Economic Development for the DFW Metroplex Related to Security: An Academic Perspective Dr. Bhavani Thuraisingham The University of Texas at Dallas December.

Slides:



Advertisements
Similar presentations
Chapter 1 Business Driven Technology
Advertisements

Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #26 Emerging Technologies.
Data Mining for Security Applications Dr. Bhavani Thuraisingham The University of Texas at Dallas February 2005.
Data warehouse example
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Data Mining.
The Quality Management System
Healthcare Group: The 12 Stories Peng (group lead), Paul, Bhavani, Le, Gail, Prabhakaran, Khan, Murat Feb 19-20, 2009 NSF Data & Application Security Workshop.
Data Mining. 2 Models Created by Data Mining Linear Equations Rules Clusters Graphs Tree Structures Recurrent Patterns.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Created by Curt Harrell & Jesse Kuzy for THE DEPARTMENT OF HOMELAND SECURITY.
Chapter 1 Introduction to Data Mining
@ ?!.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Data Mining for Security.
Data Mining for Security Applications Dr. Bhavani Thuraisingham The University of Texas at Dallas January 2006.
ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University.
Chapter 1 Business Driven Technology MANGT 366 Information Technology for Business Chapter 1: Management Information Systems: Business Driven MIS.
BUSINESS DRIVEN TECHNOLOGY
Data and Applications Security Developments and Directions Guest Lecture Dr. Kevin Hamlen Given in February 2012.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Guest Lecture Introduction to Data Mining Dr. Bhavani Thuraisingham September 17, 2010.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture ##9 Data Mining, Security.
Data Mining for Security Applications Dr. Bhavani Thuraisingham Dr. Doug Harris The University of Texas at Dallas March.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Data Mining for Security Applications Dr. Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Data and Applications Security Research at the University of Texas at Dallas Dr. Bhavani Thuraisingham The University of Texas at Dallas April 25, 2006.
Accelerating Adoption of Sector Strategies A State Policy Development Assistance Project Funded by The Ford and C. S. Mott Foundations February 24, 2006.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Secure Multimedia Data.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Biometrics and Other Emerging Technologies in Applications.
Data Mining, Security and Privacy Prof. Bhavani Thuraisingham Prof. Murat Kantarcioglu Ms Li Liu (PhD Student – completing December 2007) The University.
Pertemuan 16 Materi : Buku Wajib & Sumber Materi :
Why BI….? Most companies collect a large amount of data from their business operations. To keep track of that information, a business and would need to.
Data Mining Status and Risks Dr. Gregory Newby UNC-Chapel Hill
1 Data Mining for Surveillance Applications Suspicious Event Detection Dr. Bhavani Thuraisingham April 2006.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #17 Data Warehousing, Data.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 22, 2005.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #25 Dependable Data Management.
1 RAND October 30, 2003 Border Security Issues After 9/11 November 5, 2003.
Data Mining, Security and Privacy Dr. Bhavani Thuraisingham The University of Texas at Dallas March 2008.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
Chapter 3 Building Business Intelligence Chapter 3 DATABASES AND DATA WAREHOUSES Building Business Intelligence 6/22/2016 1Management Information Systems.
Global Physical Security Market Primary Research, Risk Analysis, Product Research, Trends and Forecast by 2022 Phone No.: +1 (214) id:
Data and Applications Security
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Introduction C.Eng 714 Spring 2010.
Data and Applications Security Introduction to Data Mining
Introduction to Data, Information and Knowledge Management
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Maintaining order and safety in a city is no small task
Data Warehousing Data Mining Privacy
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Trustworthy Semantic Webs
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Data and Applications Security
Data and Applications Security
Digital Forensics Dr. Bhavani Thuraisingham
Presentation transcript:

Economic Development for the DFW Metroplex Related to Security: An Academic Perspective Dr. Bhavani Thuraisingham The University of Texas at Dallas December 2006

2 10/19/ :02 Contact Information 0 Dr. Bhavani Thuraisingham Professor of Computer Science and Director of Cyber Security Research Center The University of Texas at Dallas Richardson, TX Phone: Fax:

3 10/19/ :02 Areas for Economic Development related to Security 0 Border Security -Technologies for protecting the borders will have an impact on the economy 0 Education -Build an educated workforce 0 Inland Port -Technologies for Inland Port to promote trade with China and other countries 0 Why we should not outsource data yet -Serious security and privacy concerns

4 10/19/ :02 Border Security 0 We need to monitor the borders and ports to prevent and detect terrorism 0 Our research is focusing on the following topics for national security -Surveillance for suspicious events -Data mining for Counter-terrorism -RFID data management -Cannot forget about PRIVACY

5 10/19/ :02 Video Surveillance and Suspicious Event Detection 0 Huge amounts of video data available in the security domain 0 Need for tools to aid human analyst; pointing out areas in video where unusual activity occurs; 0 We have developed a system to detect suspicious events 0 Biometrics for Face detection 0 Investigating Privacy Preserving Surveillance

6 10/19/ :02 What is Data Mining? Data Mining Knowledge Mining Knowledge Discovery in Databases Data Archaeology Data Dredging Database Mining Knowledge Extraction Data Pattern Processing Information Harvesting Siftware The process of discovering meaningful new correlations, patterns, and trends by sifting through large amounts of data, often previously unknown, using pattern recognition technologies and statistical and mathematical techniques (Data Mining: Technologies, Techniques, Tools and Trends, CRC Press, 1998 Author: Bhavani Thuraisingham)

7 10/19/ :02 Data Mining for Counterterrorism: Non-real-time Analysis 0 Gather data from multiple sources -Information on terrorist attacks: who, what, where, when, how -Personal and business data: place of birth, ethnic origin, religion, education, work history, finances, criminal record, relatives, friends and associates, travel history,... -Unstructured data: newspaper articles, video clips, speeches, s, phone records,... 0 Integrate the data, build warehouses and federations 0 Develop profiles of terrorists, activities/threats 0 Mine the data to extract patterns of potential terrorists and predict future activities and targets 0 Find the “needle in the haystack” - suspicious needles? 0 Need to maintain PRIVACY -Privacy Preserving Data Mining

8 10/19/ :02 RFID Data Management 0 RFID: Radio Frequency Identifier 0 We are developing a data management system to manage the RFID data streams emanating from the tags 0 Query processing in data streams 0 Security and privacy techniques to ensure authorized access and privacy of individuals 0 Digital identity management

9 10/19/ :02 Security Education at the University of Texas at Dallas (UTD) 0 We are NSA/DHS Center for Excellence on Information Assurance Education 0 Focus areas include: System security, Data and Applications security, Network security, Secure geospatial data management 0 Strong team also focusing on data mining for national security as well as cyber security 0 Also developing system for Emergency Preparedness 0 Research for NSF, Air Force, EPA, DFW Corporations, and discussing plans with DHS 0 Strong collaboration with Industry through contracts and student worker positions

10 10/19/ :02 Technologies for Inland Port Creation 0 Data Mining and Knowledge Management technologies will strengthen DFW position in becoming the major city in USA for trade 0 DFW is the 8 th largest city in US, has one of the nation’s largest hub airport in the heart of the country with easy access to almost every city in US and several countries -We must get the nonstop route to/from Beijing 0 Data mining will help us to determine who our competitors are, what are their strategies, what actions do we need to take? 0 Knowledge management technologies will improve e-business, supply chain management, enterprise resource planning, enterprise security, all critical for trade 0 UTD has strength in both data mining and knowledge management technologies; we are also conducting research on supply chain management and e-business

11 10/19/ :02 Outsourcing Data 0 Daily we are hearing about job losses due to outsourcing 0 We need to be very careful when outsourcing our critical data -Accounting data, Income tax data, etc. 0 Maintaining security and privacy for outsourced data is very difficult at present -We are conducting research on querying encrypted data and practical solutions are yet to be developed; need lot more research 0 Even if key attributes are suppressed, Inference Problem may be possible 0 We don’t want our precious and valuable data to go into the wrong hands 0 Tradeoffs between Outsourcing and Security

12 10/19/ :02 In Summary 0 Continue with Border security activities with attention to Privacy 0 Education is our strength; promote Math and Science in DFW; encourage people from other states to migrate to DFW for our education; close collaboration with Industry 0 Develop technologies to enable DFW become a major Indoor port for USA and our Trade partners 0 Be careful about outsourcing our data and conduct research on security solutions