The Science of Cyber Security Laurie Williams 1 Figure from IEEE Security and Privacy, May-June 2011 issue.

Slides:



Advertisements
Similar presentations
Operating System Security
Advertisements

Jacques Bus, Head of Unit DG Information Society and Media EU-US Cooperation in Network and Information Security 17 Mar, 2008 – Yale, US.
Designed-in Security Some Major Challenges Security Group Department of Computer Science University of California, Santa Barbara Trustworthy.
Sponsored by the U.S. Department of Defense © 2005 by Carnegie Mellon University 1 Pittsburgh, PA Dennis Smith, David Carney and Ed Morris DEAS.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
1 SANS Technology Institute - Candidate for Master of Science Degree 1 A Preamble into Aligning Systems Engineering and Information Security Risk Dr. Craig.
Secure and Trustworthy Cyberspace (SaTC) Program Sam Weber Program Director March 2012.
The FI-WARE Project – Base Platform for Future Service Infrastructures NOVEMBER, 16th 2011Thierry Nagellen Workshop AAL Community.
Evaluating COTS Software June Software Engineering Institute Carnegie Mellon Evaluating COTS Software © 1999 Carnegie Mellon University Fred Hansen.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
1 MIT-Harvard Conference Explorations in Cyber International Relations (ECIR) Closing Remarks – Next Steps Nazli Choucri Professor of Political Science.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
27 September 1999 Crisis Management William L. Scherlis Carnegie Mellon University School of Computer Science.
Design considerations for P2P Stefan Saroiu, Krishna Gummadi, Steve Gribble Department of Computer Science and Engineering University of Washington
SERC Security Systems Engineering Initiative Dr. Clifford Neuman, Director USC Center for Computer Systems Security Information Sciences Institute University.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Search Engines.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Secure Information and Resource Sharing in CloudSecure Information and Resource Sharing in Cloud References OSAC-SID Model [1]K. Harrison and G. White.
10 Colleges / 282 Fields of Study / >34,000 students Among the most productive research universities: >$400M annually in research activities Patents (>800.
A Robust Health Data Infrastructure P. Jon White, MD Director, Health IT Agency for Healthcare Research and Quality
52°North Simon Jirka – VGIrisk Workshop - April 2011.
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Patterns for Location and Context-based access control
Introduction to Software Engineering LECTURE 2 By Umm-e-Laila 1Compiled by: Umm-e-Laila.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
SALSA-NetAuth Joint Techs Vancouver, BC July 2005.
Applying Open Source to Open Science Ray Idaszak Director, Collaborative Environments RENCI, University of North Carolina at Chapel Hill.
Semantic Web and Policy Workshop Panel Contribution Norman M. Sadeh School of Computer Science Carnegie Mellon University Director, e-Supply Chain Management.
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
NanoHUB.org and HUBzero™ Platform for Reproducible Computational Experiments Michael McLennan Director and Chief Architect, Hub Technology Group and George.
CSCI 6231 – Final Lecture Additional Resources and Topics.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
Supporting Privacy Protection in Personalized Web Search.
From Information Assurance to Trusted Systems – A Strategic Shift Patricia A. Muoio Chief, NSA Trusted Systems Research (formerly known as National Information.
26/05/2005 Research Infrastructures - 'eInfrastructure: Grid initiatives‘ FP INFRASTRUCTURES-71 DIMMI Project a DI gital M ulti M edia I nfrastructure.
The Laboratory of Information Integration, Security and Privacy ● University of North Carolina at Charlotte URL: 306, UNC Charlotte.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
1 Structuring Knowledge for a Security Trade-offs Knowledge Base Golnaz Elahi Department of Computer Science Eric Yu Faculty of Information Study University.
June 13-15, 2007Policy 2007 Infrastructure-aware Autonomic Manager for Change Management H. Abdel SalamK. Maly R. MukkamalaM. Zubair Department of Computer.
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
Sponsored by the National Science Foundation GENI Cloud Security GENI Engineering Conference 12 Kansas City, MO Stephen Schwab University of Southern California.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Carnegie Mellon University Software Engineering Institute Lecture 4 The Survivable Network Analysis Method: Evaluating Survivability of Critical Systems.
CISC 849 : Applications in Fintech Vaishnavi Gandra Dept of Computer & Information Sciences University of Delaware Extracting Cybersecurity Related Linked.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Fixing Windows 10 Automatic Updates Install Problem
Similarities between Grid-enabled Medical and Engineering Applications
Xiaohong (Dorothy) Yuan North Carolina A&T State University 11/16/2017
Confidentiality October 14, 2005.
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
UTSA's New Center Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director of ICS and C-SPECC Professor.
Clemson University: Jill Gemmill
Institute for Cyber Security: Research Vision
Internet of Things: Security Challenges
EOSCpilot Skills Landscape & Framework
Institute for Cyber Security: Research Vision
UTSA Cyber Security Ecosystem
Attribute-Based Access Control: Insights and Challenges
The Graduate College Travel Summary Presentation
Brian Matthews STFC EOSCpilot Brian Matthews STFC
World-Leading Research with Real-World Impact!
Software Engineering for Safety: a Roadmap
Institute for Cyber Security Overview
Final Conference 18 Set 2018.
CYBER SECURITY SPACE OPERATIONS AND RESILIENCY.
Albeado - Enabling Smart Energy
Cyber Security R&D: A Personal Perspective
Definition Of Computer Security
IT Applications with Emerging Techniques: Security Solutions
Presentation transcript:

The Science of Cyber Security Laurie Williams 1 Figure from IEEE Security and Privacy, May-June 2011 issue

NSA Science of Security Lablet (SoSL) NSA SOSL lablets: –North Carolina State University (Analytics) –Carnegie Mellon (Scalability, Usability) –University of Illinois (Resiliency) Projected $2.0-$2.5M funding per year per lablet NCSU: Based out of Computer Science –14 supported NCSU faculty; 18 supported NCSU students –Multi-disciplinary: 3 NCSU colleges and institutes –5 collaborating university partners

Hard Problem 1: Scalability and Composability Challenge Develop methods to enable the construction of secure systems with known security properties.

Hard Problem 2: Policy-Governed Secure Collaboration Challenge Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains

Hard Problem 3: Predictive Security Metrics Challenge Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.

Hard Problem 4: Resilient Architectures Challenge Develop means to design and analyze system architectures that deliver required service in the face of compromised components

Hard Problem 5: Human Behavior Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties and

My SOSL Projects Security Metrics: Non-repudiation metrics Human Behavior: Security Requirements Security Metrics/Resilient Architectures: Software Security Engineering

Non-repudiation analysis

Extracting Security Requirements

Software Security Engineering Attack Profile Vulnerability Intensity Objective Choose vulnerability prevention & removal practices Vulnerability prediction models

NCSU Science of Security Community Meeting Local: October 22, 2013 National: April 8-9, 2013 Let me know if you want to be on the mailing list …