Secure Connections for a Smarter World Dr. Shuyuan Mary Ho Assistant Professor School of Information Florida State University.

Slides:



Advertisements
Similar presentations
Security Challenges in a Connected World Security Challenges in a Connected World ISACA Roundtable, Breukelen, The Netherlands March 2013 Yiru Zhong, Analyst.
Advertisements

© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Cyber Security and the Smart Grid George W. Arnold, Eng.Sc.D. National Institute of Standards and Technology (NIST) U.S. Department of Commerce
Computer Crimes Chapter 9. Definition  Illegal act that involves a computer system or computer-related system  Telephone, microwave, satellite telecommunications.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
SMART GRID: Privacy Awareness and Training – for PUCs/PSCs A Starting Point December 2011 SGIP-CSWG Privacy Group 1 DRAFT.
Horizon 2020 Secure Societies Security Research and Industry DG Enterprise and Industry 2013.
Lessons Learned in Smart Grid Cyber Security
What is Next-Generation Disaster Recovery and Service Availability? Why do We Need it? Dan Smith Senior Manager, Solution Consulting and Engineering, GTSI.
James Brehm Senior Strategist Compass Intelligence.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Network of Excellence in Internet Science Network of Excellence in Internet Science (EINS) Joint Workshop and 4 th Plenary Meeting Bologna June 13, 2014.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
Frankfurt (Germany), 6-9 June 2011 IT COMPLIANCE IN SMART GRIDS Martin Schaefer – Sweden – Session 6 – 0210.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Security and Privacy in Smart Communities By: Dr. Tan Hanh, Dr. Hoang Xuan Dau Posts and Telecommunications Institute of Technology (PTIT), Hanoi, Vietnam.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Presentation of projects’ ideas. 1. Madrid Network “A public-private network which aim is to contibute actively to position Madrid Region in the top.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
An Overview of the Smart Grid David K. Owens Chair, AABE Legislative Issues and Public Policy Committee AABE Smart Grid Working Group Webinar September.
ICT in HORIZON 2020 The New EU Framework Programme for Research and Innovation Morten Møller, Head of Programme Coordination Unit, DG CONNECT,
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 End to End Security on the Smart Grid Perry Jurancich Utilities Vertical Market Development Verizon.
Monitoring Employees on Networks: Unethical or Good Business?
Network Security Management Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
ITS ePrimer Module 14: Emerging Opportunities and Challenges September 2013 Intelligent Transportation Systems Joint Program Office Research and Innovative.
Maritime Cyber Vulnerabilities in the Energy Sector Center for Joint Operations of the Sea ODU Maritime Institute Students Crow, Fresco, Lee.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Chapter 2: Anatomy of the Problem Recent terrorist attacks and the raise in cyber attacks have raised concern about the need to protect the nation’s cyber.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Mission: NCSA’s mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. Empowering Smart Machines.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
International Telecommunication Union ITU-T Cybersecurity Symposium - Florianópolis, Brazil, 4 October 2004 Infrastructure Security: The impact on Telecommunications.
Homeland Security CJ 355 Unit 6 Professor David R. Thompson.
Computer Policy and Security Report to Faculty Council Jeanne Smythe ATN Director for Computing Policy March 26,2004.
State of the Industry NAESB Critical Infrastructure Committee.
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
Computer Security Mike Asoodeh & Ray Dejean Office of Technology Southeastern Louisiana University.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Overview of National Infrastructure Protection CHAPTER 3.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
OFFICIAL Horizon 2020 Secure Societies Home Office Perspective Tim Cook
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
A Layered Solution to Cybersecurity Dr. Erfan Ibrahim Cyber-Physical Systems Security & Resilience Center National Renewable Energy Laboratory.
- Company Confidential - Corporate Overview March 2015.
Horizon 2020 Secure Societies Secure Societies Briefing Day 21 January /06/2016.
© 2013 TM Forum | 1 V Catalysts and Innovation Projects Rapid Technology Innovation Projects The Hub at Management World 2013.
Data and Security Workshop Digital Transformation and Security Challenges Prof. Daniel Kofman Co-founder and Director of LINCS CEO of ICT4V International.
Jeju, 13 – 16 May 2013Standards for Shared ICT Dr. Farrokh Khatibi Director of Engineering Qualcomm ATIS and the Smart Grid Document No: GSC17-PLEN-63.
Society for Maintenance and Reliability Professionals (SMRP)
Information Security – Current Challenges
4th SG13 Regional Workshop for Africa on “Future Networks for a better Africa: IMT-2020, Trust, Cloud Computing and Big Data” (Accra, Ghana, March.
Information Technology Sector
Smart Meter Technology European Style!?
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
The U.S. Department of Homeland Security
Opportunities for Cybersecurity and Privacy clusters
Presentation transcript:

Secure Connections for a Smarter World Dr. Shuyuan Mary Ho Assistant Professor School of Information Florida State University

Airlines Unfettered Connectivity via Cloud Refrigerators Power Plants Vehicles Home Automation County tax payment systems Mobile banking systems Water treatment facilities

The good, the bad, and the ugly

Smart Grid Security

The Future of Energy Generation?

Overview of the Electric Power System and Control Communications 16 critical infrastructure sectors regulated under the National Cybersecurity Framework The Dept of Energy is developing the Energy Sector-Specific Plan through a coordinated efforts involving public and private sectors. The Smart Grid Interoperability Panel (SGIP) Cybersecurity Committee (SGCC) led and managed by National Institute for Standard and Technology

Energy Sector Threatened

CyberThreats Coming soon to a workstation near you  Illegal Access  Message Interception  Data Interference  System Interference  Viruses  Spam  Computer related Forgery  Copyright infringement

CyberThreats on the Horizon Deliberate attacks on infrastructure Terrorism Disgruntled employees Industrial espionage

CyberThreats on the Horizon Inadvertent compromises to infrastructure Configuration issues User error Equipment failure Natural disasters

What can we expect going forward? Loss of Privacy Technological unpredictability A seriously trust- challenged society A steep gain in personal control, followed by a steep loss in personal control

Protective Mechanisms Available Enterprise Vulnerability Platform Asset & Risk Management Lawful interception & forensic investigation Network packet analysis & big data analysis

How do we prepare? Participate in building next-generation security Train your staff on good cyber-health practices Learn more about Cyber Intelligence

THANK YOU! For support and more information: Dr. Shuyuan Mary Ho