How I learnt to trust the GRID Brian Collins Visiting Professor IAM, University of Southampton Vice President, IEE Ex Global CIO Clifford Chance Ex Director.

Slides:



Advertisements
Similar presentations
The Next Generation Grid Kostas Tserpes, NTUA Beijing, 22 of June 2005.
Advertisements

Options appraisal, the business case & procurement
ARCH-01: Introduction to the OpenEdge™ Reference Architecture Don Sorcinelli Applied Technology Group.
“High Performing Financial Institutions and the Keys to Success in an Uncertain Environment”
Virtualizing Enterprises: Challenges Harrick M. Vin Vice President and Chief Scientist Tata Research Development and Design Centre, Tata Consultancy Services.
W w w. f a c t i v a. c o m © 2002 Dow Jones Reuters Business Interactive LLC (trading as Factiva). All rights reserved. The Keys to Successful Strategic.
1 Emerging IT Technology: Potential Regulation of Service Oriented Architectures D. Coleman PHD student, School of Public Policy George Mason University.
Managing the Information Technology Resource Jerry N. Luftman
What is an Information System? Input of DataResourcesProcessing Data Data Control of System Performance Storage of Data Resources Output of InformationProducts.
Security Governance Technology Executive Club
Session 3 – Information Security Policies
MASTER - FP From High-level Regulations to Compliance Management Policies Beatriz Gallego – Nicasio Crespo PoFI 2011 June 9, Pisa, Italy.
Key Action II - Objectives Support the development and adoption of novel IST solutions for eCommerce & eWork aimed at enhancing: Support the development.
Karolina Muszyńska Based on
Compliance System Validation - An Audit Based Approach December 2012 Uday Gulvadi, CPA, CIA, CISA, CAMS Director - Internal Audit, Risk and Compliance.
IT-Business Alignment – Challenges, Strategic/Operating Planning
CNRI Handle System and its Applications
SecureAware Building an Information Security Management System.
SEC835 Database and Web application security Information Security Architecture.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
1. 2 Learning Objectives To understand: the elements or stages of the strategic management process the different perspectives on strategy development.
Data/Analysis Challenges in the Electronic Business Environment Dr. Howard Frank Dean Robert H. Smith School of Business University of Maryland College.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Frankfurt (Germany), 6-9 June 2011 IT COMPLIANCE IN SMART GRIDS Martin Schaefer – Sweden – Session 6 – 0210.
Computer Science and Engineering 1 Cloud ComputingSecurity.
Roles and Responsibilities
Presented By Tay Un Soo Senior VP, Bank of Commerce President of ISACA - Malaysia Chapter 1999 National Accountants Conference THRIVING IN THE DIGITAL.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Brian Matthews, DeFINE, Pisa 26/11/02 Trust and the Semantic Web Brian Matthews, Business & Information Technology Dept, CLRC
©Dr. Respickius Casmir IT Security & Cybercrime IT & Communication Summit 2010 March 8, 2010 By Respickius Casmir, PhD. University of Dar es Salaam Computing.
Slide 1 of 24 Week 1: Lecture Structure Title: Managing IT –Business importance of IT –Role of CIO –Review the IS Pyramid –Top Business IT Issues –Discuss.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
SOA in Transformational Government Using SOA to change thinking Steve Jones Head of SOA Global Outsourcing, Capgemini.
Internet Banking Key Issues Internet Banking Working Group May 14, 1998.
Understanding to InterGrid and WAG Dr. ZhenChun Huang Tsinghua Univ. NRSCC/RSGS/SIG Team Sep, 2006.
CLARIN work packages. Conference Place yyyy-mm-dd
Challenges Facing Business Leaders in the New Millennium Zia Qureshi, Chief Executive & Chairman Business Catalyst International Zia Qureshi, Chief Executive.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
Lecture Overview IT System Failures.
Microsoft Belgium Security Summit Georges Ataya S olvay B usiness S chool, ISACA Belux Detlef Eckert Microsoft EMEA.
Enterprise Cybersecurity Strategy
SecSDLC Chapter 2.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
Technology-enhanced Learning: EU research and its role in current and future ICT based learning environments Pat Manson Head of Unit Technology Enhanced.
Castlebridge associates | | Castlebridge changing how people think about information How to Implement the.
E-FINANCE CHAPTER 6 RISK AND CHALLENGES Risk and Challenges, V.C joshi (2004), E-finance Log into the future, 2nd Edition, Thousand Oakes, London, E-finance:
1 Dr. Spyros Papastergiou, University of Piraeus (Greece)–Dept. of Informatics M. Zaharias Singular Logic (Greece) CYSM Risk Assessment Methodology.
Business, Operations and Supply Chain Strategy (MS 911) Global logistics and risk management.
Non-Confidential Copyright © 2006 CyberRAVE LLC. All Rights Reserved. CyberRAVE January 24, 2006 Strategic Approach to Developing Corporate Data Insurance.
Name - Date Technology-enhanced Learning: tomorrow’s school and beyond Pat Manson Head of Unit Technology Enhanced Learning Directorate General.
Telephone : +234 (0) | Website : Registered company : Telephone : +234.
Open Governance Platform
Rob Gleasure robgleasure.com
EI Architecture Overview/Current Assessment/Technical Architecture
Information Systems Strategy and business alignment
Digital preservation challenges and actions at European level
Online platforms Brussels, September 2016.
Building A Community of Trust to Transform Medicines Development
Data/Analysis Challenges in the Electronic Business Environment
Data/Analysis Challenges in the Electronic Business Environment
12th IEEE PES PowerTech Conference
IS Risk Management Framework Overview
Computer Science and Engineering
GRC - A Strategic Approach
Data Governance & Management Skills and Experience
European Commission's Initiative on Electronic Transport Documents
Presentation transcript:

How I learnt to trust the GRID Brian Collins Visiting Professor IAM, University of Southampton Vice President, IEE Ex Global CIO Clifford Chance Ex Director of Technology and Chief Scientist, GCHQ

IT and Commerce - parameters Global businesses Driven by competition Agility and adaptability are key issues Trusted self, market and customer knowledge and processes are key differentiators Time is money Cultural differences can be strengths and weaknesses

Challenges for the GRID Latency and Responsiveness Business process alignment Supply side governance Globalisation of solutions Trustworthiness of services

Latency and Responsiveness Commerce works on interlinked business processes that are time driven – time is money so.. Predictability of performance is very important Short response times in some scenarios are vital Changes in these parameters with workload must be small to negligible – a potential advantage of the GRID Failure modes need to be well explored

Supply-side governance Who owns the GRID? What are the ‘global standards’ for it and the services derived from it? If I use it who do I form a relationship with, who takes liability via a contract, and do I have a choice of supplier? What are the International issues in using it (legal, technical, process, language etc)? What body reviews and regulates its national effectiveness in commercial terms – OFGRID?

Globalisation of solutions Large commercial problems are almost certainly global – legal and linguistic issues arise Global resilience implies global service provision and possibly ownership and we have yet to do that with telcos! But the Internet… and ICANN and DNS? One of the key technical factors is the product: data source - processor speed – bandwidth- size of random access memory This is difficult to predictably maximise on campus – globally? Success could be the key to attacking real global problems of environment and poverty

Trustworthiness of services Trust comes from large number of factors - see this years Reith lectures by Baroness O’Neill Factors such as: Security Credentials Contracts Regulation and Audit Experience Brand value Offsetting natural scepticism to outsourcing the crown jewels to a shared service will be essential for the GRID to succeed.

Security Policy Framework User identification and authentication User registration and authorisation Access control Access management Non-repudiation Evidence of receipt Trusted commitment Integrity Privacy and Confidentiality Service availability Information availability Audit and Accounting Service protection  Each applied to…………

Enterprise Architecture – a framework WhatHowWhereWhoWhenWhy DATAFUNCTIONNETWORKPEOPLETIMEMOTIVATION SCOPE (context) Business critical ‘things Business processesLocation of business ops Important organisations Important events/cycles Business goals and strategies BUSINESS MODEL (conceptual) Semantic model Relationship model Business process model Business logistics systems Workflow model Master schedule and reaction Business plan SYSTEM MODEL (logical) Logical data model Application architecture Distributed system architecture Human Interface architecture Processing structure Business rules TECHNOLOGY MODEL (physical) Physical data model System designTechnology architecture Presentation Architecture Control structure Rule design DETAILED REPRESENTATIONS Out-of-context Data definitionsProgrammesNetwork architecture Security architecture Timing definitions Rule specifications FUNCTIONING ENTERPRISEContentProcessReachTrustGrowthSuccess The Zachman FrameworkIn the context of…

In the context of…. Requirements definition Systems analysis Application development Testing and Integration Rollout Operations Disaster Recovery

GRID Specific security issues Complex, dynamic heterogeneous user base Lack of control of heritage of applications Separation of services and duties Data and information integrity from shared distributed platforms Complexity of “Insider” threat Service metadata security e.g directories, data replication processes, DR and incident management plans…. How do third parties demonstrate ‘sufficient’ trustworthiness

Conclusions GRID could have huge impact on big commercial problems – but big commercial problems are not even identified because of the absence of or lack of understanding of and trust in GRID – so more Outreach is needed. Commercial service and security parameters must be systemic in architecture, conceptual design and implementation of GRID and GRID services or it will fail in the commercial world Global co-ordination (GGF and FP6 to begin with?) is essential. More commercial involvement now will make more probable any commercial exploitation in the future and hence make it affordable for e-science