Presentation is loading. Please wait.

Presentation is loading. Please wait.

IT Applications with Emerging Techniques: Security Solutions

Similar presentations


Presentation on theme: "IT Applications with Emerging Techniques: Security Solutions"— Presentation transcript:

1 IT Applications with Emerging Techniques: Security Solutions
Xin-Wen Wu Indiana University of Pennsylvania Department of Mathematical and Computer Sciences

2 Agenda IT Applications & Opportunities
Data Storage in Clouds – Security Wireless Sensor Networks – Security Cyber Security Programs at IUP Institute of Cyber Security of IUP

3 IT Applications & Opportunities
You may have already applied IT in your business: well developed information system, IT facilities, etc. You plan to expand your business? Process an increased amount of data? Save costs from hiring additional IT staff? Concerned about upgrading your system?

4 Save Your Data in Clouds
Cloud Services: Excellent for data storage ! A lot of benefits: Usability & accessibility Disaster recovery Cost saving Easy sharing Scalability

5 IT Applications & Opportunities
SOHO Networks (Small Office/Home Office Networks)

6 Beyond Traditional IT Applications
Smart home/smart building, IoT, wireless sensor networks, etc.

7 Security Challenges Facing security threats against: Confidentiality
Integrity Availability

8 Confidentiality for Data in Clouds
Before being sent to the cloud, data may be encrypted using secure encryption algorithms (ciphers) AES (advanced encryption standard) Many other available ciphers You may choose the best one for your business You may have a huge amount of data Data are at different levels of sensitivity Your may have data for different users Users are in different roles With different access rights Need many keys for data encryption !

9 Confidentiality for Data in Clouds
Before being sent to the cloud, data may be encrypted using secure encryption algorithms (ciphers) AES (advanced encryption standard) Many other available ciphers You may choose the best one for your business Question: How do you manage the keys? Need to store them properly, Maintain the secrecy of keys Require an efficient and secure key management scheme !

10 Confidentiality for Data in Clouds
Question: How do you manage the keys? Need to store them properly, Maintain the secrecy of keys Require an efficient and secure key management scheme !

11 Wireless Attacks Rogue AP / Evil twin Many other attacks:
Behind a firewall (set up by an insider) / mimic an authorized AP Many other attacks: Replay attack RF jamming

12 IoT Security Devices and sensors may be deployed in outdoor or even hostile environments – no physical protection ! While we enjoy the IoT applications, cyber-physical systems, wireless sensor networks, how do we ensure the security? The devices may not afford the existing security procedures – not enough capabilities !

13 IoT Security Devices and sensors may be deployed in outdoor or even hostile environments – no physical protection ! Require efficient (lightweight) security mechanisms ! The devices may not afford the existing security procedures – not enough capabilities !

14 IoT Security Also, security may be enhanced by running:
anomaly detection for IoT applications

15 Security: Educational Solutions
However, technical mechanisms alone do not completely solve the security issues Educational Programs help

16 Cyber security programs of IUP
IUP has been providing cyber security education for almost two decades We are designated by the DHS/NSA as National Center of Academic Excellence in Cyber Defense Education

17 Cyber security programs of IUP
Department of Mathematical & Computer Sciences Computer Science, B.A. Computer Science, B.S., with tracks in Software Engineering Cyber Security Language and Systems Currently offers two Master’s degrees, and is developing a new program: M.S. in Computer Science with emphasis in Cyber Security

18 About the Department Department Chair: Dr. Francisco Alarcón
The second largest department, with 36 tenured and tenure-track faculty Fall 2019, the department has 339 students enrolled in the various programs Also provides courses for more than 2,500 students enrolled in other programs each semester

19 Institute for Cyber Security
The Institute ICS Director: Dr. Waleed Farag Has been very successful over the past years: DOD Cyber Scholarship Program ( IUP GenCyber summer programs funded by the National Science Foundation (NSF) & the National Security Agency (NSA), ( Expansion of CAE-C Education Program (

20 Cybersecurity Education Research

21


Download ppt "IT Applications with Emerging Techniques: Security Solutions"

Similar presentations


Ads by Google