Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cybersecurity for Science

718 views

Published on

Presentation at IU Booth during Supercomputing'14.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Cybersecurity for Science

  1. 1. Cybersecurity for Science Von Welch Director, CACR SC14 November 18th, 2014
  2. 2. Cybersecurity for Science: SC14 November 18th, 2014 I love Cyberinfrastructure… HPC HTC Science Gateways Big Data Distributed Everything Bleeding-edge Networks
  3. 3. Cybersecurity for Science: SC14 November 18th, 2014 I Hate the Perception of Cybersecurity… HPC HTC Science Gateways Big Data Distributed Everything International User Communities
  4. 4. Cybersecurity for Science: SC14 November 18th, 2014 Cybersecurity is an Enabler of Cyberinfrastructure and Science
  5. 5. Cybersecurity for Science: SC14 November 18th, 2014 Why Cybersecurity Matters to Science…
  6. 6. Cybersecurity for Science: SC14 November 18th, 2014 Trustworthy Science Maintaining the trust of scientists and the public in the CI, data and science is critical. Bias: Scientists have been managing the ultimate insider threat for a long time. Cybersecurity deals with increasing threats to trustworthy computational science.
  7. 7. Cybersecurity for Science: SC14 November 18th, 2014 Do no harm CI represents some impressive cyber-facilities. Being used as a tool to do harm to others would be potentially very damaging to CI’s reputation.
  8. 8. Cybersecurity for Science: SC14 November 18th, 2014 Collaboration
  9. 9. Cybersecurity for Science: SC14 November 18th, 2014 Identity matters to Science… Scott Koranda/LIGO - Oct’11
  10. 10. Cybersecurity for Science: SC14 November 18th, 2014 Specific Concerns Many science domains, communities, and projects will have particular concerns. The risks related to confidentiality, integrity, and availability vary greatly.
  11. 11. Cybersecurity for Science: SC14 November 18th, 2014 why is cybersecurity for science hard?
  12. 12. Cybersecurity for Science: SC14 November 18th, 2014 SSccieiennttifificic CCoommmmuunnitityy SScciieennccee // CCyybbeerriinnffrraassttrruuccttuurree Multiple Universities and/or Research Multiple Universities and/or Research Orgs Orgs Regional R&E and Commercial Services Regional R&E and Commercial Services Open Source and Scientific Software Open Source and Scientific Software R&E R&E Networks Requirements, Services, Networks … Risks, Policies, Risks
  13. 13. Cybersecurity for Science: SC14 November 18th, 2014 Science pushes IT hard! HPC HTC Science Gateways Big Data Distributed Everything Bleeding-edge Networks
  14. 14. Cybersecurity for Science: SC14 November 18th, 2014 Handling things going wrong at speed….
  15. 15. Cybersecurity for Science: SC14 November 18th, 2014 Cybersecurity Historically Firewalls, IDS, encryption, logs, passwords, etc.
  16. 16. Cybersecurity for Science: SC14 November 18th, 2014 Contemporary Cybersecurity Cybersecurity supports the science mission by managing risks to science.
  17. 17. Cybersecurity for Science: SC14 November 18th, 2014 So, what am I doing about the weather?
  18. 18. Cybersecurity for Science: SC14 November 18th, 2014 TrustedCI.org: Center for Trustworthy Scientific Cyberinfrastructure Providing leadership and addressing cybersecurity challenges for the NSF community.
  19. 19. Cybersecurity for Science: SC14 November 18th, 2014 We rely increasingly on our software stacks – both the ones we write and others. Open nature leads to large attack surfaces. Software integrity is critical. A joint effort: Morgridge Institute for Research (lead) University of Illinois Urbana Champaign University of Wisconsin – Madison Indiana University Miron Livny, MIR Jim Basney, UIUC Bart Miller, UW Von Welch, IU https://continuousassurance.org/
  20. 20. Cybersecurity for Science: SC14 November 18th, 2014 XSIM: Extreme Scale Identity Management for Science The Virtual Organization (VO) is critical to science. XSIM model enables delegation of identity management from resource provider to VO. Funded by DOE/ASCR Image credit: Ian Bird/CERN
  21. 21. Cybersecurity for Science: SC14 November 18th, 2014 Fighting “Identity Management in a closet” Managing access to data, instruments, etc. Authenticating collaborators/commu nity is hard. Effort drawn away from science. Enabling use of campus identities.
  22. 22. Cybersecurity for Science: SC14 November 18th, 2014 Cybersecurity is an enabler Science and cyberinfrastructure are pushing IT to new heights. Cybersecurity helps us manage the risks, maintain trust, build collaborations, and do the science most effectively.
  23. 23. Cybersecurity for Science: SC14 November 18th, 2014 Thank you. Von Welch vwelch@iu.edu cacr.iu.edu

×