1 / 21

IT Applications with Emerging Techniques: Security Solutions

IT Applications with Emerging Techniques: Security Solutions. Xin-Wen Wu. Indiana University of Pennsylvania Department of Mathematical and Computer Sciences Email: xwu@iup.edu. Agenda. IT Applications & Opportunities Data Storage in Clouds – Security Wireless Sensor Networks – Security

trevinol
Download Presentation

IT Applications with Emerging Techniques: Security Solutions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IT Applications with Emerging Techniques: Security Solutions Xin-Wen Wu Indiana University of Pennsylvania Department of Mathematical and Computer Sciences Email: xwu@iup.edu

  2. Agenda • IT Applications & Opportunities • Data Storage in Clouds – Security • Wireless Sensor Networks – Security • Cyber Security Programs at IUP • Institute of Cyber Security of IUP

  3. IT Applications & Opportunities You may have already applied IT in your business: well developed information system, IT facilities, etc. • You plan to expand your business? • Process an increased amount of data? • Save costs from hiring additional IT staff? • Concerned about upgrading your system?

  4. Save Your Data in Clouds Excellent for data storage ! Cloud Services: • A lot of benefits: • Usability & accessibility • Disaster recovery • Cost saving • Easy sharing • Scalability

  5. IT Applications & Opportunities • SOHONetworks (Small Office/Home Office Networks)

  6. Beyond Traditional IT Applications • Smart home/smart building, IoT, wireless sensor networks, etc.

  7. Security Challenges Facing security threats against: Confidentiality Integrity Availability

  8. Confidentiality for Data in Clouds • Before being sent to the cloud, data may be encrypted using secure encryption algorithms (ciphers) • AES (advanced encryption standard) • Many other available ciphers • You may choose the best one for your business • You may have a huge amount of data • Dataare at different levels of sensitivity • Your may have data for different users • Users are in different roles • With different access rights Need many keys for data encryption !

  9. Confidentiality for Data in Clouds • Before being sent to the cloud, data may be encrypted using secure encryption algorithms (ciphers) • AES (advanced encryption standard) • Many other available ciphers • You may choose the best one for your business Question: How do you manage the keys? Need to store them properly, Maintain the secrecy of keys Require an efficient and secure key management scheme !

  10. Confidentiality for Data in Clouds Question: How do you manage the keys? Need to store them properly, Maintain the secrecy of keys Require an efficient and secure key management scheme !

  11. Wireless Attacks • Rogue AP / Evil twin • Behind a firewall (set up by an insider) / mimic an authorized AP • Many other attacks: • Replay attack • RF jamming

  12. IoT Security Devices and sensors may be deployed in outdoor or even hostile environments – no physical protection ! While we enjoy the IoT applications, cyber-physical systems, wireless sensor networks, how do we ensure the security? The devices may not afford the existing security procedures – not enough capabilities !

  13. IoT Security Devices and sensors may be deployed in outdoor or even hostile environments – no physical protection ! Require efficient (lightweight) security mechanisms ! The devices may not afford the existing security procedures – not enough capabilities !

  14. IoT Security • Also, security may be enhanced by running: • anomaly detection • for IoT applications

  15. Security: Educational Solutions However, technical mechanisms alone do not completely solve the security issues Educational Programs help

  16. Cyber security programs of IUP • IUP has been providing cyber security education for almost two decades • We are designated by the DHS/NSA as National Center of Academic Excellence in Cyber Defense Education

  17. Cyber security programs of IUP • Department of Mathematical & Computer Sciences • Computer Science, B.A. • Computer Science, B.S., with tracks in • Software Engineering • Cyber Security • Language and Systems • Currently offers two Master’s degrees, and is developing a new program: • M.S. in Computer Science with emphasis in Cyber Security

  18. About the Department • Department Chair: • Dr. Francisco Alarcón • The second largest department, with 36 tenured and tenure-track faculty • Fall 2019, the department has 339 students enrolled in the various programs • Also provides courses for more than 2,500 students enrolled in other programs each semester

  19. Institute for Cyber Security • The Institute ICS Director: • Dr. Waleed Farag • Has been very successful over the past years: • DOD Cyber Scholarship Program (https://www.iup.edu/DoDScholarship/) • IUP GenCyber summer programs fundedby the National Science Foundation (NSF) & the National Security Agency (NSA), (www.iup.edu/iupgencyber) • Expansion of CAE-C Education Program (www.iup.edu/caecexpansion)

  20. Cybersecurity Education Research

More Related