SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Secure Information Sharing Models
for CommunityCyber Security Ravi Sandra
Agenda
1. Overview
2. SIS Major Challenges
3. CommunityCyber Security
4. The Current Status…
5. Requirements
6. Life-Cycle of a Cyber Incident
7. Privacy Consent State of Mind
8. National Strategy Could Nudge SIS Forward
9. Goals
1. Overview
• “Share but protect”
• Saltzer-Schroeder1 identified the desirability and difficulty of maintaining:
• “some control over the user of the information even after it has been released”
2. SIS Major Challenges
• Policy Challenge
• Modeling, specifying and enforcing SIS policies
• Need intuitive yet formal models, guaranteed security properties, etc.
• Containment Challenge
• Ensure that protected information is accessible to users as permitted by the policy
• Security mechanisms such as authentication, cryptography, trusted hardware, etc.
3. Community Cyber Security
• Community refers to a geographical area
• E.g. county or a city with demarcated boundary
• The Center for Infrastructure Assurance and Security at UTSA conducts nation-
wide cyber security preparedness exercises and training
• communication
• incident response
• disaster recovery
• business continuity
• security awareness, etc.
4.The Current Status…
• Exchange of business cards
• No process exists for information sharing
• Technology is not the bottleneck
• Resistance due to political/competitive reasons
• Also want to avoid embarrassment
• E.g. by sharing attack data
• Participants have no clue as to what to share and how to effectively specify what to
share
5. Requirements
• Need abstract models
• With rigorous mathematical foundations
• Should ease administration
• Classic models are limited
• DiscretionaryAccess Control
• Too low-level to configure
• Lattice-BasedAccess Control (E.g. Bell LaPadula)
• Rigid
• One directional info flow is not the primary concern
• Lot of work on Dynamic Coalitions
• Many times heavy-weight
• Mainly focus on technological/infrastructural integration
6. Life-Cycle of a Cyber Incident
Secure Sharing in a Community
Core
Group
Incident
Group
Open
Group
Conditional
Membership
Automatic
Membership
Filtered RW
Administered
Membership
Administered
Membership
7. Privacy Consent State of Mind
• The space of Privacy Consent is full of trepidation. I would like to show that
although there are complexity, there is also simplicity. The complexity
comes in fine-details.The fundamentals, and the technology, are simple
• Privacy Consent can be viewed as a "State Diagram", that is by showing
what the current state of a patients consent, we can show the changes in
state.This is the modeling tool I will use here.
Privacy Consent State of Mind
• I will focus on how Privacy Consent relates to the access to Health
Information, that is shared through some form of Health Information
Exchange (HIE).
• The architecture of this HIE doesn't matter, it could be PUSH or PULL or
anything else. The concepts I show can apply anywhere, but for simplicity
think only about the broad use of healthcare information
sharing across organizations.
Privacy Consent of OPT-OUT
• At the right is the diagram for an OPT-OUT
environment. One where the patient has the
choice to OPT-OUT, that is to stop the use of
their data. This means that there is a
presumption that when there is no evidence of
a choice by the patient, that the data can be
used.
Privacy Consent of OPT-IN
• At the right is the diagram for an OPT-IN
environment. In an OPT-IN environment the
patient is given the opportunity to ALLOW
sharing of their information. This means that
there is a presumption that the patient does
not want their health information shared. I
would view it more as a respect for the patient
to make the decision.
Privacy Consent:YES vs NO
• The reality of privacy consent is that there will be a
number of patients that will change their mind.
This is just human nature, and there are many
really good reasons they might change their mind.
A patient that has given OPT-IN authorization
might revoke their authorization. A patient that
has indicated they don't want their data to be
shared might decide that they now do want to
share their data.
Privacy Consent of Maybe
• There are those that have special
circumstances that really require special
handling.
• This state is an indicator, just like "YES" or
"NO", but in this case the indicator indicates
that there are patient-specific rules. These
patient-specific rules likely start with a "YES"
or a "NO" and then apply additional rules.
Privacy Consent of Maybe
• These additional rules might be to block a specific time-period, block a
specific report, block a specific person from access, allow a specific person
access, etc.
• These special rules are applied against each access.Note that the state
diagram shows transitions between all three states. It is possible that one
goes into the "MAYBE" state forever, or just a while.
8. National Strategy Could Nudge SIS
Forward
• In the early days of the Obama administration, the president declared
cyberspace a critical asset. Since then, little more than lip service has been
paid on a policy level to the security of the country’s critical infrastructure,
despite increasing public awareness of the problem and high-profile attacks
on business and government alike.
National Strategy Could Nudge SIS Forward
• In December 2013, there was more movement. The White House released
the National Strategy for Information Sharing and Safeguarding which is a
framework for government agencies to share attack data to repel terrorist
threats, cyberattacks and more.
National Strategy Could Nudge SIS Forward
• The strategy stresses that information must be treated as a national asset
and such data must be made available to support national security, it states.
It also urges agencies to work together to identify and reduce risks, rather
than not share at all. Information, the document states, must underlie all
decisions.
9. Goals
The president hopes the strategy achieves five goals:
• Drive collective action through collaboration and accountability: Using
models to build trust and simplify the processes for sharing
• Improve information discovery and access through common standards:
Doing so paves the way for less ambiguous policies. To achieve this, secure
access via authentication and authorization controls, data classification and
sharing standards is vital.
Goals
• Optimize mission effectiveness through shared services and
interoperability: Bettering the efficacy of how information is acquired and
shared is key here.
• Strengthen information safeguarding through structural reform, policy and
technical solutions: This calls for controls on data, monitoring for insider and
external attacks to better stave off threats to systems and information.
Goals
• Protect privacy, civil rights and civil liberties through consistency and
compliance: Public trust must be a key consideration here, the document
stresses. Privacy and civil protections must be built into any sharing
mechanism.

Weitere ähnliche Inhalte

Andere mochten auch

Communicating science
Communicating scienceCommunicating science
Communicating sciencetonivanuzzo
 
Communicating science
Communicating scienceCommunicating science
Communicating sciencetonivanuzzo
 
CA/Tumores de Cabeza y Cuello
CA/Tumores de Cabeza y CuelloCA/Tumores de Cabeza y Cuello
CA/Tumores de Cabeza y CuelloLaura Palacio
 
Naser AVEC-Sep10-2012
Naser AVEC-Sep10-2012Naser AVEC-Sep10-2012
Naser AVEC-Sep10-2012njeneral
 
Celo biología básica y mejoramiento de la detección
Celo biología básica y mejoramiento de la detecciónCelo biología básica y mejoramiento de la detección
Celo biología básica y mejoramiento de la detecciónJonathan Alexander Agredo
 
What is HTML- d3brand.com
What is HTML- d3brand.comWhat is HTML- d3brand.com
What is HTML- d3brand.comDremy Riyad
 
6 word illustrated story
6 word illustrated story6 word illustrated story
6 word illustrated storycgashley
 
Conozcamos nuestra constitución verde de 1991
Conozcamos nuestra constitución verde  de 1991Conozcamos nuestra constitución verde  de 1991
Conozcamos nuestra constitución verde de 1991Daniel Macias
 
Career on Mobile Application Development
Career on Mobile Application DevelopmentCareer on Mobile Application Development
Career on Mobile Application DevelopmentDremy Riyad
 
IEEE ECC-CDC
IEEE ECC-CDCIEEE ECC-CDC
IEEE ECC-CDCnjeneral
 
Medicina Interna: Obesidad
Medicina Interna: Obesidad  Medicina Interna: Obesidad
Medicina Interna: Obesidad Laura Palacio
 
Let emerging market customers be your teachers
Let emerging market customers be your teachersLet emerging market customers be your teachers
Let emerging market customers be your teachersSiddhartha Kr
 
Presentaton of P&G Company Profile (University Presentation)
Presentaton of P&G Company Profile (University Presentation)Presentaton of P&G Company Profile (University Presentation)
Presentaton of P&G Company Profile (University Presentation)Dremy Riyad
 
Nfs version 4 protocol presentation
Nfs version 4 protocol presentationNfs version 4 protocol presentation
Nfs version 4 protocol presentationAbu Osama
 
Chi sono e a cosa servono le agenzie di rating?
Chi sono e a cosa servono le agenzie di rating? Chi sono e a cosa servono le agenzie di rating?
Chi sono e a cosa servono le agenzie di rating? tonivanuzzo
 
Chi sono e a cosa servono le agenzie di rating
Chi sono e a cosa servono le agenzie di ratingChi sono e a cosa servono le agenzie di rating
Chi sono e a cosa servono le agenzie di ratingtonivanuzzo
 
Virus del Papiloma Humano
Virus del Papiloma HumanoVirus del Papiloma Humano
Virus del Papiloma HumanoLaura Palacio
 

Andere mochten auch (19)

Yourprezi
YourpreziYourprezi
Yourprezi
 
Communicating science
Communicating scienceCommunicating science
Communicating science
 
Communicating science
Communicating scienceCommunicating science
Communicating science
 
CA/Tumores de Cabeza y Cuello
CA/Tumores de Cabeza y CuelloCA/Tumores de Cabeza y Cuello
CA/Tumores de Cabeza y Cuello
 
Naser AVEC-Sep10-2012
Naser AVEC-Sep10-2012Naser AVEC-Sep10-2012
Naser AVEC-Sep10-2012
 
Celo biología básica y mejoramiento de la detección
Celo biología básica y mejoramiento de la detecciónCelo biología básica y mejoramiento de la detección
Celo biología básica y mejoramiento de la detección
 
What is HTML- d3brand.com
What is HTML- d3brand.comWhat is HTML- d3brand.com
What is HTML- d3brand.com
 
6 word illustrated story
6 word illustrated story6 word illustrated story
6 word illustrated story
 
Conozcamos nuestra constitución verde de 1991
Conozcamos nuestra constitución verde  de 1991Conozcamos nuestra constitución verde  de 1991
Conozcamos nuestra constitución verde de 1991
 
Career on Mobile Application Development
Career on Mobile Application DevelopmentCareer on Mobile Application Development
Career on Mobile Application Development
 
IEEE ECC-CDC
IEEE ECC-CDCIEEE ECC-CDC
IEEE ECC-CDC
 
Medicina Interna: Obesidad
Medicina Interna: Obesidad  Medicina Interna: Obesidad
Medicina Interna: Obesidad
 
Let emerging market customers be your teachers
Let emerging market customers be your teachersLet emerging market customers be your teachers
Let emerging market customers be your teachers
 
Presentaton of P&G Company Profile (University Presentation)
Presentaton of P&G Company Profile (University Presentation)Presentaton of P&G Company Profile (University Presentation)
Presentaton of P&G Company Profile (University Presentation)
 
Nfs version 4 protocol presentation
Nfs version 4 protocol presentationNfs version 4 protocol presentation
Nfs version 4 protocol presentation
 
Chi sono e a cosa servono le agenzie di rating?
Chi sono e a cosa servono le agenzie di rating? Chi sono e a cosa servono le agenzie di rating?
Chi sono e a cosa servono le agenzie di rating?
 
Matriz FODA
Matriz FODAMatriz FODA
Matriz FODA
 
Chi sono e a cosa servono le agenzie di rating
Chi sono e a cosa servono le agenzie di ratingChi sono e a cosa servono le agenzie di rating
Chi sono e a cosa servono le agenzie di rating
 
Virus del Papiloma Humano
Virus del Papiloma HumanoVirus del Papiloma Humano
Virus del Papiloma Humano
 

Ähnlich wie Secure information sharing (sis) models

Clare Sanderon, IG Solutions
Clare Sanderon, IG SolutionsClare Sanderon, IG Solutions
Clare Sanderon, IG SolutionsInvestnet
 
Data Governance in two different data archives: When is a federal data reposi...
Data Governance in two different data archives: When is a federal data reposi...Data Governance in two different data archives: When is a federal data reposi...
Data Governance in two different data archives: When is a federal data reposi...Carolyn Ten Holter
 
Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010James Williams
 
One London conversation workshop 18 July slide deck
One London conversation workshop 18 July slide deck One London conversation workshop 18 July slide deck
One London conversation workshop 18 July slide deck Katie Harrison
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible DataTom Walker
 
Global Data Privacy Regulation
Global Data Privacy RegulationGlobal Data Privacy Regulation
Global Data Privacy RegulationJatin Kochhar
 
Review of Data Security, Consent and Opt-Outs
Review of Data Security, Consent and Opt-OutsReview of Data Security, Consent and Opt-Outs
Review of Data Security, Consent and Opt-OutsMohammad Al-Ubaydli
 
12 security policies
12 security policies12 security policies
12 security policiesSaqib Raza
 
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...Soumodeep Nanee Kundu
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramFinancial Poise
 
Health Data Sharing Scene Setting
Health Data Sharing Scene Setting Health Data Sharing Scene Setting
Health Data Sharing Scene Setting ipposi
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...acemindia
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
Establishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceEstablishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceRightPatient®
 
Giles Wilmore: How will the NHS Information Strategy support the new NHS?
Giles Wilmore: How will the NHS Information Strategy support the new NHS?Giles Wilmore: How will the NHS Information Strategy support the new NHS?
Giles Wilmore: How will the NHS Information Strategy support the new NHS?The King's Fund
 

Ähnlich wie Secure information sharing (sis) models (20)

Clare Sanderon, IG Solutions
Clare Sanderon, IG SolutionsClare Sanderon, IG Solutions
Clare Sanderon, IG Solutions
 
Data Governance in two different data archives: When is a federal data reposi...
Data Governance in two different data archives: When is a federal data reposi...Data Governance in two different data archives: When is a federal data reposi...
Data Governance in two different data archives: When is a federal data reposi...
 
Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010
 
One London conversation workshop 18 July slide deck
One London conversation workshop 18 July slide deck One London conversation workshop 18 July slide deck
One London conversation workshop 18 July slide deck
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
Global Data Privacy Regulation
Global Data Privacy RegulationGlobal Data Privacy Regulation
Global Data Privacy Regulation
 
Review of Data Security, Consent and Opt-Outs
Review of Data Security, Consent and Opt-OutsReview of Data Security, Consent and Opt-Outs
Review of Data Security, Consent and Opt-Outs
 
12 security policies
12 security policies12 security policies
12 security policies
 
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...
 
Mobileprivacyazahir
MobileprivacyazahirMobileprivacyazahir
Mobileprivacyazahir
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security Program
 
Health tech slides 12 june 2019
Health tech slides   12 june 2019Health tech slides   12 june 2019
Health tech slides 12 june 2019
 
A12_Beyond_HIPAA_PPT1
A12_Beyond_HIPAA_PPT1A12_Beyond_HIPAA_PPT1
A12_Beyond_HIPAA_PPT1
 
Health Data Sharing Scene Setting
Health Data Sharing Scene Setting Health Data Sharing Scene Setting
Health Data Sharing Scene Setting
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Establishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceEstablishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in Cyberspace
 
EHR - A Consumer Perspective
EHR - A Consumer PerspectiveEHR - A Consumer Perspective
EHR - A Consumer Perspective
 
Giles Wilmore: How will the NHS Information Strategy support the new NHS?
Giles Wilmore: How will the NHS Information Strategy support the new NHS?Giles Wilmore: How will the NHS Information Strategy support the new NHS?
Giles Wilmore: How will the NHS Information Strategy support the new NHS?
 

Kürzlich hochgeladen

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Kürzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Secure information sharing (sis) models

  • 1. Secure Information Sharing Models for CommunityCyber Security Ravi Sandra
  • 2. Agenda 1. Overview 2. SIS Major Challenges 3. CommunityCyber Security 4. The Current Status… 5. Requirements 6. Life-Cycle of a Cyber Incident 7. Privacy Consent State of Mind 8. National Strategy Could Nudge SIS Forward 9. Goals
  • 3. 1. Overview • “Share but protect” • Saltzer-Schroeder1 identified the desirability and difficulty of maintaining: • “some control over the user of the information even after it has been released”
  • 4. 2. SIS Major Challenges • Policy Challenge • Modeling, specifying and enforcing SIS policies • Need intuitive yet formal models, guaranteed security properties, etc. • Containment Challenge • Ensure that protected information is accessible to users as permitted by the policy • Security mechanisms such as authentication, cryptography, trusted hardware, etc.
  • 5. 3. Community Cyber Security • Community refers to a geographical area • E.g. county or a city with demarcated boundary • The Center for Infrastructure Assurance and Security at UTSA conducts nation- wide cyber security preparedness exercises and training • communication • incident response • disaster recovery • business continuity • security awareness, etc.
  • 6. 4.The Current Status… • Exchange of business cards • No process exists for information sharing • Technology is not the bottleneck • Resistance due to political/competitive reasons • Also want to avoid embarrassment • E.g. by sharing attack data • Participants have no clue as to what to share and how to effectively specify what to share
  • 7. 5. Requirements • Need abstract models • With rigorous mathematical foundations • Should ease administration • Classic models are limited • DiscretionaryAccess Control • Too low-level to configure • Lattice-BasedAccess Control (E.g. Bell LaPadula) • Rigid • One directional info flow is not the primary concern • Lot of work on Dynamic Coalitions • Many times heavy-weight • Mainly focus on technological/infrastructural integration
  • 8. 6. Life-Cycle of a Cyber Incident Secure Sharing in a Community Core Group Incident Group Open Group Conditional Membership Automatic Membership Filtered RW Administered Membership Administered Membership
  • 9. 7. Privacy Consent State of Mind • The space of Privacy Consent is full of trepidation. I would like to show that although there are complexity, there is also simplicity. The complexity comes in fine-details.The fundamentals, and the technology, are simple • Privacy Consent can be viewed as a "State Diagram", that is by showing what the current state of a patients consent, we can show the changes in state.This is the modeling tool I will use here.
  • 10. Privacy Consent State of Mind • I will focus on how Privacy Consent relates to the access to Health Information, that is shared through some form of Health Information Exchange (HIE). • The architecture of this HIE doesn't matter, it could be PUSH or PULL or anything else. The concepts I show can apply anywhere, but for simplicity think only about the broad use of healthcare information sharing across organizations.
  • 11. Privacy Consent of OPT-OUT • At the right is the diagram for an OPT-OUT environment. One where the patient has the choice to OPT-OUT, that is to stop the use of their data. This means that there is a presumption that when there is no evidence of a choice by the patient, that the data can be used.
  • 12. Privacy Consent of OPT-IN • At the right is the diagram for an OPT-IN environment. In an OPT-IN environment the patient is given the opportunity to ALLOW sharing of their information. This means that there is a presumption that the patient does not want their health information shared. I would view it more as a respect for the patient to make the decision.
  • 13. Privacy Consent:YES vs NO • The reality of privacy consent is that there will be a number of patients that will change their mind. This is just human nature, and there are many really good reasons they might change their mind. A patient that has given OPT-IN authorization might revoke their authorization. A patient that has indicated they don't want their data to be shared might decide that they now do want to share their data.
  • 14. Privacy Consent of Maybe • There are those that have special circumstances that really require special handling. • This state is an indicator, just like "YES" or "NO", but in this case the indicator indicates that there are patient-specific rules. These patient-specific rules likely start with a "YES" or a "NO" and then apply additional rules.
  • 15. Privacy Consent of Maybe • These additional rules might be to block a specific time-period, block a specific report, block a specific person from access, allow a specific person access, etc. • These special rules are applied against each access.Note that the state diagram shows transitions between all three states. It is possible that one goes into the "MAYBE" state forever, or just a while.
  • 16. 8. National Strategy Could Nudge SIS Forward • In the early days of the Obama administration, the president declared cyberspace a critical asset. Since then, little more than lip service has been paid on a policy level to the security of the country’s critical infrastructure, despite increasing public awareness of the problem and high-profile attacks on business and government alike.
  • 17. National Strategy Could Nudge SIS Forward • In December 2013, there was more movement. The White House released the National Strategy for Information Sharing and Safeguarding which is a framework for government agencies to share attack data to repel terrorist threats, cyberattacks and more.
  • 18. National Strategy Could Nudge SIS Forward • The strategy stresses that information must be treated as a national asset and such data must be made available to support national security, it states. It also urges agencies to work together to identify and reduce risks, rather than not share at all. Information, the document states, must underlie all decisions.
  • 19. 9. Goals The president hopes the strategy achieves five goals: • Drive collective action through collaboration and accountability: Using models to build trust and simplify the processes for sharing • Improve information discovery and access through common standards: Doing so paves the way for less ambiguous policies. To achieve this, secure access via authentication and authorization controls, data classification and sharing standards is vital.
  • 20. Goals • Optimize mission effectiveness through shared services and interoperability: Bettering the efficacy of how information is acquired and shared is key here. • Strengthen information safeguarding through structural reform, policy and technical solutions: This calls for controls on data, monitoring for insider and external attacks to better stave off threats to systems and information.
  • 21. Goals • Protect privacy, civil rights and civil liberties through consistency and compliance: Public trust must be a key consideration here, the document stresses. Privacy and civil protections must be built into any sharing mechanism.