Welcome to Cybersecurity - PowerPoint PPT Presentation

About This Presentation
Title:

Welcome to Cybersecurity

Description:

Title: No Slide Title Author: Marsha Chechik Last modified by: Chechik Created Date: 11/23/2002 1:42:24 AM Document presentation format: On-screen Show – PowerPoint PPT presentation

Number of Views:146
Avg rating:3.0/5.0
Slides: 11
Provided by: Marsh162
Category:

less

Transcript and Presenter's Notes

Title: Welcome to Cybersecurity


1
Welcome to Cybersecurity
  • CASCON, Toronto
  • October 17, 2005

2
What is cybersecurity?
  • policies for the security of citizens and society
    in electronic communications, transactions and
    interactions.
  • Source http//cybersecurity.jrc.it/CyberSecurity.
    html
  • Potential subareas
  • Digital identity management and privacy
  • Trustworthy eGovernment and consumer protection
    information systems
  • Digital evidence systems for combating cybercrime
  • Information infrastructure interdependencies and
    risks
  • E-Health

3
What is cybersecurity (part 2)
  • Information assurance, including information
    security, information technology disaster
    recovery, and information privacy.
  • Source Bitpipe
  • Areas
  • Cyberterrorism
  • Data Security
  • Disaster Recovery
  • Homeland Security
  • Intrusion Detection
  • Intrusion Prevention
  • Privacy Rights

4
Key Concepts
  • A vulnerability is an error or a weakness in the
    design, implementation, or operation of a system.
  • A threat is an adversary that is motivated to
    exploit a system vulnerability and is capable of
    doing so.
  • Risk refers to the likelihood that a
    vulnerability will be exploited, or that a threat
    may become harmful
  • Source Cybersecurity Today and Tomorrow

5
Goal of this workshop
  • Nurture discussion amongst diverse members
    interested in cybersecurity
  • Exchange information
  • Network
  • Advance an agenda for a national information and
    network security research network
  • Have fun!

6
Some people to thank
  • IBM CAS
  • Julie Waterhouse, Jen Hawkins
  • Organizers
  • Walid Rjaibi (IBM)
  • Jacob Slonim (Dalhousie)
  • Paul Von Oorschot (Carleton)
  • David Lie (Toronto, ECE)
  • David Evans (Dalhousie)
  • John McHugh (Dalhousie)
  • Michael McAllister (Dalhousie)
  • Rosa Esteireiro (ECE, Toronto)

7
Some people to thank (Contd)
  • FISIC (Forum for Information Security Innovation
    in Canada)
  • Craig Hillier (Bell Canada)
  • MITACS
  • Jim Brookes

8
Todays Agenda
  • 830-900 Registration Networking
  • (Registration opens at 800)
  • 900-915 Workshop Introduction
  • 915-945 Talk 1 Elias Levy (Symantic)
  • Dionaea On the automatic collection of
    malicious code samples through honey pot farms.
  • 945-1015 Talk 2 Paul Van Oorschot (Carleton
    University)
  • Information Security 2105
  • 1015-1030 Break
  • 1030-1145 Short research intros from attendees
    (about 3 minutes each)
  • 1200-100 Lunch (Provided)

9
Todays Agenda
  • 100-130 Talk 3 Bob Blakley (IBM)
  • TBA
  • 130-200 Talk 4 John McHugh (Dalhousie
    University)
  • Network Awareness and Network Security
  • 200-230 Talk 5 Bill Aiello (University of
    British Columbia)
  • Enterprise Security A Community of Interest
    Based Approach
  • 230-245 Break
  • 245-350 Jim Brookes
  • Canadian security research networking session
  • 350-400 Wrap-up

10
Mini-presentations
  1. Lewis Robart and David Gibson, Industry Canada
  2. Stefan Saroiu, University of Toronto
  3. Eric Yu, University of Toronto
  4. Michel Barbeau, Carleton University
  5. Rene Struik, Certicom
  6. Stephan Neville, U of Victoria
  7. David Lie, University of Toronto
  8. Marsha Chechik, University of Toronto
  9. Hugh Williams, U of Calgary
  10. Urs Hengartner, Waterloo
  11. Ashraf Matrawy, Carleton
  12. Jose Fernandez, Ecole Polytechnique de Montreal
  13. Mark Perry, Western
  14. Nadia Tawbi, Laval
  15. Andrew Patrick, NRC
  16. Gord Agnew, Waterloo
  17. Patrick Hung, UOIT
  18. Konstantin Beznosov, UBC
  19. Victor Ralevich, Sheridan College
Write a Comment
User Comments (0)
About PowerShow.com