210 likes | 230 Views
IT Applications with Emerging Techniques: Security Solutions. Xin-Wen Wu. Indiana University of Pennsylvania Department of Mathematical and Computer Sciences Email: xwu@iup.edu. Agenda. IT Applications & Opportunities Data Storage in Clouds – Security Wireless Sensor Networks – Security
E N D
IT Applications with Emerging Techniques: Security Solutions Xin-Wen Wu Indiana University of Pennsylvania Department of Mathematical and Computer Sciences Email: xwu@iup.edu
Agenda • IT Applications & Opportunities • Data Storage in Clouds – Security • Wireless Sensor Networks – Security • Cyber Security Programs at IUP • Institute of Cyber Security of IUP
IT Applications & Opportunities You may have already applied IT in your business: well developed information system, IT facilities, etc. • You plan to expand your business? • Process an increased amount of data? • Save costs from hiring additional IT staff? • Concerned about upgrading your system?
Save Your Data in Clouds Excellent for data storage ! Cloud Services: • A lot of benefits: • Usability & accessibility • Disaster recovery • Cost saving • Easy sharing • Scalability
IT Applications & Opportunities • SOHONetworks (Small Office/Home Office Networks)
Beyond Traditional IT Applications • Smart home/smart building, IoT, wireless sensor networks, etc.
Security Challenges Facing security threats against: Confidentiality Integrity Availability
Confidentiality for Data in Clouds • Before being sent to the cloud, data may be encrypted using secure encryption algorithms (ciphers) • AES (advanced encryption standard) • Many other available ciphers • You may choose the best one for your business • You may have a huge amount of data • Dataare at different levels of sensitivity • Your may have data for different users • Users are in different roles • With different access rights Need many keys for data encryption !
Confidentiality for Data in Clouds • Before being sent to the cloud, data may be encrypted using secure encryption algorithms (ciphers) • AES (advanced encryption standard) • Many other available ciphers • You may choose the best one for your business Question: How do you manage the keys? Need to store them properly, Maintain the secrecy of keys Require an efficient and secure key management scheme !
Confidentiality for Data in Clouds Question: How do you manage the keys? Need to store them properly, Maintain the secrecy of keys Require an efficient and secure key management scheme !
Wireless Attacks • Rogue AP / Evil twin • Behind a firewall (set up by an insider) / mimic an authorized AP • Many other attacks: • Replay attack • RF jamming
IoT Security Devices and sensors may be deployed in outdoor or even hostile environments – no physical protection ! While we enjoy the IoT applications, cyber-physical systems, wireless sensor networks, how do we ensure the security? The devices may not afford the existing security procedures – not enough capabilities !
IoT Security Devices and sensors may be deployed in outdoor or even hostile environments – no physical protection ! Require efficient (lightweight) security mechanisms ! The devices may not afford the existing security procedures – not enough capabilities !
IoT Security • Also, security may be enhanced by running: • anomaly detection • for IoT applications
Security: Educational Solutions However, technical mechanisms alone do not completely solve the security issues Educational Programs help
Cyber security programs of IUP • IUP has been providing cyber security education for almost two decades • We are designated by the DHS/NSA as National Center of Academic Excellence in Cyber Defense Education
Cyber security programs of IUP • Department of Mathematical & Computer Sciences • Computer Science, B.A. • Computer Science, B.S., with tracks in • Software Engineering • Cyber Security • Language and Systems • Currently offers two Master’s degrees, and is developing a new program: • M.S. in Computer Science with emphasis in Cyber Security
About the Department • Department Chair: • Dr. Francisco Alarcón • The second largest department, with 36 tenured and tenure-track faculty • Fall 2019, the department has 339 students enrolled in the various programs • Also provides courses for more than 2,500 students enrolled in other programs each semester
Institute for Cyber Security • The Institute ICS Director: • Dr. Waleed Farag • Has been very successful over the past years: • DOD Cyber Scholarship Program (https://www.iup.edu/DoDScholarship/) • IUP GenCyber summer programs fundedby the National Science Foundation (NSF) & the National Security Agency (NSA), (www.iup.edu/iupgencyber) • Expansion of CAE-C Education Program (www.iup.edu/caecexpansion)