1
Welcome to NURAP at Noon!
October 28, 2015
Presentation byInformation & Systems Security/Compliance
Feinberg School of MedicineResearch Computing Services
2
Overview
Information as an Asset
Threat Landscape
Process Improvements / FSM & IT
Simple Steps to Your Security
Research Computing Services
3
Information as an Asset
4
“If it’s worth collecting, it’s worth protecting”
Budgets Invoices, receipts, payments, planning, forecastingHR Data Compensation, pension, benefits, performanceContracts Terms & conditions, nondisclosure, service agreementsResearch IP, patents, consent agreements, patient recordsPersonal SSNs, credit cards, DoB, medical/health records, certificatesProfessional Accomplishments, CV, degrees, awards, reputation
Threat Landscape
5
Jul ‘15 Harvard University (8 colleges) Unknown Unknown
May ‘15 Pennsylvania State (Engineering) China 18K
Jul ‘14 University of Illinois Chicago Unknown Unknown
Mar ‘14 University of Wisconsin Parkside Unknown 15K
Mar ‘14 North Dakota University Unknown 290K
Feb ‘14 Indiana University Unknown 146K
Feb ‘14 University of Maryland Unknown 309K
https://www.privacyrights.org/data‐breach
Threat Landscape ‐ Northwestern
6
Oct ’15 Communications Battery – stolen laptopSep ‘15 WCAS Misconfigured server/driveAug ‘15 McCormick Two stolen laptops Jul ‘15 Ford Building Stolen serverOct ‘14 FSM Stolen laptopJun ‘14 FSM Misconfigured server 400 PIIMar ‘14 FSM Misconfigured NAS deviceMar ‘14 Travel Credit card fraud $18,000Feb ‘14 FSM Misconfigured NAS device
Threat Landscape
• Highly automated• Indiscriminate and targeted attacks• 24 X 7 – never takes a vacation, never takes a holiday• Medical records now more “valuable” than financial (e.g., credit cards)• Hacktivist – Criminal – Insider – Espionage – Terrorism - Warfare
https://cybermap.kaspersky.com/https://www.checkpoint.com/ThreatPortal/livemap.html
7
Process ImprovementsFeinberg School of Medicine• Information Security Data Security Plans• Research Use of EDW Data• Guidelines for File Storage• Hardware and Software Standards• Encryption: Computers and Email• Tiered Network Services
8
http://www.feinberg.northwestern.edu/it/standards‐policies/
Process ImprovementsInformation & Systems Security/Compliance• Information Security Management System (ISMS)• Information & Systems Security Policy/Procedures (ISSPP)• ISO Security Standards• HIPAA/ISO Information Security Guidance• Incident Response Protocol
9
http://www.it.northwestern.edu/security/security‐management.html
Simple Steps to Your Security
• Change ‘default’ settings• Use encryption, anti-malware and anti-virus
Use longer/stronger passphrasesKeep your systems & applications currentPhishing: Be awareMaintain situational awareness
10
“It just has to be ‘good enough’…”
Research Computing ServicesNorthwestern Information Technology
Jackie Milhans, Lead Computational SpecialistJoe Paris, Assoc. Director for Research
Overview
• Stay engaged in conversations on campus to understand emerging and growing research needs.
• Enable research by supporting computing, data management (storage, transfer, security), etc.
• Educate researchers in programming, computational skills and raise awareness of available resources.
• Help build communities on campus (bioinformatics, data science, etc.) and communicate growing areas to University.
Computational Climate at Northwestern
Computing Scale
Effort by PI
DesktopDesktop
CloudCloud
VMVMQuestQuest
SSCCSSCC
National Facilities (XSEDE, Mira, Blue
Waters, etc.)
Exascale
Usage at Northwestern
High-Performance Computing – Quest
• Supports over 250 research projects• We provided one‐on‐one training, software installation, etc.• Several common software is installed, and project‐specific software can be installed.
• Can adapt to unique computing needs (GPU, High‐Memory).
Quest ‐ Fields of Research
Applied Physics
Biomedical Engineering
Center for Genetic Medicine
Chemical and Biological Engineering
Chemistry
Civil and Environmental Engineering
Civil Engineering
Department of Medicine Cardiology Division
Department of Medicine Endocrinology Division
Division of Hematology Oncology
Earth and Planetary Sciences
Economics
EECS and Learning Science
Electrical Engineering and Computer Science
Engineering Sciences and Applied Mathematics
Finance
Human Molecular Genetics Program
Industrial Engineering and Management Sciences
Interdisciplinary Biological Sciences Graduate Program
Management and Stategy
Quest – Access
• Free access is requested by an allocation proposal.• Accounts are offered for development, classes, and
larger research allocations.• Quest is 90% grant supported – These nodes are
owned by a research group for dedicated acces.• Special purchases – dedicated login nodes, GPGPUs
and high-memory nodes have been purchased and installed on Quest when commodity nodes will not fit the research.
Social Sciences Computing Cluster (SSCC)
• Supports research and teaching of social sciences community• Includes a selection of analytical and statistical software• Access is available at no charge to social sciences faculty, graduate
students, and undergraduate students
External Computing Resources
• When Quest or the SSCC does not fit the research need Research Computing HPC Specialists can:– Consult with users – Test code performance– Review allocation proposals– Explain best practices
Research Data Storage Options
Tiers Annual Cost/TB ($)
Collaborativewith external researchers
Access to Quest
PHI/PII compliant
BOX 0 YES NO **
RESEARCH DATA STORAGE SERVICE
137 YES NO YES
VAULT SUPPLEMENTARY 70 NO YES NO
HPC STORAGE 410 NO YES NO
Note: Box file size limit is 15 GB.
Research Data Storage Service• Features include:
– Desktop mountable (SMB)– HIPAA-compliant capable (audited zone)– Daily snapshot (local copy) and daily replication to
Chicago cluster– $137/TB annually, can pay up to 5 years in advance
• 3 zones:– Feinberg (managed by FSM IT), audited– Northwestern – unaudited– Northwestern – audited
Visualization Services
• Visualization services at Northwestern include illustrations, animations, and interactive types of data and concept visualizations.
• Visualizations help explain ideas, results, and concepts that may otherwise be difficult to convey or explain.
• Work by this team has been featured in journals, conference presentations, and in the classroom.
• These services are available for an hourly fee.
Northwestern VisualizationIllustration
Northwestern VisualizationAnimation
Northwestern VisualizationInteractive
Workshops and Training
• We provide training via consultation, specialized workshops, and workshop series.
• We also partner with existing events to teach workshops or portions of workshops (Kellogg Computational Social Sciences Summit, Big Data Introduction to Programming, Programming for Biologists).
Workshop Series• Researcher’s Toolkit
– In partnership with the Library, this series is normally held in Mudd Library.
– Topics include: Intro to Bash, GIS, EndNote, Data Management, Intro to Quest, Github, etc.
• Computational Skills for Informatics– In partnership with Galter Health
Sciences Library– Topics include: Intro to Quest,
Chip-Seq, DNA-Seq, etc.
Individual Workshops and Bootcamps
• Software Carpentry – 2-day workshop that focuses on bash shell, version control (git), and programming in R or python.
• NVIDIA GPU workshop – 1-day workshop taught by NVIDIA.• Galaxy – Open source, web-based platform for data intensive biomedical
research.• Virtual School of Computational Science and Engineering – Delivered by
XSEDE, hosted simultaneously at multiple locations across country.
Computational Research Day• All‐day symposium held at Norris during Spring. • ~20 speakers, largely NU faculty, some postdocs and grad students, and 2 visiting keynote speakers.
• Poster Competition ($1500 towards conference travel) and Data Visualization Challenge.
• Next year will be the 3rd year.• Each year, topics are more diverse.• Attendance was over 300 this year.• Excellent feedback from faculty and students regarding diversity of topics and quality of talks.
Additional Efforts
• Involvement in faculty recruitment, including interviews, consulting in startup packages, etc.
• Cyberinfrastructure Engineer – Provide training and consulting for researchers’ data management and raise awareness of available resources (supported by the NSF).
• Computational Lab Technician – Facilitate research data acquisition and control for lab equipment, data management and security, and utilization of available research cyberinfrastructure.
Contacts
30
Information & Systems Security/ComplianceDave Kovarik, DirectorEmail: david‐[email protected]: (847) 467‐5930
FSM Information Security Carl Cammarata, Senior Director & Chief Information Security OfficerEmail: [email protected]: (312) 503‐2822
Research Computing ServicesJackie Milhans, Lead Computational SpecialistEmail: [email protected]: (847) 467‐4592
Top Related