Tuesday, April 16, 2002 |
1:00 p.m |
Welcome, and State of CERIAS
Eugene Spafford, Director, CERIAS
Stewart Center 206
|
2:00 - 5:00 |
Poster Sessions and Demonstrations
Refreshments served
Stewart Center, Rooms 214 A-D and 218 A-D
|
4:30 - 6:00 |
Reception
Purdue Memorial Union,
Anniversary Drawing Room (East end of second floor)
Hors d'oeuvres and cash bar
|
7:00 p.m. |
Indiana Homeland Security Simulation Demo
Krannert Building, Room 140
The Home Land Security (HLS) simulation is a tool based on the Synthetic Environment for Analysis and Simulation (SEAS). SEAS is developed at Purdue University in conjunction with the Department of Defense. It provides a "wind tunnel" for decision makers to formulate, test, and analyze alternative courses of action.
|
Wednesday, April 17, 2002 |
7:30 a.m. |
Continental Breakfast
Stewart Center
Room 214 A-D
|
8:00 |
Welcome and Introductions
|
Panel Discussions |
Stewart Center, Room 214A-D |
8:15 - 10:00 |
Wireless Panel
|
10:00 - 10:30 |
Break
|
10:30 - 12:15 |
Intellectual Property Protections Panel
|
12:15 - 1:15 p.m. |
Lunch
Purdue Memorial Union,
West Faculty Lounge
|
Panel Discussions |
Stewart Center, Room 214A-D |
1:30 - 3:15 |
Dimensions of Intrusion Detection Panel
|
3:15 - 3:45 |
Break
|
3:45 - 5:30 |
Privacy in a Wired World Panel
|
8:15 a.m.-5:00 p.m. Concurrent |
Curriculum Workshop
Attendance by invitation only. Contact Dr. Melissa Dark (dark@cerias.purdue.edu)
|
5:30 |
Closing Remarks
Eugene Spafford
|
5:30 - 6:30 |
Networking and Demos Faculty/Research Demos
Stewart Center, Room 116
|
Thursday, April 18, 2002 |
8:00 a.m. - 12:00 noon |
Security Practices Workshops
Registrants may attend any one workshop.
Continental Breakfast included in fee.
Rooms to be announced.
|
Workshop Descriptions
- Securing Your Website
This workshop will provide you with practical tips and techniques for securing your website. Topics
that will be covered include: Network Layout, Common Events or Exploits and Appropriate Responses, Determining Appropriate
Server/OS Configurations for Your Needs, Securing the Host, Pitfalls to Avoid in Popular Application Services, Web Proxying,
Browser Security, and Monitoring Your System.
- Windows Security
This workshop will provide an interesting look at Information Security as it crosses the most popular platform
today: Windows 2000. This course will highlight several areas of security including: IP Based Restriction, File System
Security, File System Sharing to the Network, Cryptography, Delegation of Control, Logging, Creating a Forensic Trail,
Intrusion Detection, and Virus Detection. We will look at each of these areas and how you can most effectively implement them
on the platform.
- Security Management
It has been said that employees are your best firewall, this workshop will look at the role of policy and
training in creating an information security culture so that employees are functioning like a firewall. This workshop will
include the role of policy in the Information Security Program, models for examining your business environment and your
computing environment, and steps for creating Information Security Policy. In addition, this workshop will show you how to
identify poor security practices common to computer users in your organization, how to establish goals for an awareness and
training program in your organization, and how to select appropriate training methods to ensure that your training program
meets its goals.
- Network Security
This workshop will include an introduction to network threats, vulnerabilities, and security. If you need a
primer on network security, this is for you. We will cover basic security concepts and how those concepts apply network
scenarios; examine the role of various components and users in network security; review the basic functions of network
security tools; discuss vulnerabilities and threats that exist across all levels of networking; and review limitations,
weaknesses, and vulnerabilities of network security tools.
- Intrusion Detection
Looking for an introduction to intrusion detection? This workshop is for you. This workshop includes an
overview of intrusion detection systems, types of intrusion detection systems, the functions of intrusion detection systems,
advantages to different intrusion detection systems, as well as the drawbacks.
|