1 Cybersecurity at ODU ( ) We offer a variety of options for individuals to learn about cybersecurity. These include: a. Twenty-one separate undergraduate courses related to the topic. b. Eight graduate courses focusing on cybersecurity c. An interdisciplinary undergraduate major in cybersecurity d. An undergraduate major in computer science with an emphasis in cybersecurity e. A undergraduate minor in cybersecurity f. A graduate certificate in cybersecurity offered through the computer science department g. A cyber systems certificate in advanced engineering h. Seminars offered by the Center for Cyber Security Education and Research ODU has developed a solid research infrastructure in the area of cybersecurity. At the university level, we created the Center for Cyber Security Education and Research in March This center, housed in the Office of Academic Affairs, works towards meeting the following objectives: Promote awareness about cybersecurity, cyber forensics and cyber operations from an interdisciplinary framework; Coordinate interdisciplinary academic programming related to cybersecurity; Expand the pipeline for a cybersecurity workforce through focused education programs for a diverse group of learners; Facilitate a collaborative approach for responding to cybersecurity issues; Provide training and research to the military with a specific focus on topics related to homeland security and infrastructure needs; Serve as a clearinghouse for cybersecurity academic programming, research, training, and prevention tools; Facilitate the interdisciplinary collaboration of faculty from across the university to attract funding and to address real-world problems through innovative and cutting edge research The focus of our cybersecurity efforts can be categorized under four different themes that separate our initiative from others. These themes include: An interdisciplinary framework for understanding issues related to cybersecurity. No single academic unit or researcher can address cybersecurity on their own. A collaborative and holistic model betters meets societal needs. A translational framework emphasizes the need to conduct research that informs practice and policy. With the creation of the College of Continuing Education and Professional Development, ODU is in a position to more seamlessly provide up-to-date research to consumers in a meaningful way. A focus on preventing cybercrime by pulling together expertise from social scientists, computer scientists, and engineers results in practical information. A focus on resilience informs businesses and companies how to respond to cyber attacks in a way that minimizes the harm from those security breaches. In particular, our researchers examine how to keep computer systems working while a breach is ongoing.
2 ODU s current assets in the area of cyber security provide a solid foundation for expanding our efforts. These assets include the following: Twenty-seven faculty members who work in the area of cybersecurity. They teach about the topic, conduct research on topics related to cybersecurity, and have offered a variety of consulting services related to the topic. (See Appendix A). Eight graduate students are currently working in a network security lab. We are in the process of purchasing cybersecurity software that assists in teaching cybersecurity courses. Information is available online at In 2013, the Batten College of and Technology developed the Cyber Security, Communications, and Networking Innovation Lab. Working closely with researchers from VMASC, the mission of this lab is to use research to improve the security of cognitive radio networks, wireless communications, and wireless networking. Programmatically, ODU has much to offer the region in the area of cyber security. Here is a summary of the potential benefits: Our programs are developing a pipeline of future employees who will be able to work in cybersecurity positions. Having a strong cadre of cybersecurity employees will make the region more attractive to future employers. Through programs developed by our College of Continuing Education and Professional Development, the university will be able to meet the current and changing needs of the workforce. Because changes occur rapidly in the information technology field, we will be able to develop continuing education programming that is up-to-date and responsive to technological changes. Research by faculty members at ODU will provide information that can directly translate into practice. This research will help to identify prevention and intervention strategies. By translating the research into practice, ultimately businesses and government agencies will have more secure computer networks. Enhancing the security of cyber systems reduces unnecessary costs to businesses/agencies and allows those entities to focus on their specific goals and tasks. Our plan for the future of cybersecurity programming at ODU includes the following: Expanding our research infrastructure and promoting collaborative projects Developing new continuing education courses responsive the industry needs Developing additional for credit certificates in areas of cyber physical security, information system security, and cyber ethics and law Developing a Master s program to expand the pipeline for the information security workforce. For our cybersecurity efforts to be most successful, we must partner with various stakeholders. These include: Industry partners seeking up-to-date information related to cybersecurity Government agencies responsible for securing the regional infrastructure Military officials performing information security tasks Small business developing cybersecurity businesses.
3 Appendix A. ODU Cybersecurity Expertise Guide (updated on April 22, 2015) Name Website Al-Nashif, Youssif B. Brill, Chris Brunelle, Janet Chernikov, Andrey Ezell, Barry Flanagan, David Gheorghe, Adrian https://www.odu.edu/directory/people/a/agheorgh Graham, Roderick S. College/Department /Electrical & Computer s/psychology Chief Scientist, VA Modeling, Analysis and Simulation Center Project Scientist /Batten Chair of Systems Arts&Letters/Sociology & Criminal Justice Expertise Cybersecurity, Cyber Resilience, Secure Critical Infrastructures, Cyber Trust, Cloud Security, Autonomic Computing, Data Analysis, Workload Behavior Modeling and Autonomic Power and Performance Management. Multimodal displays (esp. vibrotactile displays), responses to motion (e.g., sopite syndrome, virtual environment aftereffects), aerospace psychophysiology, multiple resource theory, and workload assessment. LaRC: Software reliability, Fault-tolerant software, Artificial intelligence ODU: Investigation of new teaching techniques and technologies Image analysis in medical and bio-material modeling and simulation. Parallel computational geometry with a focus on quality mesh generation. High-performance scientific computing. Risk analysis expertise in terrorism risk, critical infrastructure, and industrial control systems; President of Security Analysis and Risk Management Association Cyber risk to industrial control systems in the surface transportation sector (DHS). Risk and vulnerability assessment for complex systems, risk assessment transportation of dangerous goods. Social implications of various information and communication technologies (ICTs) including the Internet and mobile phones. How these technologies increase or decrease inequality between economic classes, racial
4 groups, and nations. He, Wu https://www.odu.edu/directory/people/w/whe#profiletab=3 Madan, Bharat B. Maly, Kurt Mielke, Roland https://www.odu.edu/directory/people/r/rmielke#profiletab =3 Mukkama, Ravi Nadeem, Tamer Olariu, Stephan Payne, Brian Popescu, Dimitrie https://www.odu.edu/directory/people/d/dpopescu Business/Information Technology & Decision /Modeling, Simulation and Visualization /Modeling, Simulation and Visualization Associate Dean, College of Vice Provost for Graduate and Undergraduate Academic Programs/Sociology and Criminal Justice Electrical & Computer Cyber security, social media, data mining Cyber security and attack tolerant cyber systems, elliptic curve cryptography, big data analytics for cyber situation awareness Digital libraries, very high-performance networks, and Internet resource access. System theory and graph applications in data flow architectures. Security in distributed systems Wireless networks, mobile computin, ad-hoc and sensor networks, vehicular networks, enterprise wireless network managements, efficient cross layer designs, smart antenna protocols, peer-to-peer systems, pervasive computing, location determination systems, and social networks wireless communications and more specifically wireless sensor networks with applications to information s ecurity Criminology with a concentration in white-collar crime and policy Wireless communications: distributed optimization in wireless systems; spectrum sensing and modulation classification, multiple antenna and MIMO systems, interference avoidance/suppression and power control,
5 Ranjan, Desh Sokolowski, John Streit, Doug Weigle, Michele Wittkower, D. E. https://odu.academia.edu/dewittkower Wu, Harris Xin, Chunsheng Xu, Li Zubair, Mohammed s/chair, Computer Executive Director, VA Modeling, Analysis and Simulation Center Information Technology Services Arts & Letters/Philosophy & Religious Studies Business/IT & Decision /Electrical & Computer Business/IT & Decision OFDM and multicarrier systems, ultra wideband systems, vehicular networks. Control theory. Algorithm design and implementation, bioinformatics and computational complexity. Human behavior modeling, decision system modeling, multiagent system simulation, and modeling and simulation representation of social systems. IT security, records and PM Web science, digital preservation, information visualization, mobile computing, wireless networks Philosophy of technology, philosophy of digital culture, conduct of personal relationships online, phenomenology of SNS (social networking sites), business and professional ethics, theories of privacy, ethics of data use. Social computing, knowledge management, cloud computing, social networks, data, text and Web mining, case-based design Cybersecurity, cognitive radio networks, wireless communications and networking, cyber-physical systems, and performance evaluation and modeling MIS foundational theory and methodologies, business intelligence, enterprise information systems in e- commerce, ERP, and intelligent systems. High performance computing and big data analytics. Parallel programming environments.
Report of the Cyber Security Task Force to the University System of Maryland, May 2011 rm biometrics iques protect e-mail sector hub techniques global engineering metrics act data see assess alias illegal
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
Master of Science in Information Security and Assurance The Master of Science in Information Security and Assurance is a competency-based degree program that encompasses the 10 security domains that are
A Rhode Island Academic Collaboration on Cybersecurity Technology and Policy (CCTP) Abstract The University of Rhode Island, Brown University, and the U.S. Naval War College, with the engagement of Bryant
National Spatial Data Infrastructure Strategic Plan 2014 2016 Federal Geographic Data Committee December 2013 Federal Geographic Data Committee Federal Geographic Data Committee, Reston, Virginia: 2013
PROPOSAL FOR New Instructional Program Submission: October 2014 Doctor of Philosophy in Management and Decision Sciences Award to be Offered Projected Implementation Date Doctor of Philosophy (Ph.D.) Fall
110101001101101101010011000 11011010100110110101001100 11011010011011010100110000 10100110110101001100010010 Protecting Information The Role of Community Colleges in Cybersecurity Education A Report from
and Mission Information technology is a dynamic discipline that addresses the use of computing and I n t r o d u c t i o n information technology in business, education, government, and other organizations.
The Masters of Science in Information Systems & Technology College of Engineering and Computer Science University of Michigan-Dearborn A Rackham School of Graduate Studies Program PH: 1-59-561; FAX: 1-59-692;
Report on Cyber Security Education Project June 9, 2014 For Further Information: Dennis Egan: email@example.com Fred Roberts: firstname.lastname@example.org Table of Contents ` Executive Summary...
February X, 2015 REQUEST FOR AUTHORIZATION TO IMPLEMENT A COLLABORATIVE ONLINE MASTER OF SCIENCE DEGREE IN DATA SCIENCE University of Wisconsin-Eau Claire University of Wisconsin-Green Bay University of
THE GRADUATE SCHOOL CAreer Forward Advance with a respected graduate degree from UMUC. www.umuc.edu/moveforward An advanced degree opens the door to CAreer advancement Professional credentials can help
Master of Science in Nursing Education The Master of Science degree is a competency-based program that prepares graduates to be educators in diverse settings: hospitals, community agencies, schools, industry
Master of Science in Nursing Leadership and Management The Master of Science for is a competency-based program that prepares graduates to be leaders and managers in diverse settings: hospitals, long term
Cyber Security: Designing and Maintaining Resilience White paper presented by: Georgia Tech Research Institute Cyber Technology and Information Security Laboratory Dr. George A. Wright Chief Engineer Terrye
E N V I R O N M E N T A L S C A N CYBERSECURITY Los Angeles and Orange Counties J U N E 2 0 1 2 E N V I R O N M E N T A L S C A N CENTER OF EXCELLENCE Los Angeles and Orange Counties Audrey Reille, Director
Bachelor of Science in Business Human Resource Management The Bachelor of Science in Business Human Resource Management is a competency-based program that enables students to earn a Bachelor of Science
Testimony of Farnam Jahanian, Ph.D. Assistant Director Computer and Information Science and Engineering Directorate Before the Committee on Science, Space, and Technology Subcommittee on Technology and
BOARD OF REGENTS SUMMARY OF ITEM FOR ACTION, INFORMATION, OR DISCUSSION TOPIC: University of Maryland Eastern Shore: Master of Science in Cybersecurity Engineering Technology COMMITTEE: Education Policy
Master of Public Administration MASTER OF PUBLIC ADMINISTRATION (M.P.A.) On-campus MPA and On-line MPA Programs Director: Dr. Michael Pennington Concentration coordinators: Public Management Dr. William
Cyber-security Cluster Communication Computer Science Electrical and Computer Engineering Finance and Operations Management Political Science Proposing Team: Lead: Wayne Burleson, Electrical and Computer
Bachelor of Science in Marketing Management The Bachelor of Science in Marketing Management is a competencybased program that enables marketing and sales professionals to earn a Bachelor of Science degree.
Qatar National Cyber Security Strategy MAY 2014 i ii TABLE OF CONTENTS FOREWORD... v EXECUTIVE SUMMARY... vi 1. INTRODUCTION...1 2. THE IMPORTANCE OF CYBER SECURITY TO QATAR...3 2.1 Threats... 3 2.2 Challenges...
Program Proposal for Master of Information Technology Security Submission to Post-secondary Education Quality Assessment Board February 3, 2004 Master of Information Technology Security 1 1 ORGANIZATION
Bachelor of Science in Business Management The Bachelor of Science in Business Management is a competencybased program that enables leaders and managers in organizations to earn a Bachelor of Science degree.