Dec 14 th, 2005Telecom Italia Strategy Meeting TRUST :Team for Research in Ubiquitous Secure Technologies Strategic and Implementation Plan overview Shankar.

Slides:



Advertisements
Similar presentations
Connected Health Framework
Advertisements

Pervasive Wireless Solutions © Copyright IBM Corporation 2004 IBM La Gaude Smart Home / Intelligent Building Jean-Michel Corrieu IBM Europe Technical Manager.
Jose Jimenez Director. International Programmes Telefónica Digital.
State of Indiana Business One Stop (BOS) Program Roadmap Updated June 6, 2013 RFI ATTACHMENT D.
Vehicle-infrastructure integration: creating co-operative mobility systems and services Hearing EU Parliament, 22 January 2009 Hermann Meyer, CEO.
ASCR Data Science Centers Infrastructure Demonstration S. Canon, N. Desai, M. Ernst, K. Kleese-Van Dam, G. Shipman, B. Tierney.
GENI: Global Environment for Networking Innovations Larry Landweber Senior Advisor NSF:CISE Joint Techs Madison, WI July 17, 2006.
David A. Brown Chief Information Security Officer State of Ohio
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
Introduction to Cyber Physical Systems Yuping Dong Sep. 21, 2009.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Secure and Trustworthy Cyberspace (SaTC) Program Sam Weber Program Director March 2012.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Smart Grid Cyber Security Framework
(Geneva, Switzerland, September 2014)
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Research Directions for the Internet of Things Supervised by: Dr. Nouh Sabry Presented by: Ahmed Mohamed Sayed.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
The LOGIIC Consortium Zachary Tudor, CISSP, CISM, CCP Program Director SRI International.
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
TRUST, Autumn 2010 Conference, November 10-11, 2010 Simulation of Network Attacks on SCADA Systems Rohan Chabukswar, Bruno Sinopoli, Gabor Karsai, Annarita.
Critical Emerging Network-Centric Applications Tele-control/tele-presence Defense Tele-medicine Remote plane/vehicle/robot control Distance learning Real-time.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Cloud Computing Zach Ciccone Claudia Rodriguez Annia Aleman Xiaoying Tu Nov 14, 2013.
Yuan Xue Vanderbilt University
CSIAC is a DoD Information Analysis Center (IAC) sponsored by the Defense Technical Information Center (DTIC) Presentation to: Insider Threat SOAR Workshop.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Challenges in Urban Meteorology: A Forum for Users and Providers OFCM Workshop Summaries Lt Col Rob Rizza Assistant Federal Coordinator for USAF/USA Affairs.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
TRUST NSF Site Visit, Berkeley, March, 2007 Sensor Networks: Technology Transfer Stephen Wicker – Cornell University.
IST programme Cultural Heritage in Tomorrow ’s Knowledge Society FUTURE PLANS FP6 Cultural Heritage in Tomorrow ’s Knowledge Society FUTURE PLANS FP6 RRRESE.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
SBIR Final Meeting Collaboration Sensor Grid and Grids of Grids Information Management Anabas July 8, 2008.
"The views expressed in this presentation are those of the author and do not necessarily reflect the views of the European Commission“ Future Internet.
MTBC Cloud Computing Initiative  Applications of cloud computing  Overview of the NSF Net-Centric Software and Systems (NCSS) I/UCRC  MTBC and NCSS.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
Demonstrators and Pan-European Services Laboratory WP5 session.
CSCE 548 Secure Software Development Security Operations.
The EU framework programme for research and innovation.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
IoTs Capabilities. IoTs Capabilities What is IoTs? Control / Information Internet Devices.
STREP Research Project HOBNET (FP7- ICT , ) HOlistic Platform Design for Smart Buildings of the Future InterNET (
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Integrated Simulation and Emulation Platform for Cyber-Physical System Security Experimentation Wei Yan, Yuan Xue, Xiaowei Li, Jiannian Weng, Timothy Busch,
Driving Innovation Connect & Catalyse The Cultural – Creative Industries Contemporary & Future Challenges Sian Brereton 24 th February 2010.
Session 1: Technology Development August 15 NSF Workshop.
Innovative ICT Building a Better Smart City. Agenda 1. Why focus on Smart City 2. What is a Smart City 3. References.
Advancing National Wireless Capability Date: March 22, 2016 Wireless Test Bed & Wireless National User Facility Paul Titus Department Manager, Communications.
Algorithms for Big Data Delivery over the Internet of Things
TRUST:Team for Research in Ubiquitous Secure Technologies
TRUST:Team for Research in Ubiquitous Secure Technologies
TRUST:Team for Research in Ubiquitous Secure Technologies
Presentation for information days Units involved:
Engineering Autonomy Mr. Robert Gold Director, Engineering Enterprise
Smart Learning concepts to enhance SMART Universities in Africa
Matteo Merialdo RHEA Group Innovative aspects in cyber range solutions.
Presentation transcript:

Dec 14 th, 2005Telecom Italia Strategy Meeting TRUST :Team for Research in Ubiquitous Secure Technologies Strategic and Implementation Plan overview Shankar Sastry (Berkeley), Anna Gatti (myQube), Giuliano Tavaroli (Telecom Italia, Pirelli)

December 14th 2005 Telecom Italia Meeting 2 TRUST worthy Systems More than an Information Technology issue Complicated interdependencies and composition issues – Spans security, systems, and social, legal and economic sciences – Cyber security for computer networks – Critical infrastructure protection – Economic policy, privacy TRUST : “holistic” interdisciplinary systems view of security, software technology, analysis of complex interacting systems, economic, legal, and public policy issues Goals: – Composition and computer security for component technologies – Integrate and evaluate on testbeds – Address societal objectives for stakeholders in real systems

December 14th 2005 Telecom Italia Meeting 3 Coordinated Research Agenda TRUST center will develop and demonstrate science and technology in real-life testbeds. TRUST has long term research objectives but immediate delivery of royalty free tools and testbeds available today. NSF seed funding of $ 19 M (39 M) over 5 (10) years Expected additional support from US Air Force NSF/US State Department would like to make partnerships with key international partners Coordinated research: eleven challenge areas across three key topics: – Security Science – Systems Science – Social Science

December 14th 2005 Telecom Italia Meeting 4 Security Science (1) Network Security – Focused on making the Internet more secure – Challenges Denial of service attacks Spoofed source addresses Routing security – Approaches: Structured overlay networks Better infrastructure Epidemic protocols Simulation and Emulation on DETER testbed (key area for collaboration with Telecom Italia)

December 14th 2005 Telecom Italia Meeting 5 Security Science (2) Trusted Platforms – Composition – Security and Vulnerability – Minimal Software and Hardware Configurations Software Security – Static Code Verification – Dynamic Analysis – Multi-lingual Security – Software Design

December 14th 2005 Telecom Italia Meeting 6 DETER: Cyber Defense Test and Evaluation Research Network Created by National Science Foundation and Department of Homeland Security for testing of network (DDOS, BGP, DNS) attacks and worm defenses in a vendor and user neutral framework

December 14th 2005 Telecom Italia Meeting 7 DETER Testbed Goals Established by Department of Homeland Security and NSF to facilitate scientific experimentation – Establish baseline for validation of new approaches – Made available to industry such as BT, Bell South – Provide a safe platform for experimental approaches that involve breaking network infrastructure – “Real systems, Real code, Real attacks!” Provide access for wide community of users – Create researcher- and vendor-neutral environment (Juniper, Cisco, HP, Foundry, IBM, Sun) – Potential to simulate effects of network attack for Telecom Italia

December 14th 2005 Telecom Italia Meeting 8 Long Term Objectives Create reusable library of test technology for conducting realistic, rigorous, reproducible, impartial tests – For assessing attack impact and defense effectiveness – Test data, test configurations, analysis software, and experiment automation tools Provide usage examples and methodological guidance – Recommendations for selecting (or developing) tests and interpreting results – Test cases and results, possibly including benchmarks Facilitate testing of prototypes during development and commercial products during evaluation

December 14th 2005 Telecom Italia Meeting 9 System Science (1) Complex Interdependency Modeling and Analysis – The nation’s critical infrastructure is intertwined and interdependent. Will begin Power systems, Financial Systems, and SCADA (Supervisory Control and Data Acquisition) networks – Four-fold approach to reducing vulnerability of interdependent systems to disruptive failure Modeling Strategies Analysis Techniques Design Technologies Operational Tools

December 14th 2005 Telecom Italia Meeting 10 System Science (2) Secure Network Embedded Systems – Present unique security concerns Conventional end-to-end approaches break down New code must be propagated throughout the network – Focus areas: Automated design, verification, and validation Secure, composable, and adaptive software – Emphasis on sensor networking technology as high-impact application Berkeley motes, Tiny OS used by hundreds of groups Motes being used by Pirelli for tire monitoring

December 14th 2005 Telecom Italia Meeting 11 The Sensor Network Challenge applications service network system architecture data mgmt Monitoring & Managing Spaces and Things technology MEMS sensing Power Comm. uRobots actuate Miniature, low-power connections to the physical world Proc Store

December 14th 2005 Telecom Italia Meeting 12 Building Comfort, Smart Alarms Great Duck Island Elder Care Fire Response Factories Wind Response Of Golden Gate Bridge Vineyards Redwoods Soil monitoring Instrumenting the world

December 14th 2005 Telecom Italia Meeting 13 NEST Final Experiment: Demo

December 14th 2005 Telecom Italia Meeting 14 Social Science Security vs. Privacy Digital Forensics and Privacy – Privacy cuts across the trust/security issues that are the focus of TRUST – Common interfaces are needed for specifying privacy requirements Allows privacy properties to transfer as information crosses compositional boundaries – Emphasis on strong audit, selective revelation of information, and rule-processing technologies – Research will develop framework for privacy-preserving data mining, identify theft, and privacy-aware sensor networking.

December 14th 2005 Telecom Italia Meeting 15 Sample Application: Use of IT for health in the home Embedded, intelligent sensors as event monitors: – Provide private monitoring and alerting – Can also enable telemedicine functions – Can be used as A personal system: electronic patient records belong to the user! Or integrated with a health care provider system – Smart sensors can/will be easy to install and operate – Will be modular and upgradeable: Learning and/or assimilation technologies that will customize the devices to individuals.

December 14th 2005 Telecom Italia Meeting 16 Health Care Security and Privacy Testbed EECS Network (http) Device being deployed Laptops for emulation of other sensors RS232-Bluetooth “Cable Replacers” Telos Motes Camera phone – Nokia 6670 Communicator – Nokia 9500

December 14th 2005 Telecom Italia Meeting 17 Social Science: Usability Human Computer Interfaces and Security – Security problems may arise through the mis-configuration of complex systems – Generally, humans lack many computational abilities that are conducive to securing networks and systems Research Emphases – Strengthening standard passwords – Using biometric information – Using image recognition

December 14th 2005 Telecom Italia Meeting 18 Some Concluding Remarks TRUST is an excellent point of leverage for Telecom Italia to develop cyber security and trust solutions for wired/wireless infrastructures, emerging critical infrastructures. Long term investment by US Federal Agencies. Initial points of collaboration could be in Network Defense, secure wireless networked embedded systems, trusted privacy, authentication and anti-phishing solutions TRUST software and solutions are available as royalty-free to partners TRUST offers technologists, economists, social scientists and public policy researchers and teachers. Telecom Italia can influence strategic directions and testbed development.