ACM Columbia University 25 February 2009 What's a CS to do?

Slides:



Advertisements
Similar presentations
Distributed Data Processing
Advertisements

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
The New Face of Enterprise Collaboration Trends, Observations, and Lessons Learned.
1 Storage Today Victor Hatridge – CIO Nashville Electric Service (615)
A Demo of and Preventing XSS in.NET Applications.
Transforming the very fabric of the Internet into a high-performance video game machine Digital Media: The Butterfly Grid Presented by: Hao Wang.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
15 Chapter 15 Web Database Development Database Systems: Design, Implementation, and Management, Fifth Edition, Rob and Coronel.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin Copyright © 2008 The McGraw-Hill Companies, Inc.
CS 290C: Formal Models for Web Software Lecture 1: Introduction Instructor: Tevfik Bultan.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Web-Enabling the Warehouse Chapter 16. Benefits of Web-Enabling a Data Warehouse Better-informed decision making Lower costs of deployment and management.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Adriana Iordan Web Marketing Manager / Avangate Social Networking Media How the software authors should use it?
© 2012 TeraMedica, Inc. Big Data: Challenges and Opportunities for Healthcare Joe Paxton Healthcare and Life Sciences Sales Leader.
C5- IT Infrastructure and Emerging Technologies
WebGIS. Web & GIS ….WebGIS Access without purchasing proprietary software Data directly from producer Emerging new market.
Internet GIS. A vast network connecting computers throughout the world Computers on the Internet are physically connected Computers on the Internet use.
COMMUNICATING TO STUDENTS Using Social Media and Digital Marketing.
Navigating the Maze How to sell to the public sector Adrian Farley Chief Deputy CIO State of California
 Cloud computing is one of the more recent technologies that many businesses, individuals and other industry organizations believe to by one of the keys.
Secure Software Development Mini Zeng University of Alabama in Huntsville 1.
Treasury in the Cloud Bob Stark – Vice President, Strategy September 17, 2014.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Helping Organizations Accelerate Their Global Business Initiatives SDL and TRADOS: Keith Laska Vice President, SDL Desktop Technology Association.
The generation, storage, and movement of information are central to managing an enterprise’s business processes As a result, businesses must ensure.
Copyright © cs-tutorial.com. Introduction to Web Development In 1990 and 1991,Tim Berners-Lee created the World Wide Web at the European Laboratory for.
Security Management prepared by Dean Hipwell, CISSP
HirePlug Keynote A sneak peek at Social Hiring Technology.
What’s Your Digital Marketing Strategy?. What is Digital Marketing? Computers Tablets Phones Social networks Traditional (Radio, TV) Ease of use.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS (Cont’d) Instructor Ms. Arwa Binsaleh.
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
1 Solving the records management problem A cloud-computing approach to archiving Amanda Kleha Product Marketing, Google May 20, 2008.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Configuring Electronic Health Records Privacy and Security in the US Lecture f This material (Comp11_Unit7f) was developed by Oregon Health & Science University,
Digital Media Marketing Campaign Rick E. Norris – An Accountancy Corporation – Case Study.
10/8/20151 Mobile Apps and QAD Stephen McHugh Broom Street Software 03-17,2013.
Use of Electronic and Internet advertising options Standard 3.4.
Join the Conversation: Active Listening on Social Media By Lauren Cleland New Media Specialist, Explore Georgia #TeamGaSocial.
1 Introduction to Middleware. 2 Outline What is middleware? Purpose and origin Why use it? What Middleware does? Technical details Middleware services.
C 3 : A Formula For Success Coverage, Customization & Collaboration Pete Peterson SVP, U.S. Sales, Tech Data.
1 Welcome to CSC 301 Web Programming Charles Frank.
1 Chapter 12 Enterprise Computing. Objectives Overview Discuss the special information requirements of an enterprise-sized corporation Identify information.
Database Administration
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Introduction to Superfast West Yorkshire Business Support 1 st May 2014 Richard Brook Business Adviser.
Lecture 18 Page 1 CS 111 Online OS Use of Access Control Operating systems often use both ACLs and capabilities – Sometimes for the same resource E.g.,
14 1 Chapter 14 Web Database Development Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Chapter 1 The Software Security Problem. Goals of this course Become aware of common pitfalls. Static Analysis and tools.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
PRESENTATION TITLE Presented by: Xxxx Xxxxx. Providence Health & Services Very large Catholic healthcare system 33 hospitals in AK, CA, MT, OR, WA 65,000.
SAM for SQL Workloads Presenter Name.
MGT305 - Application Management in Private and Public Clouds Sean Christensen Senior Product Marketing Manager Microsoft Corporation MGT305.
SANS Top 25 Most Dangerous Programming Errors Catagory 1: Insecure Interaction Between Components These weaknesses are related to insecure ways.
BIG DATA. The information and the ability to store, analyze, and predict based on that information that is delivering a competitive advantage.
SECURE DEVELOPMENT. SEI CERT TOP 10 SECURE CODING PRACTICES Validate input Use strict compiler settings and resolve warnings Architect and design for.
«My future profession»
Chapter 6: Securing the Cloud
Cloud computing-The Future Technologies
Federated IdM Across Heterogeneous Clouding Environment
Objectives Overview Explain why computer literacy is vital to success in today's world Describe the five components of a computer Discuss the advantages.
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Cloud Consulting Services and Solutions
marketing in a web 2.0 world
Journey to the Cloud – Guidance and Lessons Learned
Salesforce.com Salesforce.com is the world leader in on-demand customer relationship management (CRM) services Manages sales, marketing, customer service,
Presentation transcript:

ACM Columbia University 25 February 2009 What's a CS to do?

Computer humor How many software developers does it take to screw in a light bulb?

Let’s talk money…NACE 2009 Computer science grads saw their average salary offer fall 1.4% from $56,920 to $56,128. For those employers who expect to offer signing bonuses to computer science grads, the average bonus will be about 25% lower than 2008’s average bonus.

The economy It’s going to have an impact for at least three years... …but the Stimulus Plan may actually help with jobs. Smart infrastructure Smart energy Smart healthcare

Separating yourself It’s not the degree nor the school – it’s your brand What programming issues do professionals face? What areas will be hot for CS majors? Staying in front – listening to those on the street & prospecting for positions instead of applying to them

Your brand and being found You must have a social media strategy Blogging Videos Podcasts Photos Facebook, LinkedIn, Twitter It’s all about building relationships

Top 25 programming errors Insecure Interaction Between Components Risky Resource Management Porous Defenses Source: SANS Institute - SANS (SysAdmin, Audit, Network, Security) Institute Source: MITRE Corp - cwe.mitre.org/top25/cwe.mitre.org/top25/

The impact of the top 25 errors Software buyers will be buy much safer software. Programmers will have tools that consistently measure the security of the software they are writing. Colleges will teach secure coding more confidently. Employers will ensure they have programmers who can write more secure code.

Insecure interaction b/n components Improper Input Validation Improper Encoding or Escaping of Output Failure to Preserve SQL Query Structure (SQL Injection) Failure to Preserve Web Page Structure (Cross-site Scripting) Failure to Preserve OS Command Structure (OS Command Injection) Cleartext Transmission of Sensitive Information Cross-Site Request Forgery (CSRF) Race Condition Error Message Information Leak

Risky resource management Failure to Constrain Operations within the Bounds of a Memory Buffer External Control of Critical State Data External Control of File Name or Path Untrusted Search Path Failure to Control Generation of Code (Code Injection) Download of Code Without Integrity Check Improper Resource Shutdown or Release Improper Initialization Incorrect Calculation

Porous defenses Improper Access Control (Authorization) Use of a Broken or Risky Cryptographic Algorithm Hard-Coded Password Insecure Permission Assignment for Critical Resource Use of Insufficiently Random Values Execution with Unnecessary Privileges Client-Side Enforcement of Server-Side Security

What will be hot in 2009+? Virtualization This includes server virtualization as well as storage and client devices. Greater efficiencies and elimination of duplicate copies of data on real storage devices.server virtualizationstorage Cloud computing The built-in elasticity and scalability of cloud computing will help smaller companies grow quickly while also reducing barriers to entry. Cloud computing

What will be hot in 2009+? Servers - beyond blades Evolving servers will simplify the provisioning of capacity so organizations will be able to track an individual resource type - such as memory or processing power - and replace as needed, rather than having to pay for all resources every time an upgrade is needed.blades Web-oriented architectures Web-centric technologies and standards will continue to affect enterprise computing models leading to greater use of service-oriented environments. service-oriented environments

What will be hot in 2009+? Enterprise mash-ups Mash-ups are being added to enterprise systems to help deliver and manage applications.mash-ups Specialized systems Heterogeneous server systems are big in high performance computing from previously dedicated appliances.

What will be hot in 2009+? Social software and social networking Leading organizations add a social dimension to a conventional website or application.social networking Unified communications Massive consolidation in the communications industry as applications shift to off-the-shelf server and operating systems. This means formerly distinct markets and vendors will converge requiring organizations to take account of communications functions being replaced or converged.

What will be hot in 2009+? Business intelligence BI continues to boost and transform business performance, particularly in a difficult business environment like the current global credit crunch. Business intelligence Green IT Companies should think about shifting to more efficient products and processes as environmental scrutiny increases, and cut energy use. Green regulation is “hot” and this especially has the potential to seriously limit how businesses build data centers so organizations will require alternative plans for capacity growth. Green IT

Really hot Financial services especially refactoring of legacy systems Games Mobile: Smaller and smaller

Sites

Me Steve Levy The Tuttle Agency 295 Madison Avenue, 8 th Floor New York My blog Connect to me on LinkedIn Follow me on Twitter