Download presentation
Presentation is loading. Please wait.
Published byGavin Simmons Modified over 6 years ago
1
Csilla Farkas farkas@cec.sc.edu
Cybersecurity Csilla Farkas
2
Who is Impacted by Cyber Attacks?
Source:
3
The Scary Future!
4
“A ship in port is safe, but that's not what ships are built for.”
Grace Hopper
5
What is Cyber Security? Highly Technical
People, processes, and technology Legislation and Regulation Risk management
6
Understanding Cyber Security Risk
Cyber Security Threats Mobile Malware Virtual currencies Stealth attacks by state actors Social attack New PC and server attacks Cloud-based attacks Source: McAfee Labs 2014 Treats Predictions dreamsmademe.wordpress.com
7
Optimal level of security
Risk Assessment Business Policy Decision Communication between technical and administrative employees Internal vs. external resources Legal and regulatory requirements Developing security capabilities Cost Security level 0 % 100% Optimal level of security at a minimum cost Security Investment Cost of Breaches
8
Law and Computer Security
International, national, state, and city laws: affect privacy and secrecy Laws: regulate the use, development, and ownership of data and programs Laws: affect actions that can be taken to protect the secrecy, integrity, and availability of computing resources
9
Lack of Legislation Reactive procedures Not addressed improper acts
Lack of technical expertise of legal personnel
10
Question 1. If you see someone shoplifting a bicycle what would you do? Report it Create diversion to ensure s/he is not detected Ask if you can borrow it sometime Turn away
11
Question 2. If you see someone making a copy of a computer game what would you do? Report it Create diversion to ensure s/he is not detected Ask if you can borrow it sometime Turn away
12
Copyright: http://sdtimes. com/top-20-countries-software-piracy/ Nov
Copyright: Nov. 2014
13
Ethics vs. Law Law Ethics Formal, written document
Unwritten principles Interpreted by courts Interpreted by each individual Established by legislatures Presented by philosophers, religious, professional groups Applicable to everyone Personal choice Priority decided by court Priority determined by individual Court makes final decision No external decision maker Enforceable by police and courts Limited enforcement
14
National Center of Academic Excellence in
Information Assurance Education National Training Standards: CNSS 4011, 4013, 4014
15
CIAE Mission OUTREACH EDUCATION RESEARCH
16
Peer-reviewed publications
CIAE Mission OUTREACH EDUCATION RESEARCH External funding Peer-reviewed publications Ph.D. graduates
17
Graduate IA Certificate
CIAE Mission OUTREACH EDUCATION IA courses IA specialization Applied Computing Graduate IA Certificate RESEARCH
18
CIAE Mission OUTREACH Collaborations Academia Government Industry
EDUCATION RESEARCH
19
Center for Information Assurance Engineering http://www. cse. sc
Center for Information Assurance Engineering Online activities:
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.