Information Trust Institute 10th anniversary Save the date
Save the Date - September 17 and 18
FEATURED
RESEARCH
Information Trust Institute Slide
Learn new skills in cyber security and information assurance through this multidisciplinary certificate program.
FEATURED
RESEARCH
Information Trust Institute Slide
From financial to medical information, our most private data is increasingly online -- and so are the cyber criminals.
FEATURED
RESEARCH
Information Trust Institute Slide
She is an ITI researcher and currently working with ITI's Trustworthy Cyber Infrastructure for the Power Grid project.
FEATURED
RESEARCH
Information Trust Institute Slide
NP-View was designed to automate the analysis of utilities' computer networks, offering advanced modeling capabilities.
FEATURED
RESEARCH

RESEARCH
THEMES

News

Mar 20. 2014
Due to advancement in cyber attack methodology, many companies are being encouraged to employ thorough security measures to combat the increasingly widespread attacks. This is evident in the release of cyber security frameworks such as the NIST Cyber Security Framework that was created from Presidential Executive Order 13636. For instance, utility companies, in particular, need to go beyond just guarding their networks at the edge, and begin protecting at deeper network levels as well. The current edge-based firewall approach, as well as the lack of widely deployed security protections in existing protocols, presents problems that require new, resilient and intelligent protection schemes.
3541
Mar 14. 2014
If Alexander Graham Bell came back today and saw the improvement technology has made on his first telephone, he would be astonished. But according to CSL Professor Peter Sauer, if Thomas Edison came back, he wouldn’t be all that surprised at what has developed in the power industry. “Electric power grid utilities have been criticized for being old and decrepit and stodgy and in a way, that’s true,” Sauer said. “So the smart grid is a way of advancing the technology of the power system by using computers, cell phones, etc. The industry is changing and whether we help it or not is up to us. We could sit back and teach the same old stuff we always teach or we could get out and push the edge.”
3534
Feb 26. 2014
Representatives from the University of Illinois at Urbana-Champaign stood alongside President Obama yesterday, February 25, as he announced a new Chicago-based public-private partnership called the Digital Lab for Manufacturing.
3528
Jan 08. 2014
Where are the country’s most innovative and creative tech hubs? The answer to that question used to be easy.
3499
Dec 16. 2013
From financial to medical information, our most private data is increasingly online -- and so are the cyber criminals who seek to sabotage the information systems that support the data. But while the number of cyber crimes has steadily risen over the years, the number of cyber security experts needed to stop them has not kept pace.
3484

Take This On Trust...

Oct 3. 2013 NSA, data privacy and the complexities of trust

Current events have pushed concerns about personal and data privacy into the limelight. Each new round of revelations about classified government programs highlights for me that at the heart of them all are issues of trust.

Jun 25. 2013 NetAPT and NP-View: How We Developed a Network Security Analysis Solution for Power Utilities

NetAPT is a software tool that performs an automated, comprehensive security policy analysis to identify any respects in which a network containing firewalls deviates from global access policy. The idea is that it provides a means for a system analyst to review his or her security controls and ensure that they do what the analyst intends them to do. The whole idea is to reduce the number of people that can access critical systems and potentially compromise those systems.