Privacy from accessing databases to location based services

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=hTV5ykYMQ3c



Category:
Guide
Duration: 49:35
0 views
0


#CERIAS

https://www.cerias.purdue.edu/site/symposium/

The Center for Education and Research in Information Assurance and Security (CERIAS), a cross-cutting institute at Purdue University, is the world’s foremost interdisciplinary academic center for cyber and cyber-physical systems; more than a hundred researchers addressing issues of security, privacy, resiliency, trusted electronics, autonomy and explainable artificial intelligence. CERIAS brings together world-class faculty, students and industry partners to design, build and maintain trusted cyber/cyber-physical systems. CERIAS serves as an unbiased resource to the worldwide community.

The Research conducted through CERIAS includes faculty from six different colleges and 20+ departments across campus. The six areas below summarize the research focus areas for the faculty involved with the center:

Assured Identity and Privacy
End System Security
Human Centric Security
Network Security
Policy, Law and Management
Prevention, Detection and Response
Policy, Law and Management
This area includes tools and methods for understanding the context of security, and how to best allocate resources for protection of assets. This includes research into risk assessment and mitigation methodologies, policy development, the role of law and social pressure on security, economic aspects of security, cross-cultural issues governing security, cyberethics, simulation and modeling of security, and policy languages and proofs.

Associated personnel: B. Alge, J. Anderson, M. Bernstein, A. Chaturvedi, H. Cho, J. Goldman, K. Kannan, R. Mislan, J.Rees, J. Richardson, D. Schoorman, E. Spafford, L. Tsoukalas

Departments: Communication, Computer Science, Education, ITaP, Management, Nuclear Engineering, Philosophy, Sociology, Computer & Information Technology

Human Centric Security
How does IT change our interactions, and how can more trustworthy IT change them further? This includes studies of on-line trust, ecommerce (business-to-business and business-to-consumer), digital government services, e-conferencing, on-line personae and anonymity, online news, on-line research and the ephemeral nature of information, on-line propaganda, and spam.

Associated faculty: J. Boyd, H. Cho, M. Dutta, A. Elmagarmid, J. Hahn, K. Kannan, S. Matei, P. Meunier, J. Mills, S. Offenbach, M. Rogers, E. Spafford, H. Sypher

Departments: Communication, CERIAS Staff, Computer Science, Hospitality & Tourism Management, Management, Psychology, Computer & Information Technology, Linguistics

End System Security
This area includes tools and methods for building software artifacts, servers, and networks that are resistant to attacks and failures. This includes research into vulnerability assessment and identification, programming languages and tools for secure programming, mobile code and “sandboxes,” proof-carrying systems, trusted embedded systems, resilient server architectures, protection against malicious software, dynamic reconfiguration of systems, hardware architecture design, fault-tolerance, code tamperproofing, and penetration testing. Research into more secure operating systems and database systems falls in this area, as does research into better human-computer interfaces for security (HCI).

Associated personnel: W. Aref, M. Atallah, E. Bertino, B. Bhargava, C. Clifton, R. Eigenmann, A. Elmagarmid, A. Ghafoor, A. Grama, A. Hosking, E. Houstis, C. Justice, P. Meunier, N. Li, C. Nita-Rotaru, K. Park, S. Prabhakar, R. Proctor, J. Rice, G. Salvendy, M. Salvo, L. Si, T.N. Vijaykumar, J. Vitek, K. Watson, D. Xu

Departments: CERIAS staff, Computer & Information Technology, Computer Science, Electrical & Computer Engineering, Industrial Engineering, Linguistics, Psychology

Network Security
Security becomes more complex when participating entities are physically separated from the current location; knowing who and what is communicating from a remote location complicates security decisions. Research in this area includes wireless computing, communication protocol design and verification, agent computation, quality-of-service protection, firewall design and testing, SCADA security, dynamic and protective routing, security for grid computing, and sensor net security.

Associated personnel: S. Bagchi, W. Cleveland, E. Coyle, R. Dejoie, P. Eugster, S. Fahmy, J. T., Korb, S. Ksander, J. Lehnert, S. Matei, P. Meunier, C. Nita-Rotaru, S. Nof, S. Rao, P. Rawles, A. Schroll, N. Shroff, E. Spafford, K. Watson, D. Xu, D. Yau, M. Zhu, M. Zoltowski

Departments: CERIAS staff, Communication, Computer & Information Technology, Computer Science, Electrical & Computer Engineering, Industrial Engineering, ITaP CERIAS - 2009 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-01-18Ribbons, A Partially Shared Memory Programming Model
2022-01-18Detection and protection from denial of service attacks in grids by accountab
2022-01-18The role of System Security Engineering in the engineering lifecycle
2022-01-18Provenance based Data Trustworthiness Assessment in Data Streams
2022-01-18Detecting Insider Theft of Trade Secrets
2022-01-18Database Assurance Anomaly Detection for Relational Databases
2022-01-18Some Thoughts on the Pervasive Trust Foundation for the Future Internet Archi
2022-01-18Providing Privacy through Plausibly Deniable Search
2022-01-18Cyber Security Trends and Disruptors
2022-01-18Software Assurance Motivation, Background, and Acquisition Pursuits
2022-01-18Privacy from accessing databases to location based services
2022-01-18Security in Infrastructureless and Decentralized Communication Networks Pos
2022-01-18An Analysis of Data Breach Disclosure
2022-01-18PlugNPlay Trust for Embedded Communication Systems
2022-01-18USER AWARENESS OF SECURITY COUNTERMEASURES AND ITS IMPACT ON INFORMATION SYST
2022-01-18Multi Policy Access Control for Healthcare using Policy Machine
2022-01-18An Alternate Memory Architecture for Code Injection Prevention
2022-01-18Access Control and Resiliency for WS BPEL
2022-01-18The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyb
2022-01-18A Rules Based Statistical Algorithm for Keystroke Detection
2022-01-18Mace Systems and Language Support for Building Correct, High Performance Net



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering