Center for Applied Cybersecurity Research
Permanent link for this collectionhttps://hdl.handle.net/2022/15468
The Center for Applied Cybersecurity Research (CACR) leads the creation of IT security policy, security tools, and secure applications in critical areas of cyberinfrastructure, including health. CACR is affiliated with the Indiana University Pervasive Technology Institute and works closely with its partner organizations at Indiana University: CLEAR Health Information, the Maurer School of Law, the Kelley School of Business, the School of Informatics and Computing, REN-ISAC, the University Information Policy Office, and the University Information Security Office.
Browse
Browsing Center for Applied Cybersecurity Research by Author "Adams, Andrew"
Now showing 1 - 9 of 9
- Results Per Page
- Sort Options
Item Access Control Policy(2021) Krenz, Mark; Adams, Andrew; Marsteller, JamesItem Master Information Security Policy & Procedures Trusted CI(2021-05-21) Krenz, Mark; Adams, AndrewItem OOI/Trusted CI Engagement(2021-11-07) Filus, Shane; Adams, AndrewThe Ocean Observatories Initiative (OOI, https://oceanobservatories.org/), funded by the NSF OCE Division of Ocean Sciences #1743430 , is a science-driven ocean observing network that 2 delivers real-time data from more than 800 instruments to address critical science questions regarding the world’s oceans. OOI data are freely available online to anyone with an Internet connection. The OOI provides an exponential increase in the scope and timescale of observations of the world’s oceans. Present and future educators, scientists, and researchers will draw conclusions about climatological and environmental processes based on these measurements, which sets a requirement for the data to be accurate, with a flawless pedigree. As a result, the OOI has a requirement to protect its data from being altered by any external agent. To this end, OOI-CI (OOI Cyberinfrastructure) is seeking consultation from Trusted CI on evaluation of their current security program, along with guidance on reviewing and evaluating potential alternatives for an enhanced security posture. 2 https://www.nsf.gov/awardsearch/showAward?AWD_ID=1743430 OOI Engagement Final Report | Trusted CI Distribution: Public 2 Due to leadership changes, obligations and activities involved in transitioning to a new data center, and schedules during the holiday season, this engagement was conducted on a shorter timeline than typically allocated. We were mindful of this when defining goals and milestones and ensured not to overcommit or overpromise the final engagement deliverables. The OOI team consisted of Craig Risien (lead), Jeffrey Glatstein, Jim Housell, and Casey Dinsmore, while the Trusted CI personnel were Shane Filus (lead), and Andrew Adams. The engagement ran from August 16, 2021 to December 31, 2021.Item Open Science Cyber Risk Profile (OSCRP)(2017) Peisert, Sean; Welch, Von; Adams, Andrew; Bevier, RuthAnne; Dopheide, Michael; LeDuc, Rich; Meunier, Pascal; Schwab, Steve; Stocks, KarenThe Open Science Cyber Risk Profile (OSCRP) is a joint project of the Center for Trustworthy Scientific Cyberinfrastructure and the Department of Energy's Energy Sciences Network (ESnet). More information can be found at: http://trustedci.org/oscrp/Item perfSONAR-CTSC Code Review Engagement Final Report (2016-01) Heiland, Randy; Adams, Andrew; Heymann, ElisaperfSONAR ("Performance focused Service Oriented Network monitoring ARchitecture") is an infrastructure for monitoring network performance. The perfSONAR software toolkit is deployed around the world, primarily at government labs and universities, to help monitor and provide network reliability information across multiple domains. Some of the virtual organizations deploying perfSONAR include ESnet, GÉANT, and Internet2. CTSC and perfSONAR conducted an engagement in which CTSC performed a code review of perfSONAR’s Bandwidth Test Controller (BWCTL). BWCTL is essentially a daemon and framework for scheduling and executing non-overlapping performance measurement tests between sets of participating hosts (endpoints). The code review consisted of two parts: (1) a First Principles Vulnerability Assessment (FPVA) that involved a manual inspection and analysis of the code, resulting in detailed architecture and resources diagrams and (manual) detection of potential vulnerabilities, and (2) an automated/programmatic static source code analysis using the Software Assurance Marketplace (SWAMP) online service.Item The Report of the 2018 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure(2018-12) Adams, Andrew; Dopheide, Jeannette; Krenz, Mark; Marsteller, James; Welch, Von; Zage, JohnItem Research at Risk: Ransomware attack on Physics and Astronomy Case Study(2021-07) Adams, Andrew; Siu, Tom; Songer, Julie; Welch, VonItem The State of the Scientific Software World: Findings of the 2021 Trusted CI Software Assurance Annual Challenge Interviews(2021-09) Peisert, Sean; Adams, Andrew; Avila, Kay; Heymann, Elisa; Krenz, Mark; Lee, Jason; Miller, BartonItem Trusted CI: Galaxy Engagement Final Report(2021-02-02) Krenz, Mark; Shankar, Anurag; Adams, Andrew; Filus, Shane; Shute, Kelli