1 / 16

CASC Members Meet New Challenges

C A S C. Coalition for Academic Scientific Computation. CASC Members Meet New Challenges. Since September 11, members of the Coalition for Academic Scientific Computation have been called upon to develop new and improved security measures to combat terrorism. . New Challenges.

gore
Download Presentation

CASC Members Meet New Challenges

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. C A S C Coalition for Academic Scientific Computation CASC Members Meet New Challenges • Since September 11, members of the Coalition for Academic Scientific Computation have been called upon to develop new and improved security measures to combat terrorism.

  2. New Challenges Homeland Security Bio-Terrorism Computer Security/Cyber-Terrorism

  3. Homeland Security • The National Center for Supercomputing Applications has developed the Multi-Sector Crisis Management Consorium (MSCMC) at the University of Illinois at Urbana-Champaign • The MSCMC uses cutting edge technology to mitigate and respond to crises of national security and national disasters, such as the Sept. 11 attack. http://www.mscmc.org

  4. Crisis Management Objectives: • Encourage partnerships, collaboration, and problem solving within the crisis management and disaster response communities and other economic and security sectors of society. • Promote the use of global technology resources and resource centers as networked global showcases for training, testing, and demonstrating information technology (IT) innovations. • Develop simulations of crisis situations for training and analysis. • Provide members with access to leading IT researchers in academia, government, and the private sector.

  5. Emergency Response Draco, a project of the University of Maryland, is an innovative technology that can revolutionize emergency response to national crises and regional disasters • It provides secure and rapidly deployable network that immediately allows first responders at all levels -- local, state, and federal -- to communicate with each other using voice, video and data. With a simple click on a PDA or pen computer screen, responders can note their location and connect by voice to any other responder or set of responders. http://umiacs.umd.edu/mind/research_draco.htm

  6. Bio-Terrorism Definition: • Biological Terrorism is the use or threatened use of biological or biologically-related toxins against civilians, with the objective of causing illness, death or fear.

  7. Are you prepared?

  8. Ebola virus Bio-Terrorism The Pittsburgh Supercomputing Center supports the BioMedical Security Institute (BMSI), which conducts research into the prevention of, preparation for and response to bioterrorism. BMSI's mission is to advance the capability to detect, analyze, prevent and respond to acts of terrorism and natural events involving biological agents. BMSI is a collaboration between Carnegie Mellon University and the University of Pittsburgh. http://www.biomedsecurity.org/

  9. BioMedical Security Institute (BMSI)

  10. Cyber-Terrorism Two definitions: • Achieving or threatening violence through cyber attacks • The calculated use of cyber attacks or the threat of cyber attack to inculcate fear, intended to coerce or intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological. Cyber-terror is an attractive non-lethal weapon – The information and communications revolution lessens the need for violence.

  11. Computer Security Measures • SUNY-Buffalo’s Center of Excellence in Information Systems Assurance Research and Education is working on Intrusion Detection systems, in cooperation with the US National Security Agency. • They are also developing e-commerce and Web assurance applications, as well as new approaches to Trusted Mobile Computing. Basic Measures: • Encryption • Firewalls • Detection of Intrusions • Vulnerability Testing http://www.cse.buffalo.edu/caeiae/

  12. Computer Security Research Purdue University’s Center for Education and Research in Information Assurance and Security (CERIAS) is the world's foremost University center for multidisciplinary research and education in areas of information security. • Projects include: • Detecting Denial of Service Attacks • Online Security Communication about Credit Card Usage • Protection of Educational Data in Large Scale Databases and Internet Environments • Trusted Software Composition • Uses of Randomness in Computer Security http://www.cerias.purdue.edu/

  13. About CASC • CASC is a nonprofit organization of supercomputing centers and research universities that offer leading edge hardware, software, and expertise in high performance computing resources and advanced visualization environments. Founded in 1989, CASC has grown into a national association representing 33 centers, with programs in 21 states. • Working individually and together, coalition members complement traditional methods of laboratory and theoretical investigation by using high performance computers to simulate natural phenomena, handle and analyze data, process signals, and create images - all at performance levels not available from smaller computers. By applying the technology, CASC members help extend the state of the art to achieve the scientific, technical, and information management breakthroughs that will keep the U.S. in the forefront of the 21st century Information Technology (IT) revolution.

  14. CASC Members • National Energy Research Scientific Computing Center, California • National Supercomputing Center for Energy and the Environment, Nevada • North Carolina Supercomputing Center at MCNC, North Carolina • Oak Ridge National Laboratory, Tennessee • Ohio Supercomputer Center, Ohio • Pennsylvania State University, Pennsylvania • Pittsburgh Supercomputing Center, Pennsylvania • Purdue University, Indiana • San Diego Supercomputer Center, California • Texas A&M University Supercomputer Center, Texas • Texas Advanced Computing Center , Texas • Texas Learning and Computation Center, Texas • Texas Tech University, Texas • University of Florida, Florida • University of Maryland, Maryland • University of Southern California, California • Arctic Region Supercomputing Center, Alaska • Arizona State University, Arizona • Boston University, Massachusetts • Center for Advanced Computing Research, California Institute of Technology • Center for Computational Research , New York • Center for Computational Sciences, Kentucky • Center for High Performance Computing, Utah • Center for Parallel Computing , Michigan • Computer and Information Technology Institute, Texas • Computational Science and Information Technology , Florida • Cornell Theory Center, New York • East Carolina University, North Carolina • High Performance Computing Education and Research, New Mexico • Indiana University, Indiana • Mississippi State University, Mississippi • National Center for Atmospheric Research, Colorado • National Center for Supercomputing Applications, Illinois

  15. CASC Member Locations

  16. CONTACT CASC: • CASC Chair: Beverly Clayton Clayton@psc.edu 412-268-4960 • CASC Washington Liaison: Sue Fratkin Sue@casc.org 202-265-5410 http://www.casc.org

More Related