Information Trust Institute Distinguished Lecture Elisa Bertino
September 6, 2011
ITI Distinguished Lecture
Past research on information security has focused on protecting valuable resources from attacks by outsiders. However, statistics show that many security and privacy breaches are due to insider attacks. Protection from insider threats is challenging because insiders may have access to many sensitive resources and high-privileged system accounts. Suitable approaches need to combine several security techniques, like fine-grained access control, stronger authentication protocols, integrated digital identity management, and intrusion detection, with techniques from areas like information integration, machine learning, and risk assessment. In this talk, after an introduction to the problem of insider threats, I will present recent work addressing the problem of anomaly detection and response policies for database management systems and then discuss open research issues, emphasizing the role of techniques from the area of information integration.
Reception to follow in 301 Coordinated Science Lab.
July 2, 2015
Cyber Center director, Elisa Bertino and Computer Science graduate student, Hasini Gunasinghe, received the Best Poster Award for their presentation at the 35th IEEE ICDCS Conference in Columbus, Ohio, June 29-July 2.Read Full Story
June 5, 2015
Cyber Center Bioinformatics Core is acknowledged for making GLBIO 2015 at Purdue a huge success. With over 250 attendees, outstanding education, the celebration of GLBIO's tenth anniversary and 118 poster presentations, GLBIO 2015 was a rousing success!Read Full Story