Cybersecurity Challenges and Opportunities Anita Nikolich Program Director, Advanced Cyberinfrastructure October 2015.

Slides:



Advertisements
Similar presentations
21 st Century Science and Education for Global Economic Competition William Y.B. Chang Director, NSF Beijing Office NATIONAL SCIENCE FOUNDATION.
Advertisements

W ashington A rea T rustworthy C omputing H our
Update on OCIs Cybersecurity Activities for CASC September 2011 Kevin Thompson.
Software Sustainability Institute “Doing Science Properly in the Digital Age” UK e-Infrastructure Academic User Community Forum 12 September.
Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
Joint CASC/CCI Workshop Report Strategic and Tactical Recommendations EDUCAUSE Campus Cyberinfrastructure Working Group Coalition for Academic Scientific.
Security BoF: What Are The Community's Open Questions? Joe St Sauver, Ph.D. or Manager, Internet2 Nationwide Security.
ASCR Data Science Centers Infrastructure Demonstration S. Canon, N. Desai, M. Ernst, K. Kleese-Van Dam, G. Shipman, B. Tierney.
GENI: Global Environment for Networking Innovations Larry Landweber Senior Advisor NSF:CISE Joint Techs Madison, WI July 17, 2006.
Bill Newhouse Two Government Cybersecurity Initiatives NIST.
Funding Opportunities at NSF Jane Silverthorne International Arabidopsis Consortium Workshop January 15, 2011.
EInfrastructures (Internet and Grids) US Resource Centers Perspective: implementation and execution challenges Alan Blatecky Executive Director SDSC.
1 Cyberinfrastructure Framework for 21st Century Science & Engineering (CIF21) NSF-wide Cyberinfrastructure Vision People, Sustainability, Innovation,
1 Cyberinfrastructure Framework for 21st Century Science & Engineering (CF21) IRNC Kick-Off Workshop July 13,
Secure and Trustworthy Cyberspace (SaTC) Program Sam Weber Program Director March 2012.
29th WATCH: Cybersecurity for the Internet of Everything (IoE) Bret Hartman Cisco Systems, Inc. Thursday June 18, Noon, Room 110 W ashington A rea T rustworthy.
EInfrastructures (Internet and Grids) - 15 April 2004 Sharing ICT Resources – “Think Globally, Act Locally” A point-of-view from the United States Mary.
1 MAIS & ITSS FY09 Priorities Joint UL Meeting October 27, 2008.
Thomas Hacker Barb Fossum Matthew Lawrence Open Science Grid May 19, 2011.
Von Welch (PI) Susan Sons (HUBzero Engagement Lead) Hubbub September 2014 trustedci.org Cybersecurity for Cyberinfrastructure… and Science!
Computing in Atmospheric Sciences Workshop: 2003 Challenges of Cyberinfrastructure Alan Blatecky Executive Director San Diego Supercomputer Center.
A First Course in Information Security
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Secure and Trustworthy Cyberspace (SaTC) Program Presentation to NSF/DIMACS Workshop for Aspiring PIs in SaTC SaTC Program Directors National Science Foundation.
David C. Croson, Ph.D. Office of the Assistant Director Directorate for Social, Behavioral, and Economic Sciences National Science Foundation
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
INTERNET2 COLLABORATIVE INNOVATION PROGRAM DEVELOPMENT Florence D. Hudson Senior Vice President and Chief Innovation.
SIMCorBSIMCorB 1 Outreach Projects n SIMCorB Web site (8.3.1) n Strategic partnerships with other organizations (8.3.2) n Promote awareness of scientific.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
National Cyber Security Awareness Month October 20, 2011 Cyber Security – Our Shared Responsibility.
Sharing Research Data Globally Alan Blatecky National Science Foundation Board on Research Data and Information.
Salsa Bits: A few things that the analysts aren't talking about... December 2006.
Presentation of projects’ ideas. 1. Madrid Network “A public-private network which aim is to contibute actively to position Madrid Region in the top.
Campus Cyberinfrastructure – Network Infrastructure and Engineering (CC-NIE) Kevin Thompson NSF Office of CyberInfrastructure April 25, 2012.
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
Sponsored by the National Science Foundation GENI Goals & Milestones GENI CC-NIE Workshop NSF Mark Berman January 7,
Innovation: The Key to the Future of Security  Douglas Maughan, Division Director, DHS S&T  Moderator: Illena Armstrong.
National Center for Supercomputing Applications Barbara S. Minsker, Ph.D. Associate Professor National Center for Supercomputing Applications and Department.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
HPC Centres and Strategies for Advancing Computational Science in Academic Institutions Organisers: Dan Katz – University of Chicago Gabrielle Allen –
Slide 1 Science meets cybersecurity Trustworthy Computational Science Von Welch Director, CACR Indiana University 2015 Campus Cyberinfrastructure PI Workshop.
Materials Innovation Platforms (MIP): A New NSF Mid-scale Instrumentation and User Program to Accelerate The Discovery of New Materials MRSEC Director’s.
CSCE 548 Secure Software Development Security Operations.
Cyberinfrastructure: An investment worth making Joe Breen University of Utah Center for High Performance Computing.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
Award # funded by the National Science Foundation Award #ACI Jetstream: A Distributed Cloud Infrastructure for.
NSF Cybersecurity Funding Opportunities Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure September 2015.
1 NSF/TeraGrid Science Advisory Board Meeting July 19-20, San Diego, CA Brief TeraGrid Overview and Expectations of Science Advisory Board John Towns TeraGrid.
Promoting Research and Education of IA & CyberSecurity Gordon W. Romney Ph.D Professor and Senior Research Scientist School of Engineering and Technology.
Context: The Strategic Plan for Establishing the Network Integrated Biocollections Alliance Judith E. Skog, Office of the Assistant Director, Biological.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
NSF Middleware Initiative Purpose To design, develop, deploy and support a set of reusable, expandable set of middleware functions and services that benefit.
Data Infrastructure Building Blocks (DIBBS) NSF Solicitation Webinar -- March 3, 2016 Amy Walton, Program Director Advanced Cyberinfrastructure.
Who am I? Mikhail I. Gofman Assistant Professor of Computer Science at CSUF since Fall Education: Ph.D. in Computer Science at State University of.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Bill Fisher Security Engineer National.
Campus Cyberinfrastructure (CC*) Program NSF Larry Gallery Manager, Membership Development and K-20 Program Manager June 16,
Horizon 2020 Secure Societies European Info Day and Brokerage Event
Department of Computer and Information Sciences
Legacy and future of the World Data System (WDS) certification of data services and networks Dr Mustapha Mokrane, Executive Director, WDS International.
Center of Excellence in Cyber Security
ASSET - Automotive Software cyber SEcuriTy
Internet2 Update CSG at Yale University May 2017
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
I have many checklists: how do I get started with cyber security?
Clemson University: Jill Gemmill
Csilla Farkas Cybersecurity Csilla Farkas
Smart Learning concepts to enhance SMART Universities in Africa
Brian Matthews STFC EOSCpilot Brian Matthews STFC
Sachiko A. Kuwabara, PhD, MA
Presentation transcript:

Cybersecurity Challenges and Opportunities Anita Nikolich Program Director, Advanced Cyberinfrastructure October 2015

2 Why Worry about Security in the Scientific Environment?  Integrity of data and results  Embarrassment, damage to reputation  High value assets – understand and manage risk  Scientific Collaborations based on trust  Being used to harm others would be damaging to one’s reputation  Rutgers – 4 attacks in 5 months. Cost 2 Bitcoin, or ~$500! Knocked out Wi-Fi, course registration, . Goal to annoy.

3 Facilities Security (FacSec)  Group of NSF Program Directors with responsibility for large projects or facilities (ie, LSST, OOI, Polar)  Quarterly meetings to exchange best practices, share information  Facilitated by ACI

4 Secure and Trustworthy Cyberspace (SaTC)  Cross Directorate Program  Aims to support fundamental scientific advances and technologies to protect cyber-systems from malicious behavior, while preserving privacy and promoting usability.  Develop the foundations for engineering systems inherently resistant to malicious cyber disruption  Cybersecurity is a multi-dimensional problem, involving both the strength of security technologies and variability of human behavior.  Encourage and incentivize socially responsible and safe behavior by individuals and organizations  Focus on Privacy: Dear Colleague Letter for new collaborations between Computer and Social Scientists, including a focus on privacy.

5 SaTC FY15 Funding Areas Access control Anti-malware Anticensorship Applied cryptography Authentication Cellphone network security Citizen science Cloud security Cognitive psychology Competitions Cryptographic theory Cyber physical systems Cybereconomics Cyberwar Digital currencies Education Forensics Formal methods Governance Hardware security Healthcare security Insider threat Intrusion detection Mobile security Network security Operating systems Personalization Privacy Provenance Security usability Situational awareness Smart Grid Social networks Sociology of security Software security Vehicle security Verifiable computation Voting systems security Web security

6 SaTC: Transition to Practice (TTP)  Supports later stage activities in the research and development lifecycle such as prototyping and experimental deployment  ACI Funded  Looking for early adopters  Review Criteria:  Impact on deployed environment  Value in terms of needed capability and potential impact across the NSF community  Feasibility, utility, and interoperability in operation  Project plan including goals, milestones, demonstration and evaluation  Tangible metrics to evaluate effectiveness of capabilities developed

7 Center for Trustworthy Scientific Cyberinfrastructure (CTSC) PI: Von Welch, Indiana University  Mission: Establish a coherent cybersecurity ecosystem for NSF computational science and engineering, while allowing projects to focus on their science endeavors.  Trustedci.org - webinars, project documents, best practices, online free training, etc  Hosts annual Large Facilities Cybersecurity Summit, 120+ attendees

8 CTSC Community Engagements Building or reviewing a cybersecurity plan Software assessment Design review Advanced challenges (federated IdM, delegation, etc.) Topics as needed by the community.  No cost outside of time and effort.  Can be answering a question, a phone call to advise, a day-long review, or week-to-month of collaboration.  Examples: trustedci.org

9 CTSC: Security Training For PI’s or Technical Staff Secure coding Identity Management/InCommon Developing a cybersecurity plan Present at existing conferences (XSEDE, SC, NSF Cybersecurity Summit, etc.) or can come to you  TrustedCI Forum for users: Questions, discussions regarding NSF cybersecurity * Did I mention it’s at no cost to you? Contact

10 Cybersecurity Innovation for Cyberinfrastructure (CICI) NSF Activities that impact the security of science, engineering and education environments Target community is operational cyberinfrastructure  FY15 $11M/13 awards. FY15 Areas:  Cybersecurity Center of Excellence ($5M award, still pending)  Secure Data Provenance ($500K awards)  Secure Architecture Design ($500K awards) 

11  FY16 Areas TBD  Focus on security of scientific workflow and operational cyberinfrastructure  What are your greatest privacy, security, identity management challenges? Cybersecurity Innovation for Cyberinfrastructure (CICI)

12 Examples of ACI Funded Security Projects  Bro IDS - ubiquitous at large sites and campuses  ShellOS Malware Detection – UNC-Chapel Hill deploys in production. More accurate and useful than off the shelf appliances.  CICI: Mini Science DMZ for Scientific Instruments (IU)  CICI: Provenance-Based Trust Management for Collaborative Data Curation (UPenn)  CICI: CapNet: Secure Scientific Workloads with Capability Enabled Networks (Utah)

13 Security within ACI programs  Data/DIBBs – Focus on privacy and integrity of data sets  Software/SI2 – Focus on trustworthy software. Vulnerability assessments throughout process  HPC – Focus on integrity of results and secure interoperability of computing resources  LWD – Integration of training and education through CICI

14 How Can NSF Help? Tell me your biggest security challenge – lack of tools? Lack of people? Lack of time to think about security? Not wanting to impede the scientific workflow? Talk to me today or me: