CERIAS Security Seminar Series
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.
Show all Visit Show Website http://www.cerias.purdue.edu/sec...Recently Aired
-
HD
Buzz Walsh, "Managing Security Polarities"
There is inherent tension between network performance and security. With ...
There is inherent tension between network performance and security. With the rapidly evolving drive for military and economic data being accessible via Service Oriented Architectures, the import of securing such data is increasing and the consequences for
-
HD
Ta-Wei "David" Wang, "Reading the Disclosures with New Eyes: Bridging the Gap between Information Security Disclosures and Incidents"
This paper investigates the relationship between information security related disclosures ...
This paper investigates the relationship between information security related disclosures in financial reports and the impacts of information security incidents through cross-sectional and cluster analysis. First, by drawing upon the theories of disclosur
-
HD
Myron Cramer, "Beyond the Enclave: Evolving Concepts in Security Architectures"
This presentation discusses evolving concepts in security architectures. Current security ...
This presentation discusses evolving concepts in security architectures. Current security architectures are based on the enclave architecture model. This model organizes and separates networked information systems into trusted, untrusted, and shared areas
-
HD
Anand Singh, "What are CSO's thinking about? Top information security initiatives for 2008 and beyond �"
2006 and 2007 were seminal years which saw emergence of ...
2006 and 2007 were seminal years which saw emergence of several information security threats and significant data breaches. The media focus on various incidents have made consumers much more aware of information security and hence, any significant securit
-
HD
Edward W. Felten, "Electronic Voting: Danger and Opportunity"
Electronic voting machines have made our elections less reliable and ...
Electronic voting machines have made our elections less reliable and less secure, but recent developments offer hope of a better system in the future. Current research offers the hope of a future voting system that is more reliable and more secure than ev
-
HD
Paul Syverson & Roger Dingledine, "Tor: Anonymous communications for government agencies, corporations, journalists... and you"
What do the Department of Defense and the Electronic Frontier ...
What do the Department of Defense and the Electronic Frontier Foundation have in common? They have both funded the development of Tor (torproject.org), a free-software anonymizing network that helps people around the world use the Internet in safety. Tor'
-
HD
Eric Cole, "Security in a Changing World"
While the world is constantly changing, the core principles of ...
While the world is constantly changing, the core principles of security have not changed that much, yet organizations are stilling be compromised. This talk will look at some of the problems in cyber space and some unique solutions for securing informatio
-
HD
Ventkat Venkatakrishnan, "CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations"
SQL injection attacks are one of the topmost threats for ...
SQL injection attacks are one of the topmost threats for applications written for the Web. These attacks are launched through specially crafted user input on web applications that use low level string operations to construct SQL queries. In this talk, I w
-
HD
Steve Myers, Indiana University, "Wireless Router Insecurity: The Next Crimeware Epidemic"
The widespread adoption of home routers by the general public ...
The widespread adoption of home routers by the general public has added a new target for malware and crimeware authors. A router's ability to manipulate essentially all network traffic coming in to and out of a home, means that malware installed on these
-
HD
Richard Thieme, "Security, Soft Boundaries, and oh-so-subtle Strategies:How to Play Chess While the Board is Disappearing"
Non-state and state intelligence are converging in a context of ...
Non-state and state intelligence are converging in a context of fluid boundaries. It is increasingly difficult to know who is inside and who is not. Creating a trusted network does not resolve the most critical security problems because those problems beg