Lunes 21 de Julio de 2008 a las 11:00. Departamento de Informática, Campus de Viesques de Gijón, Edificio Departamental Oeste, Módulo 1, Sala de Posgrado (1.1.25)
Distinguished Keynote Speaker: Professor Mohammad S. Obaidat
IEEE Fellow and SCS Fellow
Editor-in-Chief, Wiley International Journal of Communication Systems
Editor, IEEE Wireless Communications
Senior Vice President, The Society for Modeling and Simulation International (SCS)
Distinguished Lecturer of ACM (1995-Present)
Distinguished Lecturer of SCS (2006-Present)
Distinguished Speaker of IEEE Computer Society (1994-1997)
Professor of Computer Science, Monmouth University,
W. Long Branch, NJ 07764, USA
Web Page: www.monmouth.edu/mobaidat
e-Based systems and computer networks are ubiquitous in the modern world, with applications spanning e-commerce, WLANS, healthcare and governmental organizations, banking, among others. The secure transfer of information has therefore become a critical area of research, development, and investment. e-Security solutions aim to provide five important services: authentication of users and actors, integrity, confidentiality of communication, availability of business services, and non-repudiation of transactions. Most e-security solutions that are provided by the literature use two main cryptographic techniques: public key cryptosystems and digital signatures.
Organizations face three types of economic impact as possible results of malicious attacks targeting them: the immediate, short term, and midterm economic impacts. The immediate economic impact is the cost of repairing, modifying, or replacing systems (when needed) and the immediate losses due to disruption of business operations, transactions, and cash flows. Short term economic impact is the cost on an organization, which includes the loss of contractual relationships or existing customers because of the inability to deliver products or services as well as the negative impact on the reputation of the organization. Long term economic impact is induced by the decline in an organization’s market appraisal.
ICT and Internet use have contributed significantly to the success of many companies and organizations. Nevertheless, the current growth of digital attacks has caused decision makers in enterprises and government to doubt the confidence in information and communication technology. In fact, security incidents that occurred recently have emphasized three important facts: (a) computer network attacks can induce a huge damage on business and government activity, (b) many of the attacked organizations have active security infrastructures at the moment the security incident occurred and (c) the security infrastructure cost vary highly from one organization to the other based on the security policy adopted and the nature of the activity performed by the enterprise. Structured methodologies that identify, analyze, monitor, and mitigate computer and network security risks have been developed to help enterprises integrate security in their strategic plans.
The core areas of security of e-systems and computer networks such as authentication of users, system integrity, confidentiality of communication, availability of business service, risk management and analysis and nonrepudiation of transactions –are covered in this talk. Other topics that will be dealt with include public key infrastructure (PKI) systems, biometric-based security systems, intrusion detection technologies, virtual private networks (VPNs), malware, and wireless LANs security.
This keynote presents the recent trends, challenges and applications of security of e-based systems and computer networks. Samples of some of our recent results in this fascinating area will be presented as well.