Protecting Information Resources
April 16 - 18 | Stewart Center | West Lafayette Campus
Registration | Maps and Lodging | Further Information

Agenda


Note: This information is subject to change

Tuesday, April 16, 2002
1:00 p.m Welcome, and State of CERIAS
Eugene Spafford, Director, CERIAS
Stewart Center 206
2:00 - 5:00 Poster Sessions and Demonstrations
Refreshments served
Stewart Center, Rooms 214 A-D and 218 A-D
4:30 - 6:00 Reception
Purdue Memorial Union,
Anniversary Drawing Room (East end of second floor)
Hors d'oeuvres and cash bar
7:00 p.m. Indiana Homeland Security Simulation Demo
Krannert Building, Room 140

The Home Land Security (HLS) simulation is a tool based on the Synthetic Environment for Analysis and Simulation (SEAS). SEAS is developed at Purdue University in conjunction with the Department of Defense. It provides a "wind tunnel" for decision makers to formulate, test, and analyze alternative courses of action.

Wednesday, April 17, 2002
7:30 a.m. Continental Breakfast
Stewart Center
Room 214 A-D
8:00 Welcome and Introductions
Panel Discussions Stewart Center, Room 214A-D
8:15 - 10:00 Wireless Panel
10:00 - 10:30 Break
10:30 - 12:15 Intellectual Property Protections Panel
12:15 - 1:15 p.m. Lunch
Purdue Memorial Union,
West Faculty Lounge
Panel Discussions Stewart Center, Room 214A-D
1:30 - 3:15 Dimensions of Intrusion Detection Panel
3:15 - 3:45 Break
3:45 - 5:30 Privacy in a Wired World Panel
8:15 a.m.-5:00 p.m.
Concurrent
Curriculum Workshop
Attendance by invitation only. Contact Dr. Melissa Dark (dark@cerias.purdue.edu)
5:30 Closing Remarks
Eugene Spafford
5:30 - 6:30 Networking and Demos Faculty/Research Demos
Stewart Center, Room 116
Thursday, April 18, 2002
8:00 a.m. - 12:00 noon Security Practices Workshops
Registrants may attend any one workshop.
Continental Breakfast included in fee.
Rooms to be announced.
Workshop Descriptions

  • Securing Your Website

    This workshop will provide you with practical tips and techniques for securing your website. Topics that will be covered include: Network Layout, Common Events or Exploits and Appropriate Responses, Determining Appropriate Server/OS Configurations for Your Needs, Securing the Host, Pitfalls to Avoid in Popular Application Services, Web Proxying, Browser Security, and Monitoring Your System.

  • Windows Security

    This workshop will provide an interesting look at Information Security as it crosses the most popular platform today: Windows 2000. This course will highlight several areas of security including: IP Based Restriction, File System Security, File System Sharing to the Network, Cryptography, Delegation of Control, Logging, Creating a Forensic Trail, Intrusion Detection, and Virus Detection. We will look at each of these areas and how you can most effectively implement them on the platform.

  • Security Management

    It has been said that employees are your best firewall, this workshop will look at the role of policy and training in creating an information security culture so that employees are functioning like a firewall. This workshop will include the role of policy in the Information Security Program, models for examining your business environment and your computing environment, and steps for creating Information Security Policy. In addition, this workshop will show you how to identify poor security practices common to computer users in your organization, how to establish goals for an awareness and training program in your organization, and how to select appropriate training methods to ensure that your training program meets its goals.

  • Network Security

    This workshop will include an introduction to network threats, vulnerabilities, and security. If you need a primer on network security, this is for you. We will cover basic security concepts and how those concepts apply network scenarios; examine the role of various components and users in network security; review the basic functions of network security tools; discuss vulnerabilities and threats that exist across all levels of networking; and review limitations, weaknesses, and vulnerabilities of network security tools.

  • Intrusion Detection

    Looking for an introduction to intrusion detection? This workshop is for you. This workshop includes an overview of intrusion detection systems, types of intrusion detection systems, the functions of intrusion detection systems, advantages to different intrusion detection systems, as well as the drawbacks.




Registration

On-line registration is available at: For on-campus hotel reservations, phone 1-800-320-6291 to reserve your room. Indicate that you are attending the CERIAS Research Symposium.


Maps & Lodging

Several major road construction projects are underway between Lafayette and West Lafayette. Purdue has a website devoted to helpful traffic suggestions to make your trip as hassle-free as possible. The university has provided an online travel resource with maps of the construction zones and alternative routes to use. Please take this into account when making travel arrangements.

For lodging and travel information, visit our visitor and travel information page.


Further Information

For further information on current or future CERIAS initiatives, contact:







Purdue University is an equal access/equal opportunity university