Larry Howard Sr. Research Scientist Eric Imsand 1, Larry Howard 2, Ken Pence 2, Mike Byers 3, Dipankar Dasgupta.

Slides:



Advertisements
Similar presentations
Alex Crowell, Rutgers University Computer Science and Mathematics Advisor: Prof. Danfeng Yao, Computer Science Department.
Advertisements

Voice over the Internet Protocol (VoIP) Technologies… How to Select a Videoconferencing System for Your Agency Based on the Work of Watzlaf, V.M., Fahima,
Safe City Mississauga – Crime Prevention Conference September 11 th, 2010 Len Paris Manager Campus Police Services 1.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
Breaking Trust On The Internet
DHS, National Cyber Security Division Overview
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Bringing Governments, Industry and Academia Closer Together to Assure Global Cyber Security Terry L. Janssen, PhD Science and Technology Advisor Network.
1 P. A. Sadowski IT Manager North Carolina State Highway Patrol Security Liaison North Carolina Department of Crime Control and Public Safety A Public.
EFQUEL 2008 Forum, June 2008, Lisbon 1 Learning2.0 Kirsti Ala-Mutka, Christine Redecker & Yves Punie European Commission, JRC Institute for Prospective.
1 July 08, 2010 Information Security Officer Meeting.
(Geneva, Switzerland, September 2014)
INTERNET SAFETY FOR EVERYONE
Trend Micro Deployment Kelvin Hwang IT Services University of Windsor.
Norman SecureSurf Protect your users when surfing the Internet.
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
Oklahoma Chapter Information Systems Security Association Oklahoma Chapter, Tulsa Oklahoma City Chapter, OKC Student Chapter, Okmulgee Oklahoma Chapter,
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Atomic Learning, Inc. Embrace technology. Empower yourself.
Presentation by Kathleen Stoeckle All Your iFRAMEs Point to Us 17th USENIX Security Symposium (Security'08), San Jose, CA, 2008 Google Technical Report.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Credit unions use social media in a variety of ways, including marketing, providing incentives, facilitating applications for new accounts, inviting feedback.
October 27, 2005 Contra Costa Operational Area Homeland Security Strategic and Tactical Planning and Hazardous Materials Response Assessment Project Overview.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Fostering worldwide interoperabilityGeneva, July 2009 How to counter web-based attacks on the Internet in Korea Heung Youl YOUM Chairman of Korea.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
INFORMATION SECURITY GOVERNANCE READINESS IN GOVERNMENT INSTITUTION
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
The MSR-UR Curriculum Repository Tom Healy Lead Program Manager Microsoft Research University Relations.
Just Say Know, Internet Safety for Educators CPD Linda Sweeting: Prince George’s County Public Schools Technology.
CSCE 201 Secure Software Development Best Practices.
Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang and Nagendra Modadugu – Google First Workshop on Hot Topics in Understanding Botnets (HotBots.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
TÜBİTAK – BİLGEM – SGE Cyber Security Institute Asım Gençer Gökce TÜBİTAK BİLGEM Cyber Security Institute (SGE) Role: Cyber.
IS3220 Information Technology Infrastructure Security
A Quick and Easy Crash Course Internet Safety for Everyone.
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
Which is better Avast Free Edition or Avast Pro Version?
Information Security Officer Meeting
INTERNET SAFETY FOR EVERYONE
Integrated Public Alert and Warning System
Team 2 – understand vulnerabilities
Secure Software Confidentiality Integrity Data Security Authentication
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Internet Safety for Everyone
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
The University of Adelaide, School of Computer Science
Prepared By : Binay Tiwari
Cybersecurity compliance for attorneys
Internet Safety for Everyone
Cybersecurity Threat Assessment
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Larry Howard Sr. Research Scientist Eric Imsand 1, Larry Howard 2, Ken Pence 2, Mike Byers 3, Dipankar Dasgupta 1 Center for Information Assurance University of Memphis Institute for Software Integrated Systems Vanderbilt University SPARTA, Inc. Huntsville, AL 123

“…remotely exploitable vulnerabilities have been increasing since the year 2000 and reached 89.4% of vulnerabilities reported in 2007.”  Source: “IBM Internet Security Systems X-Force 2007 Trend Statistics” “In 2007, Google uncovered more than three million malicious Web addresses (URLs) that initiate drive-by downloads.”  Source: N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu, “The Ghost In The Browser – Analysis of Web-based Malware” TRUST Autumn Conference 2008

Source: Stefan Frei, Thomas Duebendorfer, Gunter Ollmann, Martin May, ‘Understanding the Web browser threat: Examination of vulnerable online Web browser populations and the “insecurity iceberg”’

“Long game” – More trustworthy technologies – Fail-safe deployment models “Short game” – Increase awareness of threats among users – Make training on responses more readily available and valuable TRUST Autumn Conference 2008

Fire Safety Training In the event of fire, move quickly to the nearest exit, avoiding elevators. Fire Safety Training In the event of fire, move quickly to the nearest exit, avoiding elevators. In the event of fire, you should a)Put out the fire b)Find the nearest elevator c)Move quickly to the nearest exit d)None of the above In the event of fire, you should a)Put out the fire b)Find the nearest elevator c)Move quickly to the nearest exit d)None of the above Next Hmm. a? Hmm. a?

TRUST Autumn Conference 2008 Thanks for using the Online Training System This morning you have completed the following training: Sexual Harassment Fire Safety Neurosurgery Thanks for using the Online Training System This morning you have completed the following training: Sexual Harassment Fire Safety Neurosurgery Glad that’s over. What’s for lunch? Glad that’s over. What’s for lunch? Despite the potential to reach large numbers of users, most online training is currently perceived as a bad joke.

FEMA sponsored free online training – for IT professionals, risk managers, and general users University of Memphis Center for Information Assurance (CfIA) – with Vanderbilt University (ISIS) and SPARTA, Inc. TRUST Autumn Conference

TRUST Autumn Conference 2008 Level/TrackTechnical (Track 1) General (Track 2) Business Continuity (Track 3) Beginner/IntroductoryInformation Security Basics (TEI: AWR-173-W) Information Security for Everyone (TEI: AWR-175-W) Business Information Continuity (TEI: AWR-176-W) IntermediateSecure Software and Network Assurance (In development) Cyber Ethics (TEI: AWR-174-W) Information Risk Management (Pending approval) AdvancedDigital Forensics (Q1-2009) Cyber Law and White Collar Crime (Q3-2009) Cyber Incident Analysis and Response (Q1-2009)

TRUST Autumn Conference 2008 ACT Online courses consist of modules anchored on authentic problem-solving situations with a common macro-structure.

TRUST Autumn Conference 2008 ACT Online learning resources can be freely explored by trainees to address the overarching challenge.

TRUST Autumn Conference 2008 Like the web, assisted search features of ACT Online help trainees use learning resources and self-assessments.

TRUST Autumn Conference 2008 ACT Online self-assessments enable trainees to confirm their understanding of resources with progressive feedback. Clarify the questionCriticize the responseProvide resource(s)

TRUST Autumn Conference 2008 ACT Online gives trainees credit for what they already know through pre-qualification, adapting the training in response.

Attackers increasingly target vulnerabilities widely distributed among user population Lack of awareness and response by computer users is a serious near-term problem Online training holds potential to reach large populations, but currently viewed as ineffective ACT Online is using modern instructional techniques and features to change perception Visit us today at TRUST Autumn Conference 2008

ACT Online is supported by Cooperative Agreement Number 2006-GT-T6-K009 administered by the Federal Emergency Management Agency, National Preparedness Directorate, National Integration Center, Training and Exercise Integration. Points of view and opinions in this presentation are those of the author(s) and do not necessarily represent the position or policies of the United States Government. TRUST Autumn Conference 2008