sponsored by n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Sponsored by PowerPoint Presentation
Download Presentation
Sponsored by

Loading in 2 Seconds...

play fullscreen
1 / 20
gilda

Sponsored by - PowerPoint PPT Presentation

340 Views
Download Presentation
Sponsored by
An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Sponsored by Cyber Security Collaboration Forum Hosted by Cyber Security Institute

  2. NASA/JSC

  3. Cyber Security 101 Security? Security =Confidentiality ? • All types of security • Computer security • Information security • Data security • Database security • Network security • Software security • Application security • Physical security • Web security • Mobile Security • … • Other ‘security’ components: • integrity, • availability, • non-repudiability, • …

  4. The CIA Model (aka. CIA triad) • Confidentialityprevents unauthorized disclosure of sensitive information and/or resources. • Integrity prevents unauthorized modification. • Availability is the prevention of loss of access to resources and information to ensure that information or resource is available for use when it is needed. Source: http://en.wikipedia.org/wiki/Information_security

  5. Cyber Security Institute (CSI)

  6. Cyber Security Institute (CSI)

  7. Cyber Security Institute (CSI)

  8. Cyber Security Institute (CSI)

  9. Cyber Security Institute (CSI)

  10. Cyber Security Institute (CSI)

  11. Cyber Security Institute (CSI)

  12. Cyber Security ? • Security does not focus on “products” only; it is a process and focuses on the whole “information system”. • no panacea or cure-all • a continual and iterative process • building up readiness • knowledge acquisition • learning & research • intelligence collection, • close monitoring, … • knowledge sharing • community awareness and involvement

  13. Regional Industry Threats

  14. The Public Health of the Internet • “EastWest Institute Proposes Public Health Model For Internet Cyber Security”, by Mickey McCarter, 06/06/2012 • Scott Charney, "As use and reliance on the Internet continues to grow, improving Internet health requires all ecosystem members to take a global, collaborative approach to protecting people from potential dangers online." • “Collective Defense: Applying Public Health Models to the Internet”, By Scott Charney, Corporate Vice President, Trustworthy Computing, Microsoft Corp., 2010.

  15. Cyber Security Collaboration Model Strategy: Accelerate Bay Area Houston’s cyber security industry by leveraging the synergy created through the collaborative efforts of the community, academia, local and state government, DoD, Federal protection agencies, and regional business sectors.

  16. A sustainableCyber Security Institute for the Bay Area region • How one may help? • Financial • Corporation donation • Personal donation • in-kind contribution • Professional participation • Advisory Board • Industry Technical committees • Distinguished speakers • Mentors • Volunteers • Promotion

  17. Cyber Security Institute http://www.uhcl.edu/CyberSecurityInstitute