A Buckeye Bounce? New Ohio Approach Might Just Catch On

  • Post author:
  • Post category:News

National Cybersecurity Month 2018 has been, appropriately, an active time in cybersecurity law and regulation. Our state of California has passed a first-of-its-kind law to begin to regulate Internet of Things (IoT) devices – smart thermostats, implantable medical devices, etc. Watch this space for much more on this important development. California is often the first state out of the blocks with landmark innovations in cybersecurity and privacy regulation.

Often, but not always.

On November 2nd 2018, a groundbreaking new cybersecurity law will go into effect in Ohio of all places. Ohio’s new approach hopefully will serve as a bellwether for cybersecurity law and data breach liability legislation across the country.

Ohio Senate Bill 220, grants “safe harbor” to companies taking reasonable measures to implement a standards-based cybersecurity program. Not to be confused with the US-EU data transfer agreement of the same name that was struck down by Europe’s highest court, the Ohio “safe harbor” law provides significant protection from legal liability for companies that implement a reasonable written cybersecurity plan.

(more…)

Continue ReadingA Buckeye Bounce? New Ohio Approach Might Just Catch On
Read more about the article CPRI Cyber Crisis Simulation: Understanding the Rules and Risks of Cyber Conflicts
CPRI Executive Director Bryan Cunningham introducing participants to the half-day cyber crisis simulation at UCI.

CPRI Cyber Crisis Simulation: Understanding the Rules and Risks of Cyber Conflicts

  • Post author:
  • Post category:News

UCI’s Cybersecurity Policy & Research Institute (CPRI) recently partnered with the Atlantic Council and the Marine Corps University Foundation (MCUF) to provide a half-day cyber simulation event, approximating adership decision-making during a crisis with cyber actions. Event participants were notified of cyber activity related to an “escalating crisis” with a rival nation. They had to choose between a number of options to de-escalate the crisis, conduct a proportionate response or escalate the situation. They then had to recommend a coordinated response, ranging from “publicly call for third-party mediation” to “use exploit chains to erode rival military navigation.”

“Having participated in a number of actual national security crisis meetings,” said CPRI Executive Director Bryan Cunningham, welcoming everyone to the event, “I can tell you that the [scenario] is pretty accurate.” The former White House lawyer and adviser warned the participants prior to the exercise, “You will find that you have not anywhere near enough information and not anywhere near enough time, and that is how reality works in many crisis situations.”

(more…)

Continue ReadingCPRI Cyber Crisis Simulation: Understanding the Rules and Risks of Cyber Conflicts

UCI CPRI & Atlantic Council:
Invitation to Participate

  • Post author:
  • Post category:Events

Crisis Dynamics and Cyber Statecraft: Simulating Cross-National Perspectives

September 25, 2018
Donald Bren Hall, UCI Campus
9:00am-12:00pm
Space is limited for this event.*

The UC Irvine Cybersecurity Policy & Research Institute (CPRI) is proud to announce – in partnership with the Atlantic Council and the Marine Corps University Foundation – a 1/2-day crisis simulation exercise critical to increase understanding, by governments, police forces, and businesses, of how states use offensive cyber capabilities, alongside more traditional instruments of statecraft, to manage crises and further their national interests. For businesses, this exercise will enhance understanding of how nation-state cyberwarfare may affect them. All attendees will be able to participate – through scenario focus groups – in the decision-making process and outcome.

(more…)

Continue ReadingUCI CPRI & Atlantic Council:
Invitation to Participate

Data Breach, Privacy, and Cyber Insurance: How Insurance Companies Act as “Compliance Managers” for Businesses

  • Post author:
  • Post category:News

by Shauhin A. Talesh While data theft and cyber risk are major threats facing organizations, existing research suggests that most organizations do not have sufficient protection to prevent data breaches,…

Continue ReadingData Breach, Privacy, and Cyber Insurance: How Insurance Companies Act as “Compliance Managers” for Businesses

ICS Researchers Introduce Thermanator, Revealing a New Threat to Using Keyboards to Enter Passwords and Other Sensitive Information

  • Post author:
  • Post category:News

A thermal image of “iloveyou” 20 seconds after entry.

After entering a password, your regular computer keyboard might appear to look the same as always, but a new approach harvesting thermal energy can illuminate the recently pressed keys, revealing that keyboard-based password entry is even less secure than previously thought. Computer Science Ph.D. students Tyler Kaczmarek and Ercan Ozturk in the Donald Bren School of Information and Computer Sciences (ICS), working with Chancellor’s Professor of Computer Science Gene Tsudik, have exploited thermal residue from human fingertips to introduce a new insider attack — the Thermanator.

(more…)

Continue ReadingICS Researchers Introduce Thermanator, Revealing a New Threat to Using Keyboards to Enter Passwords and Other Sensitive Information

Gene Tsudik, Two Computer Science Ph.D. Students Develop Novel De-Authentication Prototype

  • Post author:
  • Post category:News

Chancellor’s Professor of Computer Science Gene Tsudik and two of his Ph.D. students, Tyler Kaczmarek and Ercan Ozturk, have developed a novel technique aimed at mitigating “Lunchtime Attacks.” Such attacks occur when an insider adversary takes over an authenticated state of a careless user who has left his or her computer unattended. Tsudik, Kaczmarek and Ozturk have come up with an unobtrusive and continuous biometic-based “de-authentication,” i.e., a means of quickly terminating the secure session of a previously authenticated user after detecting that user’s absence. They introduce the new biometric, called Assentication, in a paper appearing at the 2018 International Conference on Applied Cryptography and Network Security (ACNS).

Continue ReadingGene Tsudik, Two Computer Science Ph.D. Students Develop Novel De-Authentication Prototype

Gene Tsudik, ICS Exchange Students on International Team Studying Information Leakage

  • Post author:
  • Post category:News

In a paper to appear at the 2018 European Symposium on Research in Computer Security (ESORICS), a team of researchers from UC Irvine, New York Institute of Technology and University of Padova (Italy) reveal a new attack: Secret Information Leakage from Keystroke Timing Videos (SILK-TV). The UCI researchers include Chancellor’s Professor of Computer Science Gene Tsudik and undergrad exchange students Martin Georgiev and Nikita Samarian.  

Continue ReadingGene Tsudik, ICS Exchange Students on International Team Studying Information Leakage