Need for New Approaches to Security PowerPoint

Download Report

Transcript Need for New Approaches to Security PowerPoint

International Cyber Center
Need for New Approaches to Security
-Interdisciplinary
- International
Arun Sood
Professor (Computer Science)
Co-Director, International Cyber Center
George Mason University
Fairfax, VA 20124
[email protected]
ICC
 Faculty research
 CERT capacity building in Africa
 Intrusion tolerance
 Insider threat
 Smart grid security
 Building community of interest
 Workshops on Cyber Security and Global Affairs


Oxford (09), Zurich (10), Budapest (May 31 – June 2, Budapest)
Breakfast sessions at Mason
Cloud Security and Compliance
 International Cyber Security

What is a CERT
 Computer Emergency Response Team.
 Computer Emergency Readiness Team.
 IDS/IPS – Alerts and Warnings.



Signatures.
Anomaly.
Behavioral.
 Incident handling.



Forensic evidence collection.
Tracking or tracing.
Incident response.
 Situational awareness.

Information sharing.
 Remediation.
 Vulnerability handling.


Vulnerability analysis .
Vulnerability response.
International Scope of Cybercrime Top 10
Perpetrators)
Top Ten Countries (Cyber Crime Perpetrators)
 1. United States 66.1%
 2. United Kingdom 10.5%
 3. Nigeria 7.5%
 4. Canada 3.1%
 5. China 1.6%
 6. South Africa 0.7%
 7. Ghana 0.6%
 8. Spain 0.6%
 9. Italy 0.5%
 10. Romania 0.5%
Why Should we Care?
 Cybercrime has international scope
 Cyber security has an economic impact
 Credit vs debit cards
 Carrier payment constraints
 National reputation
 Our solutions are not working
 Constraints in Africa are similar to those in small
town America and Europe
Potential for Technology Leapfrogging
 Cyber security solutions combine
 Process
 People
 Technology
 Cloud computing
 Centralized
vs Distributed
 Efficient use of skilled manpower
 Policy Implementation
 Cloud security??
Evolution of Architectures
Individual
Servers
Data
Centers
Virtualization
(1 app /
server)
Utilization
10 to 20 %
10 to
20 %
15 to 25%
Security
Highest
High
Virtualizatio
n
(N apps /
server)
Cloud
40 to 45 %
60 + %
Lowest