welcome to cybersecurity cascon, toronto october 17, 2005
TRANSCRIPT
Welcome to Cybersecurity
CASCON, Toronto
October 17, 2005
What is cybersecurity?policies for the security of citizens and society in
electronic communications, transactions and interactions.
Source: http://cybersecurity.jrc.it/CyberSecurity.htmlPotential subareas:
Digital identity management and privacy Trustworthy eGovernment
and consumer protection information systems Digital evidence systems for combating
cybercrime Information infrastructure interdependencies a
nd risks
E-Health
What is cybersecurity (part 2) Information assurance, including information
security, information technology disaster recovery, and information privacy.
Source: BitpipeAreas:
CyberterrorismData SecurityDisaster RecoveryHomeland SecurityIntrusion DetectionIntrusion PreventionPrivacy Rights
Key Concepts
A vulnerability is an error or a weakness in the design, implementation, or operation of a system.
A threat is an adversary that is motivated to exploit a system vulnerability and is capable of doing so.
Risk refers to the likelihood that a vulnerability will be exploited, or that a threat may become harmful
Source: Cybersecurity: Today and Tomorrow
Goal of this workshopNurture discussion amongst diverse members
interested in cybersecurityExchange informationNetworkAdvance an agenda for a national information and
network security research network Have fun!
Some people to thank IBM CAS
Julie Waterhouse, Jen Hawkins
Organizers:Walid Rjaibi (IBM)Jacob Slonim (Dalhousie)Paul Von Oorschot (Carleton)David Lie (Toronto, ECE)David Evans (Dalhousie)John McHugh (Dalhousie)Michael McAllister (Dalhousie)Rosa Esteireiro (ECE, Toronto)
Some people to thank (Cont’d)FISIC (Forum for Information Security Innovation in
Canada)Craig Hillier (Bell Canada)
MITACSJim Brookes
Today’s Agenda 8:30-9:00 Registration + Networking
(Registration opens at 8:00) 9:00-9:15 Workshop Introduction 9:15-9:45 Talk #1: Elias Levy (Symantic):
Dionaea: On the automatic collection of malicious code samples through honey pot farms.
9:45-10:15 Talk #2: Paul Van Oorschot (Carleton University): Information Security 2105
10:15-10:30 Break 10:30-11:45 Short research intros from
attendees (about 3 minutes each) 12:00-1:00 Lunch (Provided)
Today’s Agenda 1:00-1:30 Talk #3: Bob Blakley (IBM):
TBA
1:30-2:00 Talk #4: John McHugh (Dalhousie University): ]Network Awareness and Network Security
2:00-2:30 Talk #5: Bill Aiello (University of British Columbia): Enterprise Security: A Community of Interest
Based Approach
2:30-2:45 Break 2:45-3:50 Jim Brookes
Canadian security research networking session
3:50-4:00 Wrap-up
Mini-presentations1. Lewis Robart and David Gibson, Industry Canada2. Stefan Saroiu, University of Toronto 3. Eric Yu, University of Toronto 4. Michel Barbeau, Carleton University 5. Rene Struik, Certicom 6. Stephan Neville, U of Victoria 7. David Lie, University of Toronto8. Marsha Chechik, University of Toronto9. Hugh Williams, U of Calgary 10. Urs Hengartner, Waterloo 11. Ashraf Matrawy, Carleton 12. Jose Fernandez, Ecole Polytechnique de Montreal 13. Mark Perry, Western 14. Nadia Tawbi, Laval 15. Andrew Patrick, NRC 16. Gord Agnew, Waterloo 17. Patrick Hung, UOIT 18. Konstantin Beznosov, UBC19. Victor Ralevich, Sheridan College20. Andrew Marshall, TD21. Ken Barker, Univ. of Calgary