SlideShare une entreprise Scribd logo
1  sur  21
Secure Information Sharing Models
for CommunityCyber Security Ravi Sandra
Agenda
1. Overview
2. SIS Major Challenges
3. CommunityCyber Security
4. The Current Status…
5. Requirements
6. Life-Cycle of a Cyber Incident
7. Privacy Consent State of Mind
8. National Strategy Could Nudge SIS Forward
9. Goals
1. Overview
• “Share but protect”
• Saltzer-Schroeder1 identified the desirability and difficulty of maintaining:
• “some control over the user of the information even after it has been released”
2. SIS Major Challenges
• Policy Challenge
• Modeling, specifying and enforcing SIS policies
• Need intuitive yet formal models, guaranteed security properties, etc.
• Containment Challenge
• Ensure that protected information is accessible to users as permitted by the policy
• Security mechanisms such as authentication, cryptography, trusted hardware, etc.
3. Community Cyber Security
• Community refers to a geographical area
• E.g. county or a city with demarcated boundary
• The Center for Infrastructure Assurance and Security at UTSA conducts nation-
wide cyber security preparedness exercises and training
• communication
• incident response
• disaster recovery
• business continuity
• security awareness, etc.
4.The Current Status…
• Exchange of business cards
• No process exists for information sharing
• Technology is not the bottleneck
• Resistance due to political/competitive reasons
• Also want to avoid embarrassment
• E.g. by sharing attack data
• Participants have no clue as to what to share and how to effectively specify what to
share
5. Requirements
• Need abstract models
• With rigorous mathematical foundations
• Should ease administration
• Classic models are limited
• DiscretionaryAccess Control
• Too low-level to configure
• Lattice-BasedAccess Control (E.g. Bell LaPadula)
• Rigid
• One directional info flow is not the primary concern
• Lot of work on Dynamic Coalitions
• Many times heavy-weight
• Mainly focus on technological/infrastructural integration
6. Life-Cycle of a Cyber Incident
Secure Sharing in a Community
Core
Group
Incident
Group
Open
Group
Conditional
Membership
Automatic
Membership
Filtered RW
Administered
Membership
Administered
Membership
7. Privacy Consent State of Mind
• The space of Privacy Consent is full of trepidation. I would like to show that
although there are complexity, there is also simplicity. The complexity
comes in fine-details.The fundamentals, and the technology, are simple
• Privacy Consent can be viewed as a "State Diagram", that is by showing
what the current state of a patients consent, we can show the changes in
state.This is the modeling tool I will use here.
Privacy Consent State of Mind
• I will focus on how Privacy Consent relates to the access to Health
Information, that is shared through some form of Health Information
Exchange (HIE).
• The architecture of this HIE doesn't matter, it could be PUSH or PULL or
anything else. The concepts I show can apply anywhere, but for simplicity
think only about the broad use of healthcare information
sharing across organizations.
Privacy Consent of OPT-OUT
• At the right is the diagram for an OPT-OUT
environment. One where the patient has the
choice to OPT-OUT, that is to stop the use of
their data. This means that there is a
presumption that when there is no evidence of
a choice by the patient, that the data can be
used.
Privacy Consent of OPT-IN
• At the right is the diagram for an OPT-IN
environment. In an OPT-IN environment the
patient is given the opportunity to ALLOW
sharing of their information. This means that
there is a presumption that the patient does
not want their health information shared. I
would view it more as a respect for the patient
to make the decision.
Privacy Consent:YES vs NO
• The reality of privacy consent is that there will be a
number of patients that will change their mind.
This is just human nature, and there are many
really good reasons they might change their mind.
A patient that has given OPT-IN authorization
might revoke their authorization. A patient that
has indicated they don't want their data to be
shared might decide that they now do want to
share their data.
Privacy Consent of Maybe
• There are those that have special
circumstances that really require special
handling.
• This state is an indicator, just like "YES" or
"NO", but in this case the indicator indicates
that there are patient-specific rules. These
patient-specific rules likely start with a "YES"
or a "NO" and then apply additional rules.
Privacy Consent of Maybe
• These additional rules might be to block a specific time-period, block a
specific report, block a specific person from access, allow a specific person
access, etc.
• These special rules are applied against each access.Note that the state
diagram shows transitions between all three states. It is possible that one
goes into the "MAYBE" state forever, or just a while.
8. National Strategy Could Nudge SIS
Forward
• In the early days of the Obama administration, the president declared
cyberspace a critical asset. Since then, little more than lip service has been
paid on a policy level to the security of the country’s critical infrastructure,
despite increasing public awareness of the problem and high-profile attacks
on business and government alike.
National Strategy Could Nudge SIS Forward
• In December 2013, there was more movement. The White House released
the National Strategy for Information Sharing and Safeguarding which is a
framework for government agencies to share attack data to repel terrorist
threats, cyberattacks and more.
National Strategy Could Nudge SIS Forward
• The strategy stresses that information must be treated as a national asset
and such data must be made available to support national security, it states.
It also urges agencies to work together to identify and reduce risks, rather
than not share at all. Information, the document states, must underlie all
decisions.
9. Goals
The president hopes the strategy achieves five goals:
• Drive collective action through collaboration and accountability: Using
models to build trust and simplify the processes for sharing
• Improve information discovery and access through common standards:
Doing so paves the way for less ambiguous policies. To achieve this, secure
access via authentication and authorization controls, data classification and
sharing standards is vital.
Goals
• Optimize mission effectiveness through shared services and
interoperability: Bettering the efficacy of how information is acquired and
shared is key here.
• Strengthen information safeguarding through structural reform, policy and
technical solutions: This calls for controls on data, monitoring for insider and
external attacks to better stave off threats to systems and information.
Goals
• Protect privacy, civil rights and civil liberties through consistency and
compliance: Public trust must be a key consideration here, the document
stresses. Privacy and civil protections must be built into any sharing
mechanism.

Contenu connexe

En vedette

Communicating science
Communicating scienceCommunicating science
Communicating sciencetonivanuzzo
 
Communicating science
Communicating scienceCommunicating science
Communicating sciencetonivanuzzo
 
CA/Tumores de Cabeza y Cuello
CA/Tumores de Cabeza y CuelloCA/Tumores de Cabeza y Cuello
CA/Tumores de Cabeza y CuelloLaura Palacio
 
Naser AVEC-Sep10-2012
Naser AVEC-Sep10-2012Naser AVEC-Sep10-2012
Naser AVEC-Sep10-2012njeneral
 
Celo biología básica y mejoramiento de la detección
Celo biología básica y mejoramiento de la detecciónCelo biología básica y mejoramiento de la detección
Celo biología básica y mejoramiento de la detecciónJonathan Alexander Agredo
 
What is HTML- d3brand.com
What is HTML- d3brand.comWhat is HTML- d3brand.com
What is HTML- d3brand.comDremy Riyad
 
6 word illustrated story
6 word illustrated story6 word illustrated story
6 word illustrated storycgashley
 
Conozcamos nuestra constitución verde de 1991
Conozcamos nuestra constitución verde  de 1991Conozcamos nuestra constitución verde  de 1991
Conozcamos nuestra constitución verde de 1991Daniel Macias
 
Career on Mobile Application Development
Career on Mobile Application DevelopmentCareer on Mobile Application Development
Career on Mobile Application DevelopmentDremy Riyad
 
IEEE ECC-CDC
IEEE ECC-CDCIEEE ECC-CDC
IEEE ECC-CDCnjeneral
 
Medicina Interna: Obesidad
Medicina Interna: Obesidad  Medicina Interna: Obesidad
Medicina Interna: Obesidad Laura Palacio
 
Let emerging market customers be your teachers
Let emerging market customers be your teachersLet emerging market customers be your teachers
Let emerging market customers be your teachersSiddhartha Kr
 
Presentaton of P&G Company Profile (University Presentation)
Presentaton of P&G Company Profile (University Presentation)Presentaton of P&G Company Profile (University Presentation)
Presentaton of P&G Company Profile (University Presentation)Dremy Riyad
 
Nfs version 4 protocol presentation
Nfs version 4 protocol presentationNfs version 4 protocol presentation
Nfs version 4 protocol presentationAbu Osama
 
Chi sono e a cosa servono le agenzie di rating?
Chi sono e a cosa servono le agenzie di rating? Chi sono e a cosa servono le agenzie di rating?
Chi sono e a cosa servono le agenzie di rating? tonivanuzzo
 
Chi sono e a cosa servono le agenzie di rating
Chi sono e a cosa servono le agenzie di ratingChi sono e a cosa servono le agenzie di rating
Chi sono e a cosa servono le agenzie di ratingtonivanuzzo
 
Virus del Papiloma Humano
Virus del Papiloma HumanoVirus del Papiloma Humano
Virus del Papiloma HumanoLaura Palacio
 

En vedette (19)

Yourprezi
YourpreziYourprezi
Yourprezi
 
Communicating science
Communicating scienceCommunicating science
Communicating science
 
Communicating science
Communicating scienceCommunicating science
Communicating science
 
CA/Tumores de Cabeza y Cuello
CA/Tumores de Cabeza y CuelloCA/Tumores de Cabeza y Cuello
CA/Tumores de Cabeza y Cuello
 
Naser AVEC-Sep10-2012
Naser AVEC-Sep10-2012Naser AVEC-Sep10-2012
Naser AVEC-Sep10-2012
 
Celo biología básica y mejoramiento de la detección
Celo biología básica y mejoramiento de la detecciónCelo biología básica y mejoramiento de la detección
Celo biología básica y mejoramiento de la detección
 
What is HTML- d3brand.com
What is HTML- d3brand.comWhat is HTML- d3brand.com
What is HTML- d3brand.com
 
6 word illustrated story
6 word illustrated story6 word illustrated story
6 word illustrated story
 
Conozcamos nuestra constitución verde de 1991
Conozcamos nuestra constitución verde  de 1991Conozcamos nuestra constitución verde  de 1991
Conozcamos nuestra constitución verde de 1991
 
Career on Mobile Application Development
Career on Mobile Application DevelopmentCareer on Mobile Application Development
Career on Mobile Application Development
 
IEEE ECC-CDC
IEEE ECC-CDCIEEE ECC-CDC
IEEE ECC-CDC
 
Medicina Interna: Obesidad
Medicina Interna: Obesidad  Medicina Interna: Obesidad
Medicina Interna: Obesidad
 
Let emerging market customers be your teachers
Let emerging market customers be your teachersLet emerging market customers be your teachers
Let emerging market customers be your teachers
 
Presentaton of P&G Company Profile (University Presentation)
Presentaton of P&G Company Profile (University Presentation)Presentaton of P&G Company Profile (University Presentation)
Presentaton of P&G Company Profile (University Presentation)
 
Nfs version 4 protocol presentation
Nfs version 4 protocol presentationNfs version 4 protocol presentation
Nfs version 4 protocol presentation
 
Chi sono e a cosa servono le agenzie di rating?
Chi sono e a cosa servono le agenzie di rating? Chi sono e a cosa servono le agenzie di rating?
Chi sono e a cosa servono le agenzie di rating?
 
Matriz FODA
Matriz FODAMatriz FODA
Matriz FODA
 
Chi sono e a cosa servono le agenzie di rating
Chi sono e a cosa servono le agenzie di ratingChi sono e a cosa servono le agenzie di rating
Chi sono e a cosa servono le agenzie di rating
 
Virus del Papiloma Humano
Virus del Papiloma HumanoVirus del Papiloma Humano
Virus del Papiloma Humano
 

Similaire à Secure information sharing (sis) models

Clare Sanderon, IG Solutions
Clare Sanderon, IG SolutionsClare Sanderon, IG Solutions
Clare Sanderon, IG SolutionsInvestnet
 
Data Governance in two different data archives: When is a federal data reposi...
Data Governance in two different data archives: When is a federal data reposi...Data Governance in two different data archives: When is a federal data reposi...
Data Governance in two different data archives: When is a federal data reposi...Carolyn Ten Holter
 
Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010James Williams
 
One London conversation workshop 18 July slide deck
One London conversation workshop 18 July slide deck One London conversation workshop 18 July slide deck
One London conversation workshop 18 July slide deck Katie Harrison
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible DataTom Walker
 
Global Data Privacy Regulation
Global Data Privacy RegulationGlobal Data Privacy Regulation
Global Data Privacy RegulationJatin Kochhar
 
Review of Data Security, Consent and Opt-Outs
Review of Data Security, Consent and Opt-OutsReview of Data Security, Consent and Opt-Outs
Review of Data Security, Consent and Opt-OutsMohammad Al-Ubaydli
 
12 security policies
12 security policies12 security policies
12 security policiesSaqib Raza
 
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...Soumodeep Nanee Kundu
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramFinancial Poise
 
Health Data Sharing Scene Setting
Health Data Sharing Scene Setting Health Data Sharing Scene Setting
Health Data Sharing Scene Setting ipposi
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...acemindia
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
Establishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceEstablishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceRightPatient®
 
Giles Wilmore: How will the NHS Information Strategy support the new NHS?
Giles Wilmore: How will the NHS Information Strategy support the new NHS?Giles Wilmore: How will the NHS Information Strategy support the new NHS?
Giles Wilmore: How will the NHS Information Strategy support the new NHS?The King's Fund
 

Similaire à Secure information sharing (sis) models (20)

Clare Sanderon, IG Solutions
Clare Sanderon, IG SolutionsClare Sanderon, IG Solutions
Clare Sanderon, IG Solutions
 
Data Governance in two different data archives: When is a federal data reposi...
Data Governance in two different data archives: When is a federal data reposi...Data Governance in two different data archives: When is a federal data reposi...
Data Governance in two different data archives: When is a federal data reposi...
 
Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010
 
One London conversation workshop 18 July slide deck
One London conversation workshop 18 July slide deck One London conversation workshop 18 July slide deck
One London conversation workshop 18 July slide deck
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
Global Data Privacy Regulation
Global Data Privacy RegulationGlobal Data Privacy Regulation
Global Data Privacy Regulation
 
Review of Data Security, Consent and Opt-Outs
Review of Data Security, Consent and Opt-OutsReview of Data Security, Consent and Opt-Outs
Review of Data Security, Consent and Opt-Outs
 
12 security policies
12 security policies12 security policies
12 security policies
 
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...
 
Mobileprivacyazahir
MobileprivacyazahirMobileprivacyazahir
Mobileprivacyazahir
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security Program
 
Health tech slides 12 june 2019
Health tech slides   12 june 2019Health tech slides   12 june 2019
Health tech slides 12 june 2019
 
A12_Beyond_HIPAA_PPT1
A12_Beyond_HIPAA_PPT1A12_Beyond_HIPAA_PPT1
A12_Beyond_HIPAA_PPT1
 
Health Data Sharing Scene Setting
Health Data Sharing Scene Setting Health Data Sharing Scene Setting
Health Data Sharing Scene Setting
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Establishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceEstablishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in Cyberspace
 
EHR - A Consumer Perspective
EHR - A Consumer PerspectiveEHR - A Consumer Perspective
EHR - A Consumer Perspective
 
Giles Wilmore: How will the NHS Information Strategy support the new NHS?
Giles Wilmore: How will the NHS Information Strategy support the new NHS?Giles Wilmore: How will the NHS Information Strategy support the new NHS?
Giles Wilmore: How will the NHS Information Strategy support the new NHS?
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Dernier (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Secure information sharing (sis) models

  • 1. Secure Information Sharing Models for CommunityCyber Security Ravi Sandra
  • 2. Agenda 1. Overview 2. SIS Major Challenges 3. CommunityCyber Security 4. The Current Status… 5. Requirements 6. Life-Cycle of a Cyber Incident 7. Privacy Consent State of Mind 8. National Strategy Could Nudge SIS Forward 9. Goals
  • 3. 1. Overview • “Share but protect” • Saltzer-Schroeder1 identified the desirability and difficulty of maintaining: • “some control over the user of the information even after it has been released”
  • 4. 2. SIS Major Challenges • Policy Challenge • Modeling, specifying and enforcing SIS policies • Need intuitive yet formal models, guaranteed security properties, etc. • Containment Challenge • Ensure that protected information is accessible to users as permitted by the policy • Security mechanisms such as authentication, cryptography, trusted hardware, etc.
  • 5. 3. Community Cyber Security • Community refers to a geographical area • E.g. county or a city with demarcated boundary • The Center for Infrastructure Assurance and Security at UTSA conducts nation- wide cyber security preparedness exercises and training • communication • incident response • disaster recovery • business continuity • security awareness, etc.
  • 6. 4.The Current Status… • Exchange of business cards • No process exists for information sharing • Technology is not the bottleneck • Resistance due to political/competitive reasons • Also want to avoid embarrassment • E.g. by sharing attack data • Participants have no clue as to what to share and how to effectively specify what to share
  • 7. 5. Requirements • Need abstract models • With rigorous mathematical foundations • Should ease administration • Classic models are limited • DiscretionaryAccess Control • Too low-level to configure • Lattice-BasedAccess Control (E.g. Bell LaPadula) • Rigid • One directional info flow is not the primary concern • Lot of work on Dynamic Coalitions • Many times heavy-weight • Mainly focus on technological/infrastructural integration
  • 8. 6. Life-Cycle of a Cyber Incident Secure Sharing in a Community Core Group Incident Group Open Group Conditional Membership Automatic Membership Filtered RW Administered Membership Administered Membership
  • 9. 7. Privacy Consent State of Mind • The space of Privacy Consent is full of trepidation. I would like to show that although there are complexity, there is also simplicity. The complexity comes in fine-details.The fundamentals, and the technology, are simple • Privacy Consent can be viewed as a "State Diagram", that is by showing what the current state of a patients consent, we can show the changes in state.This is the modeling tool I will use here.
  • 10. Privacy Consent State of Mind • I will focus on how Privacy Consent relates to the access to Health Information, that is shared through some form of Health Information Exchange (HIE). • The architecture of this HIE doesn't matter, it could be PUSH or PULL or anything else. The concepts I show can apply anywhere, but for simplicity think only about the broad use of healthcare information sharing across organizations.
  • 11. Privacy Consent of OPT-OUT • At the right is the diagram for an OPT-OUT environment. One where the patient has the choice to OPT-OUT, that is to stop the use of their data. This means that there is a presumption that when there is no evidence of a choice by the patient, that the data can be used.
  • 12. Privacy Consent of OPT-IN • At the right is the diagram for an OPT-IN environment. In an OPT-IN environment the patient is given the opportunity to ALLOW sharing of their information. This means that there is a presumption that the patient does not want their health information shared. I would view it more as a respect for the patient to make the decision.
  • 13. Privacy Consent:YES vs NO • The reality of privacy consent is that there will be a number of patients that will change their mind. This is just human nature, and there are many really good reasons they might change their mind. A patient that has given OPT-IN authorization might revoke their authorization. A patient that has indicated they don't want their data to be shared might decide that they now do want to share their data.
  • 14. Privacy Consent of Maybe • There are those that have special circumstances that really require special handling. • This state is an indicator, just like "YES" or "NO", but in this case the indicator indicates that there are patient-specific rules. These patient-specific rules likely start with a "YES" or a "NO" and then apply additional rules.
  • 15. Privacy Consent of Maybe • These additional rules might be to block a specific time-period, block a specific report, block a specific person from access, allow a specific person access, etc. • These special rules are applied against each access.Note that the state diagram shows transitions between all three states. It is possible that one goes into the "MAYBE" state forever, or just a while.
  • 16. 8. National Strategy Could Nudge SIS Forward • In the early days of the Obama administration, the president declared cyberspace a critical asset. Since then, little more than lip service has been paid on a policy level to the security of the country’s critical infrastructure, despite increasing public awareness of the problem and high-profile attacks on business and government alike.
  • 17. National Strategy Could Nudge SIS Forward • In December 2013, there was more movement. The White House released the National Strategy for Information Sharing and Safeguarding which is a framework for government agencies to share attack data to repel terrorist threats, cyberattacks and more.
  • 18. National Strategy Could Nudge SIS Forward • The strategy stresses that information must be treated as a national asset and such data must be made available to support national security, it states. It also urges agencies to work together to identify and reduce risks, rather than not share at all. Information, the document states, must underlie all decisions.
  • 19. 9. Goals The president hopes the strategy achieves five goals: • Drive collective action through collaboration and accountability: Using models to build trust and simplify the processes for sharing • Improve information discovery and access through common standards: Doing so paves the way for less ambiguous policies. To achieve this, secure access via authentication and authorization controls, data classification and sharing standards is vital.
  • 20. Goals • Optimize mission effectiveness through shared services and interoperability: Bettering the efficacy of how information is acquired and shared is key here. • Strengthen information safeguarding through structural reform, policy and technical solutions: This calls for controls on data, monitoring for insider and external attacks to better stave off threats to systems and information.
  • 21. Goals • Protect privacy, civil rights and civil liberties through consistency and compliance: Public trust must be a key consideration here, the document stresses. Privacy and civil protections must be built into any sharing mechanism.