30
1 Welcome to NURAP at Noon! October 28, 2015

Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

1

Welcome to NURAP at Noon!

October 28, 2015

Page 2: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Presentation byInformation & Systems Security/Compliance

Feinberg School of MedicineResearch Computing Services

2

Page 3: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Overview

Information as an Asset     

Threat Landscape

Process Improvements / FSM & IT

Simple Steps to Your Security

Research Computing Services

3

Page 4: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Information as an Asset

4

“If it’s worth collecting, it’s worth protecting”

Budgets  Invoices, receipts, payments, planning, forecastingHR Data  Compensation, pension, benefits, performanceContracts  Terms & conditions, nondisclosure, service agreementsResearch  IP, patents, consent agreements, patient recordsPersonal  SSNs, credit cards, DoB, medical/health records, certificatesProfessional  Accomplishments, CV, degrees, awards, reputation

Page 5: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Threat Landscape

5

Jul ‘15 Harvard University (8 colleges) Unknown Unknown

May ‘15 Pennsylvania State (Engineering) China 18K

Jul ‘14 University of Illinois Chicago Unknown Unknown

Mar ‘14 University of Wisconsin Parkside Unknown 15K

Mar ‘14 North Dakota University Unknown 290K

Feb ‘14 Indiana University Unknown 146K

Feb ‘14 University of Maryland Unknown 309K

https://www.privacyrights.org/data‐breach

Page 6: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Threat Landscape ‐ Northwestern

6

Oct ’15         Communications       Battery – stolen laptopSep ‘15  WCAS  Misconfigured server/driveAug ‘15  McCormick Two stolen laptops Jul ‘15  Ford Building Stolen serverOct ‘14  FSM  Stolen laptopJun ‘14  FSM  Misconfigured server 400 PIIMar ‘14  FSM  Misconfigured NAS deviceMar ‘14  Travel  Credit card fraud   $18,000Feb ‘14  FSM  Misconfigured NAS device

Page 7: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Threat Landscape

• Highly automated• Indiscriminate and targeted attacks• 24 X 7 – never takes a vacation, never takes a holiday• Medical records now more “valuable” than financial (e.g., credit cards)• Hacktivist – Criminal – Insider – Espionage – Terrorism - Warfare

https://cybermap.kaspersky.com/https://www.checkpoint.com/ThreatPortal/livemap.html

7

Page 8: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Process ImprovementsFeinberg School of Medicine• Information Security Data Security Plans• Research Use of EDW Data• Guidelines for File Storage• Hardware and Software Standards• Encryption: Computers and Email• Tiered Network Services

8

http://www.feinberg.northwestern.edu/it/standards‐policies/

Page 9: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Process ImprovementsInformation & Systems Security/Compliance• Information Security Management System (ISMS)• Information & Systems Security Policy/Procedures (ISSPP)• ISO Security Standards• HIPAA/ISO Information Security Guidance• Incident Response Protocol

9

http://www.it.northwestern.edu/security/security‐management.html

Page 10: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Simple Steps to Your Security

• Change ‘default’ settings• Use encryption, anti-malware and anti-virus

Use longer/stronger passphrasesKeep your systems & applications currentPhishing: Be awareMaintain situational awareness

10

“It just has to be ‘good enough’…”        

Page 11: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Research Computing ServicesNorthwestern Information Technology

Jackie Milhans, Lead Computational SpecialistJoe Paris, Assoc. Director for Research

Page 12: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Overview

• Stay engaged in conversations on campus to understand emerging and growing research needs.

• Enable research by supporting computing, data management (storage, transfer, security), etc.

• Educate researchers in programming, computational skills and raise awareness of available resources.

• Help build communities on campus (bioinformatics, data science, etc.) and communicate growing areas to University.

Page 13: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Computational Climate at Northwestern

Computing Scale

Effort by PI

DesktopDesktop

CloudCloud

VMVMQuestQuest

SSCCSSCC

National Facilities (XSEDE, Mira, Blue 

Waters, etc.)

Exascale

Usage at Northwestern

Page 14: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

High-Performance Computing – Quest

• Supports over 250 research projects• We provided one‐on‐one training, software installation, etc.• Several common software is installed, and project‐specific software can be installed.

• Can adapt to unique computing needs (GPU, High‐Memory).

Page 15: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Quest ‐ Fields of Research

Applied Physics

Biomedical Engineering

Center for Genetic Medicine

Chemical and Biological Engineering

Chemistry

Civil and Environmental Engineering

Civil Engineering

Department of Medicine Cardiology Division

Department of Medicine Endocrinology Division

Division of Hematology Oncology

Earth and Planetary Sciences

Economics

EECS and Learning Science

Electrical Engineering and Computer Science

Engineering Sciences and Applied Mathematics

Finance

Human Molecular Genetics Program

Industrial Engineering and Management Sciences

Interdisciplinary Biological Sciences Graduate Program

Management and Stategy

Page 16: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Quest – Access

• Free access is requested by an allocation proposal.• Accounts are offered for development, classes, and

larger research allocations.• Quest is 90% grant supported – These nodes are

owned by a research group for dedicated acces.• Special purchases – dedicated login nodes, GPGPUs

and high-memory nodes have been purchased and installed on Quest when commodity nodes will not fit the research.

Page 17: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Social Sciences Computing Cluster (SSCC)

• Supports research and teaching of social sciences community• Includes a selection of analytical and statistical software• Access is available at no charge to social sciences faculty, graduate

students, and undergraduate students

Page 18: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

External Computing Resources

• When Quest or the SSCC does not fit the research need Research Computing HPC Specialists can:– Consult with users – Test code performance– Review allocation proposals– Explain best practices

Page 19: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Research Data Storage Options 

Tiers Annual Cost/TB ($)

Collaborativewith external researchers

Access to Quest

PHI/PII compliant

BOX 0 YES NO **

RESEARCH DATA STORAGE SERVICE

137 YES NO YES

VAULT SUPPLEMENTARY 70 NO YES NO

HPC STORAGE 410 NO YES NO

Note:  Box file size limit is 15 GB.

Page 20: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Research Data Storage Service• Features include:

– Desktop mountable (SMB)– HIPAA-compliant capable (audited zone)– Daily snapshot (local copy) and daily replication to

Chicago cluster– $137/TB annually, can pay up to 5 years in advance

• 3 zones:– Feinberg (managed by FSM IT), audited– Northwestern – unaudited– Northwestern – audited

Page 21: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Visualization Services

• Visualization services at Northwestern include illustrations, animations, and interactive types of data and concept visualizations.

• Visualizations help explain ideas, results, and concepts that may otherwise be difficult to convey or explain.

• Work by this team has been featured in journals, conference presentations, and in the classroom.

• These services are available for an hourly fee.

Page 22: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Northwestern VisualizationIllustration

Page 23: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Northwestern VisualizationAnimation

Page 24: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Northwestern VisualizationInteractive

Page 25: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Workshops and Training

• We provide training via consultation, specialized workshops, and workshop series.

• We also partner with existing events to teach workshops or portions of workshops (Kellogg Computational Social Sciences Summit, Big Data Introduction to Programming, Programming for Biologists).

Page 26: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Workshop Series• Researcher’s Toolkit

– In partnership with the Library, this series is normally held in Mudd Library.

– Topics include: Intro to Bash, GIS, EndNote, Data Management, Intro to Quest, Github, etc.

• Computational Skills for Informatics– In partnership with Galter Health

Sciences Library– Topics include: Intro to Quest,

Chip-Seq, DNA-Seq, etc.

Page 27: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Individual Workshops and Bootcamps

• Software Carpentry – 2-day workshop that focuses on bash shell, version control (git), and programming in R or python.

• NVIDIA GPU workshop – 1-day workshop taught by NVIDIA.• Galaxy – Open source, web-based platform for data intensive biomedical

research.• Virtual School of Computational Science and Engineering – Delivered by

XSEDE, hosted simultaneously at multiple locations across country.

Page 28: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Computational Research Day• All‐day symposium held at Norris during Spring. • ~20 speakers, largely NU faculty, some postdocs and grad students, and 2 visiting keynote speakers.

• Poster Competition ($1500 towards conference travel) and Data Visualization Challenge.

• Next year will be the 3rd year.• Each year, topics are more diverse.• Attendance was over 300 this year.• Excellent feedback from faculty and students regarding diversity of topics and quality of talks.

Page 29: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Additional Efforts

• Involvement in faculty recruitment, including interviews, consulting in startup packages, etc.

• Cyberinfrastructure Engineer – Provide training and consulting for researchers’ data management and raise awareness of available resources (supported by the NSF).

• Computational Lab Technician – Facilitate research data acquisition and control for lab equipment, data management and security, and utilization of available research cyberinfrastructure.

Page 30: Welcome to NURAP at Noon! · • Enable research by supporting computing, data management (storage, transfer, security), etc. • Educate researchers in programming, computational

Contacts

30

Information & Systems Security/ComplianceDave Kovarik, DirectorEmail: david‐[email protected]: (847) 467‐5930

FSM Information Security Carl Cammarata, Senior Director & Chief Information Security OfficerEmail: [email protected]: (312) 503‐2822

Research Computing ServicesJackie Milhans, Lead Computational SpecialistEmail: [email protected]: (847) 467‐4592