SlideShare une entreprise Scribd logo
1  sur  23
Cybersecurity for Science 
Von Welch 
Director, CACR 
SC14 
November 18th, 2014
Cybersecurity for Science: SC14 November 18th, 2014 
I love Cyberinfrastructure… 
HPC HTC 
Science 
Gateways 
Big Data 
Distributed 
Everything 
Bleeding-edge 
Networks
Cybersecurity for Science: SC14 November 18th, 2014 
I Hate the Perception of Cybersecurity… 
HPC HTC 
Science 
Gateways 
Big Data 
Distributed 
Everything 
International 
User 
Communities
Cybersecurity for Science: SC14 November 18th, 2014 
Cybersecurity is an Enabler of 
Cyberinfrastructure and Science
Cybersecurity for Science: SC14 November 18th, 2014 
Why Cybersecurity Matters to 
Science…
Cybersecurity for Science: SC14 November 18th, 2014 
Trustworthy Science 
Maintaining the trust of scientists and the 
public in the CI, data and science is critical. 
Bias: Scientists have been managing the 
ultimate insider threat for a long time. 
Cybersecurity deals with increasing threats 
to trustworthy computational science.
Cybersecurity for Science: SC14 November 18th, 2014 
Do no harm 
CI represents some 
impressive cyber-facilities. 
Being used as a tool to do 
harm to others would be 
potentially very damaging 
to CI’s reputation.
Cybersecurity for Science: SC14 November 18th, 2014 
Collaboration
Cybersecurity for Science: SC14 November 18th, 2014 
Identity matters to Science… 
Scott Koranda/LIGO - Oct’11
Cybersecurity for Science: SC14 November 18th, 2014 
Specific Concerns 
Many science domains, 
communities, and 
projects will have 
particular concerns. 
The risks related to 
confidentiality, 
integrity, and 
availability vary greatly.
Cybersecurity for Science: SC14 November 18th, 2014 
why is cybersecurity for science 
hard?
Cybersecurity for Science: SC14 November 18th, 2014 
SSccieiennttifificic CCoommmmuunnitityy 
SScciieennccee // CCyybbeerriinnffrraassttrruuccttuurree 
Multiple 
Universities 
and/or 
Research 
Multiple 
Universities 
and/or 
Research 
Orgs 
Orgs 
Regional 
R&E and 
Commercial 
Services 
Regional 
R&E and 
Commercial 
Services 
Open 
Source and 
Scientific 
Software 
Open 
Source and 
Scientific 
Software 
R&E 
R&E 
Networks 
Requirements, 
Services, Networks … 
Risks, 
Policies, 
Risks
Cybersecurity for Science: SC14 November 18th, 2014 
Science pushes IT hard! 
HPC HTC 
Science 
Gateways 
Big Data 
Distributed 
Everything 
Bleeding-edge 
Networks
Cybersecurity for Science: SC14 November 18th, 2014 
Handling things going wrong at speed….
Cybersecurity for Science: SC14 November 18th, 2014 
Cybersecurity Historically 
Firewalls, IDS, 
encryption, logs, 
passwords, etc.
Cybersecurity for Science: SC14 November 18th, 2014 
Contemporary Cybersecurity 
Cybersecurity 
supports the 
science mission 
by managing 
risks to science.
Cybersecurity for Science: SC14 November 18th, 2014 
So, what am 
I doing about 
the weather?
Cybersecurity for Science: SC14 November 18th, 2014 
TrustedCI.org: 
Center for Trustworthy Scientific 
Cyberinfrastructure 
Providing leadership and addressing 
cybersecurity challenges for the NSF community.
Cybersecurity for Science: SC14 November 18th, 2014 
We rely increasingly on 
our software stacks – both 
the ones we write and 
others. 
Open nature leads to 
large attack surfaces. 
Software integrity is 
critical. 
A joint effort: 
Morgridge Institute for 
Research (lead) 
University of Illinois 
Urbana Champaign 
University of Wisconsin 
– Madison 
Indiana University 
Miron Livny, MIR 
Jim Basney, UIUC 
Bart Miller, UW 
Von Welch, IU 
https://continuousassurance.org/
Cybersecurity for Science: SC14 November 18th, 2014 
XSIM: Extreme Scale Identity 
Management for Science 
The Virtual Organization 
(VO) is critical to science. 
XSIM model enables 
delegation of identity 
management from 
resource provider to VO. 
Funded by DOE/ASCR 
Image credit: Ian Bird/CERN
Cybersecurity for Science: SC14 November 18th, 2014 
Fighting “Identity Management in a closet” 
Managing access to 
data, instruments, etc. 
Authenticating 
collaborators/commu 
nity is hard. 
Effort drawn away 
from science. 
Enabling use of 
campus identities.
Cybersecurity for Science: SC14 November 18th, 2014 
Cybersecurity is an enabler 
Science and cyberinfrastructure 
are pushing IT to new heights. 
Cybersecurity helps us manage 
the risks, maintain trust, build 
collaborations, and do the science 
most effectively.
Cybersecurity for Science: SC14 November 18th, 2014 
Thank you. 
Von Welch 
vwelch@iu.edu 
cacr.iu.edu

Contenu connexe

Tendances

Cybersecurity Fact Sheet _ Defense in Depth
Cybersecurity Fact Sheet _ Defense in DepthCybersecurity Fact Sheet _ Defense in Depth
Cybersecurity Fact Sheet _ Defense in Depth
Sue DeRosier
 

Tendances (17)

Research Issues
Research IssuesResearch Issues
Research Issues
 
Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot
 
Hackon journal international
Hackon journal internationalHackon journal international
Hackon journal international
 
Cybersecurity Fact Sheet _ Defense in Depth
Cybersecurity Fact Sheet _ Defense in DepthCybersecurity Fact Sheet _ Defense in Depth
Cybersecurity Fact Sheet _ Defense in Depth
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
APrIGF 2015: Security and the Internet of Things
APrIGF 2015: Security and the Internet of ThingsAPrIGF 2015: Security and the Internet of Things
APrIGF 2015: Security and the Internet of Things
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
A military perspective on cyber security
A military perspective on cyber securityA military perspective on cyber security
A military perspective on cyber security
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
Showcase poster
Showcase posterShowcase poster
Showcase poster
 
Cloud storage security
Cloud storage securityCloud storage security
Cloud storage security
 
Development of Jisc security programme - Networkshop44
Development of Jisc security programme - Networkshop44Development of Jisc security programme - Networkshop44
Development of Jisc security programme - Networkshop44
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 
Security and confidentiality of Advocate-Client Electronic Communication
Security and confidentiality of Advocate-Client Electronic CommunicationSecurity and confidentiality of Advocate-Client Electronic Communication
Security and confidentiality of Advocate-Client Electronic Communication
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
 
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
 

Similaire à Cybersecurity for Science

Trustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveTrustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade Perspective
Von Welch
 
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdfTdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
RamithaDevi
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
2b3d
 
Iidss 2017 sarwono sutikno arwin sumari (cps in defense)
Iidss 2017 sarwono sutikno   arwin  sumari (cps in defense)Iidss 2017 sarwono sutikno   arwin  sumari (cps in defense)
Iidss 2017 sarwono sutikno arwin sumari (cps in defense)
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F
 
Andrei Patrascu support letter
Andrei Patrascu support letterAndrei Patrascu support letter
Andrei Patrascu support letter
Andrei Patrascu
 

Similaire à Cybersecurity for Science (20)

Cybersecurity for Science
Cybersecurity for ScienceCybersecurity for Science
Cybersecurity for Science
 
Trustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveTrustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade Perspective
 
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdfTdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
 
Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...
Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...
Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...
 
Brucon presentation
Brucon presentationBrucon presentation
Brucon presentation
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
 
Contextual Cyber Security for IoT
Contextual Cyber Security for IoTContextual Cyber Security for IoT
Contextual Cyber Security for IoT
 
Iidss 2017 sarwono sutikno arwin sumari (cps in defense)
Iidss 2017 sarwono sutikno   arwin  sumari (cps in defense)Iidss 2017 sarwono sutikno   arwin  sumari (cps in defense)
Iidss 2017 sarwono sutikno arwin sumari (cps in defense)
 
Arm the World with SPN based Security
Arm the World with SPN based SecurityArm the World with SPN based Security
Arm the World with SPN based Security
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
 
Virtual Reality, Augmented Reality, Mixed Reality, Extended Reality – what yo...
Virtual Reality, Augmented Reality, Mixed Reality, Extended Reality – what yo...Virtual Reality, Augmented Reality, Mixed Reality, Extended Reality – what yo...
Virtual Reality, Augmented Reality, Mixed Reality, Extended Reality – what yo...
 
The evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityThe evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivity
 
OpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptxOpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptx
 
Andrei Patrascu support letter
Andrei Patrascu support letterAndrei Patrascu support letter
Andrei Patrascu support letter
 
Trustworthy Computational Science: Lessons Learned and Next Steps
Trustworthy Computational Science: Lessons Learned and Next StepsTrustworthy Computational Science: Lessons Learned and Next Steps
Trustworthy Computational Science: Lessons Learned and Next Steps
 
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNBAtlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Democratizing Science through Cyberinfrastructure - Manish Parashar
Democratizing Science through Cyberinfrastructure - Manish ParasharDemocratizing Science through Cyberinfrastructure - Manish Parashar
Democratizing Science through Cyberinfrastructure - Manish Parashar
 

Plus de Von Welch (9)

Extreme-scale Identity Management for Scientific Collaborations
Extreme-scale Identity Management for Scientific CollaborationsExtreme-scale Identity Management for Scientific Collaborations
Extreme-scale Identity Management for Scientific Collaborations
 
CACR Overview
CACR OverviewCACR Overview
CACR Overview
 
Facilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity ManagementFacilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity Management
 
Facilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity ManagementFacilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity Management
 
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands Meeting
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands MeetingXSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands Meeting
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands Meeting
 
Welch owasp-feb-2015
Welch owasp-feb-2015Welch owasp-feb-2015
Welch owasp-feb-2015
 
CACR Director's Update 2015
CACR Director's Update 2015CACR Director's Update 2015
CACR Director's Update 2015
 
Campus Identities for Research.
Campus Identities for Research.Campus Identities for Research.
Campus Identities for Research.
 
Identity Management for Virtual Organizations: A Model
Identity Management for Virtual Organizations: A ModelIdentity Management for Virtual Organizations: A Model
Identity Management for Virtual Organizations: A Model
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Cybersecurity for Science

  • 1. Cybersecurity for Science Von Welch Director, CACR SC14 November 18th, 2014
  • 2. Cybersecurity for Science: SC14 November 18th, 2014 I love Cyberinfrastructure… HPC HTC Science Gateways Big Data Distributed Everything Bleeding-edge Networks
  • 3. Cybersecurity for Science: SC14 November 18th, 2014 I Hate the Perception of Cybersecurity… HPC HTC Science Gateways Big Data Distributed Everything International User Communities
  • 4. Cybersecurity for Science: SC14 November 18th, 2014 Cybersecurity is an Enabler of Cyberinfrastructure and Science
  • 5. Cybersecurity for Science: SC14 November 18th, 2014 Why Cybersecurity Matters to Science…
  • 6. Cybersecurity for Science: SC14 November 18th, 2014 Trustworthy Science Maintaining the trust of scientists and the public in the CI, data and science is critical. Bias: Scientists have been managing the ultimate insider threat for a long time. Cybersecurity deals with increasing threats to trustworthy computational science.
  • 7. Cybersecurity for Science: SC14 November 18th, 2014 Do no harm CI represents some impressive cyber-facilities. Being used as a tool to do harm to others would be potentially very damaging to CI’s reputation.
  • 8. Cybersecurity for Science: SC14 November 18th, 2014 Collaboration
  • 9. Cybersecurity for Science: SC14 November 18th, 2014 Identity matters to Science… Scott Koranda/LIGO - Oct’11
  • 10. Cybersecurity for Science: SC14 November 18th, 2014 Specific Concerns Many science domains, communities, and projects will have particular concerns. The risks related to confidentiality, integrity, and availability vary greatly.
  • 11. Cybersecurity for Science: SC14 November 18th, 2014 why is cybersecurity for science hard?
  • 12. Cybersecurity for Science: SC14 November 18th, 2014 SSccieiennttifificic CCoommmmuunnitityy SScciieennccee // CCyybbeerriinnffrraassttrruuccttuurree Multiple Universities and/or Research Multiple Universities and/or Research Orgs Orgs Regional R&E and Commercial Services Regional R&E and Commercial Services Open Source and Scientific Software Open Source and Scientific Software R&E R&E Networks Requirements, Services, Networks … Risks, Policies, Risks
  • 13. Cybersecurity for Science: SC14 November 18th, 2014 Science pushes IT hard! HPC HTC Science Gateways Big Data Distributed Everything Bleeding-edge Networks
  • 14. Cybersecurity for Science: SC14 November 18th, 2014 Handling things going wrong at speed….
  • 15. Cybersecurity for Science: SC14 November 18th, 2014 Cybersecurity Historically Firewalls, IDS, encryption, logs, passwords, etc.
  • 16. Cybersecurity for Science: SC14 November 18th, 2014 Contemporary Cybersecurity Cybersecurity supports the science mission by managing risks to science.
  • 17. Cybersecurity for Science: SC14 November 18th, 2014 So, what am I doing about the weather?
  • 18. Cybersecurity for Science: SC14 November 18th, 2014 TrustedCI.org: Center for Trustworthy Scientific Cyberinfrastructure Providing leadership and addressing cybersecurity challenges for the NSF community.
  • 19. Cybersecurity for Science: SC14 November 18th, 2014 We rely increasingly on our software stacks – both the ones we write and others. Open nature leads to large attack surfaces. Software integrity is critical. A joint effort: Morgridge Institute for Research (lead) University of Illinois Urbana Champaign University of Wisconsin – Madison Indiana University Miron Livny, MIR Jim Basney, UIUC Bart Miller, UW Von Welch, IU https://continuousassurance.org/
  • 20. Cybersecurity for Science: SC14 November 18th, 2014 XSIM: Extreme Scale Identity Management for Science The Virtual Organization (VO) is critical to science. XSIM model enables delegation of identity management from resource provider to VO. Funded by DOE/ASCR Image credit: Ian Bird/CERN
  • 21. Cybersecurity for Science: SC14 November 18th, 2014 Fighting “Identity Management in a closet” Managing access to data, instruments, etc. Authenticating collaborators/commu nity is hard. Effort drawn away from science. Enabling use of campus identities.
  • 22. Cybersecurity for Science: SC14 November 18th, 2014 Cybersecurity is an enabler Science and cyberinfrastructure are pushing IT to new heights. Cybersecurity helps us manage the risks, maintain trust, build collaborations, and do the science most effectively.
  • 23. Cybersecurity for Science: SC14 November 18th, 2014 Thank you. Von Welch vwelch@iu.edu cacr.iu.edu

Notes de l'éditeur

  1. We are driving IT at high speed. XXX Add different technologies here.
  2. We are driving IT at high speed. XXX Add different technologies here.
  3. We are driving IT at high speed. XXX Add different technologies here.
  4. How fast would you drive a car that didn’t have brakes?
  5. OK, so what are we doing about the weather?
  6. But with brakes, you can go fast! Cybersecurity for CI is analogous to brakes for cars – when done right… it lets us go as fast as we do. It is an enabler for “high-speed” CI.