- IDEALS Home
- →
- National Center for Supercomputing Applications (NCSA)
- →
- Browse National Center for Supercomputing Applications (NCSA) by Title
Browse National Center for Supercomputing Applications (NCSA) by Title
Now showing items 142-161 of 195
-
(2018-05-21)The European Union’s General Data Protection Regulation (GDPR) is slated to come into effect on May 25, 2018, and organizations around the world are struggling to determine whether they are covered, what is required, and ...
application/pdf
PDF (322kB)
-
(2008-02-06)This case study describes FBI Major Case 216, which ultimately became a collaborative investigation between the FBI and site security professionals into a series of cyberattacks that took place from August 2003 to March ...
application/pdf
PDF (1MB)
-
(2017-12)A collection of training presentations covering federated identity management for research organization, presented at the 2017 AGU New Orleans conference. Hands-on exercises are included in this submission. The topics ...
application/pdf
PDF (13MB)
-
(2018-07-24)Workshop presented at PEARC18. This 3-hour workshop covers practical information security for science projects by describing the foundational elements of a cybersecurity program necessary to provide a secure and safe ...
application/pdf
PDF (5MB)
-
(2019-11-19)The Report of the 2019 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure
application/pdf
PDF (4MB)
-
(17-11-28)The Report of the California State Polytechnic University Pomona SFS Engagement
application/pdf
PDF (395kB)
-
(2020-11-04)The Report of the 2020 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure
application/pdf
PDF (2MB)
-
(2018-09-13)Sample sponsorship prospectus for an open source software conference. Attached is a sponsorship prospectus from the 2017 BroCon hosted at NCSA. It is meant for demonstration purposes only. The contact info referenced in ...
application/pdf
PDF (132kB)
-
(2020-12-01)The final report of the Trusted CI engagement with The Scalable Cyberinfrastructure for Multi-Messenger Astrophysics (SCiMMA).
application/pdf
PDF (245kB)
-
(2020-03-24)Trusted CI is holding a Virtual Town Hall on Tuesday March 24th at 3pm Eastern to discuss the impact of COVID-19 on the NSF open science community. We recently posted a blog discussing recommendations for reducing cybersecurity ...
application/pdf
PDF (1MB)
-
(2019-07-31)Presentation summarizing our PEARC19 paper. Paper abstract: This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation (NSF) to serve the community ...
application/pdf
PDF (4MB)
-
application/pdf
PDF (539kB)
-
(2020-06-22)Susan Sons, Deputy Director of the Research Security Operations Center (ResearchSOC) will provide a mini threat briefing (a brief brief) and a broader discussion on how the research cybersecurity community approaches threat ...
application/pdf
PDF (2MB)
-
(2020-09-28)Today, a large number of researchers do not have access to secure, compliance-capable research computing infrastructure at their home institutions. Traditional institutional secure CI only supports “in-house” users. The ...
application/pdf
PDF (5MB)
-
(2019-02-25)Cyberattacks on enterprise networks have moved into an era where both attackers and security analysts utilize complex strategies to confuse and mislead one another. Critical attacks often take multitudes of reconnaissance, ...
application/pdf
PDF (16MB)
-
(2018-12-10)A “cloud resource” provides a hosted, self-service means for users to run virtual machines or containers such that they can have a custom software stack and isolation from other users. Virtual machines or container images ...
application/pdf
PDF (3MB)
-
(2021-02-22)In an era where big data, machine learning algorithms, and simulations are used to understand cyberattacks and cybersecurity, is there room for qualitative or 'thick' data? This talk shares a social scientist’s perspective ...
application/pdf
PDF (3MB)
-
(2020-10-06)The US has historically taken a fairly minimalist approach to cybersecurity regulation, but recent years have evidenced a trend toward increasing regulation. The latest in this trend is the US Department of Defense’s ...
application/pdf
PDF (5MB)
-
(2018-03-26)In this talk, we are presenting our work on building a data quality and security (DQS) framework, which integrates cybersecurity with other diverse metrics, such as accuracy, reliability, timeliness, and safety into a ...
application/pdf
PDF (9MB)
-
(2019-12-09)The DDIDD Project (DDoS Defense in Depth for DNS) is applying existing and developing new defenses against Distributed-Denial-of-Service attacks for operational DNS infrastructure. We are building a defense-in-depth approach ...
application/pdf
PDF (2MB)
Now showing items 142-161 of 195