SlideShare a Scribd company logo
S oftware
E ngineering &
N etwork
S ystems Lab
How Does Cybersecurity
Relate to Safety?
Betty H.C. Cheng,
Software Engineering and Network Systems Lab
Digital Evolution Laboratory
BEACON: NSF Center for Evolution in Action
Department of Computer Science and Engineering
Michigan State University
chengb at cse dot msu dot edu
http://www.cse.msu.edu/~chengb
S oftware
E ngineering &
N etwork
S ystems Lab
IoT: Physical Cyberinfrastructure
•Network-
•Centric
•Battlefield
•Homeland Security
•Ecosystem Monitoring
•Disaster
•Relief
•Secure Information Systems•Digital Supply Chain
• Remote
• Safety-critical
• Real-time
• Privacy
• Adaptable
• All the above
• Wired
•Internet
S oftware
E ngineering &
N etwork
S ystems Lab
New Scale: Internet of Things
Healthcare Infrastructure
•20
•Ultra-Large-ScaleSystems
•Linda Northrop, ICSE 2007
•© 2007 Carnegie Mellon University
•New scale:
• Data stored, accessed, manipulated, and refined
• Number of connections/interdependencies among
components
• Number of hardware elements
Heterogeneous Collection of Distributed Systems
S oftware
E ngineering &
N etwork
S ystems Lab
Intelligent Transportation and Vehicle Systems
•21
•Ultra-Large-ScaleSystems
•Linda Northrop, ICSE 2007
•© 2007 Carnegie Mellon University
High-Assurance Cyberphysical Systems
•Requires increasingly complex systems
• Thousands of platforms, sensors, decision nodes, complex
systems
• Connected through heterogeneous wired and wireless
networks.
Ultra-Large Scale Systems
S oftware
E ngineering &
N etwork
S ystems Lab
S oftware
E ngineering &
N etwork
S ystems LabThe ULS/IoT Ecosystem
• Key elements:
– Computing devices
– Business and organizational policies
– Environment (including people)
• Forces:
– Competition for resources
– Unexpected environmental changes
– Decentralized control
– Demand for assurance (safety and
security)
S oftware
E ngineering &
N etwork
S ystems Lab
Approach
• Key Cybersecurity Challenges:
– Prevention
– Detection
– Mitigation
• Competing Concerns:
• Safety
• Information Access (e.g., “Internet of Things”)
• Heterogeneity of Systems and Stakeholders
• Multi-Disciplinary Strategies:
– Leverage enabling technologies from other disciplines
(e.g., biology, AI, control, cognitive & social science, etc.)
– Collaborate with other disciplines for a more holistic,
systemic approach to address cybersecurity and safety.
6

More Related Content

What's hot

On Crowd-sensing back-end
On Crowd-sensing back-endOn Crowd-sensing back-end
On Crowd-sensing back-end
Coldbeans Software
 
On Internet of Things programming models
On Internet of Things programming modelsOn Internet of Things programming models
On Internet of Things programming models
Coldbeans Software
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
newbie2019
 
On Physical Web models
On Physical Web modelsOn Physical Web models
On Physical Web models
Coldbeans Software
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEEFINALYEARSTUDENTPROJECTS
 
Research Topics in Network Security for PhD
Research Topics in Network Security for PhDResearch Topics in Network Security for PhD
Research Topics in Network Security for PhD
Phdtopiccom
 
Projects for MSc Computer Science Students
Projects for MSc Computer Science StudentsProjects for MSc Computer Science Students
Projects for MSc Computer Science Students
Phdtopiccom
 
Scaling Approaches to the National Research Platform
Scaling Approaches to the National Research PlatformScaling Approaches to the National Research Platform
Scaling Approaches to the National Research Platform
Jerry Sheehan
 
Topics in Networking for project and thesis
Topics in Networking for project and thesisTopics in Networking for project and thesis
Topics in Networking for project and thesis
Techsparks
 

What's hot (10)

On Crowd-sensing back-end
On Crowd-sensing back-endOn Crowd-sensing back-end
On Crowd-sensing back-end
 
On Internet of Things programming models
On Internet of Things programming modelsOn Internet of Things programming models
On Internet of Things programming models
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
 
On Physical Web models
On Physical Web modelsOn Physical Web models
On Physical Web models
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
 
Research Topics in Network Security for PhD
Research Topics in Network Security for PhDResearch Topics in Network Security for PhD
Research Topics in Network Security for PhD
 
Projects for MSc Computer Science Students
Projects for MSc Computer Science StudentsProjects for MSc Computer Science Students
Projects for MSc Computer Science Students
 
Scaling Approaches to the National Research Platform
Scaling Approaches to the National Research PlatformScaling Approaches to the National Research Platform
Scaling Approaches to the National Research Platform
 
Topics in Networking for project and thesis
Topics in Networking for project and thesisTopics in Networking for project and thesis
Topics in Networking for project and thesis
 
there
therethere
there
 

Viewers also liked

Jacquelyn pryor resume-1
Jacquelyn pryor resume-1Jacquelyn pryor resume-1
Jacquelyn pryor resume-1
Jackie Pryor
 
Developing Web-Enabled Considering Decision Support System for Staff Dormitor...
Developing Web-Enabled Considering Decision Support System for Staff Dormitor...Developing Web-Enabled Considering Decision Support System for Staff Dormitor...
Developing Web-Enabled Considering Decision Support System for Staff Dormitor...
Chingchai Humhong
 
Paula Fleming - Resume 11-12-15
Paula Fleming - Resume 11-12-15Paula Fleming - Resume 11-12-15
Paula Fleming - Resume 11-12-15Paula Fleming
 
Resume 2016 for Library
Resume 2016 for LibraryResume 2016 for Library
Resume 2016 for LibraryCarolyn Sachs
 
Participatory 3-Dimensional Mapping (P3DM) for Disaster Risk Reduction
Participatory 3-Dimensional Mapping (P3DM) for Disaster Risk ReductionParticipatory 3-Dimensional Mapping (P3DM) for Disaster Risk Reduction
Participatory 3-Dimensional Mapping (P3DM) for Disaster Risk Reduction
Giacomo Rambaldi
 
Dr Crispin Cooper - QGIS Plugin ‘sDNA’
Dr Crispin Cooper - QGIS Plugin ‘sDNA’Dr Crispin Cooper - QGIS Plugin ‘sDNA’
Dr Crispin Cooper - QGIS Plugin ‘sDNA’
Shaun Lewis
 
Using Lidar in QGIS
Using Lidar in QGISUsing Lidar in QGIS
Using Lidar in QGIS
Matt Travis
 
Statistic Analysis
Statistic AnalysisStatistic Analysis
Statistic Analysis
Khadijah Sohail
 
Using Data Services in QGIS by Richard Evans
Using Data Services in QGIS by Richard EvansUsing Data Services in QGIS by Richard Evans
Using Data Services in QGIS by Richard Evans
Shaun Lewis
 
Making beautiful maps with Mapbox Studio by Charley Glynn
Making beautiful maps with Mapbox Studio by Charley GlynnMaking beautiful maps with Mapbox Studio by Charley Glynn
Making beautiful maps with Mapbox Studio by Charley Glynn
Shaun Lewis
 
Xactly Sales Compensation for Dummies_02_05_2007
Xactly Sales Compensation for Dummies_02_05_2007Xactly Sales Compensation for Dummies_02_05_2007
Xactly Sales Compensation for Dummies_02_05_2007ThreatMetrix
 

Viewers also liked (13)

Jacquelyn pryor resume-1
Jacquelyn pryor resume-1Jacquelyn pryor resume-1
Jacquelyn pryor resume-1
 
лекц 14 энто
лекц 14 энтолекц 14 энто
лекц 14 энто
 
Developing Web-Enabled Considering Decision Support System for Staff Dormitor...
Developing Web-Enabled Considering Decision Support System for Staff Dormitor...Developing Web-Enabled Considering Decision Support System for Staff Dormitor...
Developing Web-Enabled Considering Decision Support System for Staff Dormitor...
 
Paula Fleming - Resume 11-12-15
Paula Fleming - Resume 11-12-15Paula Fleming - Resume 11-12-15
Paula Fleming - Resume 11-12-15
 
Resume 2016 for Library
Resume 2016 for LibraryResume 2016 for Library
Resume 2016 for Library
 
Resume-Revised
Resume-RevisedResume-Revised
Resume-Revised
 
Participatory 3-Dimensional Mapping (P3DM) for Disaster Risk Reduction
Participatory 3-Dimensional Mapping (P3DM) for Disaster Risk ReductionParticipatory 3-Dimensional Mapping (P3DM) for Disaster Risk Reduction
Participatory 3-Dimensional Mapping (P3DM) for Disaster Risk Reduction
 
Dr Crispin Cooper - QGIS Plugin ‘sDNA’
Dr Crispin Cooper - QGIS Plugin ‘sDNA’Dr Crispin Cooper - QGIS Plugin ‘sDNA’
Dr Crispin Cooper - QGIS Plugin ‘sDNA’
 
Using Lidar in QGIS
Using Lidar in QGISUsing Lidar in QGIS
Using Lidar in QGIS
 
Statistic Analysis
Statistic AnalysisStatistic Analysis
Statistic Analysis
 
Using Data Services in QGIS by Richard Evans
Using Data Services in QGIS by Richard EvansUsing Data Services in QGIS by Richard Evans
Using Data Services in QGIS by Richard Evans
 
Making beautiful maps with Mapbox Studio by Charley Glynn
Making beautiful maps with Mapbox Studio by Charley GlynnMaking beautiful maps with Mapbox Studio by Charley Glynn
Making beautiful maps with Mapbox Studio by Charley Glynn
 
Xactly Sales Compensation for Dummies_02_05_2007
Xactly Sales Compensation for Dummies_02_05_2007Xactly Sales Compensation for Dummies_02_05_2007
Xactly Sales Compensation for Dummies_02_05_2007
 

Similar to How Does Cybersecurity Relate to Safety?

2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data
2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data
2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data
IEEEMEMTECHSTUDENTSPROJECTS
 
IEEE 2014 DOTNET DATA MINING PROJECTS Data mining with big data
IEEE 2014 DOTNET DATA MINING PROJECTS Data mining with big dataIEEE 2014 DOTNET DATA MINING PROJECTS Data mining with big data
IEEE 2014 DOTNET DATA MINING PROJECTS Data mining with big data
IEEEMEMTECHSTUDENTPROJECTS
 
IoT Unit 1 pptx ( introduction to Iot )
IoT Unit 1 pptx ( introduction to Iot  )IoT Unit 1 pptx ( introduction to Iot  )
IoT Unit 1 pptx ( introduction to Iot )
BelieveMe5
 
Cybersecurity Threat Analysis: Status and Advanced Tools
Cybersecurity Threat Analysis: Status and Advanced ToolsCybersecurity Threat Analysis: Status and Advanced Tools
Cybersecurity Threat Analysis: Status and Advanced Tools
Santiago Nunez
 
Montana State, Research Networking and the Outcomes from the First National R...
Montana State, Research Networking and the Outcomes from the First National R...Montana State, Research Networking and the Outcomes from the First National R...
Montana State, Research Networking and the Outcomes from the First National R...
Jerry Sheehan
 
Internet of Things: Research Directions
Internet of Things: Research DirectionsInternet of Things: Research Directions
Internet of Things: Research Directions
Davide Nardone
 
ECE department faculty research profile
ECE department faculty research profileECE department faculty research profile
ECE department faculty research profile
Wayne State University College of Engineering
 
Fog computing
Fog computingFog computing
Fog computing
Ankit_ap
 
MIT-KIT Intro at #idcon sattelite
MIT-KIT Intro at #idcon satteliteMIT-KIT Intro at #idcon sattelite
MIT-KIT Intro at #idcon satteliteNov Matake
 
Resume_CV___1_.pdf
Resume_CV___1_.pdfResume_CV___1_.pdf
Resume_CV___1_.pdf
ChristopherLoewentha
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
Mujahed Al-Tahle
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
Maribel García Arenas
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia Network
GauthamSK4
 
Sinnott Paper
Sinnott PaperSinnott Paper
Sinnott Paper
Johanna Green
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
nadoje
 
Power System Cybersecurity: Threats, Challenges, and Barriers
Power System Cybersecurity: Threats, Challenges, and Barriers Power System Cybersecurity: Threats, Challenges, and Barriers
Power System Cybersecurity: Threats, Challenges, and Barriers
Nathan Wallace, PhD, PE
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation2b3d
 
resume v 5.0
resume v 5.0resume v 5.0
resume v 5.0Ye Xu
 
Network Science: Theory, Modeling and Applications
Network Science: Theory, Modeling and ApplicationsNetwork Science: Theory, Modeling and Applications
Network Science: Theory, Modeling and Applications
Biocomplexity Institute of Virginia Tech
 

Similar to How Does Cybersecurity Relate to Safety? (20)

2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data
2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data
2014 IEEE DOTNET DATA MINING PROJECT Data mining with big data
 
IEEE 2014 DOTNET DATA MINING PROJECTS Data mining with big data
IEEE 2014 DOTNET DATA MINING PROJECTS Data mining with big dataIEEE 2014 DOTNET DATA MINING PROJECTS Data mining with big data
IEEE 2014 DOTNET DATA MINING PROJECTS Data mining with big data
 
IoT Unit 1 pptx ( introduction to Iot )
IoT Unit 1 pptx ( introduction to Iot  )IoT Unit 1 pptx ( introduction to Iot  )
IoT Unit 1 pptx ( introduction to Iot )
 
Cybersecurity Threat Analysis: Status and Advanced Tools
Cybersecurity Threat Analysis: Status and Advanced ToolsCybersecurity Threat Analysis: Status and Advanced Tools
Cybersecurity Threat Analysis: Status and Advanced Tools
 
Montana State, Research Networking and the Outcomes from the First National R...
Montana State, Research Networking and the Outcomes from the First National R...Montana State, Research Networking and the Outcomes from the First National R...
Montana State, Research Networking and the Outcomes from the First National R...
 
Internet of Things: Research Directions
Internet of Things: Research DirectionsInternet of Things: Research Directions
Internet of Things: Research Directions
 
ECE department faculty research profile
ECE department faculty research profileECE department faculty research profile
ECE department faculty research profile
 
Fog computing
Fog computingFog computing
Fog computing
 
CINET: A CyberInfrastructure for Network Science
CINET: A CyberInfrastructure for Network ScienceCINET: A CyberInfrastructure for Network Science
CINET: A CyberInfrastructure for Network Science
 
MIT-KIT Intro at #idcon sattelite
MIT-KIT Intro at #idcon satteliteMIT-KIT Intro at #idcon sattelite
MIT-KIT Intro at #idcon sattelite
 
Resume_CV___1_.pdf
Resume_CV___1_.pdfResume_CV___1_.pdf
Resume_CV___1_.pdf
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia Network
 
Sinnott Paper
Sinnott PaperSinnott Paper
Sinnott Paper
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
Power System Cybersecurity: Threats, Challenges, and Barriers
Power System Cybersecurity: Threats, Challenges, and Barriers Power System Cybersecurity: Threats, Challenges, and Barriers
Power System Cybersecurity: Threats, Challenges, and Barriers
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
 
resume v 5.0
resume v 5.0resume v 5.0
resume v 5.0
 
Network Science: Theory, Modeling and Applications
Network Science: Theory, Modeling and ApplicationsNetwork Science: Theory, Modeling and Applications
Network Science: Theory, Modeling and Applications
 

More from Michigan State University Research

NFRO interdisciplinary international 081617
NFRO interdisciplinary international 081617NFRO interdisciplinary international 081617
NFRO interdisciplinary international 081617
Michigan State University Research
 
Web accessible nfro 2017 as of 08152017
Web accessible nfro 2017 as of 08152017Web accessible nfro 2017 as of 08152017
Web accessible nfro 2017 as of 08152017
Michigan State University Research
 
SmartAg/Food Engineering Overview
SmartAg/Food Engineering OverviewSmartAg/Food Engineering Overview
SmartAg/Food Engineering Overview
Michigan State University Research
 
The Internet of Plants
The Internet of PlantsThe Internet of Plants
The Internet of Plants
Michigan State University Research
 
Digital Agriculture
Digital AgricultureDigital Agriculture
A New Magnetic Resononance Imaging Biomarker for Diabetes
A New Magnetic Resononance Imaging Biomarker for DiabetesA New Magnetic Resononance Imaging Biomarker for Diabetes
A New Magnetic Resononance Imaging Biomarker for Diabetes
Michigan State University Research
 
MSU Transgenic and Genome Editing Facility
MSU Transgenic and Genome Editing FacilityMSU Transgenic and Genome Editing Facility
MSU Transgenic and Genome Editing Facility
Michigan State University Research
 
Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Intelligent and Automatic In vivo Detection and Quantification of Transplante...Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Michigan State University Research
 
Re-budgeting & Report Tracking in KC
Re-budgeting & Report Tracking in KCRe-budgeting & Report Tracking in KC
Re-budgeting & Report Tracking in KC
Michigan State University Research
 
Budget Development in KC
Budget Development in KCBudget Development in KC
Budget Development in KC
Michigan State University Research
 
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...
Michigan State University Research
 
Proposal Development in KC
Proposal Development in KCProposal Development in KC
Proposal Development in KC
Michigan State University Research
 
Thomas D. Gregory 9 14-16
Thomas D. Gregory 9 14-16Thomas D. Gregory 9 14-16
Thomas D. Gregory 9 14-16
Michigan State University Research
 
Taking an ancient path towards artificial intelligence 10-12-16
Taking an ancient path towards artificial intelligence 10-12-16Taking an ancient path towards artificial intelligence 10-12-16
Taking an ancient path towards artificial intelligence 10-12-16
Michigan State University Research
 
Michigan State University coffee break: building a budget 10-20-16
Michigan State University coffee break: building a budget 10-20-16Michigan State University coffee break: building a budget 10-20-16
Michigan State University coffee break: building a budget 10-20-16
Michigan State University Research
 
Domicology: Changing the CEM Paradigm
Domicology: Changing the CEM ParadigmDomicology: Changing the CEM Paradigm
Domicology: Changing the CEM Paradigm
Michigan State University Research
 
Removal of Abandoned Properties Deconstruction vs.Demolition
Removal of Abandoned Properties Deconstruction vs.DemolitionRemoval of Abandoned Properties Deconstruction vs.Demolition
Removal of Abandoned Properties Deconstruction vs.Demolition
Michigan State University Research
 
Advancing the Science of Domicology
Advancing the Science of DomicologyAdvancing the Science of Domicology
Advancing the Science of Domicology
Michigan State University Research
 
Advancing Domicology for Sustainable Construction
Advancing Domicology for Sustainable ConstructionAdvancing Domicology for Sustainable Construction
Advancing Domicology for Sustainable Construction
Michigan State University Research
 
Harnessing Microbe-Electrode Interactions for Bioenergy
Harnessing Microbe-Electrode Interactions for BioenergyHarnessing Microbe-Electrode Interactions for Bioenergy
Harnessing Microbe-Electrode Interactions for Bioenergy
Michigan State University Research
 

More from Michigan State University Research (20)

NFRO interdisciplinary international 081617
NFRO interdisciplinary international 081617NFRO interdisciplinary international 081617
NFRO interdisciplinary international 081617
 
Web accessible nfro 2017 as of 08152017
Web accessible nfro 2017 as of 08152017Web accessible nfro 2017 as of 08152017
Web accessible nfro 2017 as of 08152017
 
SmartAg/Food Engineering Overview
SmartAg/Food Engineering OverviewSmartAg/Food Engineering Overview
SmartAg/Food Engineering Overview
 
The Internet of Plants
The Internet of PlantsThe Internet of Plants
The Internet of Plants
 
Digital Agriculture
Digital AgricultureDigital Agriculture
Digital Agriculture
 
A New Magnetic Resononance Imaging Biomarker for Diabetes
A New Magnetic Resononance Imaging Biomarker for DiabetesA New Magnetic Resononance Imaging Biomarker for Diabetes
A New Magnetic Resononance Imaging Biomarker for Diabetes
 
MSU Transgenic and Genome Editing Facility
MSU Transgenic and Genome Editing FacilityMSU Transgenic and Genome Editing Facility
MSU Transgenic and Genome Editing Facility
 
Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Intelligent and Automatic In vivo Detection and Quantification of Transplante...Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Intelligent and Automatic In vivo Detection and Quantification of Transplante...
 
Re-budgeting & Report Tracking in KC
Re-budgeting & Report Tracking in KCRe-budgeting & Report Tracking in KC
Re-budgeting & Report Tracking in KC
 
Budget Development in KC
Budget Development in KCBudget Development in KC
Budget Development in KC
 
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...
 
Proposal Development in KC
Proposal Development in KCProposal Development in KC
Proposal Development in KC
 
Thomas D. Gregory 9 14-16
Thomas D. Gregory 9 14-16Thomas D. Gregory 9 14-16
Thomas D. Gregory 9 14-16
 
Taking an ancient path towards artificial intelligence 10-12-16
Taking an ancient path towards artificial intelligence 10-12-16Taking an ancient path towards artificial intelligence 10-12-16
Taking an ancient path towards artificial intelligence 10-12-16
 
Michigan State University coffee break: building a budget 10-20-16
Michigan State University coffee break: building a budget 10-20-16Michigan State University coffee break: building a budget 10-20-16
Michigan State University coffee break: building a budget 10-20-16
 
Domicology: Changing the CEM Paradigm
Domicology: Changing the CEM ParadigmDomicology: Changing the CEM Paradigm
Domicology: Changing the CEM Paradigm
 
Removal of Abandoned Properties Deconstruction vs.Demolition
Removal of Abandoned Properties Deconstruction vs.DemolitionRemoval of Abandoned Properties Deconstruction vs.Demolition
Removal of Abandoned Properties Deconstruction vs.Demolition
 
Advancing the Science of Domicology
Advancing the Science of DomicologyAdvancing the Science of Domicology
Advancing the Science of Domicology
 
Advancing Domicology for Sustainable Construction
Advancing Domicology for Sustainable ConstructionAdvancing Domicology for Sustainable Construction
Advancing Domicology for Sustainable Construction
 
Harnessing Microbe-Electrode Interactions for Bioenergy
Harnessing Microbe-Electrode Interactions for BioenergyHarnessing Microbe-Electrode Interactions for Bioenergy
Harnessing Microbe-Electrode Interactions for Bioenergy
 

Recently uploaded

This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 

Recently uploaded (20)

This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 

How Does Cybersecurity Relate to Safety?

  • 1. S oftware E ngineering & N etwork S ystems Lab How Does Cybersecurity Relate to Safety? Betty H.C. Cheng, Software Engineering and Network Systems Lab Digital Evolution Laboratory BEACON: NSF Center for Evolution in Action Department of Computer Science and Engineering Michigan State University chengb at cse dot msu dot edu http://www.cse.msu.edu/~chengb
  • 2. S oftware E ngineering & N etwork S ystems Lab IoT: Physical Cyberinfrastructure •Network- •Centric •Battlefield •Homeland Security •Ecosystem Monitoring •Disaster •Relief •Secure Information Systems•Digital Supply Chain • Remote • Safety-critical • Real-time • Privacy • Adaptable • All the above • Wired •Internet
  • 3. S oftware E ngineering & N etwork S ystems Lab New Scale: Internet of Things Healthcare Infrastructure •20 •Ultra-Large-ScaleSystems •Linda Northrop, ICSE 2007 •© 2007 Carnegie Mellon University •New scale: • Data stored, accessed, manipulated, and refined • Number of connections/interdependencies among components • Number of hardware elements Heterogeneous Collection of Distributed Systems
  • 4. S oftware E ngineering & N etwork S ystems Lab Intelligent Transportation and Vehicle Systems •21 •Ultra-Large-ScaleSystems •Linda Northrop, ICSE 2007 •© 2007 Carnegie Mellon University High-Assurance Cyberphysical Systems •Requires increasingly complex systems • Thousands of platforms, sensors, decision nodes, complex systems • Connected through heterogeneous wired and wireless networks. Ultra-Large Scale Systems
  • 5. S oftware E ngineering & N etwork S ystems Lab S oftware E ngineering & N etwork S ystems LabThe ULS/IoT Ecosystem • Key elements: – Computing devices – Business and organizational policies – Environment (including people) • Forces: – Competition for resources – Unexpected environmental changes – Decentralized control – Demand for assurance (safety and security)
  • 6. S oftware E ngineering & N etwork S ystems Lab Approach • Key Cybersecurity Challenges: – Prevention – Detection – Mitigation • Competing Concerns: • Safety • Information Access (e.g., “Internet of Things”) • Heterogeneity of Systems and Stakeholders • Multi-Disciplinary Strategies: – Leverage enabling technologies from other disciplines (e.g., biology, AI, control, cognitive & social science, etc.) – Collaborate with other disciplines for a more holistic, systemic approach to address cybersecurity and safety. 6