1 / 36

Challenges in Computing: Cybersecurity and Cyberinfrastructure

This lecture explores the research and education challenges in computing, specifically focusing on cybersecurity and cyberinfrastructure. It discusses the importance of these issues in the context of national security and the advancements in science and technology. The lecture also highlights the critical infrastructure protection and high-end cyberinfrastructure as key areas of focus.

elenan
Download Presentation

Challenges in Computing: Cybersecurity and Cyberinfrastructure

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Triangle CS Distinguished Lecturer SeriesResearch and Education Challengesin ComputingOctober 21, 2002 Peter A. Freeman Assistant Director of NSF for CISE

  2. Agenda • NSF context • Cybersecurity • Cyberinfrastructure • Science of design • Educational Issues

  3. NSF Context NSF's continuing mission is set out in the preamble to the National Science Foundation Act of 1950 (Public Law 810507): To promote the progress of science; to advance the national health, prosperity, and welfare; to secure the national defense; and for other purposes.

  4. NSF Strategic Focus • People: to develop a diverse, internationally competitive and globally-engaged workforce of scientists, engineers, and well-prepared citizens • Ideas: to provide a deep and broad fundamental science and engineering knowledge base • Tools: to provide widely accessible, state-of-the-art science and engineering infrastructure

  5. Historical Context • We are at a point in time that is like the start of the Cold War. • The threat of terrorism could last a generation or more. • The nature of the enemy - and his location - is very unclear. • We know a lot that can be done now; however, many areas require fundamental research. • NSF is assisting in making connections to the research community. • The computing community must be a key player.

  6. Branscomb Report • Making the Nation Safer: The Role of Science and Technology in Countering Terrorism • NRC Committee formed shortly after 9/11 • Chaired by Lew Branscomb and Rick Klausner • Report released June, 2002 • Approximately 25 specific research areas • Available at www.nap.edu/html/stct/

  7. Highest Priority • Information and network security • Information technology for emergency response • Information fusion and management

  8. Cybersecurity

  9. Cybersecurity • Old problem, new incarnation via the Internet • Number of incidents has increased dramatically • Incidents over the last few years have been much less damaging than they could easily have been. • Serious attacks could be much more stealthy and could penetrate widely, particularly among client systems. • It is an individual and an infrastructure problem • Essential to defense, commerce, science & engineering

  10. Vital Cybersecurity Research Areas • Manageable security • System administration, accountability, survivability • Empirical cyber security studies • Data, analysis, simulation, system view • Cybersecurity foundations • Reasoning about trustworthiness, tools, methods • Cybersecurity for next generation technology • Mega-networks, ubiquity • Cybersecurity across disciplines • humans, commerce, laws, regulations are part of the system - compliments of Carl Landwehr, NSF

  11. 10 Technical Challenges in Cybersecurity • How to avoid building security flaws into programs • How to know when a system has been penetrated • How to design systems that can tolerate intrusions • How to design systems with manageable security • How to provide reasonable protection of intellectual property • How to support privacy enforcement technically • How to get trustworthy computations from untrusted platforms • How to prevent / withstand denial of service attacks • How to quantify security tradeoffs • How to reveal / minimize assumptions in security system designs or more generally: How to build programs/systems and know what they do - compliments of Carl Landwehr, NSF

  12. Critical Infrastructure Protection(CIP) • All critical infrastructure depends on IT • Has been increasing for some time but is now pervasive and recognized! • Vulnerabilities not completely recognized • Interdependencies even less well understood • Generalization of the cybersecurity problem

  13. Some CIP Research Issues • Open software control and middleware for real-time, multi-modal, coordinated control systems (e.g., model-centric, predictive, and reactive hierarchical software control) • Risk-related fault tolerance techniques for distributed real-time systems • Fast, assured authentication and dynamic authority management for real-time embedded systems and human/system interfaces • Scalable communication, control, sensor, and actuator technologies for ubiquitous sensing and actuation; distributed imaging arrays, localization • Integrated software, network, and physical system design against failure: end-to-end fault and critical effects analysis, failure mode design, fault and failure isolation, mitigation and recovery techniques • Quality of Service (QoS) mechanisms for secure networking and resource management for distributed, real-time, embedded systems • Group-level services for fast encryption, key management • Systems services for composable event- and time-triggered computation and communications - compliments of Helen Gill, NSF

  14. High-EndCyberinfrastructure (CI)

  15. Cyberinfrastructure (CI) Goal • Cyberinfrastructure (CI) is critical to the advancement of all areas of science and technology. • The Cyberinfrastructure Goal: • provide an integrated high end system of hardware, software, and services that ... • enables scientists and engineers to work on advanced research problems that would not otherwise be solvable. • What is high-end cyberinfrastructure?

  16. HIGH-ENDCYBERINFRASTRUCTURE Cycles Software High BandwidthNetworks Storage&Libraries Services Instruments

  17. Converging Trends • Power and capacity of the technology

  18. The Information Tsunami • Terabyte [ 1,000,000,000,000 bytes OR 1012 bytes] • 1 Terabyte: An automated tape robot OR all the X-ray films in a large technological hospital OR 50000 trees made into paper and printed OR daily rate of EOS data (1998) • 2 Terabytes: An academic research library OR a cabinet full of Exabyte tapes • 10 Terabytes: The printed collection of the US Library of Congress • 50 Terabytes: The contents of a large Mass Storage System • 400 Terabytes: National Climactic Data Center (NOAA) database • Petabyte [ 1,000,000,000,000,000 bytes OR 1015 bytes] • 1 Petabyte: 3 years of EOS data (2001), OR 1 sec of CMS data collection • 2 Petabytes: All US academic research libraries • 8 Petabytes: All information available on the Web • 20 Petabytes: Production of hard-disk drives in 1995 • 200 Petabytes: All printed material OR production of digital magnetic tape in 1995 • Exabyte [ 1,000,000,000,000,000,000 bytes OR 1018 bytes] • 2 Exabytes: Total volume of information generated worldwide annually • 5 Exabytes: All words ever spoken by human beings • Zettabyte [ 1,000,000,000,000,000,000,000 bytes OR 1021 bytes] • Yottabyte [ 1,000,000,000,000,000,000,000,000 bytes OR 1024 bytes]

  19. New Modes of Computing • Distributed Computing • synchronous processing across distributed resources • High-Throughput Computing • asynchronous processing • On-Demand Computing • dynamic resource allocation • Data-Intensive Computing • co-location of computational resources with large databases • Collaborative Computing • scientific collaboratories

  20. New Modes of Interaction with Resources W. Feiereisen

  21. Converging Trends • Power and capacity of the technology • Transformative power of computational resources for S&E research

  22. New Modes of Scientific Research • Space Weather Modeling - solar surface and corona, solar wind, and the earth’s magnetosphere-ionosphere-thermosphere. • Severe storm track prediction with constantly updated information from sensor networks • Encyclopedia of Life (EOL) is characterizing and functionally describing genes identified in all 800 publicly accessible genomes. The calculation is highly parallel, requiring over 100 CPU years to complete useful structure predictions.

  23. National and International Grid Computing Efforts

  24. New Collaborative Research Communities

  25. Converging Trends • Power and capacity of the technology • Transformative power of computational resources for S&E research • Recognition of the importance of computation both to S&E and to the Nation • Economic transformation • Critical infrastructure • Homeland security • High-end cyberinfrastructure

  26. The Cyberinfrastructure Objective: • provide an integrated, high-end system of computing, data facilities, connectivity, software, services, and sensors that ... • enables all scientists and engineers to work on advanced research problems that would not otherwise be solvable

  27. Users App Sys App Sys App Sys Cyberinfrastructure INSTRUMENTS LIBRARIES STORAG E & SOFTWARE SERVICES CYCLES High Bandwidth Networks

  28. Challenges • CI is a great driver for fundamental computer science and engineering research. • How to build the components? • Networks, processors, storage devices, sensors, software • How to shape the technical architecture? • Pervasive, many CI’s, constantly evolving/changing capabilities • How to operate it? • How to use it?

  29. Science of Design

  30. Consider Other Complex Systems • How are they built? • Well-understood (and used!) methods for construction • Representations for designs • Methods for systematic evaluation of designs • Scientific and engineering foundation for component construction • Systematic study of previous efforts • Professionals • Standards • Sanctions for failure to meet standards

  31. Providing a Systematic Basis • Fundamental work needed on: • Representations • Processes • Methods for reasoning about designs • Extensive observation of actual systems and construction processes • Closer ties with management and organizational studies

  32. Education

  33. Needs • The educational implications of all of the above should be obvious • CS&E faculty must find ways to improve education in our field, without overwork! • Use of IT in education more broadly is a very large, but risky challenge • Our performance on broadening participation in the field must be changed.

  34. CONCLUSION • The issue is not how to find interesting research and education challenges, but how to not drown in the sea of opportunities before us. • Computing is still the Future!

  35. Thank you!

  36. Contact Information Dr. Peter A. Freeman NSF Assistant Director for CISE Phone: 703-292-8900 Email:pfreeman@nsf.gov Visit the CISE Web site at: www.cise.nsf.gov

More Related