Need for New Approaches to Security PowerPoint
Download
Report
Transcript Need for New Approaches to Security PowerPoint
International Cyber Center
Need for New Approaches to Security
-Interdisciplinary
- International
Arun Sood
Professor (Computer Science)
Co-Director, International Cyber Center
George Mason University
Fairfax, VA 20124
[email protected]
ICC
Faculty research
CERT capacity building in Africa
Intrusion tolerance
Insider threat
Smart grid security
Building community of interest
Workshops on Cyber Security and Global Affairs
Oxford (09), Zurich (10), Budapest (May 31 – June 2, Budapest)
Breakfast sessions at Mason
Cloud Security and Compliance
International Cyber Security
What is a CERT
Computer Emergency Response Team.
Computer Emergency Readiness Team.
IDS/IPS – Alerts and Warnings.
Signatures.
Anomaly.
Behavioral.
Incident handling.
Forensic evidence collection.
Tracking or tracing.
Incident response.
Situational awareness.
Information sharing.
Remediation.
Vulnerability handling.
Vulnerability analysis .
Vulnerability response.
International Scope of Cybercrime Top 10
Perpetrators)
Top Ten Countries (Cyber Crime Perpetrators)
1. United States 66.1%
2. United Kingdom 10.5%
3. Nigeria 7.5%
4. Canada 3.1%
5. China 1.6%
6. South Africa 0.7%
7. Ghana 0.6%
8. Spain 0.6%
9. Italy 0.5%
10. Romania 0.5%
Why Should we Care?
Cybercrime has international scope
Cyber security has an economic impact
Credit vs debit cards
Carrier payment constraints
National reputation
Our solutions are not working
Constraints in Africa are similar to those in small
town America and Europe
Potential for Technology Leapfrogging
Cyber security solutions combine
Process
People
Technology
Cloud computing
Centralized
vs Distributed
Efficient use of skilled manpower
Policy Implementation
Cloud security??
Evolution of Architectures
Individual
Servers
Data
Centers
Virtualization
(1 app /
server)
Utilization
10 to 20 %
10 to
20 %
15 to 25%
Security
Highest
High
Virtualizatio
n
(N apps /
server)
Cloud
40 to 45 %
60 + %
Lowest