Example: Data Mining for the NBA - The University of Texas at Dallas

Download Report

Transcript Example: Data Mining for the NBA - The University of Texas at Dallas

Information Security Analytics
Dr. Bhavani Thuraisingham
The University of Texas at Dallas
Introduction to the Course
Course Outline
 June 1: Introduction to Security, Data and Applications Security
 June 8: Security Governance and Risks / Data mining overview
 June 15: Access Control / Access control and policy for data
management
 June 22: Security architecture / Access control for web services and
the cloud
 June 29: Cryptography / Secure XML Publishing
 July 6: Network Security / Physical Security /Review for exam
 July 13: Exam #1
 July 20: Applications Security / Secure Data Architectures; Insider
Threat Detection/
 July 27: Legal Aspects, Forensics
 August 3: Operations Security, Disaster Planning
 August 10: Special Topics, Exam #2
Text Book
 CISSP All-in-One Exam Guide, Fifth Edition
 Author: Shon Harris
 Hardcover: 1216 pages
 Publisher: McGraw-Hill Osborne Media; 5 edition (January 15, 2010)
 Language: English
 ISBN-10: 0071602178
 ISBN-13: 978-0071602174
Course Rules
 Unless special permission is obtained from the instructor, each
student will work individually.
 Copying material from other sources will not be permitted unless the
source is properly referenced.
 Any student who plagiarizes from other sources will be reported to
the Computer Science department and any other committees as
advised by the department
 No copying of anything from a paper except for about 10 words in
quotes. No copying of figure even if it is attributed. You have to draw
all figures.
 COURSE ATTENDANCE IS MANDATORY
Course Plan
 Exam #1: 20 points – July 13
 Exam #2: 20 points - August 10
 Two term papers 10 points each: Total 20 points
- July 6, July 27
 Programming project : 20 points
- August 3
 Two Assignments: 10 points each: Total: 20 points
- June 30 – July3, July 20
Assignment #1
 Explain with examples the following
- Discretionary access control
- Mandatory access control
- Role-based access control (RBAC)
- Privacy aware role based access control
- Temporal role based access control
- Risk aware role-based access control
- Attribute-based access control
- Usage control (UCON)
Term Paper #1
 Write paper on Identity Management for Cloud Computing
- Identity Management
- Cloud Computing security challenges
- Apply identity management to cloud computing
- Directions
Assignment #2
 Suppose you are give the assignment of the Chief Security Officer of
a major bank (e.g., Bank of America) or a Major hospital (e.g.,
Massachusetts General)
 Discuss the steps you need to take with respect to the following (you
need to keep the following in mining: Confidentiality, Integrity and
Availability;; you also need to understand the requirements of
banking or healthcare applications and the policies may be:
- Information classification
- Risk analysis
- Secure networks
- Secure data management
- Secure applications
Term Paper #2
 Write paper on any topic discussed in class (that is, any of the 10
CISSP modules)
Contact
 For more information please contact
- Dr. Bhavani Thuraisingham
- Professor of Computer Science and
- Director of Cyber Security Research Center Erik Jonsson School
of Engineering and Computer Science EC31, The University of
Texas at Dallas Richardson, TX 75080
- Phone: 972-883-4738
- Fax: 972-883-2399
- Email: [email protected]
- URL:
- http://www.utdallas.edu/~bxt043000/
Project
 Software
 Design document
- Project description
- Architecture (prefer with a picture) and description (software –
e.g., Oracle, Jena etc.)
- Results
- Analysis
- Potential improvements
- References
Paper: Original – you can use material from
sources, reword (redraw) and give reference
 Abstract
 Introduction
 Body of the paper
- Comparing different approaches and analyzing
- Discuss your approach,
- Survey
 Conclusions
 References
- ([1]. [2], - - -[THUR99].
- Embed the reference also within the text.
- E.g., Tim Berners Lee has defined the semantic web to be -[2].
--
Index to Exam #1
 Lecture 1: Introduction to Info Systems Security
 Lecture 2: Data Mining for Malware Detection* (1)
 Lecture 3: Governance and Risk ** (2)
 Lecture 4: Data Mining Overview
 Lecture 5: Access Control* (1)
 Lecture 6: Access Control and Policy for data * (1)
 Lecture 7: Security Architecture* (1)
 Lecture 8: Secure Web Services* (1)
 Lecture 9: Secure Cloud* (1)
 Lecture 10: Cryptography* (1)
 Lecture #11: Secure publication of XML data * (1)
Extra credit: One or two questions on any one of the above
Papers to Read for Exam #1
 Elisa Bertino, Barbara Carminati, Elena Ferrari, Bhavani M.
Thuraisingham, Amar Gupta: Selective and Authentic Third-Party
Distribution of XML Documents. IEEE Trans. Knowl. Data Eng.
16(10): 1263-1278 (2004)
 Expert on Cloud technologies
 Vaibhav Khadilkar
 [email protected]
Index to Exam #2
 Lecture 12: Network Security
 Lecture 13: Physical Security
 Lecture 14: Assured Cloud Computing (extra credit)
 Lecture 15: Data and Applications Security
 Lecture 16: Multilevel Secure Data Management
 Lecture 17: Insider Threat
 Lecture 18: Business Continuity Planning
 Lecture 19: Operations Security
 Lecture 20: Legal Aspects
 Lecture 21 Digital Forensics
 Lecture 22: Privacy
 Lecture 23: NIST/NVD Lecture (extra credit)