Cyberspace Security Issues and Challenges

Wednesday, June 9th, 2004 at 6:00 PM

TI Auditorium


Speaker: Manu Malek

Bio: Manu Malek is Industry Professor of Computer Science and Director, Certificate in CyberSecurity Program, at Stevens Institute of Technology. Prior to joining Stevens, he was Distinguished Member of Technical Staff at Lucent Technologies Bell Laboratories. He has more than 20 years of experience in teaching, practicing, and research in communication networks design, optimization, operations, and management. He has held various academic positions in the US and overseas, as well as technical management positions with Bellcore (now Telcordia Technologies) and AT&T Bell Laboratories.

He is the author, co-author, or editor of seven books, co-holder of two patents, and the author or co-author of over fifty published technical papers and numerous technical reports in the areas of network design, computer communications, and network operations and management.

Dr. Malek is a fellow of the IEEE, an IEEE Communications Society Distinguished Lecturer, and the founder and Editor-in-Chief of Journal of Network and Systems Management. He earned his Ph.D. in EE/CS from University of California, Berkeley.

Title: Cyberspace Security Issues and Challenges

Abstract: Cyberspace is used extensively for commerce. Businesses that accept transactions via the Internet can gain a competitive edge by reaching a worldwide customer base at a relatively low cost. But the Internet poses a unique set of security issues due to its openness and ubiquity. Customers will submit information via the Web/Internet only if they are confident that their private information, such as their credit card numbers, is secure. Therefore, todays Web/Internet-based services must include solutions that provide security as a primary component in their design and deployment.
This talk will provide an overview of cyberspace security vulnerabilities, attacks, and safeguards. Some attack techniques and the corresponding defenses against them will be described. The anatomy of a specific attack will be presented. Also some techniques based on data mining will be provided to detect and even predict attacks.