Computer Science and Engineering 1 Information Assurance Research Department of Computer Science and Engineering University of South Carolina, Columbia.

Slides:



Advertisements
Similar presentations
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
Advertisements

1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
Network security Dr.Andrew Yang.  A wireless sensor network is network a consisting of spatially distributed autonomous devices using sensors to cooperatively.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Trust, Privacy, and Security Moderator: Bharat Bhargava 1 Coordinators: Bharat Bhargava 1, Csilla Farkas 2, and Leszek Lilien 1 1 Purdue University and.
Wireless Security.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
CS691 Robin Kimzey Cell Phone Security a little computer in your pocket an easy target for malcontents.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
PRIVACY, TRUST, and SECURITY Bharat Bhargava (moderator)
Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer.
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Securing Information Systems
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Data Management Information Management Knowledge Management Data and Applications Security Challenges Bhavani Thuraisingham October 2006.
Computer Science and Engineering 1 Future of Cyber Security.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks.
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Future ICT Landscapes – Security and Privacy Challenges & Requirements Simone Fischer-Hübner IVA Workshop, Stockholm 24th May 2012.
A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks Anand Patwardhan, Anupam Joshi, Tim Finin, and Yelena Yesha Anand Patwardhan.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Wireless Security. Traditional method A computer with network card a cable connecting network card and the network.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Csilla Farkas Department of Computer Science and Engineering University of South Carolina
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
IS3220 Information Technology Infrastructure Security
Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Principles Identified - UK DfT -
Lecture 1 Introduction Basic Security Concepts
Data and Applications Security
CMIT100 Chapter 15 - Information.
ASSET - Automotive Software cyber SEcuriTy
Introduction to the Federal Defense Acquisition Regulation
Detection and Analysis of Threats to the Energy Sector (DATES)
Data and Applications Security
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
IS4680 Security Auditing for Compliance
Denial-of-Service Jammer Detector Training Course Worldsensing
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Security in SDR & cognitive radio
Data and Applications Security Developments and Directions
Andrei G. Stoica and Csilla Farkas
Data and Applications Security
Data and Applications Security
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Data and Applications Security
Presentation transcript:

Computer Science and Engineering 1 Information Assurance Research Department of Computer Science and Engineering University of South Carolina, Columbia

Faculty in Information Assurance 3 faculty members with primary interest in IA –Csilla Farkas: Information assurance, web data security and privacy, damage and social vulnerability analysis of cyber attacks –Chin-Tser Huang: Intrusion detection, wireless security, network protocols –Wenyuan Xu: Wireless networking and security, sensor networks, jamming detection and avoidance 6 faculty members with IA-related research –Duncan Buell, Caroline Eastman, Stephen Fenner, Michael Huhns, Manton Matthews, and John Rose

Computer Science and Engineering 3 Csilla Farkas Associate Professor (2000 – present)

Computer Science and Engineering 4 Semantic Web security –Data and meta-data security –Secure information sharing –Web application security Critical Infrastructure Protection –Economic and social aspects of cyber attacks –SCADA systems security Research Directions Organizational Data Confidential Ontology Secure Data Integration and Inferences Public User Web Data Public Access Control Models Offense Defense Other Research – Policy Compliance – Online Privacy – Open source intelligence – Secure VANET communication

Computer Science and Engineering 5 Secure Semantic Web Web Data and Metadata Security –Semantic-Aware XML access control –RDF security policy –Stream data security Web Services (WS) Security –Service-level security across heterogeneous domains –Identity and trust management –Execution correctness, WS transactions

Computer Science and Engineering 6 Damage Assessment and Social Vulnerability Damage Estimation and Social Vulnerability –Damage of the target may not reflect the real amount of damage –Services may rely on the attacked service, causing a cascading and escalating damage –Identify characteristics to evaluate vulnerability of different social strata for cyber attack consequences Support decision makers to –Evaluate risk and consequences of cyber attacks –Support methods to prevent, deter, and mitigate consequences of attacks

Computer Science and Engineering 7 Chin-Tser Huang Assistant Professor (2003 – present)

Computer Science and Engineering 8 Wenyuan Xu Associate Professor (2007 – present)

Wireless networking and security Wireless networking and security Interested in non-traditional security and privacy issues for emerging wireless systems Vehicular networks, Sensor networks….. Like to deal with real systems, play with cool gadgets. Like to break thing first, then build a solution Computer Science and Engineering 9

10 Computer Science and Engineering Radio Interference/Jamming Attacks in Wireless Networks  Wireless networks  Communicate via shared media  Channel access protocol: carrier sense based  Threats  Unintentional radio interference: b/g, cordless phone, Bluetooth, Microwave oven share the same frequency band  Intentional jamming: A transmitter overrides any signal with enough power  Research  Jamming detection– distinguish between radio interference scenario from normal network dynamics, including congestion, hardware failure, mobility  Jamming defenses – resume network connectivity in the presence of jamming  Channel Surfing  Timing channel BobAlic e Hello … … Mr. X

Security Analysis of TPMS TPMS - Tire Pressure Monitoring Systems –Monitoring the air pressure inside tires in automobiles. –All cars made after 2008 are mandated to install TPMS Any secure or any privacy issues? –Can we eavesdrop? –Can we inject fake packets? Not much TPMS information available in public domains. => Reverse engineered communication protocols Computer Science and Engineering 11

Computer Science and Engineering 12 Privacy Issues in Wireless Networks Content-Oriented Security and Privacy: –Issues that arise because an adversary can observe and manipulate the exact content in a sensor message. –Best addressed through cryptography and network security. Context-Oriented Privacy (what we are interested): –Issues that arise because an adversary observes the context surrounding creation and transmission of a sensor message. –Example: sink location privacy in sensor networks. 12 ATM

Computer Science and Engineering 13 Contact Information Center for Information Assurance Engineering