“The attacks on supercomputers at [sites deleted] and other locations were closer to a skillful assault, but they were not actually successful. The attackers,

Slides:



Advertisements
Similar presentations
Welcome 26 September st PRAGMA Institute. Conceptual Framework for Building and Sustaining Community (e) Science Previously Unobtainable Observations.
Advertisements

Supporting Research on Campus - Using Cyberinfrastructure (CI) Public research use of ICT has rapidly increased in the past decade, requiring high performance.
Cybersecurity Summit 2004: Conclusions and Recommendations Tom Bettge and Ginger Caldwell Scientific Computing Division National Center for Atmospheric.
Background Chronopolis Goals Data Grid supporting a Long-term Preservation Service Data Migration Data Migration to next generation technologies Trust.
Booth Computing Services Agenda Who’s in CS? What We Do… Resources Labs and Study Rooms Portal Accounts Responsibilities What Do I Do First? How.
U.S. Department of Energy Office of Science Advanced Scientific Computing Research Program How to write a good HBCU Proposal George Seweryniak DOE Program.
First Lego League of Tennessee Quentoria Leeks Fisk University Research Alliance in Math and Science Computer Applications and Web Technologies Networking.
SAN DIEGO SUPERCOMPUTER CENTER Security and Grids Victor Hazlewood, CISSP Information Security Officer
Thursday, October 20 4:00-8:00pm University of Colorado (room to be announced). Please register for this free workshop now at
Aug. 20, JPL, SoCalBSI '091 The power of bioinformatics tools in cancer research Early Detection Research Network, JPL Mentors: Dr. Chris Mattmann,
1 NERSC User Group Business Meeting, June 3, 2002 High Performance Computing Research Juan Meza Department Head High Performance Computing Research.
1 Welcome & Overview 2 nd Annual Workshop “What are National Security Threats?” Kathleen D. Morrison Co-Director, JTAC Professor of Anthropology Director,
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
DIDS part II The Return of dIDS 2/12 CIS GrIDS Graph based intrusion detection system for large networks. Analyzes network activity on networks.
Knowledge Environments for Science and Engineering: Current Technical Developments James French, Information and Intelligent Systems Division, Computer.
Knowledge Environments for Science and Engineering: Overview of Past, Present and Future Michael Pazzani, Information and Intelligent Systems Division,
Forward Together: UW Madison’s Framework for Diversity and Inclusive Excellence Ad Hoc Diversity Planning Committee Shared Governance (Faculty, staff,
Rising Voices in Action Julie Maldonado and Heather Lazrus, co-organizers.
Update on the NASA/NOAA/DOE Collaboration on the Utilization of ROA/UAV/UAS for Global Climate Change and Weather Research Will Bolton Sandia National.
CyberSecurity Summit 2005 Teragrid Incident Response Overview December 13th, 2005 James Marsteller CISSP Information Security Officer Pittsburgh Supercomputing.
Colorado Families as Faculty Project Families as Faculty: Improving Home-School Communication Beth Schaffner.
TACC’s Scientific Computing Curriculum Texas Advanced Computing Center.
John Vetrano Materials Sciences and Engineering Division Office of Basic Energy Sciences Welcome.
Protecting Personal Information at Fermilab. What You Will Learn F Why must we protect personal information? F What are the laboratory policies governing.
A New Collaborative to Improve Broader Impacts Kevin Niemi, U. Wisconsin-Madison Kemi Jona, Northwestern U. Jane Horwitz, U. Penn
R∙I∙T NTID Center on Access Technology Videoconference Communication Support Bill Clymer Christine Monikowski Benjamin Rubin February 27, A presentation.
National Computational Science Alliance Expanding Participation in Computing and Communications -- the NSF Partnerships for Advanced Computational Infrastructure.
National Science Foundation DMR ITR Computational Review and Workshop: ITR and beyond Daryl Hess, NSF Bruce Taggart, NSF June 17-19, 2004 Urbana, IL.
CERT AM: Securing NREN in Armenia. Armenian NREN ASNET AM – Connecting more than 40 academic institutes of NAS RA and more than 10 other research, educational.
Federated Environments and Incident Response: The Worst of Both Worlds? A TeraGrid Perspective Jim Basney Senior Research Scientist National Center for.
Research Experiences for Undergraduates in Renewable Energy Charles A. Stone, IV, Colorado School of Mines, DMR Intellectual Merit: An interdisciplinary.
NCAR Undergraduate Leadership Workshop. What is NCAR?  National Center for Atmospheric Research  Located in Boulder Colorado  Managed by University.
ORAU Center for Science Education 100 ORAU Way, Oak Ridge, TN
3 rd Annual WRF Users Workshop Promote closer ties between research and operations Develop an advanced mesoscale forecast and assimilation system   Design.
Digital Ohio Meeting June 5, 2003 Ohio Internet Users Group and Ohio Server Project Customers.
Welcome! 2 nd User Forum 2005 Computational and Information Systems Laboratory (CISL) User Forum May 2005.
GRID Overview Internet2 Member Meeting Spring 2003 Sandra Redman Information Technology and Systems Center and Information Technology Research Center National.
NEES Cyberinfrastructure Center at the San Diego Supercomputer Center, UCSD George E. Brown, Jr. Network for Earthquake Engineering Simulation Analyzing.
NEES Cyberinfrastructure Center at the San Diego Supercomputer Center, UCSD George E. Brown, Jr. Network for Earthquake Engineering Simulation Enabling.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Leveraging the InCommon Federation to access the NSF TeraGrid Jim Basney Senior Research Scientist National Center for Supercomputing Applications University.
1 Spallation Neutron Source Data Analysis Jessica Travierso Research Alliance in Math and Science Program Austin Peay State University Mentor: Vickie E.
1 NSF/TeraGrid Science Advisory Board Meeting July 19-20, San Diego, CA Brief TeraGrid Overview and Expectations of Science Advisory Board John Towns TeraGrid.
CENDI Update to the Board of Research Data and Information Bonnie C. Carroll Executive Director CENDI Secretariat.
Introducing the Open Science Grid Project supported by the Department of Energy Office of Science SciDAC-2 program from the High Energy Physics, Nuclear.
Managed by UT-Battelle for the Department of Energy DOE & Data Bruce Wilson Oak Ridge National Laboratory.
NSF Middleware Initiative Purpose To design, develop, deploy and support a set of reusable, expandable set of middleware functions and services that benefit.
NITRD Networking and Information Technology Research and Development Program 19 March 2009.
October 2007 Cyberinfrastructure: Changing the Face of Science and Engineering Session Chairs Prof. Ann Gates, University of Texas El Paso Dr. Chaitan.
XLR8 STEM Academy. Lynchburg Regional Governor’s XLR8 STEM Academy opened for classes on August 15 th, 2013 The STEM Academy is a public-private partnership.
Information Quality Cluster - Introduction H. K. (Rama) Ramapriyan Science Systems and Applications, Inc. & NASA Goddard Space Flight Center David Moroni.
A Tour of the VCU Computer Center Presentation by John Owens Photography by Zoltan Forray.
Welcome! C omputing in Atmospheric Sciences CAS2K3 Created by: Lynda Lester, NCAR/SCD/Digital Information Group.
The Global Organization for Earth System Science Portals Don Middleton National Center for Atmospheric Research; Boulder, Colorado, USA Scientific Computing.
Lidar Radar Open Software Environment LROSE Mike Dixon Earth Observing Laboratory (EOL) National Center for Atmospheric Research (NCAR) Boulder, Colorado.
Expedition Workshop Strategic Leadership For Networking and Information Technology Education September 16, 2008 Chris Greer Director, NCO.
National Archives Center for Advanced Systems and Technologies (NCAST) The National Archives and Records Administration Welcome! Now What? Mark Conrad.
Board on Enterprise Strategic Topics (BEST)* 2013 Annual Report and looking ahead into 2014 Chris Strager and Andrea Bleistein * Formally known as the.
Seasonal-to-Decadal Predictions of Arctic Sea Ice: Challenges and Strategies Sponsors: NASA, ONR, Intelligence Community Report available: October 30,
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
INTRODUCTION Sam Wachira
CybersecuritySummit 2007 for NSF Large Research Facilities
NASA’s Universe of Learning Astrophysics
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Penetration Testing Computer Science and Software Engineering
Sequential Phase II Awards at the Department of Energy
D iscover what’s working in Michigan schools
Roger Pielke, Sr, Director
Federated Environments and Incident Response: The Worst of Both Worlds
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Presentation transcript:

“The attacks on supercomputers at [sites deleted] and other locations were closer to a skillful assault, but they were not actually successful. The attackers, instead of treading lightly, just kept abusing more accounts and taking over more systems, making it only a matter of time before their intrusions were discovered. The attackers were certainly persistent, returning even after being discovered. I am hopeful that one or more of the defenders will discuss their experiences with these intrusions in the Security edition of ;login:.” -Rik Farlow, USENIX ;login:, August 2004

Welcome !

Who Am I ? Tom Bettge Associate Director Scientific Computing Division National Center for Atmospheric Research Boulder, Colorado Background: Applications Software Engineer – Climate Modeling my mother’s maiden name is Hacker

“………………………….The attackers were certainly persistent, returning even after being discovered. I am hopeful that one or more of the defenders will discuss their experiences with these intrusions in the Security edition of ;login:.” -Rik Farlow, USENIX ;login:, August 2004

Program Committee Tom BettgeNational Center for Atmospheric Research RuthAnne BevierCalifornia Institute of Technology Ginger CaldwellNational Center for Atmospheric Research Walter DykasOak Ridge National Laboratory Victor HazlewoodSan Diego Supercomputer Center Chris HempelTexas Advanced Computer Center Jim MarstellerPittsburgh Supercomputer Center Marla MeehlNational Center for Atmospheric Research George StrawnNational Science Foundation Howard WalterNational Energy Research Scientific Computing Center John TownsNational Center for Supercomputing Applications

Who Are You ? Registered Participants:128 By Organizational/Agency: –University/NSF 79 –DOE 25 –Military 8 –NASA 8 –NOAA 3 –Other 5 By Duty/Position: –system/security administration50 –management40 –end user10

Breakout Sessions 1.User Policies/Education 2.System Administration Policies/Education 3.Network Based Intrusion Detection 4.Host Based Intrusion Detection 5.Grid Computing Challenges

Tom NCAR/Scientific Computing Division Bettge Cybersecurity Summit Breakout Session Assignment

Monday Evening: Meeting Rooms Dewey I / II Charleston I / II Farragut wireless will be available Contact Staff

Thanks to NCAR Staff Susan Cross Lynda Lester Janie Young

Cybersecurity Summit ? Concept of Summit – Spring 2004 Share information, discuss impact upon users, systems, etc. Best Practices Procedures for future incidents (communication, etc.) To include peer agencies Endorsed/Sponsored by National Science Foundation Expanded to broad community Expanded to include peer agencies Invitation Only !