DOC PREVIEW
UTD CS 4398 - Lecture #1 Introduction to Data and Applications Security and Digital Forensics

This preview shows page 1-2-19-20 out of 20 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 20 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 20 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 20 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 20 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 20 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Digital ForensicsOutlineDevelopments in Data and Applications Security: 1975 - PresentDevelopments in Data and Applications Security: Multilevel Secure Databases - IDevelopments in Data and Applications Security: Multilevel Secure Databases - IISome Directions and Challenges for Data and Applications Security - ISome Directions and Challenges for Data and Applications Security - IIEmerging Technologies in Data and Applications SecurityDigital Identity ManagementDigital Identity Management - IIIdentity Theft ManagementSteganography and Digital WatermarkingSteganography and Digital Watermarking - IIRisk AnalysisEconomics AnalysisSecure Electronic Voting MachinesBiometricsDigital ForensicsDigital Forensics - IIInformation Sharing between Trustworthy, Semi- trustworthy and Untrustworthy PartnersDigital ForensicsDr. Bhavani ThuraisinghamThe University of Texas at DallasLecture #1Introduction to Data and Applications Security and Digital ForensicsAugust 20, 2007OutlineData and Applications Security -Developments and DirectionsSome Emerging Technologies-Digital watermarking, Biometrics, Digital Forensics, - - -Developments in Data and Applications Security: 1975 - PresentAccess Control for Systems R and Ingres (mid 1970s)Multilevel secure database systems (1980 – present)-Relational database systems: research prototypes and products; Distributed database systems: research prototypes and some operational systems; Object data systems; Inference problem and deductive database system; TransactionsRecent developments in Secure Data Management (1996 – Present)-Secure data warehousing, Role-based access control (RBAC); E-commerce; XML security and Secure Semantic Web; Data mining for intrusion detection and national security; Privacy; Dependable data management; Secure knowledge management and collaboration; emerging technologies such as biometrics and digital forensicsDevelopments in Data and Applications Security: Multilevel Secure Databases - IAir Force Summer Study in 1982Early systems based on Integrity Lock approachSystems in the mid to late 1980s, early 90s-E.g., Seaview by SRI, Lock Data Views by Honeywell, ASD and ASD Views by TRW-Prototypes and commercial products-Trusted Database Interpretation and Evaluation of Commercial ProductsSecure Distributed Databases (late 80s to mid 90s)-Architectures; Algorithms and Prototype for distributed query processing; Simulation of distributed transaction management and concurrency control algorithms; Secure federated data managementDevelopments in Data and Applications Security: Multilevel Secure Databases - IIInference Problem (mid 80s to mid 90s)-Unsolvability of the inference problem; Security constraint processing during query, update and database design operations; Semantic models and conceptual structuresSecure Object Databases and Systems (late 80s to mid 90s)-Secure object models; Distributed object systems security; Object modeling for designing secure applications; Secure multimedia data managementSecure Transactions (1990s)-Single Level/ Multilevel Transactions; Secure recovery and commit protocolsSome Directions and Challenges for Data and Applications Security - ISecure semantic web -Security modelsSecure Information Integration-How do you securely integrate numerous and heterogeneous data sources on the web and otherwiseSecure Sensor Information Management-Fusing and managing data/information from distributed and autonomous sensorsSecure Dependable Information Management-Integrating Security, Real-time Processing and Fault ToleranceData Sharing vs. Privacy-Federated database architectures?Some Directions and Challenges for Data and Applications Security - IIData mining and knowledge discovery for intrusion detection-Need realistic models; real-time data miningSecure knowledge management-Protect the assets and intellectual rights of an organizationInformation assurance, Infrastructure protection, Access Control-Insider cyber-threat analysis, Protecting national databases, Role-based access control for emerging applicationsSecurity for emerging applications-Geospatial, Biomedical, E-Commerce, etc. Other Directions-Trust and Economics, Trust Management/Negotiation, Secure Peer-to-peer computing, Emerging technologies such as digital forensicsEmerging Technologies in Data and Applications SecurityDigital Identity ManagementIdentity Theft ManagementDigital WatermarkingRisk AnalysisEconomic AnalysisSecure Electronic Voting MachinesBiometricsDigital ForensicsDigital Identity ManagementDigital identity is the identity that a user has to access an electronic resourceA person could have multiple identities -A physician could have an identity to access medical resources and another to access his bank accountsDigital identity management is about managing the multiple identities-Manage databases that store and retrieve identities-Resolve conflicts and heterogeneity-Make associations-Provide securityOntology management for identity management is an emerging research areaDigital Identity Management - IIFederated Identity Management-Corporations work with each other across organizational boundaries with the concept of federated identity-Each corporation has its own identity and may belong to multiple federations-Individual identity management within an organization and federated identity management across organizationsTechnologies for identity management-Database management, data mining, ontology management, federated computingIdentity Theft ManagementNeed for secure identity management-Ease the burden of managing numerous identities-Prevent misuse of identity: preventing identity theftIdentity theft is stealing another person’s digital identityTechniques for preventing identity thefts include-Access control, Encryption, Digital Signatures-A merchant encrypts the data and signs with the public key of the recipient-Recipient decrypts with his private keySteganography and Digital WatermarkingSteganography is about hiding information within other information-E.g., hidden information is the message that terrorist may be sending to their pees in different parts of the worlds-Information may be hidden in valid texts, images, films etc.-Difficult to be detected by the unsuspecting human Steganalysis is about developing techniques that can analyze text, images, video and detect hidden


View Full Document

UTD CS 4398 - Lecture #1 Introduction to Data and Applications Security and Digital Forensics

Documents in this Course
Botnets

Botnets

33 pages

Botnets

Botnets

33 pages

Load more
Download Lecture #1 Introduction to Data and Applications Security and Digital Forensics
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture #1 Introduction to Data and Applications Security and Digital Forensics and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture #1 Introduction to Data and Applications Security and Digital Forensics 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?