Cybersecurity for Conservation
-
Upload
jbasney -
Category
Technology
-
view
207 -
download
0
Transcript of Cybersecurity for Conservation
![Page 1: Cybersecurity for Conservation](https://reader031.fdocuments.net/reader031/viewer/2022030312/58ee37c21a28ab1d7e8b45fd/html5/thumbnails/1.jpg)
Cybersecurity for Conservation
![Page 2: Cybersecurity for Conservation](https://reader031.fdocuments.net/reader031/viewer/2022030312/58ee37c21a28ab1d7e8b45fd/html5/thumbnails/2.jpg)
Center for Trustworthy CyberinfrastructureThe NSF Cybersecurity Center of Excellence
![Page 3: Cybersecurity for Conservation](https://reader031.fdocuments.net/reader031/viewer/2022030312/58ee37c21a28ab1d7e8b45fd/html5/thumbnails/3.jpg)
CTSC ActivitiesMore information at trustedci.org
Tailored Public Resources
Outreach
Community Events
Engagements
Training
![Page 4: Cybersecurity for Conservation](https://reader031.fdocuments.net/reader031/viewer/2022030312/58ee37c21a28ab1d7e8b45fd/html5/thumbnails/4.jpg)
CTSC-IBEIS Engagement
![Page 5: Cybersecurity for Conservation](https://reader031.fdocuments.net/reader031/viewer/2022030312/58ee37c21a28ab1d7e8b45fd/html5/thumbnails/5.jpg)
CTSC-IBEIS Prototype
![Page 6: Cybersecurity for Conservation](https://reader031.fdocuments.net/reader031/viewer/2022030312/58ee37c21a28ab1d7e8b45fd/html5/thumbnails/6.jpg)
Access Control Policy Examples
Subject (Role) Resource Action
Organization Member Media Asset CR
Data Curator Annotations CRUD
Organization Administrator Organization Policy CRUD
Platform Administrator Organization CRUD
![Page 7: Cybersecurity for Conservation](https://reader031.fdocuments.net/reader031/viewer/2022030312/58ee37c21a28ab1d7e8b45fd/html5/thumbnails/7.jpg)
More info on CTSC engagements
![Page 8: Cybersecurity for Conservation](https://reader031.fdocuments.net/reader031/viewer/2022030312/58ee37c21a28ab1d7e8b45fd/html5/thumbnails/8.jpg)
Risk Self-Evaluation
![Page 9: Cybersecurity for Conservation](https://reader031.fdocuments.net/reader031/viewer/2022030312/58ee37c21a28ab1d7e8b45fd/html5/thumbnails/9.jpg)
Guide to Developing Cybersecurity Programs
![Page 10: Cybersecurity for Conservation](https://reader031.fdocuments.net/reader031/viewer/2022030312/58ee37c21a28ab1d7e8b45fd/html5/thumbnails/10.jpg)
Guide to Developing Cybersecurity Programs
![Page 11: Cybersecurity for Conservation](https://reader031.fdocuments.net/reader031/viewer/2022030312/58ee37c21a28ab1d7e8b45fd/html5/thumbnails/11.jpg)
Example Risks and Mitigations
![Page 12: Cybersecurity for Conservation](https://reader031.fdocuments.net/reader031/viewer/2022030312/58ee37c21a28ab1d7e8b45fd/html5/thumbnails/12.jpg)
Additional Resources
![Page 13: Cybersecurity for Conservation](https://reader031.fdocuments.net/reader031/viewer/2022030312/58ee37c21a28ab1d7e8b45fd/html5/thumbnails/13.jpg)
We thank the National Science Foundation (grant 1547272) for supporting our work.
The views and conclusions contained herein are those of the author and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the NSF.