Lecture 2
Lecture 2
Lecture #2
Information Security
Security
Threats and
Violations
Access
Integrity
Control Fraud Sabotage
Violations Violations
Confidentiality
Denial of Authentication
Service/ Nonrepudiation
Infrastructure Violations
Attacks
Approaches and Solutions
End-to-end security
URI, UNICODE
Navigation
Data Analysis Programming Display Consoles
Data Links Processor (14)
Group (DAPG) &
Sensors Refresh
Channels
Sensor Multi-Sensor
Detections Tracks •Security being considered after
Technology
Technology the system has been designed
Future Future Future
provided
providedby
by App App App and prototypes implemented
the
theproject
project •Challenge: Integrating real-time
Data MSI processing, security and
Mgmt. Data
Xchg.
App fault tolerance
Infrastructure Services
Hardware
Research Directions for Privacy
Why this interest now on privacy?
- Data Mining for National Security
- Data Mining is a threat to privacy
- Balance between data sharing/mining and privacy
Privacy Preserving Data Mining
Inference Problem as a Privacy Problem
Data Sharing Across Coalitions
Data Mining to Handle Security Problems
Data mining tools could be used to examine audit data and flag
abnormal behavior
Much recent work in Intrusion detection
DBMS Database
Secure Data Sharing Across Coalitions
Export Export
Data/Policy Data/Policy
Export
Data/Policy
Component Component
Data/Policy for Data/Policy for
Agency A Agency C
Component
Data/Policy for
Agency B