Presentation is loading. Please wait.

Presentation is loading. Please wait.

Csilla Farkas farkas@cec.sc.edu Cybersecurity Csilla Farkas farkas@cec.sc.edu.

Similar presentations


Presentation on theme: "Csilla Farkas farkas@cec.sc.edu Cybersecurity Csilla Farkas farkas@cec.sc.edu."— Presentation transcript:

1 Csilla Farkas farkas@cec.sc.edu
Cybersecurity Csilla Farkas

2 Who is Impacted by Cyber Attacks?
Source:

3 The Scary Future!

4 “A ship in port is safe, but that's not what ships are built for.”
Grace Hopper

5 What is Cyber Security? Highly Technical
People, processes, and technology Legislation and Regulation Risk management

6 Understanding Cyber Security Risk
Cyber Security Threats Mobile Malware Virtual currencies Stealth attacks by state actors Social attack New PC and server attacks Cloud-based attacks Source: McAfee Labs 2014 Treats Predictions dreamsmademe.wordpress.com 

7 Optimal level of security
Risk Assessment Business Policy Decision Communication between technical and administrative employees Internal vs. external resources Legal and regulatory requirements Developing security capabilities Cost Security level 0 % 100% Optimal level of security at a minimum cost Security Investment Cost of Breaches

8 Law and Computer Security
International, national, state, and city laws: affect privacy and secrecy Laws: regulate the use, development, and ownership of data and programs Laws: affect actions that can be taken to protect the secrecy, integrity, and availability of computing resources

9 Lack of Legislation Reactive procedures Not addressed improper acts
Lack of technical expertise of legal personnel

10 Question 1. If you see someone shoplifting a bicycle what would you do? Report it Create diversion to ensure s/he is not detected Ask if you can borrow it sometime Turn away

11 Question 2. If you see someone making a copy of a computer game what would you do? Report it Create diversion to ensure s/he is not detected Ask if you can borrow it sometime Turn away

12 Copyright: http://sdtimes. com/top-20-countries-software-piracy/ Nov
Copyright: Nov. 2014

13 Ethics vs. Law Law Ethics Formal, written document
Unwritten principles Interpreted by courts Interpreted by each individual Established by legislatures Presented by philosophers, religious, professional groups Applicable to everyone Personal choice Priority decided by court Priority determined by individual Court makes final decision No external decision maker Enforceable by police and courts Limited enforcement

14 National Center of Academic Excellence in
Information Assurance Education National Training Standards: CNSS 4011, 4013, 4014

15 CIAE Mission OUTREACH EDUCATION RESEARCH

16 Peer-reviewed publications
CIAE Mission OUTREACH EDUCATION RESEARCH External funding Peer-reviewed publications Ph.D. graduates

17 Graduate IA Certificate
CIAE Mission OUTREACH EDUCATION IA courses IA specialization Applied Computing Graduate IA Certificate RESEARCH

18 CIAE Mission OUTREACH Collaborations Academia Government Industry
EDUCATION RESEARCH

19 Center for Information Assurance Engineering http://www. cse. sc
Center for Information Assurance Engineering Online activities:


Download ppt "Csilla Farkas farkas@cec.sc.edu Cybersecurity Csilla Farkas farkas@cec.sc.edu."

Similar presentations


Ads by Google