SciencesMay 5th, 2004

Introduction September 11, 2001 was in part due to a lack of operational balance between privacy and accountability: –“Uncrackable encryption is allowing terrorists to communicate about their intentions without fear of outside intrusion. They’re thwarting the efforts of law enforcement to detect, prevent and investigate illegal activities.” [FBI director] Department of Computer and Information SciencesMay 5th, 2004

Introduction Increase in security threats –Denial of service, worms, viruses, etc. Advancement in data retrieval & storage mechanisms –Data-mining, CRM, WEB Tracking

“The Balancing Act” Privacy/Anonymity –Controlling all information about one’s self & personal activity –Authentication Passwords, PKI’s, biometrics, etc. Accountability/Security –Attribute actions to the user that caused those actions

“The Balancing Act” Investigate existing methodologies: –Key Escrow third party retrieves cryptographic keys for data confidentiality for recovery of encrypted data –PKIs Department of Computer and Information SciencesMay 5th, 2004

“The Balancing Act” Department of Computer and Information SciencesMay 5th, 2004 AnonymityAccountability PrivacyAuthentication PrivacyCyber-forensics Free SpeechLiability/Copyright

Goals of Research Problem: –Existing paradigms embody conflict between security goals and privacy goals Goal: –Explore alternative paradigms that balances the needs for security with the needs for personal privacy Develop a cryptographic infrastructure models, techniques, & tools to facilitate “privacy-balanced accountability” Department of Computer and Information SciencesMay 5th, 2004

Goals of Research FAMU CIS department recognized as a Center of Educational Excellence in Information Security by National Security Agency Information Security Track in CIS curricula Department of Computer and Information SciencesMay 5th, 2004

Goals of Research

Standalone Security Lab to support research & course needs –explore new paradigms for training students about security and to foster students’ interests in security issues Extend collaborations with other security educators –FSU, University of Central Florida, etc. Department of Computer and Information SciencesMay 5th, 2004

References [1]Carl Ellison and Bruce Schneier. Ten Risks of PKI, What You Are Not Being Told About PKI. Computer Security Journal, Vol. XVI, No. 1, [2]Donald Runsfeld. US Secretary of State, Comments to the press, Sept 12, 2001, bin/real_audio.pl?Sep2001/DoD091201a& [3] Hosmer, C., Gordon, G., Hyde, C., Grant, T. "Cyber Forensics 2000." Proceedings, 1st Annual Study of the State-of-the-Art in Cyber Forensics. [4]J.K. Millen and R.N. Wright. Reasoning about Trust and Insurance in a Public Key Infrastructure. Proceedings of 13th IEEE Computer Security Foundations Workshop, IEEE Computer Society, July [5]Jack Kelley. Terror groups hide behind Web encryption. USA Today, June 19, 2001, [6]M. Burmester, Y. Desmedt and J. Seberry. Equitable key escrow with limited time-span. Advances in Cryptology, Asiacrypt 98, LNCS 1514, Springer, Berlin, pp , Department of Computer and Information SciencesMay 5th, 2004