SlideShare a Scribd company logo
The Rising Tide Lifts All
Boats: The Advancement of
Science in Cybersecurity
Laurie Williams
North Carolina State University
#metoosecurity
Intervening in the last hour of an official
campaign, this operation clearly seeks to
destabilize democracy…
We cannot tolerate that the vital interests
of democracy are thus endangered.
- Macron campaign statement
Attackers Unceasing
Cybersecurity is all of our
responsibility..
#metoosecurity
A game of cat and mouse …
Why the Science of Security?
— “… nagging perception that too much of the
research is opportunistic, lacks rigor, has weak
methodology, and fails to produce material
advances on underlying hard problems.”
(NSA BAA Industry Day, 2013)
2011 Release
2014 Re-release
The three missions of the
Science of Security Lablets
— Build a science of security community
— Advance research methods in the
context of cybersecurity to build a
sound science of security
— “Solve” hard security problems
through the application of scientific
research
Through diversity of opinion,
creativity and unity is born.
Focus areas
/
Through collaboration and
unity, we can accelerate
change on a larger scale.
Competition-free zone
Lablet (4)National Security Agency
NCSU
UIUC
CMU
NSAUMD
Science of Security Lablets
Lablet (4)National Security Agency Sub-Lablet (26)
UNL
CU
DC
PENN
PITT
NAVY
UVA
GWU
RICEUTSA
UTA
UA
UNCC
NCSU
VT
USC
UC
UCBERKELEY
ICSI
UIUC IU
IIT
PU
WSU
CMU
GMU
UNC UMD
RIT
NSA
Science of Security Lablets & Sub-Lablets
NEWCASTLE (UK)
NDSU
UNL
CU
RSA
CCT
DC
BC
SC
MITLL
POTSDAM
MIT
SIEMENS
RUTGERS
AT&T
PENN
ARL
PSU
PITT
NAVY
UVA
GWU
HPHC
NLM-NIH
NU
UMICH
VERISIGN
RPI
UALBANY
UCFRICEUTSA
UTA
TX A&M
UA AUBURN
GT
UNCC
NCSU
VU
VT
UNM AFRL
USC
UC
LLNL
HP
SU
FUJITSU
GOOGLE
UCBERKELEY
ICSI
SYMANTEC
L&C
UW
INL
UIUC IU
IIT
UW-MADISON NWU
PU
WSU
CMU
GMU
UNC UMD
UH MANOA
PC
RIT
NSA
Lablet (4)National Security Agency Sub-Lablet (26) Collaborator (64)SURE (4)
Science of Security Lablets, Sub-Lablets, and
Collaborators NEWCASTLE (UK)
UOFW
UVIC
IMDEA
NOVA
UP
UPV
EPFL USI
UWAR
LEEDS
LU
KENT
OXFORD
NEWCASTLE (UK)
UDS
JWGU
MPI-SWS
UiO
KTH
IUT
THU
BUAA
SMU
UNIMELB
ANU
VUW
ULISBOA
Science of Security International Sub-Lablets and
Collaborators
Sub-Lablet (26) Collaborator (64)
The three missions of the
Science of Security Lablets
— Build a science of security community
— Advance research methods in the
context of cybersecurity to build a
sound science of security
— “Solve” hard security problems
through the application of scientific
research
Those “pesky” and ever-
present tough questions
Where’s the
beef . . . .
science?
Tough questions lead to
great(er) insight.
“The quality of your answers is in direct
proportion to the quality of your questions.”
--Albert Einstein
It’s so easy to fall back to
“engineering-ish” research.
Principles, Theories, Laws,
Hypotheses … Science
May be just a “subtle change”
Stand on the
shoulders of giants.
Software
Engineering
Type of result
Accepted
(ICSE
2002)
Accepted
(ICSE
2016)
Analysis … …
Evaluation … …
Experience 8 (19%) 4 (4%)
Example 16 (37%) 1 (1%)
Persuasion 0 (0%) 1 (1%)
Underspecified … …
No validation mentioned 6 (14%) 0 (0%)
Types of Validation
Type of result
Accepted
(ICSE
2002)
Accepted
(ICSE
2016)
Analysis … …
Evaluation … …
Experience 8 (19%) 4 (4%)
Example 16 (37%) 1 (1%)
Persuasion 0 (0%) 1 (1%)
Underspecified … …
No validation mentioned 6 (14%) 0 (0%)
Types of Validation
Type of result
Accepted
(ICSE
2002)
Accepted
(ICSE
2016)
Analysis … …
Evaluation … …
Experience 8 (19%) 4 (4%)
Example 16 (37%) 1 (1%)
Persuasion 0 (0%) 1 (1%)
Underspecified … …
No validation mentioned 6 (14%) 0 (0%)
Types of Validation
Type of result
Accepted
(ICSE
2002)
Accepted
(ICSE
2016)
Analysis … …
Evaluation … …
Experience 8 (19%) 4 (4%)
Example 16 (37%) 1 (1%)
Persuasion 0 (0%) 1 (1%)
Underspecified … …
No validation mentioned 6 (14%) 0 (0%)
Types of Validation
Science of Security Copycats
— Guidelines
— Seminars
— Research plan reviews
— Workshops
— Conference (Hot SoS)
The Rising Tide: Leading by
Example
Cybersecurity is all of our
responsibility..
#metoosecurity
1. Introduce yourself to someone you don’t know.
2. Provide one way that you can bring security into your
research and/or teaching.
Two minutes …. GO!
The three missions of the
Science of Security Lablets
— Build a science of security community
— Advance research methods in the
context of cybersecurity to build a
sound science of security
— “Solve” hard security problems
through the application of scientific
research
Through focus,
progress is made.
1. Thing 1
2. Thing 2
3. Thing 3
4. Thing 4
5. Thing 5
6. Thing 6
7. Thing 7
8. Thing 8
Do This!
DON’T DO THIS!
You wouldn’t do it anyway.
Science of Security Focus
1. Scalability and composability
2. Policy-governed secure collaboration
3. Encryption algorithms
4. Predictive security metrics
5. Intrusion Detection
6. Resilient architectures
7. Human behavior
Do This!
DON’T DO THIS!
Hard Problem 1: Scalability
and Composability
Challenge
— Develop methods to enable the construction
of secure systems with known security
properties.
Component and
Configuration Change
Hard Problem 2: Policy-Governed
Secure Collaboration
Challenge
— Develop methods to express and enforce
normative requirements and policies for
handling data with differing usage needs and
among users in different authority domains
Implied security and privacy
requirements
Templates
Repository
Supervised
Machine Learning
Hard Problem 3: Predictive
Security Metrics
Challenge
— Develop security metrics and models
capable of predicting whether or confirming
that a given cyber system preserves a given
set of security properties (deterministically or
probabilistically), in a given context.
Leveraging stack traces
from crash dumps
Risk-based attack surface
approximation
Windows: 48% of all binaries crash, 95% of vulnerable binaries crash.
Firefox: 16% of all files crash, 74% of vulnerable files crash.
Fedora: 8% of all packages crash, 60% of vulnerable packages crash.
Hard Problem 4: Resilient
Architectures
Challenge
— Develop means to design and analyze
system architectures that deliver required
service in the face of compromised
components
Synthesizing Network
Security Configurations
Resiliency Configurations Synthesis
Resiliency
Requirements
Topology
i.e., links, hosts
connectivity
Mission
e.g., connectivity requirements
Resiliency Configurations
-Isolation patterns
-Security device placements
-OS/Service/Software to be installed
Business Constraints
e.g., budget, usability constraint
Diversity Model
Isolation Model
Host Info
i.e., service/software
requirements
Impact Model
Attack Graph
Model
Design Specifications
- Resiliency metrics
- Usability
- Deployment/Cost
Hard Problem 5: Human
Behavior
Develop models of human behavior (of both
users and adversaries) that enable the design,
modeling, and analysis of systems with
specified security properties
/
Phishing: Personality &
Persuasion
LinkedIn Passwords
As Seen at NC State
Protect users from
themselves … easily!
My Intentions
Security Collaborative Research
Science Life
#metoosecurity
Making the world
a better place
Making the world
a better place
Making the world
a better place … by making
ALL software more secure
#metoosecurity
— #metoosecurity When deploying rapidly, we need
processes to make sure we are not pushing out
vulnerabilities
Slide photos -1— http://www.foxbusiness.com/markets/2017/07/13/verizon-customer-information-exposed-in-
data-breach.html
— http://www.tomandjerryonline.com/images/TrapHappy1.jpg
— http://www.leftlion.co.uk/articles.cfm/title/the-three-musketeers/id/1539
— http://www.dailymail.co.uk/tvshowbiz/article-1085791/Free-DVD-The-Four-Musketeers-todays-
Mail-Sunday.html
— https://www.reddit.com/r/pics/comments/1aw3f3/pathway/;
http://www.bbc.co.uk/bristol/content/image_galleries/tunnel_gallery.shtml
— http://www.thomthom.net/gallery/everything/tunnel-vision/
— http://davemeehan.com/cycling/ojos-negros-tunnel-vision
— http://www.techsangam.com/wp33/wp-content/uploads/2011/05/1221_jargon-boil-the-
ocean_485x340_forbes_com.jpg
— https://upload.wikimedia.org/wikipedia/en/3/33/Silicon_valley_title.png
— http://www.hindustantimes.com/india-news/tirupati-temple-andhra-pradesh-secretariat-hit-by-
wannacry-ransomware-attack/story-UJorivWJKEe2CL2tTaDusK.html
— https://www.popxo.com/2016/12/stereotypes-about-introverts-and-extroverts-broken/
— http://www.troll.me/images/pissed-off-obama/you-better-watch-yourself-thumb.jpg
Slide photos - 2
— https://bizpsycho.files.wordpress.com/2015/05/colored_puzzle_connection_1600_wht_9893.png
— https://scottmccown.wordpress.com/category/competition/
— https://www.linkedin.com/pulse/standing-shoulders-giants-6-apis-instant-saas-success-nick-boucart
— http://thebsblog.com/2015/10/09/oops-wrong-diagnosis/#prettyPhoto/0/
— http://www.findmemes.com/eye-roll-memes
— http://user47329.vs.easily.co.uk/wp-content/uploads/2014/08/Science-v-Engineering-Wordpress3.jpg
— http://memegenerator.net/instance/59256035
— http://www.pxleyes.com/photoshop-contest/20606/makeover.html
— http://lorettalovehuffblog.com/
— http://itnewscast.com/book/export/html/62241
— http://www.jenningswire.com/book-coaches/searching-for-the-needle-in-the-haystack/
— https://www.bing.com/images/search?view=detailV2&ccid=Y%2bfsSC%2b6&id=00072BAC4D3C77EC
F8E4AFFA13CCBFE0EC8E8A12&thid=OIP.Y-fsSC-6cSVEL_8ECb-
wlgEsC7&q=capability+brown++bridges&simid=608050771047878264&selectedIndex=7&ajaxhist=0
Slide photos - 3
— http://1000awesomethings.com/2011/02/23/302-grandma-hair
— http://garysreflections.blogspot.com/2011/02/chinese-hackers-now-hitting-major.html
— http://www.my-programming.com/2011/10/how-to-become-a-programmer/
— http://www.govconexecutive.com/2011/02/executive-spotlight-joseph-cormier-of-gtec
— https://cdn.psychologytoday.com/sites/default/files/field_blog_entry_images/ext.jpg
— http://www.keywordsblogger.com/wp-content/uploads/2009/05/persuading.jpg
— http://www.zdnet.com/pictures/biggest-hacks-security-data-breaches-2016
— http://www.zdnet.com/article/these-are-the-worst-passwords-from-the-linkedin-hack/
— https://www.iii.com/sites/default/files/imce/Elizabeth_Image_for_Blog_July_2015.png
— https://www.magzter.com/news/488/1242/032017/er0pk
— http://www.youngwebbuilder.com/how-to-get-listed-on-justtweetit-directory/
— https://alisonhinksyoga.wordpress.com/2013/09/09/a-rising-tide-lifts-all-boats/
http://thecybersaviours.com/intrusion-detection-system-ids

More Related Content

What's hot

Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Cybersecurity Curricula Guidelines for Post-Secondary Degree ProgramsCybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Matthew Rosenquist
 
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanWho Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Michael Roytman
 
Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automation
Chadni Islam
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
h702367529
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
h702367529
 
Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Insider threatsystemdynamics 2
Insider threatsystemdynamics 2
Fred Kautz
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
mark-smith
 
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
NYU Tandon Online
 
Architecture-centric Support for Integrating Security Tool in a Security Orch...
Architecture-centric Support for Integrating Security Tool in a Security Orch...Architecture-centric Support for Integrating Security Tool in a Security Orch...
Architecture-centric Support for Integrating Security Tool in a Security Orch...
Chadni Islam
 
Cisco - See Everything, Secure Everything
Cisco - See Everything, Secure EverythingCisco - See Everything, Secure Everything
Cisco - See Everything, Secure Everything
Redington Value Distribution
 
Cyb 690 security architecture scoring guide performance level
Cyb  690 security architecture scoring guide performance level Cyb  690 security architecture scoring guide performance level
Cyb 690 security architecture scoring guide performance level
ANIL247048
 
NTXISSACSC3 - Collin College's Security Management Practices Capstone Course ...
NTXISSACSC3 - Collin College's Security Management Practices Capstone Course ...NTXISSACSC3 - Collin College's Security Management Practices Capstone Course ...
NTXISSACSC3 - Collin College's Security Management Practices Capstone Course ...
North Texas Chapter of the ISSA
 
Customer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rigCustomer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rig
ANIL247048
 
PhD Welcome Day 2014
PhD Welcome Day 2014PhD Welcome Day 2014
PhD Welcome Day 2014
Andrea Avancini
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation2b3d
 
Coursera Cybersecurity 2015
Coursera Cybersecurity 2015Coursera Cybersecurity 2015
Coursera Cybersecurity 2015Arpit Singh
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 
Threat landscape 4.0
Threat landscape 4.0Threat landscape 4.0
Threat landscape 4.0
Dr. C.V. Suresh Babu
 
Cloud Security: Risks and Recommendations for New Entrants
Cloud Security: Risks and Recommendations for New EntrantsCloud Security: Risks and Recommendations for New Entrants
Cloud Security: Risks and Recommendations for New Entrants
irvinchoo
 

What's hot (20)

Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Cybersecurity Curricula Guidelines for Post-Secondary Degree ProgramsCybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
 
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanWho Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
 
Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automation
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Insider threatsystemdynamics 2
Insider threatsystemdynamics 2
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
 
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
 
Architecture-centric Support for Integrating Security Tool in a Security Orch...
Architecture-centric Support for Integrating Security Tool in a Security Orch...Architecture-centric Support for Integrating Security Tool in a Security Orch...
Architecture-centric Support for Integrating Security Tool in a Security Orch...
 
Cisco - See Everything, Secure Everything
Cisco - See Everything, Secure EverythingCisco - See Everything, Secure Everything
Cisco - See Everything, Secure Everything
 
Cyb 690 security architecture scoring guide performance level
Cyb  690 security architecture scoring guide performance level Cyb  690 security architecture scoring guide performance level
Cyb 690 security architecture scoring guide performance level
 
NTXISSACSC3 - Collin College's Security Management Practices Capstone Course ...
NTXISSACSC3 - Collin College's Security Management Practices Capstone Course ...NTXISSACSC3 - Collin College's Security Management Practices Capstone Course ...
NTXISSACSC3 - Collin College's Security Management Practices Capstone Course ...
 
Customer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rigCustomer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rig
 
PhD Welcome Day 2014
PhD Welcome Day 2014PhD Welcome Day 2014
PhD Welcome Day 2014
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
 
Coursera Cybersecurity 2015
Coursera Cybersecurity 2015Coursera Cybersecurity 2015
Coursera Cybersecurity 2015
 
Coursera Cybersecurity 2015
Coursera Cybersecurity 2015Coursera Cybersecurity 2015
Coursera Cybersecurity 2015
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Threat landscape 4.0
Threat landscape 4.0Threat landscape 4.0
Threat landscape 4.0
 
Cloud Security: Risks and Recommendations for New Entrants
Cloud Security: Risks and Recommendations for New EntrantsCloud Security: Risks and Recommendations for New Entrants
Cloud Security: Risks and Recommendations for New Entrants
 

Similar to The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity

The Rising Tide Raises All Boats: The Advancement of Science of Cybersecurity
The Rising Tide Raises All Boats:  The Advancement of Science of CybersecurityThe Rising Tide Raises All Boats:  The Advancement of Science of Cybersecurity
The Rising Tide Raises All Boats: The Advancement of Science of Cybersecurity
laurieannwilliams
 
Mirror mirrror
Mirror mirrrorMirror mirrror
Mirror mirrror
Flinturgy
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
TI Safe
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
ChantellPantoja184
 
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
OWASP EEE
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
Maurice Dawson
 
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Rihab Rahman
 
information security management
information security managementinformation security management
information security management
Gurpreetkaur838
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use case
Shujun Li
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
audeleypearl
 
malicious-use-of-ai.pptx
malicious-use-of-ai.pptxmalicious-use-of-ai.pptx
malicious-use-of-ai.pptx
warlord56
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
Matthew Rosenquist
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
Mel Drews
 
Self-Learning Systems for Cyber Security
Self-Learning Systems for Cyber SecuritySelf-Learning Systems for Cyber Security
Self-Learning Systems for Cyber Security
Kim Hammar
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
dr_edw777
 
Multi-vocal Review of security orchestration
Multi-vocal Review of security orchestrationMulti-vocal Review of security orchestration
Multi-vocal Review of security orchestration
Chadni Islam
 
1.Security Overview And Patching
1.Security Overview And Patching1.Security Overview And Patching
1.Security Overview And Patchingphanleson
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
Francesco Flammini
 

Similar to The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity (20)

The Rising Tide Raises All Boats: The Advancement of Science of Cybersecurity
The Rising Tide Raises All Boats:  The Advancement of Science of CybersecurityThe Rising Tide Raises All Boats:  The Advancement of Science of Cybersecurity
The Rising Tide Raises All Boats: The Advancement of Science of Cybersecurity
 
Mirror mirrror
Mirror mirrrorMirror mirrror
Mirror mirrror
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
 
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
 
information security management
information security managementinformation security management
information security management
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use case
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
 
malicious-use-of-ai.pptx
malicious-use-of-ai.pptxmalicious-use-of-ai.pptx
malicious-use-of-ai.pptx
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
Self-Learning Systems for Cyber Security
Self-Learning Systems for Cyber SecuritySelf-Learning Systems for Cyber Security
Self-Learning Systems for Cyber Security
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Multi-vocal Review of security orchestration
Multi-vocal Review of security orchestrationMulti-vocal Review of security orchestration
Multi-vocal Review of security orchestration
 
1.Security Overview And Patching
1.Security Overview And Patching1.Security Overview And Patching
1.Security Overview And Patching
 
IEEE-SMC-TCHS 2016
IEEE-SMC-TCHS 2016IEEE-SMC-TCHS 2016
IEEE-SMC-TCHS 2016
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
 

Recently uploaded

Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
e20449
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 

Recently uploaded (20)

Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 

The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity

  • 1. The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity Laurie Williams North Carolina State University #metoosecurity
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Intervening in the last hour of an official campaign, this operation clearly seeks to destabilize democracy… We cannot tolerate that the vital interests of democracy are thus endangered. - Macron campaign statement
  • 8. Attackers Unceasing Cybersecurity is all of our responsibility.. #metoosecurity
  • 9. A game of cat and mouse …
  • 10. Why the Science of Security? — “… nagging perception that too much of the research is opportunistic, lacks rigor, has weak methodology, and fails to produce material advances on underlying hard problems.” (NSA BAA Industry Day, 2013)
  • 13. The three missions of the Science of Security Lablets — Build a science of security community — Advance research methods in the context of cybersecurity to build a sound science of security — “Solve” hard security problems through the application of scientific research
  • 14. Through diversity of opinion, creativity and unity is born.
  • 16.
  • 17.
  • 18. Through collaboration and unity, we can accelerate change on a larger scale.
  • 20. Lablet (4)National Security Agency NCSU UIUC CMU NSAUMD Science of Security Lablets
  • 21. Lablet (4)National Security Agency Sub-Lablet (26) UNL CU DC PENN PITT NAVY UVA GWU RICEUTSA UTA UA UNCC NCSU VT USC UC UCBERKELEY ICSI UIUC IU IIT PU WSU CMU GMU UNC UMD RIT NSA Science of Security Lablets & Sub-Lablets NEWCASTLE (UK)
  • 22. NDSU UNL CU RSA CCT DC BC SC MITLL POTSDAM MIT SIEMENS RUTGERS AT&T PENN ARL PSU PITT NAVY UVA GWU HPHC NLM-NIH NU UMICH VERISIGN RPI UALBANY UCFRICEUTSA UTA TX A&M UA AUBURN GT UNCC NCSU VU VT UNM AFRL USC UC LLNL HP SU FUJITSU GOOGLE UCBERKELEY ICSI SYMANTEC L&C UW INL UIUC IU IIT UW-MADISON NWU PU WSU CMU GMU UNC UMD UH MANOA PC RIT NSA Lablet (4)National Security Agency Sub-Lablet (26) Collaborator (64)SURE (4) Science of Security Lablets, Sub-Lablets, and Collaborators NEWCASTLE (UK)
  • 24.
  • 25. The three missions of the Science of Security Lablets — Build a science of security community — Advance research methods in the context of cybersecurity to build a sound science of security — “Solve” hard security problems through the application of scientific research
  • 26.
  • 27. Those “pesky” and ever- present tough questions Where’s the beef . . . . science?
  • 28. Tough questions lead to great(er) insight. “The quality of your answers is in direct proportion to the quality of your questions.” --Albert Einstein
  • 29. It’s so easy to fall back to “engineering-ish” research.
  • 31. May be just a “subtle change”
  • 32. Stand on the shoulders of giants. Software Engineering
  • 33. Type of result Accepted (ICSE 2002) Accepted (ICSE 2016) Analysis … … Evaluation … … Experience 8 (19%) 4 (4%) Example 16 (37%) 1 (1%) Persuasion 0 (0%) 1 (1%) Underspecified … … No validation mentioned 6 (14%) 0 (0%) Types of Validation
  • 34. Type of result Accepted (ICSE 2002) Accepted (ICSE 2016) Analysis … … Evaluation … … Experience 8 (19%) 4 (4%) Example 16 (37%) 1 (1%) Persuasion 0 (0%) 1 (1%) Underspecified … … No validation mentioned 6 (14%) 0 (0%) Types of Validation
  • 35. Type of result Accepted (ICSE 2002) Accepted (ICSE 2016) Analysis … … Evaluation … … Experience 8 (19%) 4 (4%) Example 16 (37%) 1 (1%) Persuasion 0 (0%) 1 (1%) Underspecified … … No validation mentioned 6 (14%) 0 (0%) Types of Validation
  • 36. Type of result Accepted (ICSE 2002) Accepted (ICSE 2016) Analysis … … Evaluation … … Experience 8 (19%) 4 (4%) Example 16 (37%) 1 (1%) Persuasion 0 (0%) 1 (1%) Underspecified … … No validation mentioned 6 (14%) 0 (0%) Types of Validation
  • 37. Science of Security Copycats — Guidelines — Seminars — Research plan reviews — Workshops — Conference (Hot SoS)
  • 38. The Rising Tide: Leading by Example
  • 39. Cybersecurity is all of our responsibility.. #metoosecurity 1. Introduce yourself to someone you don’t know. 2. Provide one way that you can bring security into your research and/or teaching. Two minutes …. GO!
  • 40. The three missions of the Science of Security Lablets — Build a science of security community — Advance research methods in the context of cybersecurity to build a sound science of security — “Solve” hard security problems through the application of scientific research
  • 41. Through focus, progress is made. 1. Thing 1 2. Thing 2 3. Thing 3 4. Thing 4 5. Thing 5 6. Thing 6 7. Thing 7 8. Thing 8 Do This! DON’T DO THIS! You wouldn’t do it anyway.
  • 42. Science of Security Focus 1. Scalability and composability 2. Policy-governed secure collaboration 3. Encryption algorithms 4. Predictive security metrics 5. Intrusion Detection 6. Resilient architectures 7. Human behavior Do This! DON’T DO THIS!
  • 43. Hard Problem 1: Scalability and Composability Challenge — Develop methods to enable the construction of secure systems with known security properties.
  • 45. Hard Problem 2: Policy-Governed Secure Collaboration Challenge — Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains
  • 46. Implied security and privacy requirements Templates Repository Supervised Machine Learning
  • 47. Hard Problem 3: Predictive Security Metrics Challenge — Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.
  • 49. Risk-based attack surface approximation Windows: 48% of all binaries crash, 95% of vulnerable binaries crash. Firefox: 16% of all files crash, 74% of vulnerable files crash. Fedora: 8% of all packages crash, 60% of vulnerable packages crash.
  • 50. Hard Problem 4: Resilient Architectures Challenge — Develop means to design and analyze system architectures that deliver required service in the face of compromised components
  • 51. Synthesizing Network Security Configurations Resiliency Configurations Synthesis Resiliency Requirements Topology i.e., links, hosts connectivity Mission e.g., connectivity requirements Resiliency Configurations -Isolation patterns -Security device placements -OS/Service/Software to be installed Business Constraints e.g., budget, usability constraint Diversity Model Isolation Model Host Info i.e., service/software requirements Impact Model Attack Graph Model Design Specifications - Resiliency metrics - Usability - Deployment/Cost
  • 52. Hard Problem 5: Human Behavior Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties /
  • 54.
  • 55.
  • 56.
  • 58.
  • 59. As Seen at NC State
  • 61. My Intentions Security Collaborative Research Science Life #metoosecurity
  • 62. Making the world a better place
  • 63. Making the world a better place
  • 64. Making the world a better place … by making ALL software more secure
  • 65. #metoosecurity — #metoosecurity When deploying rapidly, we need processes to make sure we are not pushing out vulnerabilities
  • 66. Slide photos -1— http://www.foxbusiness.com/markets/2017/07/13/verizon-customer-information-exposed-in- data-breach.html — http://www.tomandjerryonline.com/images/TrapHappy1.jpg — http://www.leftlion.co.uk/articles.cfm/title/the-three-musketeers/id/1539 — http://www.dailymail.co.uk/tvshowbiz/article-1085791/Free-DVD-The-Four-Musketeers-todays- Mail-Sunday.html — https://www.reddit.com/r/pics/comments/1aw3f3/pathway/; http://www.bbc.co.uk/bristol/content/image_galleries/tunnel_gallery.shtml — http://www.thomthom.net/gallery/everything/tunnel-vision/ — http://davemeehan.com/cycling/ojos-negros-tunnel-vision — http://www.techsangam.com/wp33/wp-content/uploads/2011/05/1221_jargon-boil-the- ocean_485x340_forbes_com.jpg — https://upload.wikimedia.org/wikipedia/en/3/33/Silicon_valley_title.png — http://www.hindustantimes.com/india-news/tirupati-temple-andhra-pradesh-secretariat-hit-by- wannacry-ransomware-attack/story-UJorivWJKEe2CL2tTaDusK.html — https://www.popxo.com/2016/12/stereotypes-about-introverts-and-extroverts-broken/ — http://www.troll.me/images/pissed-off-obama/you-better-watch-yourself-thumb.jpg
  • 67. Slide photos - 2 — https://bizpsycho.files.wordpress.com/2015/05/colored_puzzle_connection_1600_wht_9893.png — https://scottmccown.wordpress.com/category/competition/ — https://www.linkedin.com/pulse/standing-shoulders-giants-6-apis-instant-saas-success-nick-boucart — http://thebsblog.com/2015/10/09/oops-wrong-diagnosis/#prettyPhoto/0/ — http://www.findmemes.com/eye-roll-memes — http://user47329.vs.easily.co.uk/wp-content/uploads/2014/08/Science-v-Engineering-Wordpress3.jpg — http://memegenerator.net/instance/59256035 — http://www.pxleyes.com/photoshop-contest/20606/makeover.html — http://lorettalovehuffblog.com/ — http://itnewscast.com/book/export/html/62241 — http://www.jenningswire.com/book-coaches/searching-for-the-needle-in-the-haystack/ — https://www.bing.com/images/search?view=detailV2&ccid=Y%2bfsSC%2b6&id=00072BAC4D3C77EC F8E4AFFA13CCBFE0EC8E8A12&thid=OIP.Y-fsSC-6cSVEL_8ECb- wlgEsC7&q=capability+brown++bridges&simid=608050771047878264&selectedIndex=7&ajaxhist=0
  • 68. Slide photos - 3 — http://1000awesomethings.com/2011/02/23/302-grandma-hair — http://garysreflections.blogspot.com/2011/02/chinese-hackers-now-hitting-major.html — http://www.my-programming.com/2011/10/how-to-become-a-programmer/ — http://www.govconexecutive.com/2011/02/executive-spotlight-joseph-cormier-of-gtec — https://cdn.psychologytoday.com/sites/default/files/field_blog_entry_images/ext.jpg — http://www.keywordsblogger.com/wp-content/uploads/2009/05/persuading.jpg — http://www.zdnet.com/pictures/biggest-hacks-security-data-breaches-2016 — http://www.zdnet.com/article/these-are-the-worst-passwords-from-the-linkedin-hack/ — https://www.iii.com/sites/default/files/imce/Elizabeth_Image_for_Blog_July_2015.png — https://www.magzter.com/news/488/1242/032017/er0pk — http://www.youngwebbuilder.com/how-to-get-listed-on-justtweetit-directory/ — https://alisonhinksyoga.wordpress.com/2013/09/09/a-rising-tide-lifts-all-boats/ http://thecybersaviours.com/intrusion-detection-system-ids