casc members meet new challenges l.
Skip this Video
Loading SlideShow in 5 Seconds..
CASC Members Meet New Challenges PowerPoint Presentation
Download Presentation
CASC Members Meet New Challenges

Loading in 2 Seconds...

play fullscreen
1 / 16

CASC Members Meet New Challenges - PowerPoint PPT Presentation

  • Uploaded on

C A S C. Coalition for Academic Scientific Computation. CASC Members Meet New Challenges. Since September 11, members of the Coalition for Academic Scientific Computation have been called upon to develop new and improved security measures to combat terrorism. . New Challenges.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'CASC Members Meet New Challenges' - gore

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
casc members meet new challenges


Coalition for Academic Scientific Computation

CASC Members Meet New Challenges
  • Since September 11, members of the Coalition for Academic Scientific Computation have been called upon to develop new and improved security measures to combat terrorism.
new challenges
New Challenges

Homeland Security


Computer Security/Cyber-Terrorism

homeland security
Homeland Security
  • The National Center for Supercomputing Applications has developed the Multi-Sector Crisis Management Consorium (MSCMC) at the University of Illinois at Urbana-Champaign
  • The MSCMC uses cutting edge technology to mitigate and respond to crises of national security and national disasters, such as the Sept. 11 attack.

crisis management objectives
Crisis Management Objectives:
  • Encourage partnerships, collaboration, and problem solving within the crisis management and disaster response communities and other economic and security sectors of society.
  • Promote the use of global technology resources and resource centers as networked global showcases for training, testing, and demonstrating information technology (IT) innovations.
  • Develop simulations of crisis situations for training and analysis.
  • Provide members with access to leading IT researchers in academia, government, and the private sector.
emergency response
Emergency Response

Draco, a project of the University of Maryland, is an innovative technology that can revolutionize emergency response to national crises and regional disasters

  • It provides secure and rapidly deployable network that immediately allows first responders at all levels -- local, state, and federal -- to communicate with each other using voice, video and data. With a simple click on a PDA or pen computer screen, responders can note their location and connect by voice to any other responder or set of responders.

bio terrorism


  • Biological Terrorism is the use or threatened use of biological or biologically-related toxins against civilians, with the objective of causing illness, death or fear.
bio terrorism8

Ebola virus


The Pittsburgh Supercomputing Center supports the BioMedical Security Institute (BMSI), which conducts research into the prevention of, preparation for and response to bioterrorism.

BMSI's mission is to advance the capability to detect, analyze, prevent and respond to acts of terrorism and natural events involving biological agents.

BMSI is a collaboration between Carnegie Mellon University and the University of Pittsburgh.

cyber terrorism

Two definitions:

  • Achieving or threatening violence through cyber attacks
  • The calculated use of cyber attacks or the threat of cyber attack to inculcate fear, intended to coerce or intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological.

Cyber-terror is an attractive non-lethal weapon –

The information and communications revolution lessens the need for violence.

computer security measures
Computer Security Measures
  • SUNY-Buffalo’s Center of Excellence in Information Systems Assurance Research and Education is working on Intrusion Detection systems, in cooperation with the US National Security Agency.
  • They are also developing e-commerce and Web assurance applications, as well as new approaches to Trusted Mobile Computing.

Basic Measures:

  • Encryption
  • Firewalls
  • Detection of Intrusions
  • Vulnerability Testing

computer security research
Computer Security Research

Purdue University’s Center for Education and Research in Information Assurance and Security (CERIAS) is the world's foremost University center for multidisciplinary research and education in areas of information security.

  • Projects include:
  • Detecting Denial of Service Attacks
  • Online Security Communication about Credit Card Usage
  • Protection of Educational Data in Large Scale Databases and Internet Environments
  • Trusted Software Composition
  • Uses of Randomness in Computer Security

about casc
About CASC
  • CASC is a nonprofit organization of supercomputing centers and research universities that offer leading edge hardware, software, and expertise in high performance computing resources and advanced visualization environments. Founded in 1989, CASC has grown into a national association representing 33 centers, with programs in 21 states.
  • Working individually and together, coalition members complement traditional methods of laboratory and theoretical investigation by using high performance computers to simulate natural phenomena, handle and analyze data, process signals, and create images - all at performance levels not available from smaller computers. By applying the technology, CASC members help extend the state of the art to achieve the scientific, technical, and information management breakthroughs that will keep the U.S. in the forefront of the 21st century Information Technology (IT) revolution.
casc members
CASC Members
  • National Energy Research Scientific Computing Center, California
  • National Supercomputing Center for Energy and the Environment, Nevada
  • North Carolina Supercomputing Center at MCNC, North Carolina
  • Oak Ridge National Laboratory, Tennessee
  • Ohio Supercomputer Center, Ohio
  • Pennsylvania State University, Pennsylvania
  • Pittsburgh Supercomputing Center, Pennsylvania
  • Purdue University, Indiana
  • San Diego Supercomputer Center, California
  • Texas A&M University Supercomputer Center, Texas
  • Texas Advanced Computing Center , Texas
  • Texas Learning and Computation Center, Texas
  • Texas Tech University, Texas
  • University of Florida, Florida
  • University of Maryland, Maryland
  • University of Southern California, California
  • Arctic Region Supercomputing Center, Alaska
  • Arizona State University, Arizona
  • Boston University, Massachusetts
  • Center for Advanced Computing Research, California Institute of Technology
  • Center for Computational Research , New York
  • Center for Computational Sciences, Kentucky
  • Center for High Performance Computing, Utah
  • Center for Parallel Computing , Michigan
  • Computer and Information Technology Institute, Texas
  • Computational Science and Information Technology , Florida
  • Cornell Theory Center, New York
  • East Carolina University, North Carolina
  • High Performance Computing Education and Research, New Mexico
  • Indiana University, Indiana
  • Mississippi State University, Mississippi
  • National Center for Atmospheric Research, Colorado
  • National Center for Supercomputing Applications, Illinois
contact casc
  • CASC Chair:

Beverly Clayton


  • CASC Washington Liaison:

Sue Fratkin