Dr. Elisa Bertino Keynote Speaker at IRI conference
August 4, 2011
"Protecting Information Systems from Insider Threats - Concepts and Issues"
Past research on information security has focused on protecting valuable resources from attacks by outsiders. However, statistics show that a large amount of security and privacy breaches are due to insider attacks. Protection from insider threats is challenging because insiders may have access to many sensitive resources and high-privileged system accounts. Suitable approaches need to combine several security techniques, like fine-grained access control, stronger authentication protocols, integrated digital identity management, intrusion detection, with techniques from areas like information integration, machine learning, and risk assessment. In this talk, after an introduction to the problem of insider threats, we will present recent work addressing the problem of anomaly detection and response policies for database management systems and then discuss open research issues, by emphasizing the role of techniques from the area of information integration.
May 27, 2015
Like most people, I never gave it much thought when I plugged my phone charger into an electrical socket. I certainly never thought about all the time, people, and resources it takes to power the lifestyle I took for granted.Read Full Story
May 20, 2015
A Purdue University program that brings high school students and teachers to campus for a week each summer to investigate energy problems and solutions is the recipient of Duke Energy Corp.'s Difference Maker award for 2015.Read Full Story
May 18, 2015
Purdue University and Red Hat Inc. (NYSE:RHT), the world's leading open-source solutions, are collaborating to create a two-year doctoral research position for Discovery Park's Research Center for Open Digital Innovation.Read Full Story