SlideShare a Scribd company logo
1 of 6
S oftware
E ngineering&
N etwork
S ystems Lab
How Does Cybersecurity
Relate to Safety?
Betty H.C. Cheng,
Software Engineering and Network Systems Lab
Digital Evolution Laboratory
BEACON: NSF Center for Evolution in Action
Department of Computer Science and Engineering
Michigan State University
chengb at cse dot msu dot edu
http://www.cse.msu.edu/~chengb
S oftware
E ngineering&
N etwork
S ystems Lab
IoT: Physical Cyberinfrastructure
•Network-
•Centric
•Battlefiel
d •Homeland
Security
•Ecosystem
Monitoring
•Disaste
r
•Relief
•Secure Information
Systems
•Digital Supply
Chain
• Remote
• Safety-
critical
• Real-time
• Privacy
• Adaptable
• All the
above
• Wired
•Internet
S oftware
E ngineering&
N etwork
S ystems Lab
New Scale: Internet of Things
Healthcare Infrastructure
•New scale:
• Data stored, accessed, manipulated, and refined
• Number of connections/interdependencies among
components
• Number of hardware elements
•Ultra-Large-Scale Systems
•Linda Northrop, ICSE 2007
•© 2007 Carnegie Mellon University
•20
Heterogeneous Collection of Distributed Systems
S oftware
E ngineering&
N etwork
S ystems Lab
Intelligent Transportation and Vehicle Systems
Ultra-Large Scale Systems
High-Assurance Cyberphysical Systems
•Ultra-Large-Scale Systems
•Linda Northrop, ICSE 2007
•© 2007 Carnegie Mellon University
•21
•Requires increasingly complex systems
• Thousands of platforms, sensors, decision nodes, complex
systems
• Connected through heterogeneous wired and wireless
networks.
S
E
N
S
ftware
gineering&
twork stems
Lab
S oftware
E ngineering&
N etwork
S ystems LabThe ULS/IoT Ecosystem
• Key elements:
– Computing devices
– Business and organizational policies
– Environment (including people)
• Forces:
– Competition for resources
– Unexpected environmental changes
– Decentralized control
– Demand for assurance (safety and
security)
S oftware
E ngineering&
N etwork
S ystems Lab
• Key Cybersecurity Challenges:
– Prevention
– Detection
– Mitigation
• Competing Concerns:
• Safety
• Information Access (e.g., “Internet of Things”)
• Heterogeneity of Systems and Stakeholders
• Multi-Disciplinary Strategies:
– Leverage enabling technologies from other disciplines
(e.g., biology, AI, control, cognitive & social science, etc.)
– Collaborate with other disciplines for a more holistic,
systemic approach to address cybersecurity and safety.
6
Approach

More Related Content

What's hot

NSF and Environmental Cyberinfrastructure
NSF and Environmental CyberinfrastructureNSF and Environmental Cyberinfrastructure
NSF and Environmental Cyberinfrastructureazgs
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensiknewbie2019
 
FYP2- Micro Search Engine for Iot
FYP2- Micro Search Engine for IotFYP2- Micro Search Engine for Iot
FYP2- Micro Search Engine for IotAhmed Al-Haddad
 
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...Rihab Rahman
 
New Threats to Data Security
New Threats to Data SecurityNew Threats to Data Security
New Threats to Data SecurityDriveSavers, Inc.
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEEFINALYEARSTUDENTPROJECTS
 
Scaling Approaches to the National Research Platform
Scaling Approaches to the National Research PlatformScaling Approaches to the National Research Platform
Scaling Approaches to the National Research PlatformJerry Sheehan
 
Data Mining Research Projects Tutorials
Data Mining Research Projects TutorialsData Mining Research Projects Tutorials
Data Mining Research Projects TutorialsPhdtopiccom
 
Topics in Networking for project and thesis
Topics in Networking for project and thesisTopics in Networking for project and thesis
Topics in Networking for project and thesisTechsparks
 

What's hot (12)

On Physical Web models
On Physical Web modelsOn Physical Web models
On Physical Web models
 
NSF and Environmental Cyberinfrastructure
NSF and Environmental CyberinfrastructureNSF and Environmental Cyberinfrastructure
NSF and Environmental Cyberinfrastructure
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
 
Healthcare and Cyber Security 2015 :Is India Ready?
Healthcare and Cyber Security 2015 :Is India Ready? Healthcare and Cyber Security 2015 :Is India Ready?
Healthcare and Cyber Security 2015 :Is India Ready?
 
FYP2- Micro Search Engine for Iot
FYP2- Micro Search Engine for IotFYP2- Micro Search Engine for Iot
FYP2- Micro Search Engine for Iot
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
 
New Threats to Data Security
New Threats to Data SecurityNew Threats to Data Security
New Threats to Data Security
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
 
Scaling Approaches to the National Research Platform
Scaling Approaches to the National Research PlatformScaling Approaches to the National Research Platform
Scaling Approaches to the National Research Platform
 
Data Mining Research Projects Tutorials
Data Mining Research Projects TutorialsData Mining Research Projects Tutorials
Data Mining Research Projects Tutorials
 
Topics in Networking for project and thesis
Topics in Networking for project and thesisTopics in Networking for project and thesis
Topics in Networking for project and thesis
 

Viewers also liked (10)

A New Magnetic Resononance Imaging Biomarker for Diabetes
A New Magnetic Resononance Imaging Biomarker for DiabetesA New Magnetic Resononance Imaging Biomarker for Diabetes
A New Magnetic Resononance Imaging Biomarker for Diabetes
 
Big Data Use
Big Data UseBig Data Use
Big Data Use
 
Center of Reserach Excellence in Ultrafast Science
Center of Reserach Excellence in Ultrafast ScienceCenter of Reserach Excellence in Ultrafast Science
Center of Reserach Excellence in Ultrafast Science
 
Big Data Problems
Big Data ProblemsBig Data Problems
Big Data Problems
 
Leveraging Electronic Health Records for Predictive Modeling
Leveraging Electronic Health Records for Predictive ModelingLeveraging Electronic Health Records for Predictive Modeling
Leveraging Electronic Health Records for Predictive Modeling
 
Challenges of Big Data in Health Care
Challenges of Big Data in Health CareChallenges of Big Data in Health Care
Challenges of Big Data in Health Care
 
Harnessing Microbe-Electrode Interactions for Bioenergy
Harnessing Microbe-Electrode Interactions for BioenergyHarnessing Microbe-Electrode Interactions for Bioenergy
Harnessing Microbe-Electrode Interactions for Bioenergy
 
Advancing Domicology for Sustainable Construction
Advancing Domicology for Sustainable ConstructionAdvancing Domicology for Sustainable Construction
Advancing Domicology for Sustainable Construction
 
Advancing the Science of Domicology
Advancing the Science of DomicologyAdvancing the Science of Domicology
Advancing the Science of Domicology
 
Removal of Abandoned Properties Deconstruction vs.Demolition
Removal of Abandoned Properties Deconstruction vs.DemolitionRemoval of Abandoned Properties Deconstruction vs.Demolition
Removal of Abandoned Properties Deconstruction vs.Demolition
 

Similar to Cybersecurity Safety

IEEE 2014 DOTNET DATA MINING PROJECTS Data mining with big data
IEEE 2014 DOTNET DATA MINING PROJECTS Data mining with big dataIEEE 2014 DOTNET DATA MINING PROJECTS Data mining with big data
IEEE 2014 DOTNET DATA MINING PROJECTS Data mining with big dataIEEEMEMTECHSTUDENTPROJECTS
 
2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data
2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data
2014 IEEE DOTNET DATA MINING PROJECT Data mining with big dataIEEEMEMTECHSTUDENTSPROJECTS
 
Internet of Things: Research Directions
Internet of Things: Research DirectionsInternet of Things: Research Directions
Internet of Things: Research DirectionsDavide Nardone
 
MIT-KIT Intro at #idcon sattelite
MIT-KIT Intro at #idcon satteliteMIT-KIT Intro at #idcon sattelite
MIT-KIT Intro at #idcon satteliteNov Matake
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptnadoje
 
Montana State, Research Networking and the Outcomes from the First National R...
Montana State, Research Networking and the Outcomes from the First National R...Montana State, Research Networking and the Outcomes from the First National R...
Montana State, Research Networking and the Outcomes from the First National R...Jerry Sheehan
 
Fog computing
Fog computingFog computing
Fog computingAnkit_ap
 
Cybersecurity Threat Analysis: Status and Advanced Tools
Cybersecurity Threat Analysis: Status and Advanced ToolsCybersecurity Threat Analysis: Status and Advanced Tools
Cybersecurity Threat Analysis: Status and Advanced ToolsSantiago Nunez
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)OnRamp
 
Distributed Trust Architecture: The New Foundation of Everything
Distributed Trust Architecture: The New Foundation of EverythingDistributed Trust Architecture: The New Foundation of Everything
Distributed Trust Architecture: The New Foundation of EverythingLiming Zhu
 
Atal io t introduction
Atal io t introductionAtal io t introduction
Atal io t introductionYadvendra bedi
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkGauthamSK4
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaMaribel García Arenas
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksLiming Zhu
 
Internet2 Bio IT 2016 v2
Internet2 Bio IT 2016 v2Internet2 Bio IT 2016 v2
Internet2 Bio IT 2016 v2Dan Taylor
 

Similar to Cybersecurity Safety (20)

IEEE 2014 DOTNET DATA MINING PROJECTS Data mining with big data
IEEE 2014 DOTNET DATA MINING PROJECTS Data mining with big dataIEEE 2014 DOTNET DATA MINING PROJECTS Data mining with big data
IEEE 2014 DOTNET DATA MINING PROJECTS Data mining with big data
 
2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data
2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data
2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data
 
Internet of Things: Research Directions
Internet of Things: Research DirectionsInternet of Things: Research Directions
Internet of Things: Research Directions
 
MIT-KIT Intro at #idcon sattelite
MIT-KIT Intro at #idcon satteliteMIT-KIT Intro at #idcon sattelite
MIT-KIT Intro at #idcon sattelite
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
Montana State, Research Networking and the Outcomes from the First National R...
Montana State, Research Networking and the Outcomes from the First National R...Montana State, Research Networking and the Outcomes from the First National R...
Montana State, Research Networking and the Outcomes from the First National R...
 
Fog computing
Fog computingFog computing
Fog computing
 
Cybersecurity Threat Analysis: Status and Advanced Tools
Cybersecurity Threat Analysis: Status and Advanced ToolsCybersecurity Threat Analysis: Status and Advanced Tools
Cybersecurity Threat Analysis: Status and Advanced Tools
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
CINET: A CyberInfrastructure for Network Science
CINET: A CyberInfrastructure for Network ScienceCINET: A CyberInfrastructure for Network Science
CINET: A CyberInfrastructure for Network Science
 
ECE department faculty research profile
ECE department faculty research profileECE department faculty research profile
ECE department faculty research profile
 
Distributed Trust Architecture: The New Foundation of Everything
Distributed Trust Architecture: The New Foundation of EverythingDistributed Trust Architecture: The New Foundation of Everything
Distributed Trust Architecture: The New Foundation of Everything
 
Sinnott Paper
Sinnott PaperSinnott Paper
Sinnott Paper
 
Atal io t introduction
Atal io t introductionAtal io t introduction
Atal io t introduction
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia Network
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
 
Resume_CV___1_.pdf
Resume_CV___1_.pdfResume_CV___1_.pdf
Resume_CV___1_.pdf
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risks
 
Internet2 Bio IT 2016 v2
Internet2 Bio IT 2016 v2Internet2 Bio IT 2016 v2
Internet2 Bio IT 2016 v2
 

More from Michigan State University Research

Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Intelligent and Automatic In vivo Detection and Quantification of Transplante...Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Intelligent and Automatic In vivo Detection and Quantification of Transplante...Michigan State University Research
 
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...Michigan State University Research
 
Taking an ancient path towards artificial intelligence 10-12-16
Taking an ancient path towards artificial intelligence 10-12-16Taking an ancient path towards artificial intelligence 10-12-16
Taking an ancient path towards artificial intelligence 10-12-16Michigan State University Research
 
Michigan State University coffee break: building a budget 10-20-16
Michigan State University coffee break: building a budget 10-20-16Michigan State University coffee break: building a budget 10-20-16
Michigan State University coffee break: building a budget 10-20-16Michigan State University Research
 
Synthesis of Biobased Terephthalic Acid: Enabling Manufacture of 100% Renewab...
Synthesis of Biobased Terephthalic Acid: Enabling Manufacture of 100% Renewab...Synthesis of Biobased Terephthalic Acid: Enabling Manufacture of 100% Renewab...
Synthesis of Biobased Terephthalic Acid: Enabling Manufacture of 100% Renewab...Michigan State University Research
 

More from Michigan State University Research (20)

NFRO interdisciplinary international 081617
NFRO interdisciplinary international 081617NFRO interdisciplinary international 081617
NFRO interdisciplinary international 081617
 
Web accessible nfro 2017 as of 08152017
Web accessible nfro 2017 as of 08152017Web accessible nfro 2017 as of 08152017
Web accessible nfro 2017 as of 08152017
 
SmartAg/Food Engineering Overview
SmartAg/Food Engineering OverviewSmartAg/Food Engineering Overview
SmartAg/Food Engineering Overview
 
The Internet of Plants
The Internet of PlantsThe Internet of Plants
The Internet of Plants
 
Digital Agriculture
Digital AgricultureDigital Agriculture
Digital Agriculture
 
MSU Transgenic and Genome Editing Facility
MSU Transgenic and Genome Editing FacilityMSU Transgenic and Genome Editing Facility
MSU Transgenic and Genome Editing Facility
 
Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Intelligent and Automatic In vivo Detection and Quantification of Transplante...Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Intelligent and Automatic In vivo Detection and Quantification of Transplante...
 
Re-budgeting & Report Tracking in KC
Re-budgeting & Report Tracking in KCRe-budgeting & Report Tracking in KC
Re-budgeting & Report Tracking in KC
 
Budget Development in KC
Budget Development in KCBudget Development in KC
Budget Development in KC
 
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...
 
Proposal Development in KC
Proposal Development in KCProposal Development in KC
Proposal Development in KC
 
Thomas D. Gregory 9 14-16
Thomas D. Gregory 9 14-16Thomas D. Gregory 9 14-16
Thomas D. Gregory 9 14-16
 
Taking an ancient path towards artificial intelligence 10-12-16
Taking an ancient path towards artificial intelligence 10-12-16Taking an ancient path towards artificial intelligence 10-12-16
Taking an ancient path towards artificial intelligence 10-12-16
 
Michigan State University coffee break: building a budget 10-20-16
Michigan State University coffee break: building a budget 10-20-16Michigan State University coffee break: building a budget 10-20-16
Michigan State University coffee break: building a budget 10-20-16
 
Domicology: Changing the CEM Paradigm
Domicology: Changing the CEM ParadigmDomicology: Changing the CEM Paradigm
Domicology: Changing the CEM Paradigm
 
Synthesis of Biobased Terephthalic Acid: Enabling Manufacture of 100% Renewab...
Synthesis of Biobased Terephthalic Acid: Enabling Manufacture of 100% Renewab...Synthesis of Biobased Terephthalic Acid: Enabling Manufacture of 100% Renewab...
Synthesis of Biobased Terephthalic Acid: Enabling Manufacture of 100% Renewab...
 
Working with Universities on Export-Controlled Technology
Working with Universities on Export-Controlled TechnologyWorking with Universities on Export-Controlled Technology
Working with Universities on Export-Controlled Technology
 
Engaging with DARPA - Stefanie Thompkins
Engaging with DARPA - Stefanie ThompkinsEngaging with DARPA - Stefanie Thompkins
Engaging with DARPA - Stefanie Thompkins
 
Epidemiology: Sex/Gender and Health
Epidemiology: Sex/Gender and HealthEpidemiology: Sex/Gender and Health
Epidemiology: Sex/Gender and Health
 
Gender Matters: Stress
Gender Matters: StressGender Matters: Stress
Gender Matters: Stress
 

Recently uploaded

Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 

Recently uploaded (20)

Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 

Cybersecurity Safety

  • 1. S oftware E ngineering& N etwork S ystems Lab How Does Cybersecurity Relate to Safety? Betty H.C. Cheng, Software Engineering and Network Systems Lab Digital Evolution Laboratory BEACON: NSF Center for Evolution in Action Department of Computer Science and Engineering Michigan State University chengb at cse dot msu dot edu http://www.cse.msu.edu/~chengb
  • 2. S oftware E ngineering& N etwork S ystems Lab IoT: Physical Cyberinfrastructure •Network- •Centric •Battlefiel d •Homeland Security •Ecosystem Monitoring •Disaste r •Relief •Secure Information Systems •Digital Supply Chain • Remote • Safety- critical • Real-time • Privacy • Adaptable • All the above • Wired •Internet
  • 3. S oftware E ngineering& N etwork S ystems Lab New Scale: Internet of Things Healthcare Infrastructure •New scale: • Data stored, accessed, manipulated, and refined • Number of connections/interdependencies among components • Number of hardware elements •Ultra-Large-Scale Systems •Linda Northrop, ICSE 2007 •© 2007 Carnegie Mellon University •20 Heterogeneous Collection of Distributed Systems
  • 4. S oftware E ngineering& N etwork S ystems Lab Intelligent Transportation and Vehicle Systems Ultra-Large Scale Systems High-Assurance Cyberphysical Systems •Ultra-Large-Scale Systems •Linda Northrop, ICSE 2007 •© 2007 Carnegie Mellon University •21 •Requires increasingly complex systems • Thousands of platforms, sensors, decision nodes, complex systems • Connected through heterogeneous wired and wireless networks.
  • 5. S E N S ftware gineering& twork stems Lab S oftware E ngineering& N etwork S ystems LabThe ULS/IoT Ecosystem • Key elements: – Computing devices – Business and organizational policies – Environment (including people) • Forces: – Competition for resources – Unexpected environmental changes – Decentralized control – Demand for assurance (safety and security)
  • 6. S oftware E ngineering& N etwork S ystems Lab • Key Cybersecurity Challenges: – Prevention – Detection – Mitigation • Competing Concerns: • Safety • Information Access (e.g., “Internet of Things”) • Heterogeneity of Systems and Stakeholders • Multi-Disciplinary Strategies: – Leverage enabling technologies from other disciplines (e.g., biology, AI, control, cognitive & social science, etc.) – Collaborate with other disciplines for a more holistic, systemic approach to address cybersecurity and safety. 6 Approach