cybersecurity for conservation

13
Cybersecurity for Conservation

Upload: jbasney

Post on 12-Apr-2017

202 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Cybersecurity for Conservation

Cybersecurity for Conservation

Page 2: Cybersecurity for Conservation

Center for Trustworthy CyberinfrastructureThe NSF Cybersecurity Center of Excellence

Page 3: Cybersecurity for Conservation

CTSC ActivitiesMore information at trustedci.org

Tailored Public Resources

Outreach

Community Events

Engagements

Training

Page 4: Cybersecurity for Conservation

CTSC-IBEIS Engagement

Page 5: Cybersecurity for Conservation

CTSC-IBEIS Prototype

Page 6: Cybersecurity for Conservation

Access Control Policy Examples

Subject (Role) Resource Action

Organization Member Media Asset CR

Data Curator Annotations CRUD

Organization Administrator Organization Policy CRUD

Platform Administrator Organization CRUD

Page 7: Cybersecurity for Conservation

More info on CTSC engagements

Page 8: Cybersecurity for Conservation

Risk Self-Evaluation

Page 9: Cybersecurity for Conservation

Guide to Developing Cybersecurity Programs

Page 10: Cybersecurity for Conservation

Guide to Developing Cybersecurity Programs

Page 11: Cybersecurity for Conservation

Example Risks and Mitigations

Page 12: Cybersecurity for Conservation

Additional Resources

Page 13: Cybersecurity for Conservation

We thank the National Science Foundation (grant 1547272) for supporting our work.

The views and conclusions contained herein are those of the author and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the NSF.