Keynote Speaker

Image Description

Assoc. Prof. Dr. Teo Yong Meng

Department of Computer Science
National University of Singapore (NUS)

TEO Yong Meng is an Associate Professor of Computer Science at the National University of Singapore (NUS) and was an Affiliate Professor at the NUS Business Analytics Centre. At NUS, he is the technical leader for Systems and Networking Research.

He was a Visiting Professor at the Chinese Academy of Science in China under the International Senior Scientist Award from 2010-2014. He received his PhD and MSc in Computer Science from the University of Manchester.

His research interests include parallel computing, systems modeling and simulation and performance analysis. His recent work focuses on modeling the performance of heterogeneous parallel systems and emergent properties in complex systems among others.

He has over 150 journal and conference publications and a number of best paper awards including the Best Applied Paper Award at the annual Wintersim Conference in 2015 and the Best Paper Award at the 10th International Conference on Algorithms and Architectures for Parallel Processing in 2010. Another paper, co-authored with his PhD student won the ACM SIGSIM Best PhD Student Paper Award in 2009. He has received various research grants including European Commission, Fujitsu Computers (Singapore) Pte Ltd, Fujitsu Laboratories Ltd (Japan), Sun Microsystems/Oracle (USA), NVIDIA and PSA Corporation.

More About Assoc. Prof. Dr. Teo Yong Meng

Keynote

Modeling and Analysis of Insider Threat Vulnerabilities

Yong Meng TEO
Department of Computer Science
National University of Singapore
email: teoym@comp.nus.edu.sg
url: www.comp.nus.edu.sg/~teoym

More than 40% of computer and organizational security professionals believe that their greatest security threat is insider threat vulnerabilities where employees jeopardized security through data leaks or similar errors. Insider threat vulnerabilities are of growing interest and importance in system security but are not well understood. This talk discusses the role of social interactions in an organization and the insider threats it presents on system vulnerabilities.

In this keynote, we review various types of social engineering attacks and discuss a three-step approach to model and investigate the effects of social interactions and the risks it present. Firstly, we show how user’s roles, security policies and their interactions are modeled as facts and interaction rules. Secondly, a reasoning engine combines these facts, interaction rules and the system hardware/software configurations to produce an attack graph. The attack graph represents the cumulative effect of attack steps an intruder can take to gain system privileges through series of individual steps or network paths. Lastly, we show how an attack graph is analyzed to obtain an objective measure of cybersecurity risks and to prioritize security hardening measures among others. For examples “how likely is it that an intruder could gain privilege X?”, “which user group and system component are most vulnerable?” Some results on the impact of security leakage due to user interactions on system vulnerabilities are discussed.

Event Location

Contact Us

Sekretariat ICICAM 2019
Universiti Sultan Zainal Abidin Kampus Besut,
22200 Besut Terengganu.

(+60) 9-669 3304
(+60) 9-669 3333