46 research outputs found

    A Roadmap for HEP Software and Computing R&D for the 2020s

    Get PDF
    Particle physics has an ambitious and broad experimental programme for the coming decades. This programme requires large investments in detector hardware, either to build new facilities and experiments, or to upgrade existing ones. Similarly, it requires commensurate investment in the R&D of software to acquire, manage, process, and analyse the shear amounts of data to be recorded. In planning for the HL-LHC in particular, it is critical that all of the collaborating stakeholders agree on the software goals and priorities, and that the efforts complement each other. In this spirit, this white paper describes the R&D activities required to prepare for this software upgrade.Peer reviewe

    Computing Security

    No full text

    Computer Security

    No full text

    Computer Security Day: SEC_RITY is not complete without U!

    No full text
    Oral presentation in English, slides in English. Why is computer security important in your every day life? Online payment, e-banking, Facebook, and other applications that you use every day will be covered from a security point of view. We will also demonstrate tricks used by criminals to steal your money

    OpenDays Lectures

    No full text

    IT Lightning Talks: session #20

    No full text
    Covid-19 stopped us from attending conferences and workshops in-person; we take part in virtual events instead. While presentations and discussions can be held via Zoom, it's much harder to reproduce any social aspects - forget the ad-hoc coffee chats or late-evening pub discussions. Can we at least see faces of other online participants, and have a group photo of a virtual event

    Developing secure software

    No full text

    Computer Security in 2016: Where are we and what to expect

    No full text
    Attacks against computer systems, belonging both to individuals and organisations, are an everyday reality. How many times have we heard about supposedly well protected companies and online services at the mercy of cyber criminals, or governments accusing other nation states of cyber espionage. Only the most serious breaches and biggest data leaks continue to make the headlines. But really, how secure is our data, computers and networks? What is happening behind the scenes? Is it actually possible to avoid the vulnerabilities, or detect the resulting exploits? This talk will address these questions and provide a high-level overview of security trends in the last year or two. It will include information on emerging types of vulnerabilities and recent attack vectors, as well as providing an insight into the cyber-security world and the underground economy of 2015. The talk with finish with a discussion on how the HEP community and in particular CERN are affected by the general situation: what could be the motivation behind attacks against fundamental research scientific institutes? About the speaker Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Aix-en-Provence in 2010. His professional interests include software and network security, distributed systems, and Web and mobile technologies

    Introduction Presentation

    No full text

    Lecture 3: Web Application Security

    No full text
    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture focuses on security aspects of Web application development. Various vulnerabilities typical to web applications (such as Cross-site scripting, SQL injection, cross-site request forgery etc.) are introduced and discussed. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Aix-en-Provence in 2010. His professional interests include software and network security, distributed systems, and Web and mobile technologies
    corecore