1 / 12

Rik Farlow, USENIX ;login :, August 2004

Download Presentation

Rik Farlow, USENIX ;login :, August 2004

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. “The attacks on supercomputers at [sites deleted] and other locations were closer to a skillful assault, but they were not actually successful. The attackers, instead of treading lightly, just kept abusing more accounts and taking over more systems, making it only a matter of time before their intrusions were discovered. The attackers were certainly persistent, returning even after being discovered. I am hopeful that one or more of the defenders will discuss their experiences with these intrusions in the Security edition of ;login:.” • Rik Farlow, USENIX ;login:, August 2004

  2. Welcome !

  3. Who Am I ? Tom Bettge Associate Director Scientific Computing Division National Center for Atmospheric Research Boulder, Colorado Background: Applications Software Engineer – Climate Modeling my mother’s maiden name is Hacker

  4. “………………………….The attackers were certainly persistent, returning even after being discovered. I am hopeful that one or more of the defenders will discuss their experiences with these intrusions in the Security edition of ;login:.” • Rik Farlow, USENIX ;login:, August 2004

  5. Program Committee • Tom Bettge National Center for Atmospheric Research • RuthAnne Bevier California Institute of Technology • Ginger Caldwell National Center for Atmospheric Research • Walter Dykas Oak Ridge National Laboratory • Victor Hazlewood San Diego Supercomputer Center • Chris Hempel Texas Advanced Computer Center • Jim Marsteller Pittsburgh Supercomputer Center • Marla Meehl National Center for Atmospheric Research • George Strawn National Science Foundation • Howard Walter National Energy Research Scientific Computing Center • John Towns National Center for Supercomputing Applications

  6. Who Are You ? • Registered Participants: 128 • By Organizational/Agency: • University/NSF 79 • DOE 25 • Military 8 • NASA 8 • NOAA 3 • Other 5 • By Duty/Position: • system/security administration 50 • management 40 • end user 10

  7. Breakout Sessions • User Policies/Education • System Administration Policies/Education • Network Based Intrusion Detection • Host Based Intrusion Detection • Grid Computing Challenges

  8. Cybersecurity Summit 2004 Tom Bettge NCAR/Scientific Computing Division 1 Breakout Session Assignment

  9. Monday Evening: Meeting Rooms • Dewey I / II • Charleston I / II • Farragut • wireless will be available Contact Staff

  10. Thanks to NCAR Staff • Susan Cross • Lynda Lester • Janie Young

  11. Cybersecurity Summit ? • Concept of Summit – Spring 2004 Share information, discuss impact upon users, systems, etc. Best Practices Procedures for future incidents (communication, etc.) • To include peer agencies • Endorsed/Sponsored by National Science Foundation • Expanded to broad community • Expanded to include peer agencies • Invitation Only !

More Related