Security for eScience M. Angela Sasse & Brock Craft University College London

Slides:



Advertisements
Similar presentations
Scenarios for applying crosscutting concerns. Aspects should be visible throughout the full lifecycle of a software product. While most AOP-efforts currently.
Advertisements

ITU Regional Seminar on E-commerce Bucharest, Romania May 2002 National E-commerce Strategies for Development Dr. Susanne Teltscher United Nations.
How we work with you. Infrastructure savings Pay only for what you use Labour Costs Match job functions with skill sets Financial Technology Efficient.
E-commerce Strategies
17-1 Hybrid Windows/Web Interface Special Considerations for User Interface Design Internal Controls – Authentication and Authorization User ID.
2006 © SWITCH Authentication and Authorization Infrastructures in e-Science (and the role of NRENs) Christoph Witzig SWITCH e-IRG, Helsinki, Oct 4, 2006.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
15 1 Chapter 15 Database Administration Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Factors to be taken into account when designing ICT Security Policies
 Graphic Design Institute Overview. Managing the Curriculum  Industry Driven  Implementing Project-Based Strategies  Meeting CTE, State, & Industry.
Application Security Management Functional Project Manager (s) ERP Project Director ERP Campus Executive University & Campus Administration Security Policy.
Module 1 – MIS Careers & Intro to Systems Architecture MIS5122: Enterprise Architecture for IT Auditors.
CMM Level 3 KPA’s CS4320 Fall Organizational Process Focus (Goals) Software process development and improvement activities are coordinated across.
Chapter 13 Program Evaluation and Technology Integration Strategies.
Test Organization and Management
The rSmart Group Kuali Days Successful Financial System Implementation Indianapolis April 11,
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
The Valencian Government Certification Authority – ‘Autoritat de Certificació de la Comunitat Valenciana’ (ACCV) - is a clear case of success in Digital.
TeraGrid Science Gateways: Scaling TeraGrid Access Aaron Shelmire¹, Jim Basney², Jim Marsteller¹, Von Welch²,
How to evaluate ICT use for small organisations Session 2.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Building Capability.  In order to successfully operate an architecture function within an enterprise, it is necessary to put in place appropriate organization.
1 European Lifelong Guidance Policy Network National Guidance Forum of the Czech Republic Open Session Career Guidance Council in Lithuania Aleksandra.
Managing End-User Development of Digital Library Resources to Support User Communities Robert R. Downs Center for International Earth Science Information.
CONTENT SYSTEM ADOPTION INSTITUTIONAL CONSIDERATIONS Charleen Khane – Sr. Assoc. Dean of Distance Learning & Media Services Eva Smith – CIS Faculty Kevin.
The Costs and Benefits of Using a Tiered, Web-based Course Evaluation Tool Katharine Mason Robin Zuniga.
E-Science Projects and Security M. Angela Sasse & Mike Surridge.
1 The World Bank Internet Services Program Rajan Bhardvaj
E-Michigan Web Development 1. 2 What Is It? A web based collaboration tool that is internal to state government and accessible only from within the state.
ERPANET works to enhance the preservation of cultural and scientific digital objects through raising awareness, providing access to experience,
Bystander Intervention Pilot Project MAV Preventing Violence Against Women Network Meeting 12 th of December, 2012.
PROGRAM DEVELOPMENT Advisory Leader’s Role Judy M. Groff Advisory System and Program Development Leader NCCE.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Access Control and Markup Languages Pages 183 – 187 in the CISSP 1.
Working with HIT Systems
Mary Theofanos Visualization & Usability Group Information Access Division Information Technology Laboratory PIV Pilot Usability Lessons Learned.
Introduction to Information Security
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
ACHIEVEMENTS Spring 2013 Employee Development Mark Zocher.
Chapter 19 Manager of Information Systems. Defining Informatics Process of using cognitive skills and computers to manage information.
SEC835 Security in Databases and Web applications Presentation.
Bringing Europe’s eLectronic Infrastructures to Expanding frontiers EU-India Grid Kick-off meeting, ICTP, October 2006 EU-India Grid Kick-off meeting.
Current Quality Assurance Practices in Web Archiving Brenda Reyes Ayala, Mark Phillips, and Lauren Ko University of North Texas
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Security Training and Awareness Brad Reed, IT Security Analyst OIT – Information Security Office Securing the University – ITSS 2015.
©Dr. Respickius Casmir Network Security Best Practices – Session 2 By Dr. Respickius Casmir.
By Ms Manar A BIG WELCOME from Al Siraat College staff.
Security Solutions Rachana Ananthakrishnan University of Chicago.
E-Science Security Roadmap Grid Security Task Force From original presentation by Howard Chivers, University of York Brief content:  Seek feedback on.
Staff Leadership at Northwestern Kellogg School of Management 2012.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
Exeter Cascade project Baseline report and beyond.
Ministry of Finance of the Republic of Azerbaijan State Treasury Agency Public Finance Management Information System.
Smartxt Universal Learning Project Presented by Stacey Kayden Stacey has been a High Tech Learning Specialist at Laney College in Oakland California since.
Houston Community College System Graduates and Completers.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
David Finch National Star College Navigating the e-Safety minefield Navigating the e-Safety minefield David Finch National Star College.
Access Control. Assignment Review  Current  Next 6/23/2016 Access Control 2.
Learning Management System (LMS) /Course Management System (CMS) & Digital Portfolio.
Test Roles and Independence of Testing
Instructor LISA Galina PhD. in Economics
مراجعه النظم Information Systems Audit
IT & Security Training Skills.
Authentication & the Web
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Access Control and Site Security
Presentation transcript:

Security for eScience M. Angela Sasse & Brock Craft University College London

2 They call it anaudit … But not of you and your project, but of security policies and tools How well do they meet the need of the eScience community? What’s wrong with tools, and how we can improve them. Knowledge, skills and support you need.

3 Aim of the survey Identify current and future security needs of e-Science users Encounters with eScience security needs so far – how was it for you? Input into –future security strategy –Selection and improvement of tools –Knowledge and skills training

4 Focus on users eScientists eScience software developers System administrators and other support roles

5 Security tool audit Authentication –Knowledge-based authentication –Digital certificates Authorization –Writing polies for eScience –Implementing policies Firewalls Globus security

6 Auditing What do users need to know? How much effort is technology for different stakeholders? How well does security fit into your typical eScience day?

7 Problems with passwords?

8

9 How to talk to us Security discussion session – today (Dean Room) Make an appointment any time to discuss your specific project needs us after the meeting, tell your colleagues