[MNASIS-L] Computer Society - Information Security Seminar
Janet M. Arth
arth at tc.umn.edu
Mon Sep 9 17:12:55 EDT 2002
The Twin Cities IEEE Computer Society
Invites You to Attend:
"A Seminar on Information Security"
Saturday, September 21, 2002
8:30am until 4:00pm
at the
Radisson Hotel South
(I-494 and 100)
Minneapolis, Minnesota
To register: http://www.comp.tc-ieee.org/register.html
(or email the registration below)
Cost: $20 for full time undergraduate students
$30 for Computer Society Members
$35 for non-members
Pay at the door, cash or check are gladly accepted.
Sorry, we cannot process credit cards at this time.
Program Schedule:
0830:0900 Registration
0900:0915 Opening remarks and introductions
0915:1015 G. Jelatis - Overview of Information Security Principles
and Technologies
1015:1030 break
1030:1130 A. Odlyzko - Economics and Cryptography on the Internet
1130:1230 lunch
1230:1245 N. Clark - IEEE PACE Presentation
1245:1345 R. Smith - Authentication Techniques
1345:1400 break
1400:1500 K. Wilson - IS from a Small Business/Home User Perspective
1500:1545 all - Panel Discussion on IS topics
1545:1600 Closing remarks and presentations
About the Presentations:
(Note: please check the Website for complete program details and
speaker biographies)
The increased power and interconnectivity of computer systems available
today means that Information Security has become one of the most crucial
set of technologies in the computing industry. Join us for this seminar
where we will look at the latest research, results and ideas in Information
Security from several perspectives.
-------------------------------------------------------------------
Overview of Information Security Principles and Technologies
Information systems and the Internet are, today, integral to business,
pofessional and even many personal activities. The flexibility and
increased functionality they provide, however, expose our information
resources to a dangerous world where threats are numerous and any
vulnerabilities are likely to be exploited. How can we take advantage of
cutting-edge information and network technologies when the risk seems so
great? This talk will provide a brief overview of information security
principles, threats and vulnerabilities, and the technologies that are
available to reduce the risks of operating in such a dangerous environment.
George D. Jelatis is an information security architect and consultant. He
is a frequent speaker and lecturer on security topics, and a Certified
Information Systems Security Professional (CISSP). He has provided
information security consulting and design services to clients as diverse
as universities, banks, health care providers, manufacturers, DoD
contractors, DARPA and the US Air Force.
He was most recently the Director of E-business Initiatives and "security
evangelist" for Secure Computing Inc, after several years as a security
consultant and researcher. His career has also included management of
multi-national technical projects, research in distributed systems and
local area network protocols, and both applications and systems programming.
He has been active in information security since IBM was known for
mainframes, not PCs. He even has fond memories of 80-column Hollerith
punch cards and paper tape. He has a Bachelor of Physics and an MS in
Computer Science, both from the University of Minnesota.
-------------------------------------------------------------------
Economics and cryptography on the Internet
Mathematical cryptography has provided a variety of interesting and
important tools for e-commerce. The impact of these tools was widely
expected to be revolutionary. Yet so far, although some of these
mathematical techniques do play a vital role, many of the early
expectations have been disappointed. The reason for this, which will be
explored in this lecture, is that many of these tools conflict with the
economic incentives that govern how e-commerce is conducted.
Andrew Odlyzko is Director of the interdisciplinary Digital Technology
Center and an Assistant Vice President for Research at the University of
Minnesota. Prior to assuming that position in 2001, he devoted 26 years to
research and research management at Bell Labs and AT&T Labs. He has written
over 150 technical papers and has three patents. He has managed projects
in diverse areas, such as security, formal verification methods,
parallel and distributed computation, and auction technology. In recent
years he has also been working on electronic publishing, electronic
commerce, and economics of data networks.
-------------------------------------------------------------------
An Overview of Authentication Techniques
Based on the book "Authentication: From Passwords to Public Keys," this
talk looks at the practical benefits, drawbacks, strengths and weaknesses
of today's authentication techniques. First we look at how to make the most
out of password-based systems without overestimating their capabilities.
Then we review the benefits and limitations of biometrics. Finally, we
examine token-based techniques, including one-time password calculators,
smart cards, and more sophisticated devices. For each technique we compare
their resistance against attacks like trial-and-error guessing and we
examine practical aspects of user enrollment and day-to-day operation.
Dr. Rick Smith is a writer, lecturer, and consultant in information systems
security. He has written two books: "Authentication: From Passwords to
Public Keys" and "Internet Cryptography." He also spent twelve years as a
security architect, researcher, and software engineer at Secure Computing
Corporation. He is a Certified Information
Systems Security Professional (CISSP), a lecturer at St. Thomas University
in St. Paul, Minnesota, and a contributing writer for Information Security
magazine.
-------------------------------------------------------------------
Information Security from the Small Business/Home User Perspective
Kris Wilson is a private consultant. He is a Virtual CIO for small
business, specializing in computer systems and network installation,
integration, and support. He is a member and past chair of the Twin Cities
IEEE Consultants Network.
-------------------------------------------------------------------
Panel Discussion on Information Security Technologies and Issues:
Join our speakers in a wide open discussion of issues, debates, and
controversies in the Information Security field. We will let the audience
direct the discussion toward any areas if interest.
-------------------------------------------------------------------
Email registration:
Full name: _____________________________
Organization: _____________________________
Email address: _____________________________
Phone: _____________________________
ACM/IEEE Member Number: _____________________________
Special Meal Request: _____________________________
Please indicate which of the following applies:
_____ IEEE Computer Society Member
_____ IEEE Member
_____ ACM Member
_____ Full Time Undergraduate Student
_____ Non-Member
Please complete and email to mailto:compsoc at tc-ieee.org on or
before Wednesday, September 18, 2002. Register on the Web at:
http://www.comp.tc-ieee.org/register.html
Please register as it helps us to plan a successful event.
For further information on this and other upcoming Twin Cities
IEEE Events, see our web page at http://www.comp.tc-ieee.org/
If you've attended a recent CompSoc Event, please take a moment
to submit a feedback form at http://www.comp.tc-ieee.org/feedback.html/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.asis.org/pipermail/mnasis-l/attachments/20020909/a6e5b9a2/attachment.html
More information about the MNASIS-L
mailing list