SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Downloaden Sie, um offline zu lesen
A Multi-decade Perspective!
Trustworthy Computational
Science!
Von Welch!
Indiana University!
Director, CACR!
April 15, 2015!
About	
  the	
  Center	
  for	
  Applied	
  
Cybersecurity	
  Research	
  
•  Interdisciplinary	
  applied	
  research	
  into	
  
cybersecurity.	
  
•  Bridge	
  cybersecurity	
  research	
  and	
  prac7ce	
  
across	
  Indiana	
  University.	
  
•  Externally	
  facing,	
  with	
  projects	
  funded	
  by	
  
NSF,	
  DOE,	
  DHS,	
  …	
  
•  Part	
  of	
  Pervasive	
  Technology	
  Ins7tute.	
  
2
My	
  talk:	
  Cybersecurity	
  and	
  Science	
  
•  The	
  rise	
  of	
  scien7fic	
  compu7ng.	
  
•  Cybersecurity	
  as	
  risk	
  management.	
  
•  What	
  are	
  the	
  risks	
  to	
  science?	
  
•  What	
  can	
  science	
  teach	
  cybersecurity?	
  
•  PuOng	
  it	
  all	
  together.	
  
•  How	
  put	
  this	
  into	
  prac7ce?	
  
3
The “Good Old Days”
Scientists were
employees or
students – physically
co-located.
Image credit: Wikipedia
4
Then remote access…
Scientists start being
remote from the
computers.
But still affiliated
with computing
centers.
Image credit: All About Apple Museum
Creative Commons Attribution-Share Alike 2.5 Italy
5
Growth of the scientific
collaboration
Number of scientists, institutions, resources.
Large, expensive, rare/unique instruments.
Increasing amounts of data.
Image credit: Ian Bird/CERN
6
Cyberinfrastructure!
Scientific Community!
Multiple
Universities
and/or
Research
Orgs!
Regional
R&E and
Commercial
Services!
Open Source
and Scientific
Software!
R&E
Networks,!
IRNCs,!
Science
DMZs!
…
The	
  “Science	
  Stack”	
  
7
Cyberinfrastructure	
  
PCs/Mobile	
  
HPC	
  
HTC	
  
HPSS	
  
Instruments	
  
Science	
  
Data	
  
Servers	
  
Portals	
  
Commodity 	
   	
   	
   	
   	
  Unique	
  
Satellite	
  Links	
  
HPN	
  
Science	
  DMZ	
  Cloud	
  
Data	
  
Subjects	
  
8
What	
  is	
  the	
  Goal	
  
of	
  Cybersecurity	
  
for	
  Science?	
  
9
Cybersecurity Historically!
Firewalls, IDS,
encryption, logs,
passwords, etc.!
!
Not inspirational
to the science
community"
(or many others).!
10
Contemporary Cybersecurity!
Cybersecurity
supports the
organization’s
mission by
managing risks
to science.!
11
Maximizing	
  Trustworthy	
  Science	
  
Trustworthy
Science
Output
Too much
risk
Too little
Science
Security
12
What	
  are	
  the	
  risks	
  to	
  Science?	
  
13
?
Trustworthy Science!
	
  
Integrity of data and
computation are critical to
maintaining the trust of scientists
and the public in CI.!
!
Perception of integrity is often
just as important as reality.!
!
14
Do No Harm!
Cyberinfrastructure
represents some
impressive cyber-
facilities.!
!
Being used as a tool to
harm others would be
very damaging to one’s
reputation.	
  
	
  
15
Collaboration
is key to
science. "
"
Trust is key to
collaboration.!
16
Identity Matters to Science…!
Scott	
  Koranda/LIGO	
  -­‐	
  Oct’11	
  
17
Specific Concerns!
Many science domains,
communities, and
projects have particular
concerns.!
!
The risks related to
confidentiality,
integrity, and
availability vary
greatly, and go by their
own nomenclature.!
18
Cyberinfrastructure!
Scientific Community!
Multiple
Universities
and/or
Research
Orgs!
Regional
R&E and
Commercial
Services!
Open Source
and Scientific
Software!
R&E
Networks,!
IRNCs,!
Science
DMZs!
…
How	
  do	
  we	
  manage	
  these	
  Risks?	
  
19
Leverage	
  services	
  when	
  possible	
  
•  Leverage	
  cybersecurity	
  in	
  these	
  services.	
  
•  Save	
  effort	
  for	
  science-­‐specific	
  challenges.	
  
•  Challenge:	
  Quan7fy	
  and	
  manage	
  residual	
  
risks	
  from	
  those	
  services.	
  
Multiple
Universities
and/or
Research
Orgs!
Regional
R&E and
Commercial
Services!
Open Source
and Scientific
Software!
R&E
Networks,!
IRNCs,!
Science
DMZs!
…
20
Commodity	
  IT	
  
•  Use	
  baseline	
  
cybersecurity	
  
prac7ces	
  from	
  NIST	
  
and	
  others.	
  
E.g.	
  hXp://
trustedci.org/guide/
docs/commodityIT	
  
21
Commodity IT
Unique	
  IT/
Instruments/
Data/etc.	
  
•  Must	
  understand	
  
and	
  manage	
  risk	
  
•  A	
  custom	
  task	
  –	
  can	
  
be	
  helped	
  with	
  
resources	
  
E.g.	
  hXp://
trustedci.org/guide/	
  
22
Unique Assets
What	
  about	
  the	
  Science	
  itself?	
  
•  The	
  mission	
  we	
  are	
  ul7mately	
  suppor7ng.	
  
•  A	
  source	
  of	
  risks.	
  
But	
  is	
  that	
  all?	
  
Scientific Community!
23
Science	
  Manages	
  Risks	
  as	
  Well	
  
•  Biases	
  
•  Errors	
  
24
http://www.ligo.org/news/blind-injection.php
http://cms.web.cern.ch/news/blinding-
and-unblinding-analyses
25
https://theoreticalecology.wordpress.com/2012/06/22/statistical-
analysis-with-blinded-data-a-way-to-go-for-ecology/
Bias:	
  The	
  Ultimate	
  Insider	
  Threat	
  
•  “Insider	
  Threat”	
  –	
  dealing	
  with	
  risks	
  that	
  
originate	
  from	
  inside	
  the	
  organiza7on.	
  
•  Science	
  has	
  been	
  dealing	
  with	
  the	
  risk	
  of	
  bias	
  
for	
  a	
  long	
  7me.	
  
•  Mature	
  science	
  projects	
  bring	
  a	
  lot	
  of	
  risk	
  
management	
  around	
  bias	
  that	
  should	
  be	
  
leveraged	
  by	
  cybersecurity.	
  
•  What	
  is	
  the	
  residual	
  risk	
  in	
  computa7onal	
  
science	
  a^er	
  bias	
  management?	
  
26
27
Cyberinfrastructure!
Scientific Community!
Multiple
Universities
and/or
Research
Orgs!
Regional
R&E and
Commercial
Services!
Open Source
and Scientific
Software!
R&E
Networks,!
IRNCs,!
Science
DMZs!
…
Putting	
  it	
  all	
  together…	
  
Leverage science
processes,
understand risks.
Baseline controls,
risk management.
Leverage services
and cybersecurity to
conserve effort,
understand and
manage residual
risks.
28
How	
  do	
  we	
  
put	
  this	
  into	
  
practice?	
  
29
http://science.energy.gov/~/media/ascr/ascac/pdf/charges/ASCAC_Workforce_Letter_Report.pdf
DOE	
  Advanced	
  ScientiPic	
  Computing	
  Advisory	
  
Committee	
  Workforce	
  Subcommittee	
  Letter	
  
“In	
  par7cular,	
  the	
  findings	
  reveal	
  that:	
  All	
  large	
  DOE	
  
na7onal	
  laboratories	
  face	
  workforce	
  recruitment	
  and	
  
reten7on	
  challenges	
  in	
  the	
  fields	
  within	
  Compu7ng	
  
Sciences	
  that	
  are	
  relevant	
  to	
  their	
  mission	
  (…),	
  including	
  
Algorithms	
  (both	
  numerical	
  and	
  non-­‐numerical);	
  
Applied	
  Mathema7cs;	
  Data	
  Analysis,	
  Management	
  and	
  
Visualiza7on;	
  Cybersecurity;	
  So^ware	
  Engineering	
  and	
  
High	
  Performance	
  So^ware	
  Environments;	
  and	
  High	
  
Performance	
  Computer	
  Systems.“	
  
30
http://blog.ted.com/bridging-the-gulf-in-mental-health-care-vikram-patel-at-tedglobal2012/
Maximizing	
  Limited	
  Expertise	
  
31
SUNDAR	
  
•  Simplify	
  the	
  message	
  
•  UNpack	
  the	
  treatment	
  
•  Deliver	
  it	
  where	
  people	
  are	
  
•  Affordable	
  and	
  available	
  human	
  resources	
  
•  Realloca7on	
  of	
  specialists	
  to	
  train	
  and	
  
supervise	
  
32
Center for Trustworthy Scientific
Cyberinfrastructure"
TrustedCI.org!
!
Increase the NSF community’s understanding of
cybersecurity for science, and advance its
implementation.!
Three-year project funded by NSF ACI.!
33
CTSC Activities!
Engagements!
LIGO, SciGAP, IceCube, Pegasus, CC-NIE peer reviews, DKIST, LTERNO,
DataONE, SEAD, CyberGIS, HUBzero, Globus, LSST, OOI, NEON.!
Education and Training!
Guide to Developing Cybersecurity Programs for NSF Science and
Engineering Projects, Securing Commodity IT in Scientific CI Projects,
Baseline Controls and Best Practices, Training for CI professionals.!
Leadership!
Organized 2013, 2014 & 2015 Cybersecurity Summits for Large Facilities
and CI, vulnerability awareness, Cybersecurity for Large Facilities Manual.!
34
Cybersecurity Program Guide!
Baseline	
  prac7ces	
  and	
  risk	
  management,	
  
tailored	
  for	
  science	
  projects	
  with	
  guidance	
  
and	
  templates.	
  
http://trustedci.org/guide/
35
Please Join Us!!
!
2015 NSF Cybersecurity Summit for !
Large Facilities and Cyberinfrastructure.!
August 17-19, 2015. Arlington, VA!
!
!
Email lists, details and CFP coming soon at
trustedci.org!
36
In conclusion…!
Cybersecurity	
  for	
  science	
  is	
  about	
  managing	
  risks	
  for	
  
science	
  to	
  maximize	
  trustworthy	
  science.	
  
	
  
Science	
  itself	
  has	
  much	
  to	
  offer	
  in	
  the	
  process	
  if	
  we	
  can	
  
figure	
  out	
  how	
  the	
  worlds	
  of	
  cybersecurity	
  and	
  science	
  
interact.	
  
	
  
By	
  leveraging	
  our	
  specialists	
  for	
  training	
  and	
  maximum	
  
impact,	
  we	
  can	
  overcome	
  workforce	
  constraints	
  to	
  make	
  
this	
  a	
  reality.	
  
	
  
	
  
	
  
37
Acknowledgements	
  
•  Colleagues	
  at	
  CACR,	
  CTSC,	
  XSIM	
  who	
  make	
  all	
  this	
  
work	
  possible.	
  
•  Mike	
  Corn,	
  Adam	
  Lyon	
  for	
  discussions	
  and	
  feedback.	
  
•  Department	
  of	
  Energy	
  Next-­‐Genera7on	
  Networks	
  for	
  
Science	
  (NGNS)	
  program	
  (Grant	
  No.	
  DE-­‐
FG02-­‐12ER26111).	
  
•  Na7onal	
  Science	
  Founda7on	
  (Grant	
  1234408).	
  	
  
	
  
The	
  views	
  and	
  conclusions	
  contained	
  herein	
  are	
  those	
  of	
  the	
  author	
  and	
  should	
  not	
  
be	
  interpreted	
  as	
  necessarily	
  represen7ng	
  the	
  official	
  policies	
  or	
  endorsements,	
  
either	
  expressed	
  or	
  implied,	
  of	
  the	
  sponsors	
  or	
  any	
  organiza7on	
  
38
Notes	
  
•  Science	
  Output	
  
•  Science	
  has	
  error	
  management	
  
•  SUNDAR	
  ==	
  Beau7ful	
  in	
  Indian	
  
•  Need	
  to	
  clarify	
  Science/cybersecurity	
  risk	
  
management	
  rela7onship.	
  
39

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyFiroze Hussain
 
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC Advisory Group
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyEnergySec
 
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseEnergySec
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...EnergySec
 
Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6hymasakhamuri
 
Implementing ‘Namebers’ Using Microchip Implants: The Black Box Beneath The Skin
Implementing ‘Namebers’ Using Microchip Implants: The Black Box Beneath The SkinImplementing ‘Namebers’ Using Microchip Implants: The Black Box Beneath The Skin
Implementing ‘Namebers’ Using Microchip Implants: The Black Box Beneath The SkinFoCAS Initiative
 
Be Vigilant: There Are Limits to Veillance
Be Vigilant: There Are Limits to VeillanceBe Vigilant: There Are Limits to Veillance
Be Vigilant: There Are Limits to VeillanceFoCAS Initiative
 
The Consequences of Living and Breathing with Hyperconnectedness
The Consequences of Living and Breathing with HyperconnectednessThe Consequences of Living and Breathing with Hyperconnectedness
The Consequences of Living and Breathing with HyperconnectednessFoCAS Initiative
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityEnergySec
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDr David Probert
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation2b3d
 
Webinar slides march 2022 nikki robinson
Webinar slides march 2022 nikki robinson Webinar slides march 2022 nikki robinson
Webinar slides march 2022 nikki robinson CapitolTechU
 
The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)Cisco Crisis Response
 
Implementing Ethics: Developing Trustworthy AI PyCon 2020
Implementing Ethics: Developing Trustworthy AI PyCon 2020Implementing Ethics: Developing Trustworthy AI PyCon 2020
Implementing Ethics: Developing Trustworthy AI PyCon 2020Carol Smith
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsDr David Probert
 
nistspecialpublication800-86.pdf
nistspecialpublication800-86.pdfnistspecialpublication800-86.pdf
nistspecialpublication800-86.pdfAlexandre Pinheiro
 

Was ist angesagt? (20)

OCR cybersecurity
OCR cybersecurityOCR cybersecurity
OCR cybersecurity
 
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th July
 
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
 
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHSInsight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
 
Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6
 
Implementing ‘Namebers’ Using Microchip Implants: The Black Box Beneath The Skin
Implementing ‘Namebers’ Using Microchip Implants: The Black Box Beneath The SkinImplementing ‘Namebers’ Using Microchip Implants: The Black Box Beneath The Skin
Implementing ‘Namebers’ Using Microchip Implants: The Black Box Beneath The Skin
 
Be Vigilant: There Are Limits to Veillance
Be Vigilant: There Are Limits to VeillanceBe Vigilant: There Are Limits to Veillance
Be Vigilant: There Are Limits to Veillance
 
The Consequences of Living and Breathing with Hyperconnectedness
The Consequences of Living and Breathing with HyperconnectednessThe Consequences of Living and Breathing with Hyperconnectedness
The Consequences of Living and Breathing with Hyperconnectedness
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
 
Webinar slides march 2022 nikki robinson
Webinar slides march 2022 nikki robinson Webinar slides march 2022 nikki robinson
Webinar slides march 2022 nikki robinson
 
The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)
 
Implementing Ethics: Developing Trustworthy AI PyCon 2020
Implementing Ethics: Developing Trustworthy AI PyCon 2020Implementing Ethics: Developing Trustworthy AI PyCon 2020
Implementing Ethics: Developing Trustworthy AI PyCon 2020
 
Another view of virtual worlds
Another view of virtual worldsAnother view of virtual worlds
Another view of virtual worlds
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of Things
 
nistspecialpublication800-86.pdf
nistspecialpublication800-86.pdfnistspecialpublication800-86.pdf
nistspecialpublication800-86.pdf
 

Andere mochten auch

Extreme-scale Identity Management for Scientific Collaborations
Extreme-scale Identity Management for Scientific CollaborationsExtreme-scale Identity Management for Scientific Collaborations
Extreme-scale Identity Management for Scientific CollaborationsVon Welch
 
Shrinking the Planet—How Dedicated Optical Networks are Transforming Computat...
Shrinking the Planet—How Dedicated Optical Networks are Transforming Computat...Shrinking the Planet—How Dedicated Optical Networks are Transforming Computat...
Shrinking the Planet—How Dedicated Optical Networks are Transforming Computat...Larry Smarr
 
AN ALPHA -CUT OPERATION IN A TRANSPORTATION PROBLEM USING SYMMETRIC HEXAGONAL...
AN ALPHA -CUT OPERATION IN A TRANSPORTATION PROBLEM USING SYMMETRIC HEXAGONAL...AN ALPHA -CUT OPERATION IN A TRANSPORTATION PROBLEM USING SYMMETRIC HEXAGONAL...
AN ALPHA -CUT OPERATION IN A TRANSPORTATION PROBLEM USING SYMMETRIC HEXAGONAL...ijfls
 
Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2University of Delhi
 
M.Tech computer-science-and-software-engineering
M.Tech computer-science-and-software-engineeringM.Tech computer-science-and-software-engineering
M.Tech computer-science-and-software-engineeringJECRC UNIVERSITY, RAJASTHAN
 
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...ijcisjournal
 
Tertiary industries: Where should banks put their headquarters?
Tertiary industries: Where should banks put their headquarters?Tertiary industries: Where should banks put their headquarters?
Tertiary industries: Where should banks put their headquarters?Steven Heath
 
An introduction to Computer Technology
An introduction to Computer TechnologyAn introduction to Computer Technology
An introduction to Computer TechnologySteven Heath
 

Andere mochten auch (9)

Extreme-scale Identity Management for Scientific Collaborations
Extreme-scale Identity Management for Scientific CollaborationsExtreme-scale Identity Management for Scientific Collaborations
Extreme-scale Identity Management for Scientific Collaborations
 
Shrinking the Planet—How Dedicated Optical Networks are Transforming Computat...
Shrinking the Planet—How Dedicated Optical Networks are Transforming Computat...Shrinking the Planet—How Dedicated Optical Networks are Transforming Computat...
Shrinking the Planet—How Dedicated Optical Networks are Transforming Computat...
 
AN ALPHA -CUT OPERATION IN A TRANSPORTATION PROBLEM USING SYMMETRIC HEXAGONAL...
AN ALPHA -CUT OPERATION IN A TRANSPORTATION PROBLEM USING SYMMETRIC HEXAGONAL...AN ALPHA -CUT OPERATION IN A TRANSPORTATION PROBLEM USING SYMMETRIC HEXAGONAL...
AN ALPHA -CUT OPERATION IN A TRANSPORTATION PROBLEM USING SYMMETRIC HEXAGONAL...
 
JECRC University Inauguration Media Coverage
JECRC University Inauguration Media CoverageJECRC University Inauguration Media Coverage
JECRC University Inauguration Media Coverage
 
Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2Foundation Course: Information Technology UNIT 2
Foundation Course: Information Technology UNIT 2
 
M.Tech computer-science-and-software-engineering
M.Tech computer-science-and-software-engineeringM.Tech computer-science-and-software-engineering
M.Tech computer-science-and-software-engineering
 
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
 
Tertiary industries: Where should banks put their headquarters?
Tertiary industries: Where should banks put their headquarters?Tertiary industries: Where should banks put their headquarters?
Tertiary industries: Where should banks put their headquarters?
 
An introduction to Computer Technology
An introduction to Computer TechnologyAn introduction to Computer Technology
An introduction to Computer Technology
 

Ähnlich wie Trustworthy Computational Science: A Multi-decade Perspective

Cybersecurity for Science
Cybersecurity for ScienceCybersecurity for Science
Cybersecurity for ScienceVon Welch
 
Trustworthy Computational Science: Lessons Learned and Next Steps
Trustworthy Computational Science: Lessons Learned and Next StepsTrustworthy Computational Science: Lessons Learned and Next Steps
Trustworthy Computational Science: Lessons Learned and Next StepsVon Welch
 
Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...DETER-Project
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsinLabFIB
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksLiming Zhu
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityCSCJournals
 
Colombia 20140326 v1
Colombia 20140326 v1Colombia 20140326 v1
Colombia 20140326 v1ISSIP
 
Democratizing Science through Cyberinfrastructure - Manish Parashar
Democratizing Science through Cyberinfrastructure - Manish ParasharDemocratizing Science through Cyberinfrastructure - Manish Parashar
Democratizing Science through Cyberinfrastructure - Manish ParasharLarry Smarr
 
The "E" in STEM: Why We Can't Wait
The "E" in STEM: Why We Can't WaitThe "E" in STEM: Why We Can't Wait
The "E" in STEM: Why We Can't Waitboralogix
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
WiCyS Career Fair Handbook
WiCyS Career Fair HandbookWiCyS Career Fair Handbook
WiCyS Career Fair HandbookClearedJobs.Net
 
Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity Lilminow
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018aztechcouncil
 
Artificial Intelligence in Cyber Security Research Paper Writing.pptx
Artificial Intelligence in Cyber Security Research Paper Writing.pptxArtificial Intelligence in Cyber Security Research Paper Writing.pptx
Artificial Intelligence in Cyber Security Research Paper Writing.pptxkellysmith617941
 
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...MajedahAlkharji
 
SGCI-URSSI-Sustainability in Research Computing
SGCI-URSSI-Sustainability in Research ComputingSGCI-URSSI-Sustainability in Research Computing
SGCI-URSSI-Sustainability in Research ComputingSandra Gesing
 

Ähnlich wie Trustworthy Computational Science: A Multi-decade Perspective (20)

Cybersecurity for Science
Cybersecurity for ScienceCybersecurity for Science
Cybersecurity for Science
 
Trustworthy Computational Science: Lessons Learned and Next Steps
Trustworthy Computational Science: Lessons Learned and Next StepsTrustworthy Computational Science: Lessons Learned and Next Steps
Trustworthy Computational Science: Lessons Learned and Next Steps
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...
 
NISO — Cutting Edges with Company: Emerging Technologies as a Collective Effort
NISO — Cutting Edges with Company: Emerging Technologies as a Collective EffortNISO — Cutting Edges with Company: Emerging Technologies as a Collective Effort
NISO — Cutting Edges with Company: Emerging Technologies as a Collective Effort
 
Final Anderson Cutting Edges with Company
Final Anderson Cutting Edges with CompanyFinal Anderson Cutting Edges with Company
Final Anderson Cutting Edges with Company
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risks
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
 
mits brochure
mits brochuremits brochure
mits brochure
 
Colombia 20140326 v1
Colombia 20140326 v1Colombia 20140326 v1
Colombia 20140326 v1
 
Democratizing Science through Cyberinfrastructure - Manish Parashar
Democratizing Science through Cyberinfrastructure - Manish ParasharDemocratizing Science through Cyberinfrastructure - Manish Parashar
Democratizing Science through Cyberinfrastructure - Manish Parashar
 
The "E" in STEM: Why We Can't Wait
The "E" in STEM: Why We Can't WaitThe "E" in STEM: Why We Can't Wait
The "E" in STEM: Why We Can't Wait
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
WiCyS Career Fair Handbook
WiCyS Career Fair HandbookWiCyS Career Fair Handbook
WiCyS Career Fair Handbook
 
Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018
 
Artificial Intelligence in Cyber Security Research Paper Writing.pptx
Artificial Intelligence in Cyber Security Research Paper Writing.pptxArtificial Intelligence in Cyber Security Research Paper Writing.pptx
Artificial Intelligence in Cyber Security Research Paper Writing.pptx
 
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
 
SGCI-URSSI-Sustainability in Research Computing
SGCI-URSSI-Sustainability in Research ComputingSGCI-URSSI-Sustainability in Research Computing
SGCI-URSSI-Sustainability in Research Computing
 

Mehr von Von Welch

Facilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity ManagementFacilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity Management Von Welch
 
Facilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity ManagementFacilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity Management Von Welch
 
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands Meeting
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands MeetingXSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands Meeting
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands MeetingVon Welch
 
Welch owasp-feb-2015
Welch owasp-feb-2015Welch owasp-feb-2015
Welch owasp-feb-2015Von Welch
 
CACR Director's Update 2015
CACR Director's Update 2015CACR Director's Update 2015
CACR Director's Update 2015Von Welch
 
Cybersecurity for Science
Cybersecurity for ScienceCybersecurity for Science
Cybersecurity for ScienceVon Welch
 
Campus Identities for Research.
Campus Identities for Research.Campus Identities for Research.
Campus Identities for Research.Von Welch
 
Identity Management for Virtual Organizations: A Model
Identity Management for Virtual Organizations: A ModelIdentity Management for Virtual Organizations: A Model
Identity Management for Virtual Organizations: A ModelVon Welch
 

Mehr von Von Welch (8)

Facilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity ManagementFacilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity Management
 
Facilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity ManagementFacilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity Management
 
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands Meeting
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands MeetingXSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands Meeting
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands Meeting
 
Welch owasp-feb-2015
Welch owasp-feb-2015Welch owasp-feb-2015
Welch owasp-feb-2015
 
CACR Director's Update 2015
CACR Director's Update 2015CACR Director's Update 2015
CACR Director's Update 2015
 
Cybersecurity for Science
Cybersecurity for ScienceCybersecurity for Science
Cybersecurity for Science
 
Campus Identities for Research.
Campus Identities for Research.Campus Identities for Research.
Campus Identities for Research.
 
Identity Management for Virtual Organizations: A Model
Identity Management for Virtual Organizations: A ModelIdentity Management for Virtual Organizations: A Model
Identity Management for Virtual Organizations: A Model
 

Trustworthy Computational Science: A Multi-decade Perspective

  • 1. A Multi-decade Perspective! Trustworthy Computational Science! Von Welch! Indiana University! Director, CACR! April 15, 2015!
  • 2. About  the  Center  for  Applied   Cybersecurity  Research   •  Interdisciplinary  applied  research  into   cybersecurity.   •  Bridge  cybersecurity  research  and  prac7ce   across  Indiana  University.   •  Externally  facing,  with  projects  funded  by   NSF,  DOE,  DHS,  …   •  Part  of  Pervasive  Technology  Ins7tute.   2
  • 3. My  talk:  Cybersecurity  and  Science   •  The  rise  of  scien7fic  compu7ng.   •  Cybersecurity  as  risk  management.   •  What  are  the  risks  to  science?   •  What  can  science  teach  cybersecurity?   •  PuOng  it  all  together.   •  How  put  this  into  prac7ce?   3
  • 4. The “Good Old Days” Scientists were employees or students – physically co-located. Image credit: Wikipedia 4
  • 5. Then remote access… Scientists start being remote from the computers. But still affiliated with computing centers. Image credit: All About Apple Museum Creative Commons Attribution-Share Alike 2.5 Italy 5
  • 6. Growth of the scientific collaboration Number of scientists, institutions, resources. Large, expensive, rare/unique instruments. Increasing amounts of data. Image credit: Ian Bird/CERN 6
  • 7. Cyberinfrastructure! Scientific Community! Multiple Universities and/or Research Orgs! Regional R&E and Commercial Services! Open Source and Scientific Software! R&E Networks,! IRNCs,! Science DMZs! … The  “Science  Stack”   7
  • 8. Cyberinfrastructure   PCs/Mobile   HPC   HTC   HPSS   Instruments   Science   Data   Servers   Portals   Commodity          Unique   Satellite  Links   HPN   Science  DMZ  Cloud   Data   Subjects   8
  • 9. What  is  the  Goal   of  Cybersecurity   for  Science?   9
  • 10. Cybersecurity Historically! Firewalls, IDS, encryption, logs, passwords, etc.! ! Not inspirational to the science community" (or many others).! 10
  • 12. Maximizing  Trustworthy  Science   Trustworthy Science Output Too much risk Too little Science Security 12
  • 13. What  are  the  risks  to  Science?   13 ?
  • 14. Trustworthy Science!   Integrity of data and computation are critical to maintaining the trust of scientists and the public in CI.! ! Perception of integrity is often just as important as reality.! ! 14
  • 15. Do No Harm! Cyberinfrastructure represents some impressive cyber- facilities.! ! Being used as a tool to harm others would be very damaging to one’s reputation.     15
  • 16. Collaboration is key to science. " " Trust is key to collaboration.! 16
  • 17. Identity Matters to Science…! Scott  Koranda/LIGO  -­‐  Oct’11   17
  • 18. Specific Concerns! Many science domains, communities, and projects have particular concerns.! ! The risks related to confidentiality, integrity, and availability vary greatly, and go by their own nomenclature.! 18
  • 19. Cyberinfrastructure! Scientific Community! Multiple Universities and/or Research Orgs! Regional R&E and Commercial Services! Open Source and Scientific Software! R&E Networks,! IRNCs,! Science DMZs! … How  do  we  manage  these  Risks?   19
  • 20. Leverage  services  when  possible   •  Leverage  cybersecurity  in  these  services.   •  Save  effort  for  science-­‐specific  challenges.   •  Challenge:  Quan7fy  and  manage  residual   risks  from  those  services.   Multiple Universities and/or Research Orgs! Regional R&E and Commercial Services! Open Source and Scientific Software! R&E Networks,! IRNCs,! Science DMZs! … 20
  • 21. Commodity  IT   •  Use  baseline   cybersecurity   prac7ces  from  NIST   and  others.   E.g.  hXp:// trustedci.org/guide/ docs/commodityIT   21 Commodity IT
  • 22. Unique  IT/ Instruments/ Data/etc.   •  Must  understand   and  manage  risk   •  A  custom  task  –  can   be  helped  with   resources   E.g.  hXp:// trustedci.org/guide/   22 Unique Assets
  • 23. What  about  the  Science  itself?   •  The  mission  we  are  ul7mately  suppor7ng.   •  A  source  of  risks.   But  is  that  all?   Scientific Community! 23
  • 24. Science  Manages  Risks  as  Well   •  Biases   •  Errors   24 http://www.ligo.org/news/blind-injection.php
  • 26. Bias:  The  Ultimate  Insider  Threat   •  “Insider  Threat”  –  dealing  with  risks  that   originate  from  inside  the  organiza7on.   •  Science  has  been  dealing  with  the  risk  of  bias   for  a  long  7me.   •  Mature  science  projects  bring  a  lot  of  risk   management  around  bias  that  should  be   leveraged  by  cybersecurity.   •  What  is  the  residual  risk  in  computa7onal   science  a^er  bias  management?   26
  • 27. 27
  • 28. Cyberinfrastructure! Scientific Community! Multiple Universities and/or Research Orgs! Regional R&E and Commercial Services! Open Source and Scientific Software! R&E Networks,! IRNCs,! Science DMZs! … Putting  it  all  together…   Leverage science processes, understand risks. Baseline controls, risk management. Leverage services and cybersecurity to conserve effort, understand and manage residual risks. 28
  • 29. How  do  we   put  this  into   practice?   29
  • 30. http://science.energy.gov/~/media/ascr/ascac/pdf/charges/ASCAC_Workforce_Letter_Report.pdf DOE  Advanced  ScientiPic  Computing  Advisory   Committee  Workforce  Subcommittee  Letter   “In  par7cular,  the  findings  reveal  that:  All  large  DOE   na7onal  laboratories  face  workforce  recruitment  and   reten7on  challenges  in  the  fields  within  Compu7ng   Sciences  that  are  relevant  to  their  mission  (…),  including   Algorithms  (both  numerical  and  non-­‐numerical);   Applied  Mathema7cs;  Data  Analysis,  Management  and   Visualiza7on;  Cybersecurity;  So^ware  Engineering  and   High  Performance  So^ware  Environments;  and  High   Performance  Computer  Systems.“   30
  • 32. SUNDAR   •  Simplify  the  message   •  UNpack  the  treatment   •  Deliver  it  where  people  are   •  Affordable  and  available  human  resources   •  Realloca7on  of  specialists  to  train  and   supervise   32
  • 33. Center for Trustworthy Scientific Cyberinfrastructure" TrustedCI.org! ! Increase the NSF community’s understanding of cybersecurity for science, and advance its implementation.! Three-year project funded by NSF ACI.! 33
  • 34. CTSC Activities! Engagements! LIGO, SciGAP, IceCube, Pegasus, CC-NIE peer reviews, DKIST, LTERNO, DataONE, SEAD, CyberGIS, HUBzero, Globus, LSST, OOI, NEON.! Education and Training! Guide to Developing Cybersecurity Programs for NSF Science and Engineering Projects, Securing Commodity IT in Scientific CI Projects, Baseline Controls and Best Practices, Training for CI professionals.! Leadership! Organized 2013, 2014 & 2015 Cybersecurity Summits for Large Facilities and CI, vulnerability awareness, Cybersecurity for Large Facilities Manual.! 34
  • 35. Cybersecurity Program Guide! Baseline  prac7ces  and  risk  management,   tailored  for  science  projects  with  guidance   and  templates.   http://trustedci.org/guide/ 35
  • 36. Please Join Us!! ! 2015 NSF Cybersecurity Summit for ! Large Facilities and Cyberinfrastructure.! August 17-19, 2015. Arlington, VA! ! ! Email lists, details and CFP coming soon at trustedci.org! 36
  • 37. In conclusion…! Cybersecurity  for  science  is  about  managing  risks  for   science  to  maximize  trustworthy  science.     Science  itself  has  much  to  offer  in  the  process  if  we  can   figure  out  how  the  worlds  of  cybersecurity  and  science   interact.     By  leveraging  our  specialists  for  training  and  maximum   impact,  we  can  overcome  workforce  constraints  to  make   this  a  reality.         37
  • 38. Acknowledgements   •  Colleagues  at  CACR,  CTSC,  XSIM  who  make  all  this   work  possible.   •  Mike  Corn,  Adam  Lyon  for  discussions  and  feedback.   •  Department  of  Energy  Next-­‐Genera7on  Networks  for   Science  (NGNS)  program  (Grant  No.  DE-­‐ FG02-­‐12ER26111).   •  Na7onal  Science  Founda7on  (Grant  1234408).       The  views  and  conclusions  contained  herein  are  those  of  the  author  and  should  not   be  interpreted  as  necessarily  represen7ng  the  official  policies  or  endorsements,   either  expressed  or  implied,  of  the  sponsors  or  any  organiza7on   38
  • 39. Notes   •  Science  Output   •  Science  has  error  management   •  SUNDAR  ==  Beau7ful  in  Indian   •  Need  to  clarify  Science/cybersecurity  risk   management  rela7onship.   39