Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage,...
Transcript of Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage,...
![Page 1: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/1.jpg)
1
Welcome to NURAP at Noon!
October 28, 2015
![Page 2: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/2.jpg)
Presentation byInformation & Systems Security/Compliance
Feinberg School of MedicineResearch Computing Services
2
![Page 3: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/3.jpg)
Overview
Information as an Asset
Threat Landscape
Process Improvements / FSM & IT
Simple Steps to Your Security
Research Computing Services
3
![Page 4: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/4.jpg)
Information as an Asset
4
“If it’s worth collecting, it’s worth protecting”
Budgets Invoices, receipts, payments, planning, forecastingHR Data Compensation, pension, benefits, performanceContracts Terms & conditions, nondisclosure, service agreementsResearch IP, patents, consent agreements, patient recordsPersonal SSNs, credit cards, DoB, medical/health records, certificatesProfessional Accomplishments, CV, degrees, awards, reputation
![Page 5: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/5.jpg)
Threat Landscape
5
Jul ‘15 Harvard University (8 colleges) Unknown Unknown
May ‘15 Pennsylvania State (Engineering) China 18K
Jul ‘14 University of Illinois Chicago Unknown Unknown
Mar ‘14 University of Wisconsin Parkside Unknown 15K
Mar ‘14 North Dakota University Unknown 290K
Feb ‘14 Indiana University Unknown 146K
Feb ‘14 University of Maryland Unknown 309K
https://www.privacyrights.org/data‐breach
![Page 6: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/6.jpg)
Threat Landscape ‐ Northwestern
6
Oct ’15 Communications Battery – stolen laptopSep ‘15 WCAS Misconfigured server/driveAug ‘15 McCormick Two stolen laptops Jul ‘15 Ford Building Stolen serverOct ‘14 FSM Stolen laptopJun ‘14 FSM Misconfigured server 400 PIIMar ‘14 FSM Misconfigured NAS deviceMar ‘14 Travel Credit card fraud $18,000Feb ‘14 FSM Misconfigured NAS device
![Page 7: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/7.jpg)
Threat Landscape
• Highly automated• Indiscriminate and targeted attacks• 24 X 7 – never takes a vacation, never takes a holiday• Medical records now more “valuable” than financial (e.g., credit cards)• Hacktivist – Criminal – Insider – Espionage – Terrorism - Warfare
https://cybermap.kaspersky.com/https://www.checkpoint.com/ThreatPortal/livemap.html
7
![Page 8: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/8.jpg)
Process ImprovementsFeinberg School of Medicine• Information Security Data Security Plans• Research Use of EDW Data• Guidelines for File Storage• Hardware and Software Standards• Encryption: Computers and Email• Tiered Network Services
8
http://www.feinberg.northwestern.edu/it/standards‐policies/
![Page 9: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/9.jpg)
Process ImprovementsInformation & Systems Security/Compliance• Information Security Management System (ISMS)• Information & Systems Security Policy/Procedures (ISSPP)• ISO Security Standards• HIPAA/ISO Information Security Guidance• Incident Response Protocol
9
http://www.it.northwestern.edu/security/security‐management.html
![Page 10: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/10.jpg)
Simple Steps to Your Security
• Change ‘default’ settings• Use encryption, anti-malware and anti-virus
Use longer/stronger passphrasesKeep your systems & applications currentPhishing: Be awareMaintain situational awareness
10
“It just has to be ‘good enough’…”
![Page 11: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/11.jpg)
Research Computing ServicesNorthwestern Information Technology
Jackie Milhans, Lead Computational SpecialistJoe Paris, Assoc. Director for Research
![Page 12: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/12.jpg)
Overview
• Stay engaged in conversations on campus to understand emerging and growing research needs.
• Enable research by supporting computing, data management (storage, transfer, security), etc.
• Educate researchers in programming, computational skills and raise awareness of available resources.
• Help build communities on campus (bioinformatics, data science, etc.) and communicate growing areas to University.
![Page 13: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/13.jpg)
Computational Climate at Northwestern
Computing Scale
Effort by PI
DesktopDesktop
CloudCloud
VMVMQuestQuest
SSCCSSCC
National Facilities (XSEDE, Mira, Blue
Waters, etc.)
Exascale
Usage at Northwestern
![Page 14: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/14.jpg)
High-Performance Computing – Quest
• Supports over 250 research projects• We provided one‐on‐one training, software installation, etc.• Several common software is installed, and project‐specific software can be installed.
• Can adapt to unique computing needs (GPU, High‐Memory).
![Page 15: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/15.jpg)
Quest ‐ Fields of Research
Applied Physics
Biomedical Engineering
Center for Genetic Medicine
Chemical and Biological Engineering
Chemistry
Civil and Environmental Engineering
Civil Engineering
Department of Medicine Cardiology Division
Department of Medicine Endocrinology Division
Division of Hematology Oncology
Earth and Planetary Sciences
Economics
EECS and Learning Science
Electrical Engineering and Computer Science
Engineering Sciences and Applied Mathematics
Finance
Human Molecular Genetics Program
Industrial Engineering and Management Sciences
Interdisciplinary Biological Sciences Graduate Program
Management and Stategy
![Page 16: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/16.jpg)
Quest – Access
• Free access is requested by an allocation proposal.• Accounts are offered for development, classes, and
larger research allocations.• Quest is 90% grant supported – These nodes are
owned by a research group for dedicated acces.• Special purchases – dedicated login nodes, GPGPUs
and high-memory nodes have been purchased and installed on Quest when commodity nodes will not fit the research.
![Page 17: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/17.jpg)
Social Sciences Computing Cluster (SSCC)
• Supports research and teaching of social sciences community• Includes a selection of analytical and statistical software• Access is available at no charge to social sciences faculty, graduate
students, and undergraduate students
![Page 18: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/18.jpg)
External Computing Resources
• When Quest or the SSCC does not fit the research need Research Computing HPC Specialists can:– Consult with users – Test code performance– Review allocation proposals– Explain best practices
![Page 19: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/19.jpg)
Research Data Storage Options
Tiers Annual Cost/TB ($)
Collaborativewith external researchers
Access to Quest
PHI/PII compliant
BOX 0 YES NO **
RESEARCH DATA STORAGE SERVICE
137 YES NO YES
VAULT SUPPLEMENTARY 70 NO YES NO
HPC STORAGE 410 NO YES NO
Note: Box file size limit is 15 GB.
![Page 20: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/20.jpg)
Research Data Storage Service• Features include:
– Desktop mountable (SMB)– HIPAA-compliant capable (audited zone)– Daily snapshot (local copy) and daily replication to
Chicago cluster– $137/TB annually, can pay up to 5 years in advance
• 3 zones:– Feinberg (managed by FSM IT), audited– Northwestern – unaudited– Northwestern – audited
![Page 21: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/21.jpg)
Visualization Services
• Visualization services at Northwestern include illustrations, animations, and interactive types of data and concept visualizations.
• Visualizations help explain ideas, results, and concepts that may otherwise be difficult to convey or explain.
• Work by this team has been featured in journals, conference presentations, and in the classroom.
• These services are available for an hourly fee.
![Page 22: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/22.jpg)
Northwestern VisualizationIllustration
![Page 23: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/23.jpg)
Northwestern VisualizationAnimation
![Page 24: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/24.jpg)
Northwestern VisualizationInteractive
![Page 25: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/25.jpg)
Workshops and Training
• We provide training via consultation, specialized workshops, and workshop series.
• We also partner with existing events to teach workshops or portions of workshops (Kellogg Computational Social Sciences Summit, Big Data Introduction to Programming, Programming for Biologists).
![Page 26: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/26.jpg)
Workshop Series• Researcher’s Toolkit
– In partnership with the Library, this series is normally held in Mudd Library.
– Topics include: Intro to Bash, GIS, EndNote, Data Management, Intro to Quest, Github, etc.
• Computational Skills for Informatics– In partnership with Galter Health
Sciences Library– Topics include: Intro to Quest,
Chip-Seq, DNA-Seq, etc.
![Page 27: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/27.jpg)
Individual Workshops and Bootcamps
• Software Carpentry – 2-day workshop that focuses on bash shell, version control (git), and programming in R or python.
• NVIDIA GPU workshop – 1-day workshop taught by NVIDIA.• Galaxy – Open source, web-based platform for data intensive biomedical
research.• Virtual School of Computational Science and Engineering – Delivered by
XSEDE, hosted simultaneously at multiple locations across country.
![Page 28: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/28.jpg)
Computational Research Day• All‐day symposium held at Norris during Spring. • ~20 speakers, largely NU faculty, some postdocs and grad students, and 2 visiting keynote speakers.
• Poster Competition ($1500 towards conference travel) and Data Visualization Challenge.
• Next year will be the 3rd year.• Each year, topics are more diverse.• Attendance was over 300 this year.• Excellent feedback from faculty and students regarding diversity of topics and quality of talks.
![Page 29: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/29.jpg)
Additional Efforts
• Involvement in faculty recruitment, including interviews, consulting in startup packages, etc.
• Cyberinfrastructure Engineer – Provide training and consulting for researchers’ data management and raise awareness of available resources (supported by the NSF).
• Computational Lab Technician – Facilitate research data acquisition and control for lab equipment, data management and security, and utilization of available research cyberinfrastructure.
![Page 30: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational](https://reader034.fdocuments.us/reader034/viewer/2022042415/5f2fced96ffc3516ad719bdc/html5/thumbnails/30.jpg)
Contacts
30
Information & Systems Security/ComplianceDave Kovarik, DirectorEmail: david‐[email protected]: (847) 467‐5930
FSM Information Security Carl Cammarata, Senior Director & Chief Information Security OfficerEmail: [email protected]: (312) 503‐2822
Research Computing ServicesJackie Milhans, Lead Computational SpecialistEmail: [email protected]: (847) 467‐4592