SlideShare a Scribd company logo
1 of 2
Download to read offline
CYBERSECURITY
OFFICE OF CORPORATE RELATIONS
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
528 East Green Street, Suite 202, Champaign, IL 61820
T: (217) 244-3606 | corporaterelations@illinois.edu
FACULTY RESEARCH
Cybersecurity in the College of Engineering spans 45 faculty
in seven departments. Research ranges from protection of
computer systems from the theft or damage to their hardware,
software or information, as well as from disruption or
misdirection of the services they provide. Research also looks
at non-technical aspects of cybersecurity, such as attracting
and retaining talent. Faculty incorporate this research into
various applications such as Civil Engineering Infrastructure,
Robotics, Manufacturing and Health Information Technology.
STUDENT PROGRAM
With cyber crimes on the rise and a shortage of professionals,
cyber security is a field that offers great career opportunities. Illinois
provides opportunities for qualified students to participate in its
Illinois Cyber Security Scholars Program (ICSSP), which waives
tuition, and prepares students to follow a career in the government
for two years as a security professional. The program is open to
both graduate and undergraduate students in computer science,
computer engineering and law.
LABORATORIES & INSTITUTES
The vast majority of critical infrastructure, vital to the nation’s
security, is owned and operated by private entities. At the same
time, the infrastructure is increasingly at risk from cyber attacks
and complications that arise from aging components and the
interdependence of the cyber and physical entities that make
up these systems. To address these needs, the Department
of Homeland Security Science and Technology (DHS S&T)
officially launched the Critical Infrastructure Resilience Institute
(CIRI), a DHS Center of Excellence (COE) which exists of a
consortium of 16 universities, and will be led by the University of
Illinois at Urbana-Champaign.
Additionally, the National Center for Supercomputing
Applications (NCSA) and the International Computer Science
Institute co-developed the Bro threat detection platform. While
often compared to classic intrusion detection/prevention
systems, Bro takes a quite different approach by providing users
with a flexible framework that facilitates customized, in-depth
monitoring far beyond the capabilities of traditional systems.
With initial versions in operational deployment during the mid
‘90s already, Bro finds itself grounded in more than 20 years of
research.
corporaterelations.illinois.edu
OPPORTUNITIES FOR CORPORATE ENGAGEMENT
As modern society increasingly depends on computer networks and data to provide goods and services essential to our
well-being, there is a growing need to ensure the trustworthiness of information systems. Examples abound of real-world
critical breaches into public and private data and computer systems. It is imperative that universities, government and the
private sector share research, and fund initiatives that ensure the resiliency of cyber systems. The University of Illinois is
the forefront of several public and private initiatives that enhance research to ensure cybersecurity.
The University of Illinois at Urbana-Champaign is a pre-eminent public research university with a land-grant mission that pioneers
innovative research that tackles global problems. The University offers transformative learning experiences in and out of the classroom
designed to produce alumni who desire to make a significant societal impact. Below is just a sampling of what the University has to
offer.
FACULTY RESEARCH
	 Cyber Resilient Energy Delivery Consortium (CREDC) -
http://go.illinois.edu/UIUCCREDC
	 The (CREDC), led by the University of Illinois, is a five-year, $28.1
million research and development initiative that is funded by the
Department of Energy and the Department of Homeland Security.
Research is focused on cybersecurity and cyber-resiliency of
energy delivery systems for the electric power and oil & gas
industries. In addition to Illinois, consortium partners include:
Argonne National Laboratory, Arizona State University, Dartmouth
College, the Massachusetts Institute of Technology, Old Dominion
University, Oregon State University, the Pacific Northwest National
Laboratory, Rutgers University, Tennessee State University, the
University of Houston, and Washington State University.
	 Extreme Science & Engineering Discovery Enivornment
(XSEDE)-
http://go.illinois.edu/UIUCXSEDE
	 The XSEDE is a NSF-funded initiative led by the University
of Illinois’ National Center for Supercomputing. It is the most
advanced, powerful, and robust collection of integrated advanced
digital resources and services in the world. Within the group is the
Cyberinfrastructure Integration Team (XCI) that aims to integrate,
adapt, and disseminate software tools and related services across
the national CI community to enable the creation of an integrated
national cyberinfrastructure. XSEDE also serves as liaison for the
Bro Project at the Software Freedom Conservatory, which brings its
network security monitoring expertise and support to NSF-funded
cyber-infrastructure and Higher Ed.
	 Power Grid Security -
http://go.illinois.edu/UIUCARPA-E
	 Funded by ARPA-E, Illinois researchers are developing scalable
grid modeling, monitoring, and analysis tools that would improve
its resiliency to system failures as well as cyber attacks, which can
significantly improve the reliability of grid operations. Power system
operators today lack the ability to assess the grid’s reliability with
respect to potential cyber failures and attacks. UIUC is using
theoretical and practical techniques from both the cyber security
and power engineering domains to develop new algorithms and
software tools capable of analyzing real-world threats against
power grid critical infrastructures.
	 Digital/Cyber Security and Nuclear Security -
http://go.illinois.edu/UIUCNucSec
	 The nuclear industry and homeland security establishments have
an urgent need to continuously push the state of the art to develop
new, advanced, and nuclear-grade digital control and cyber security
technologies. Due to its existing expertise in nuclear engineering,
and in digital and cybersecurity, the University of Illinois is uniquely
positioned to develop a national center for digital instrumentation
and control, and for cyber security for nuclear-specific applications.
The goal of research at Illinois is to marry the expertise available at
the Department of Nuclear, Plasma and Radiological Engineering
(NPRE) and Coordinated Science Laboratory (CSL) - as well as
in other parts of the college and campus - to develop a center for
digital (control) and cyber security for nuclear-specific applications.
	 Digital/Cyber Security and Nuclear Security -
http://go.illinois.edu/UIUCNucSec
	 The nuclear industry and homeland security establishments have
an urgent need to continuously push the state of the art to develop
new, advanced, and nuclear-grade digital control and cyber security
technologies. Due to its existing expertise in nuclear engineering,
and in digital and cyber security, the University of Illinois is uniquely
positioned to develop a national center for digital instrumentation
and control, and for cyber security for nuclear-specific applications.
The goal of research at Illinois is to marry the expertise available at
the Department of Nuclear, Plasma and Radiological Engineering.
STUDENT PROGRAM
	 Illinois Cyber Security Scholars Program -
http://go.illinois.edu/UIUCICSSP
	 This CyberCorps scholarship for service program, funded by the
National Science Foundation, provides a scholarship to admitted,
full time, UIUC students who are interested in specializing in
cybersecurity. Students in both Engineering and Law can apply for
this unique opportunity. This scholarship has graduated 30+ students
who have successfully been placed with federal agencies and
national labs including: the Department of Homeland Security, the
FTC, CIA, NSA, Sandia National Lab, MIT Lincoln Lab, DOE, and the
MITRE Corporation.
LABORATORIES & INSTITUTES
	 The Information Trust Institute - Coordinated Science Lab:
Cybersecurity Impact Area -
http://go.illinois.edu/UIUCCSLCyber
	 The Information Trust Institute, housed at CSL, provides national
leadership in the creation of trustworthy critical applications and
cyber infrastructures. ITI aims to design trustworthy systems from the
ground up and validate systems that are intended to be trustworthy.
The three areas that their research is focused on is: Improving the
resilience of critical infrastructure; trustworthy energy systems, and
health information privacy.
	 Critical Infrastructure Reslilience Institute (CIRI) -
http://go.illinois.edu/UIUCCIRI
	 CIRI is conducting research and education activities that enhance the
resiliency of the nation’s critical infrastructures and the businesses
and public entities that own and operate those assets and systems.
CIRI is funded by a $20 million, five-year grant from the Department
of Homeland Security. It is led by the University of Illinois at Urbana-
Champaign with collaborators from other U.S. universities and
national labs. A significant focus of CIRI is on transitioning of research
outputs for use by DHS operational components, other homeland
security end users, policy makers, decision makers across all levels of
industry and government, and community leaders.
	 National Center for Supercomputing Application (NCSA):
Cybersecurity Division -
http://go.illinois.edu/UIUCNCSACyber
	 The Cybersecurity Division at NCSA is composed of researchers,
developers, and specialists who work to advance the state of the
art of cybersecurity, apply those advances to key science and
engineering user communities, and protect NCSA’s networks and
substantial computing resources. As a result, NCSA has developed
broad and deep expertise in detecting and responding to attacks and
intrusions of all sorts. With decades of experience designing and
deploying systems that meet stringent cybersecurity requirements
for serving a diverse, national scientific community, NCSA is a
recognized leader in both local site and distributed systems security.
It’s most lucrative platform in cybersecurity has been the Bro network
analysis framework - which focuses on network security monitoring
that is adaptable, flexible, efficient and analytical. It is an open source
platform, and Bro’s user community includes major universities,
research labs, supercomputing centers, and open-science
communities.
For a comprehensive list of programs please contact the Office of
Corporate Relations at corporaterelations@illinois.edu
CYBERSECURITY HIGHLIGHTS

More Related Content

What's hot

A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV IJECEIAES
 
SECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English versionSECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English versionTech and Law Center
 
Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Enrique Martin
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Alexander Decker
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organizationMohammed Mahfouz Alhassan
 
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyFiroze Hussain
 
Managing insider threat
Managing insider threatManaging insider threat
Managing insider threatmilliemill
 
The protect mobile user data in Russia
The protect mobile user data in Russia The protect mobile user data in Russia
The protect mobile user data in Russia IJECEIAES
 
Cyber security analysis presentation
Cyber security analysis presentationCyber security analysis presentation
Cyber security analysis presentationVaibhav R
 
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...CSCJournals
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...IOSR Journals
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewEnow Eyong
 

What's hot (19)

A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV
 
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
 
SECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English versionSECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English version
 
Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...
 
Alloy Cybersecurity
Alloy CybersecurityAlloy Cybersecurity
Alloy Cybersecurity
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organization
 
Alloy Cybersecurity
Alloy CybersecurityAlloy Cybersecurity
Alloy Cybersecurity
 
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th July
 
Managing insider threat
Managing insider threatManaging insider threat
Managing insider threat
 
776 s0005
776 s0005776 s0005
776 s0005
 
Cloud computing advances in 2020
Cloud computing advances in 2020Cloud computing advances in 2020
Cloud computing advances in 2020
 
The protect mobile user data in Russia
The protect mobile user data in Russia The protect mobile user data in Russia
The protect mobile user data in Russia
 
Cyber security analysis presentation
Cyber security analysis presentationCyber security analysis presentation
Cyber security analysis presentation
 
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
ConnieJusticeCV-2016
ConnieJusticeCV-2016ConnieJusticeCV-2016
ConnieJusticeCV-2016
 

Similar to Cybersecurity Research at the University of Illinois

Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityCSCJournals
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelCSCJournals
 
Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...DETER-Project
 
Trustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveTrustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveVon Welch
 
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...ssuser793b4e
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Great Wide Open
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation2b3d
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTHAwais Shibli
 
University of Illinois - Office of Corporate Relations - autonomous vehicles
University of Illinois - Office of Corporate Relations -  autonomous vehiclesUniversity of Illinois - Office of Corporate Relations -  autonomous vehicles
University of Illinois - Office of Corporate Relations - autonomous vehiclesUIUC Corporate Relations
 
WiCyS Career Fair Handbook
WiCyS Career Fair HandbookWiCyS Career Fair Handbook
WiCyS Career Fair HandbookClearedJobs.Net
 
Customer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rigCustomer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rigANIL247048
 
Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusCisco Security
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computingacijjournal
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021Francesco Flammini
 
Internship resources & Sample companies
Internship resources & Sample companiesInternship resources & Sample companies
Internship resources & Sample companiessmwortman
 
Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...
Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...
Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...DaveNjoga1
 

Similar to Cybersecurity Research at the University of Illinois (20)

University of Illinois - Data Science
University of Illinois - Data ScienceUniversity of Illinois - Data Science
University of Illinois - Data Science
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment Model
 
Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...
 
Trustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveTrustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade Perspective
 
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
 
mits brochure
mits brochuremits brochure
mits brochure
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
Another view of virtual worlds
Another view of virtual worldsAnother view of virtual worlds
Another view of virtual worlds
 
University of Illinois - Office of Corporate Relations - autonomous vehicles
University of Illinois - Office of Corporate Relations -  autonomous vehiclesUniversity of Illinois - Office of Corporate Relations -  autonomous vehicles
University of Illinois - Office of Corporate Relations - autonomous vehicles
 
WiCyS Career Fair Handbook
WiCyS Career Fair HandbookWiCyS Career Fair Handbook
WiCyS Career Fair Handbook
 
Customer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rigCustomer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rig
 
Capstone Paper
Capstone PaperCapstone Paper
Capstone Paper
 
Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on Campus
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computing
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
 
Internship resources & Sample companies
Internship resources & Sample companiesInternship resources & Sample companies
Internship resources & Sample companies
 
Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...
Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...
Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 

Recently uploaded (20)

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 

Cybersecurity Research at the University of Illinois

  • 1. CYBERSECURITY OFFICE OF CORPORATE RELATIONS UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN 528 East Green Street, Suite 202, Champaign, IL 61820 T: (217) 244-3606 | corporaterelations@illinois.edu FACULTY RESEARCH Cybersecurity in the College of Engineering spans 45 faculty in seven departments. Research ranges from protection of computer systems from the theft or damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide. Research also looks at non-technical aspects of cybersecurity, such as attracting and retaining talent. Faculty incorporate this research into various applications such as Civil Engineering Infrastructure, Robotics, Manufacturing and Health Information Technology. STUDENT PROGRAM With cyber crimes on the rise and a shortage of professionals, cyber security is a field that offers great career opportunities. Illinois provides opportunities for qualified students to participate in its Illinois Cyber Security Scholars Program (ICSSP), which waives tuition, and prepares students to follow a career in the government for two years as a security professional. The program is open to both graduate and undergraduate students in computer science, computer engineering and law. LABORATORIES & INSTITUTES The vast majority of critical infrastructure, vital to the nation’s security, is owned and operated by private entities. At the same time, the infrastructure is increasingly at risk from cyber attacks and complications that arise from aging components and the interdependence of the cyber and physical entities that make up these systems. To address these needs, the Department of Homeland Security Science and Technology (DHS S&T) officially launched the Critical Infrastructure Resilience Institute (CIRI), a DHS Center of Excellence (COE) which exists of a consortium of 16 universities, and will be led by the University of Illinois at Urbana-Champaign. Additionally, the National Center for Supercomputing Applications (NCSA) and the International Computer Science Institute co-developed the Bro threat detection platform. While often compared to classic intrusion detection/prevention systems, Bro takes a quite different approach by providing users with a flexible framework that facilitates customized, in-depth monitoring far beyond the capabilities of traditional systems. With initial versions in operational deployment during the mid ‘90s already, Bro finds itself grounded in more than 20 years of research. corporaterelations.illinois.edu OPPORTUNITIES FOR CORPORATE ENGAGEMENT As modern society increasingly depends on computer networks and data to provide goods and services essential to our well-being, there is a growing need to ensure the trustworthiness of information systems. Examples abound of real-world critical breaches into public and private data and computer systems. It is imperative that universities, government and the private sector share research, and fund initiatives that ensure the resiliency of cyber systems. The University of Illinois is the forefront of several public and private initiatives that enhance research to ensure cybersecurity. The University of Illinois at Urbana-Champaign is a pre-eminent public research university with a land-grant mission that pioneers innovative research that tackles global problems. The University offers transformative learning experiences in and out of the classroom designed to produce alumni who desire to make a significant societal impact. Below is just a sampling of what the University has to offer.
  • 2. FACULTY RESEARCH Cyber Resilient Energy Delivery Consortium (CREDC) - http://go.illinois.edu/UIUCCREDC The (CREDC), led by the University of Illinois, is a five-year, $28.1 million research and development initiative that is funded by the Department of Energy and the Department of Homeland Security. Research is focused on cybersecurity and cyber-resiliency of energy delivery systems for the electric power and oil & gas industries. In addition to Illinois, consortium partners include: Argonne National Laboratory, Arizona State University, Dartmouth College, the Massachusetts Institute of Technology, Old Dominion University, Oregon State University, the Pacific Northwest National Laboratory, Rutgers University, Tennessee State University, the University of Houston, and Washington State University. Extreme Science & Engineering Discovery Enivornment (XSEDE)- http://go.illinois.edu/UIUCXSEDE The XSEDE is a NSF-funded initiative led by the University of Illinois’ National Center for Supercomputing. It is the most advanced, powerful, and robust collection of integrated advanced digital resources and services in the world. Within the group is the Cyberinfrastructure Integration Team (XCI) that aims to integrate, adapt, and disseminate software tools and related services across the national CI community to enable the creation of an integrated national cyberinfrastructure. XSEDE also serves as liaison for the Bro Project at the Software Freedom Conservatory, which brings its network security monitoring expertise and support to NSF-funded cyber-infrastructure and Higher Ed. Power Grid Security - http://go.illinois.edu/UIUCARPA-E Funded by ARPA-E, Illinois researchers are developing scalable grid modeling, monitoring, and analysis tools that would improve its resiliency to system failures as well as cyber attacks, which can significantly improve the reliability of grid operations. Power system operators today lack the ability to assess the grid’s reliability with respect to potential cyber failures and attacks. UIUC is using theoretical and practical techniques from both the cyber security and power engineering domains to develop new algorithms and software tools capable of analyzing real-world threats against power grid critical infrastructures. Digital/Cyber Security and Nuclear Security - http://go.illinois.edu/UIUCNucSec The nuclear industry and homeland security establishments have an urgent need to continuously push the state of the art to develop new, advanced, and nuclear-grade digital control and cyber security technologies. Due to its existing expertise in nuclear engineering, and in digital and cybersecurity, the University of Illinois is uniquely positioned to develop a national center for digital instrumentation and control, and for cyber security for nuclear-specific applications. The goal of research at Illinois is to marry the expertise available at the Department of Nuclear, Plasma and Radiological Engineering (NPRE) and Coordinated Science Laboratory (CSL) - as well as in other parts of the college and campus - to develop a center for digital (control) and cyber security for nuclear-specific applications. Digital/Cyber Security and Nuclear Security - http://go.illinois.edu/UIUCNucSec The nuclear industry and homeland security establishments have an urgent need to continuously push the state of the art to develop new, advanced, and nuclear-grade digital control and cyber security technologies. Due to its existing expertise in nuclear engineering, and in digital and cyber security, the University of Illinois is uniquely positioned to develop a national center for digital instrumentation and control, and for cyber security for nuclear-specific applications. The goal of research at Illinois is to marry the expertise available at the Department of Nuclear, Plasma and Radiological Engineering. STUDENT PROGRAM Illinois Cyber Security Scholars Program - http://go.illinois.edu/UIUCICSSP This CyberCorps scholarship for service program, funded by the National Science Foundation, provides a scholarship to admitted, full time, UIUC students who are interested in specializing in cybersecurity. Students in both Engineering and Law can apply for this unique opportunity. This scholarship has graduated 30+ students who have successfully been placed with federal agencies and national labs including: the Department of Homeland Security, the FTC, CIA, NSA, Sandia National Lab, MIT Lincoln Lab, DOE, and the MITRE Corporation. LABORATORIES & INSTITUTES The Information Trust Institute - Coordinated Science Lab: Cybersecurity Impact Area - http://go.illinois.edu/UIUCCSLCyber The Information Trust Institute, housed at CSL, provides national leadership in the creation of trustworthy critical applications and cyber infrastructures. ITI aims to design trustworthy systems from the ground up and validate systems that are intended to be trustworthy. The three areas that their research is focused on is: Improving the resilience of critical infrastructure; trustworthy energy systems, and health information privacy. Critical Infrastructure Reslilience Institute (CIRI) - http://go.illinois.edu/UIUCCIRI CIRI is conducting research and education activities that enhance the resiliency of the nation’s critical infrastructures and the businesses and public entities that own and operate those assets and systems. CIRI is funded by a $20 million, five-year grant from the Department of Homeland Security. It is led by the University of Illinois at Urbana- Champaign with collaborators from other U.S. universities and national labs. A significant focus of CIRI is on transitioning of research outputs for use by DHS operational components, other homeland security end users, policy makers, decision makers across all levels of industry and government, and community leaders. National Center for Supercomputing Application (NCSA): Cybersecurity Division - http://go.illinois.edu/UIUCNCSACyber The Cybersecurity Division at NCSA is composed of researchers, developers, and specialists who work to advance the state of the art of cybersecurity, apply those advances to key science and engineering user communities, and protect NCSA’s networks and substantial computing resources. As a result, NCSA has developed broad and deep expertise in detecting and responding to attacks and intrusions of all sorts. With decades of experience designing and deploying systems that meet stringent cybersecurity requirements for serving a diverse, national scientific community, NCSA is a recognized leader in both local site and distributed systems security. It’s most lucrative platform in cybersecurity has been the Bro network analysis framework - which focuses on network security monitoring that is adaptable, flexible, efficient and analytical. It is an open source platform, and Bro’s user community includes major universities, research labs, supercomputing centers, and open-science communities. For a comprehensive list of programs please contact the Office of Corporate Relations at corporaterelations@illinois.edu CYBERSECURITY HIGHLIGHTS