Center for Computer Systems Security

Size: px
Start display at page:

Download "Center for Computer Systems Security"

Transcription

1 Center for Computer Systems Security USC recognized as Center of Academic Excellence in Information Assurance Research By US Department of Homeland Security and the National Security Agency The Center Coordinates USC research in Computer Security Focus is on improving the security of computer systems, networks, and applications. Promotes development, evaluation, and integration of security technologies. Promotes understanding and integration of policy management and enforcement technologies. The center conducts research in: Computer security architecture for computer hardware and software Critical Infrastructure Protection Dynamic policy management adaptive policy enforcement Intrusion detection and response Denial of service defenses Security for Web Services Personal privacy Survivability of critical infrastructure. The center provides to the larger community The DETER testbed to run experiments on security technologies, to observe and model attacks, and to evaluate defenses. The center provides a focal point for security education.

2 Security Education Security is critical in the development of new applications. Future developers need to understand security technologies. They need to understand how to architect applications with an eye toward security. Masters in Computer Science with Specialization in Computer Security Basic systems track Masters, discussing security in OS, Network, and architecture classes Specialization class in Computer Security Systems Additional classes in applied cryptography USC has graduated many Ph.D. students focused on security. Electronic payment technologies Electronic commerce. Denial of service defenses Intrusion detection Group communication USC provides a supportive environment for security research A significant pool of students working in the area This is a resource from which industry can hire.

3 Security Specialization You must take the CS Masters General Requirements Some of which overlap specific requirements below You must take the following Security Related Classes CSCI Security Systems CSCI Applied Cryptography CSCI Computer Communications CSCI Advanced Operating Systems CSCI 577a - Software Engineering or CSCI Software Architecture CSCI Analysis of Algorithms You must take two of the following courses CSCI Introduction to Cryptography CSCI Internetworking and Distributed Systems Laboratory CSCI Web Technologies CSCI Database Systems CSCI Special Topics (must be approved for specialization) CSCI 694a or b - Topics in Computer Networks This is a CS degree with specialization in Security It provides a more systems and CS oriented perspective that the informatics degree, which is more operational in its perspective.

4 Center for Computer Systems Security Membership drawn from faculty, staff, students in: ISI, Computer Science, Electrical Engineering, Math, Information Technology Program. CCSS Research: Researchers associated with center conduct research in: Architecture Critical Infrastructure Authentication Authorization Privacy Policy Intrusion Detection DDOS Defense Survivability Attack modeling & simulation USC CENTER for COMPUTER SYSTEMS SECURITY Center identifies opportunities, coordinates activities & resources The Center contributes to broader understanding of computer security through several activities. Web Site ccss.isi.edu Testbed Curriculum White Papers Technology Transfer Workshops Standards Strong ties to vendor and standards community promote transfer, including: PK Kerberos, CIDF, GAA-API Undergrad Electives MS Specialization PhD Research DEN/ITP Certificate Industry Government

5 CCSS Topics of Interest Trusted Computing Architectures for systems, software and networks that provide assurance that the software with which one interacts has not been modified and will enforce policies that protect the interest of all parties to a transaction. How to protect the providers of information (including personal information provided by end users) from misuse, even once the information is out of the hands of the provider. Trusted computing can readily support digital rights management, but such enforcement can sometimes be abused. We are interested in how trusted computing can be applied to provide balanced protection for content. Security for computer games Protecting the online experience Protecting the games community of users Protection of the commerce supported within games.

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu MS in Computer Science with specialization in Computer Security Prof. Clifford Neuman bcn@isi.edu Computer Security Specialization Computer Security is a hot area of study with a critical need Needed by

More information

M.Tech. Software Systems

M.Tech. Software Systems M.Tech. Software Systems Input Requirements Employed professionals holding an Integrated First Degree of BITS or its equivalent in relevant disciplines, with minimum one year work experience in relevant

More information

Discover Viterbi: Cyber Security Engineering & Informatics Programs

Discover Viterbi: Cyber Security Engineering & Informatics Programs Discover Viterbi: Cyber Security Engineering & Informatics Programs Professor Cyrus Shahabi Professor Clifford Neuman Meghan Balding Graduate & Professional Programs November 11, 2015 WebEx Quick Facts

More information

2. What are your learning objectives or outcomes associated with each student learning goal?

2. What are your learning objectives or outcomes associated with each student learning goal? Graduate Degree Program Assessment Plan Cover Sheet (rev. 07): UNIVERSITY OF ARKANSAS AT LITTLE ROCK Plan No. Degree Program: Master of Science In Computer Science (CPSM) Department College:Department

More information

Department of Information Systems and Cyber Security

Department of Information Systems and Cyber Security The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association

More information

CPATH EAE: Extending Contextualized Computing in Multiple Institutions Using Threads. Brooklyn College of the City University of New York (CUNY)

CPATH EAE: Extending Contextualized Computing in Multiple Institutions Using Threads. Brooklyn College of the City University of New York (CUNY) CPATH EAE: Extending Contextualized Computing in Multiple Institutions Using Threads Brooklyn College of the City University of New York (CUNY) Elizabeth Sklar Gerald Weiss Ira Rudowsky Status Report:

More information

UNM Information Assurance Scholarship for Service (SFS) Program

UNM Information Assurance Scholarship for Service (SFS) Program UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and

More information

EECS 588: Computer and Network Security. Introduction

EECS 588: Computer and Network Security. Introduction EECS 588: Computer and Network Security Introduction January 13, 2014 Today s Cass Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components of your grade

More information

Computer Security & Information Assurance MS Program

Computer Security & Information Assurance MS Program Computer Security & Information Assurance MS Program in a Nutshell 2005-2006 Graduate Security and Information Assurance Program in a Nutshell Department of Computer Science Rochester Institute of Technology

More information

Discover Viterbi: Computer Science

Discover Viterbi: Computer Science Discover Viterbi: Computer Science Gaurav S. Sukhatme Professor and Chairman USC Computer Science Department Meghan Balding Graduate & Professional Programs November 2, 2015 WebEx Quick Facts Will I be

More information

Graduate Student Orientation

Graduate Student Orientation Graduate Student Orientation Graduate Student Orientation Department of Computer Science The Volgenau School of Engineering Fall 2014 http://cs.gmu.edu Outline CS Department Overview Rules pertaining to

More information

Graduate Student Orientation

Graduate Student Orientation Graduate Student Orientation Prof. Sanjeev Setia Chair, Department of Computer Science The Volgenau School of IT & Engineering Spring 2013 http://cs.gmu.edu Outline CS Department Overview Rules pertaining

More information

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM Proposed Program Title: Bachelor of Science in Computing Science- Specialization in Digital Forensics Specialization

More information

Study Plan for the Bachelor Degree in Computer Information Systems

Study Plan for the Bachelor Degree in Computer Information Systems Study Plan for the Bachelor Degree in Computer Information Systems The Bachelor Degree in Computer Information Systems/Faculty of Information Technology and Computer Sciences is granted upon the completion

More information

Bachelor of Applied Information Science (Information Systems Security)

Bachelor of Applied Information Science (Information Systems Security) Sheridan College Institute of Technology and Advanced Learning Bachelor of Applied Information Science (Information Systems Security) Victor Ralevich, Ph.D. Professor and Program Coordinator Sheridan College

More information

Computer Science Electives and Clusters

Computer Science Electives and Clusters Course Number CSCI- Computer Science Electives and Clusters Computer Science electives belong to one or more groupings called clusters. Undergraduate students with the proper prerequisites are permitted

More information

Overview of CS Graduate Program Requirements. Jan Prins August 2015

Overview of CS Graduate Program Requirements. Jan Prins August 2015 Overview of CS Graduate Program Requirements Jan Prins August 2015 Types of Requirements The MS and PhD program have the following categories of requirements 1. Background 2. Course requirements (breadth

More information

SAM HOUSTON STATE UNIVERSITY CURRICULUM REPORT

SAM HOUSTON STATE UNIVERSITY CURRICULUM REPORT SAM HOUSTON STATE UNIVERSITY CURRICULUM REPORT Curriculum Requests Associated with New/Altered Degree Programs To Become Effective Fall 2008 (Pending Approval) SUBMITTED BY SAM HOUSTON STATE UNIVERSITY

More information

Office of the Provost. Substantive Academic Change to an Existing Degree Program Form

Office of the Provost. Substantive Academic Change to an Existing Degree Program Form Office of the Provost Substantive Academic Change to an Existing Degree Program Form Proposed Substantive Change to an Existing Degree: Academic Components 1. Please describe and provide a rationale for

More information

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015)

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015) TRUST TRUST: : Team for Research in Ubiquitous Secure Technology A Collaborative Approach to Advancing Cyber Security Research and Development Larry Rohrbough Executive Director, TRUST University of California,

More information

Graduate Student Orientation

Graduate Student Orientation Graduate Student Orientation Prof. Sanjeev Setia Chair, Department of Computer Science The Volgenau School of IT & Engineering Fall 2011 http://cs.gmu.edu Outline CS Department Overview Rules pertaining

More information

Department of Computer Science School of Arts and Science. www.cs.rutgers.edu

Department of Computer Science School of Arts and Science. www.cs.rutgers.edu Department of Computer Science School of Arts and Science www.cs.rutgers.edu Presented by Prof. Louis Steinberg www.cs.rutgers.edu/~lou Computer Science 1 What is Computer Science? It s NOT just using

More information

B.A. in Information Systems

B.A. in Information Systems New Jersey Institute of Technology 1 B.A. in Information Systems (129 credit) First Year Term Credits CS 100 Roadmap to Computing HUM 101 English Composition: Writing, Speaking, Thinking I MATH 18 General

More information

Silicon Valley University Doctor of Computer Engineering (DCE) Program Outline and Study Plan

Silicon Valley University Doctor of Computer Engineering (DCE) Program Outline and Study Plan Silicon Valley University Doctor of Computer Engineering (DCE) Program Outline and Study Plan DCE Program Outline DCE Curriculum: Minimum 108 semester credit hours of graduate study: (a). 96 credit hours

More information

Office of the Provost

Office of the Provost Office of the Provost Change to an Existing Degree Program Form Proposed Change to an Existing Degree: Academic Components Please answer all relevant questions below. Consultation with the appropriate

More information

EECS 588: Computer and Network Security. Introduction January 14, 2014

EECS 588: Computer and Network Security. Introduction January 14, 2014 EECS 588: Computer and Network Security Introduction January 14, 2014 Today s Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components of your grade

More information

M.S. in Business and Information Systems

M.S. in Business and Information Systems 1 M.S. in Business and Information Systems (30 Credits) M.S. in Business and Information Systems (courses only) Bridge Courses Select one of the following: 3 CS 100 Roadmap to Computing CS 113 Introduction

More information

M.S. Computer Science Graduate Student Handbook Fall 2015

M.S. Computer Science Graduate Student Handbook Fall 2015 M.S. Computer Science Graduate Student Handbook Fall 2015 http://www.cs.usc.edu Table of Contents Registration for Fall 2015 Courses... 3 EE 450 Placement Exam... 4 American Language Institute (ALI) Students

More information

Accelerated Undergraduate/Graduate (BS/MS) Dual Degree Program in Computer Science

Accelerated Undergraduate/Graduate (BS/MS) Dual Degree Program in Computer Science Accelerated Undergraduate/Graduate (BS/MS) Dual Degree Program in The BS degree in requires 126 semester hours and the MS degree in Computer Science requires 30 semester hours. Undergraduate majors who

More information

The Applied and Computational Mathematics (ACM) Program at The Johns Hopkins University (JHU) is

The Applied and Computational Mathematics (ACM) Program at The Johns Hopkins University (JHU) is The Applied and Computational Mathematics Program at The Johns Hopkins University James C. Spall The Applied and Computational Mathematics Program emphasizes mathematical and computational techniques of

More information

Course Information. Faculty of Informatics. Single Degree Programs: UAC Code

Course Information. Faculty of Informatics. Single Degree Programs: UAC Code Course Information Faculty of Informatics Single Degree Programs: UAC Code UOW Code Course name 754101 766 Bachelor of Computer Science 754104 766 Bachelor of Computer Science (Multimedia and Game Development)

More information

PhD in Computer Science at North Carolina A&T State University

PhD in Computer Science at North Carolina A&T State University PhD in Computer Science at North Carolina A&T State University December 5, 2013 Contents Admission...1 Program Requirements...2 Course Work...2 Advisory Committee...2 Residency and Other Requirements...2

More information

Computer and Network Security

Computer and Network Security EECS 588 Computer and Network Security Introduction January 12, 2016 Alex Halderman Today s Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components

More information

Computer Network Engineering

Computer Network Engineering 226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering

More information

Bowdoin Computer Science

Bowdoin Computer Science Bowdoin Science What is computer science, what are its applications in other disciplines, and its impact in society? 101: Introduction to CS Pre-requisites: none Assumes no prior knowledge of programming

More information

Student Orientation. Department of Health Informatics SHRP-UMDNJ

Student Orientation. Department of Health Informatics SHRP-UMDNJ Student Orientation Department of Health Informatics SHRP-UMDNJ OUR DEGREES Healthcare Informatics Certificate: designed to quickly build up competencies in the field of biomedical informatics useful for

More information

These regulations apply to students admitted to the BBA(IS) degree in the academic year 2005-2006 and thereafter.

These regulations apply to students admitted to the BBA(IS) degree in the academic year 2005-2006 and thereafter. 764 REGULATIONS FOR THE DEGREE OF BACHELOR OF ENGINEERING (COMPUTER SCIENCE) (BEng[CS]) AWARDED IN CONJUNCTION WITH THE DEGREE OF BACHELOR OF BUSINESS ADMINISTRATION (INFORMATION SYSTEMS) (BBA[IS]) These

More information

Master of Science in Security Informatics (MSSI) Information Security Institute (JHUISI) The Johns Hopkins University

Master of Science in Security Informatics (MSSI) Information Security Institute (JHUISI) The Johns Hopkins University Master of Science in Security Informatics (MSSI) Information Security Institute (JHUISI) The Johns Hopkins University Securing cyberspace and our national information infrastructure is now more important

More information

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus Graduate Council Document 03-24a Approved by the Graduate Council 11/20/03 Proposal for a Graduate Certificate in Information Assurance Education Track 2 Submitted by the School of Technology West Lafayette

More information

Master of Cyber Security

Master of Cyber Security Master of Cyber Security Dr. Winnie Callahan Assoc. Director, Informatics Meghan Balding Graduate & Professional Programs September 17, 2013 WebEx Quick Facts Will I be able to get a copy of the slides

More information

The University of Connecticut. School of Engineering COMPUTER SCIENCE GUIDE TO COURSE SELECTION AY 2015-2016. Revised July 27, 2015.

The University of Connecticut. School of Engineering COMPUTER SCIENCE GUIDE TO COURSE SELECTION AY 2015-2016. Revised July 27, 2015. The University of Connecticut School of Engineering COMPUTER SCIENCE GUIDE TO COURSE SELECTION AY 2015-2016 Revised July 27, 2015 for Computer Science (CSci) Majors in the School of Engineering Table of

More information

Master of Science in Computer Science

Master of Science in Computer Science Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,

More information

COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.)

COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.) VCU 1 COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.) The Bachelor of Science in Computer Science is built on a rigorous, highly concentrated, accredited curriculum of computer science courses. The program

More information

CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

CRITERIA FOR ACCREDITING COMPUTING PROGRAMS CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Effective for Reviews During the 2015-2016 Accreditation Cycle Incorporates all changes approved by the ABET Board of Directors as of November 1, 2014 Computing

More information

Other Required Courses (14-18 hours)

Other Required Courses (14-18 hours) 1) IT Business Track Required Info Technology Courses (19 hours) 1,2&3 ITEC 2110 Digital Media 1,2&3 ITEC 3100 Intro to Networks 1,2&3 ITEC 3200 Intro to Databases 1 ITEC 3350 ECommerce 1,2&3 ITEC 3900

More information

Criteria for Accrediting Computer Science Programs Effective for Evaluations during the 2004-2005 Accreditation Cycle

Criteria for Accrediting Computer Science Programs Effective for Evaluations during the 2004-2005 Accreditation Cycle Criteria for Accrediting Computer Science Programs Effective for Evaluations during the 2004-2005 Accreditation Cycle I. Objectives and Assessments The program has documented, measurable objectives, including

More information

NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA

NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA Dr. Aurelia T. Williams, NSU Ms. Kamilah Brown, CCSD Mr. Ronald Williams, DTC Mr. Tony Baylis, LLNL November 3, 2015 Who Are We? A collaborative

More information

M.Sc. Program in Informatics and Telecommunications

M.Sc. Program in Informatics and Telecommunications M.Sc. Program in Informatics and Telecommunications at UoA-DIT Prof. Ioannis Stavrakakis Deputy Dept Chair, Director of Graduate Studies 1 Overview of Graduate Studies Initiated in 1993 Modified in 2000

More information

Computer Science & Engineering Department. Robert McCartney Director of Undergraduate Computing Education ITE 239 860-486-5232 robert@engr.uconn.

Computer Science & Engineering Department. Robert McCartney Director of Undergraduate Computing Education ITE 239 860-486-5232 robert@engr.uconn. Computer Science & Engineering Department Robert McCartney Director of Undergraduate Computing Education ITE 239 860-486-5232 robert@engr.uconn.edu The Tower and the Glass Balls Given a tower of N floors,

More information

How To Get A Computer Science Degree At Coastal Carolina University

How To Get A Computer Science Degree At Coastal Carolina University New Degree Program in Information Technology Mike Murphy, Ph.D., Assistant Professor, Department of Computing Sciences Will Jones, Ph.D., Associate Professor and Chair, Department of Computing Sciences

More information

Student Handbook 2015-2016. Master of Information Systems Management (MISM)

Student Handbook 2015-2016. Master of Information Systems Management (MISM) Student Handbook 2015-2016 Master of Information Systems Management (MISM) Table of Contents Contents 1 Masters of information systems Management (MISM) Curriculum... 3 1.1 Required Courses... 3 1.2 Specialization

More information

Guidelines for Establishment of Contract Areas Computer Science Department

Guidelines for Establishment of Contract Areas Computer Science Department Guidelines for Establishment of Contract Areas Computer Science Department Current 07/01/07 Statement: The Contract Area is designed to allow a student, in cooperation with a member of the Computer Science

More information

CSE543 - Introduction to Computer and Network Security. Module: Final review

CSE543 - Introduction to Computer and Network Security. Module: Final review CSE543 - Introduction to Computer and Network Security Module: Final review Professor Trent Jaeger Fall 2012 1 Since Midterm Firewalls Intrusion Detection Malware Botnets Web Security Virtualization Cloud

More information

Master of Science in Art Education

Master of Science in Art Education Graduate Faculty Committee Document 1270 Approved May, 13, 2013 RECOMMENDATION OF THE SUBCOMMITTEE ON GRADUATE COURSE AND CURRICULUM, THE PECK SCHOOL OF THE ARTS COURSE AND CURRICULUM COMMITTEE, AND THE

More information

Meeting Cyber Security Challenges

Meeting Cyber Security Challenges Meeting Cyber Security Challenges Presented to Naval Postgraduate School Cyber Summit 29 October 2009 Cynthia Irvine, PhD, Professor Naval Postgraduate School UNCLASSIFIED Overview Challenges in Cyber

More information

Goals. Understanding security testing

Goals. Understanding security testing Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3

More information

Discover Viterbi: New Programs in Computer Science

Discover Viterbi: New Programs in Computer Science Discover Viterbi: New Programs in Computer Science Gaurav S. Sukhatme Professor and Chairman USC Computer Science Department Meghan McKenna Balding Graduate & Professional Programs April 23, 2013 WebEx

More information

NSF Activities in Cyber Trust

NSF Activities in Cyber Trust NSF Activities in Cyber Trust For ACM CCS Industry/Govt Track Oct. 26, 2004 Carl Landwehr (clandweh@nsf.gov) Cyber Trust Coordinator National Science Foundation What s s the Problem? Today s s software-based

More information

Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro

Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro Interdisciplinary Program in Information Security and Assurance By Kossi Edoh NC A&T State University Greensboro Information Assurance The protection of electronic information and infrastructures that

More information

CSci 530 Midterm Exam. Fall 2012

CSci 530 Midterm Exam. Fall 2012 CSci 530 Midterm Exam Fall 2012 Instructions: Show all work. No electronic devices are allowed. This exam is open book, open notes. You have 100 minutes to complete the exam. Please prepare your answers

More information

OUTLINE FOR AN INTERDISCPLINARY CERTIFICATE PROGRAM

OUTLINE FOR AN INTERDISCPLINARY CERTIFICATE PROGRAM OUTLINE FOR AN INTERDISCPLINARY CERTIFICATE PROGRAM I. Basic Information 1. Institution: University of Georgia Date: September 28, 2015 2. School/College: Franklin College of Arts and Sciences 3. Department/Division:

More information

The Masters of Science in Information Systems & Technology

The Masters of Science in Information Systems & Technology The Masters of Science in Information Systems & Technology College of Engineering and Computer Science University of Michigan-Dearborn A Rackham School of Graduate Studies Program PH: 313-593-5361; FAX:

More information

Building an Undergraduate Security Curriculum

Building an Undergraduate Security Curriculum Session Number: 2558 Building an Undergraduate Security Curriculum Anne Marchant, Edgar H Sibley, Hugh Tazewell (Taz) Daughtrey Jr. George Mason University/ James Madison University Abstract Faculty at

More information

Electrical and Computer Engineering

Electrical and Computer Engineering Electrical and Computer Engineering Roobik Gharabagi, Ph.D., Chair (gharabr@slu.edu) Faculty: Will Ebel, Ph.D. (ebelwj@slu.edu) Armineh Khalili, M.S.E.E. (khalilia@slu.edu) Huliyar S. Mallikarjuna, Ph.D.

More information

ASSESSMENT PLAN: M.S. in Computer Science

ASSESSMENT PLAN: M.S. in Computer Science Department of Mathematics, CSCI ASSESSMENT PLAN: M.S. in Computer Science Updated Date: Winter 2015 by Matt Johnson PROGRAM MISSION CSUEB Missions, Commitments, and ILOs, 2012 CSUEB Computer Science Program

More information

Computer and Information Science

Computer and Information Science Computer and Information Science www.odessa.edu/dept/computer Faculty: Katrieva Jones- Munroe, chair The computer information systems curriculum provides students with practical, job- related computer

More information

Master of Science (MS) in Computer Science

Master of Science (MS) in Computer Science Master of Science (MS) in Computer Science Overview of Degree The Master of Science degree in Computer Science at The University of Georgia is a comprehensive program of study intended to give qualified

More information

CSE 5392 Sensor Network Security

CSE 5392 Sensor Network Security About Instructor CSE 5392 Sensor Network Security Course Introduction Dr. Donggang Liu, assistant professor, CSE department http://ranger.uta.edu/~dliu dliu@cse.uta.edu Tel: (817) 272-0741 Office: 330NH

More information

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶 Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course

More information

Advice for Students completing the B.S. degree in Computer Science based on Quarters How to Satisfy Computer Science Related Electives

Advice for Students completing the B.S. degree in Computer Science based on Quarters How to Satisfy Computer Science Related Electives Advice for Students completing the B.S. degree in Computer Science based on Quarters How to Satisfy Computer Science Related Electives Students completing their B.S. degree under quarters had a requirement

More information

Crafting an Undergraduate Information Security Emphasis Within Information Technology

Crafting an Undergraduate Information Security Emphasis Within Information Technology Crafting an Undergraduate Information Security Emphasis Within Information Technology Patricia Y. Logan, Ph.D. Information Systems and Technologies, Weber State University Ogden, Utah, 84408-3804 plogan@weber.edu

More information

College of Science Department of Mathematics and Computer Science. Assessment Plan Computer Science and Computer Networks

College of Science Department of Mathematics and Computer Science. Assessment Plan Computer Science and Computer Networks College of Science Department of Mathematics and Computer Science Programs: Assessment Plan Computer Science and Computer Networks Computer Science offers the following instructional programs: 1. Bachelor

More information

CIS 253. Network Security

CIS 253. Network Security CIS 253 Network Security Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to Curriculum

More information

Security Software Engineering: Do it the right way

Security Software Engineering: Do it the right way Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, 2007 19 Security Software Engineering: Do it the right way Ahmad

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

Department of Urban Affairs, Social Science, and Social Work

Department of Urban Affairs, Social Science, and Social Work BA in Security Studies Curriculum Proposal Submitted by: Administration of Justice Program Department of Urban Affairs, Social Science, and Social Work A. The type of review requested 1. New program B.

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

2006 07 PETITION/PROGRAM SHEET Degree: Bachelor of Science Major: Computer Science www.mesastate.edu/schools/snsm/csms

2006 07 PETITION/PROGRAM SHEET Degree: Bachelor of Science Major: Computer Science www.mesastate.edu/schools/snsm/csms 06 07 PETITION/PROGRAM SHEET Degree: Bachelor of Science Major: Computer Science www.mesastate.edu/schools/snsm/csms About This Major... Computer science is the study of algorithms and the issues involved

More information

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST

More information

MASTER OF SCIENCE PROGRAMS ADMISSION REQUIREMENTS

MASTER OF SCIENCE PROGRAMS ADMISSION REQUIREMENTS MASTER OF SCIENCE IN COMPUTER SCIENCE MASTER OF SCIENCE PROGRAMS ADMISSION REQUIREMENTS PROGRAM REQUIREMENTS MASTER OF SCIENCE MASTER OF SCIENCE WITH SPECIALIZATION IN SOFTWARE ENGINEERING MASTER OF SCIENCE

More information

Erik Jonsson School of Engineering and Computer Science Interdisciplinary Programs

Erik Jonsson School of Engineering and Computer Science Interdisciplinary Programs Erik Jonsson School of Engineering and Computer Science Interdisciplinary Programs Software Engineering (B.S.S.E.) Goals of the Software Engineering Program The focus of the Software Engineering degree

More information

Master of Science in Information Security and Assurance

Master of Science in Information Security and Assurance Master of Science in Information Security and Assurance The Master of Science in Information Security and Assurance is a competency-based degree program that encompasses the 10 security domains that are

More information

How To Get A Computer Science Degree

How To Get A Computer Science Degree 1 M.S. in Computer Science Degree Requirements Students will meet with the graduate advisor to assist them in formulating a program of study and selecting a possible specialization. The 30 credit requirement

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Computer Engineering Graduate Handbook. Administered by the Computer Science and the Charles L. Brown Department of Electrical & Computer Engineering

Computer Engineering Graduate Handbook. Administered by the Computer Science and the Charles L. Brown Department of Electrical & Computer Engineering Computer Engineering Graduate Handbook Administered by the Computer Science and the Charles L. Brown Department of Electrical & Computer Engineering This document details the degree requirement and procedures

More information

F:\COMP\SCIENCE\CYBER SECURITY RESEARCH AND DEVELOPMENT ACT.XML

F:\COMP\SCIENCE\CYBER SECURITY RESEARCH AND DEVELOPMENT ACT.XML [ UPDATE COMP VERSION: This file reflects the execution of the amendments made by PL 113-283. Note that this version has been designed for review purposes just prior to publishing and replacing the source

More information

Research Imperatives

Research Imperatives Research Imperatives Areas of Research Needed in Information Security Julie J.C.H. Ryan, D.Sc. Assistant Professor The George Washington University What We Know Technology Fabulous research going on in

More information

Computer Science. B.S. in Computer & Information Science. B.S. in Computer Information Systems

Computer Science. B.S. in Computer & Information Science. B.S. in Computer Information Systems The field of computing enables much of the on-going revolution in information technology and communications. Its techniques, tools and problem-solving approaches have proven most powerful and effective.

More information

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Information Science & Systems Courses INFO 101 - Introduction to Information Technology Introduces

More information

Information, Network & Cyber Security

Information, Network & Cyber Security School COMSC Information, Network & Cyber Security Information security officers are faced with strategic decisions on a daily basis, and are required to make informed decisions on the security options

More information

1851 (d) RULE OF CONSTRUCTION. Nothing in this section shall be construed to (1) require a State to report data under subsection

1851 (d) RULE OF CONSTRUCTION. Nothing in this section shall be construed to (1) require a State to report data under subsection U:\REPT\OMNI\FinalOmni\CPRT--HPRT-RU00-SAHR-AMNT.xml 0 (d) RULE OF CONSTRUCTION. Nothing in this section shall be construed to () require a State to report data under subsection (a); or () require a non-federal

More information

Public Law 107 305 107th Congress An Act

Public Law 107 305 107th Congress An Act PUBLIC LAW 107 305 NOV. 27, 2002 116 STAT. 2367 Public Law 107 305 107th Congress An Act To authorize funding for computer and network security research and development and research fellowship programs,

More information

Basheer Al-Duwairi Jordan University of Science & Technology

Basheer Al-Duwairi Jordan University of Science & Technology Basheer Al-Duwairi Jordan University of Science & Technology Assistant Professor Department of Network Engineering & Security @ JUST Education: PhD, Iowa State University, 2005 Ms, Iowa State University,

More information

Graduate Student Orientation. Meeting Agenda

Graduate Student Orientation. Meeting Agenda Graduate Student Orientation Prof. Hassan Gomaa Chair, Department of Computer Science The Volgenau School of IT & Engineering Fall 2009 http://cs.gmu.edu Meeting Agenda Rules pertaining to all programs

More information

CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

CRITERIA FOR ACCREDITING COMPUTING PROGRAMS CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Effective for Evaluations During the 2009-2010 Accreditation Cycle Incorporates all changes approved by the ABET Board of Directors as of November 1, 2008 Computing

More information

B.Sc. in Computer Information Systems Study Plan

B.Sc. in Computer Information Systems Study Plan 195 Study Plan University Compulsory Courses Page ( 64 ) University Elective Courses Pages ( 64 & 65 ) Faculty Compulsory Courses 16 C.H 27 C.H 901010 MATH101 CALCULUS( I) 901020 MATH102 CALCULUS (2) 171210

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office

More information

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois

More information

Li Xiong, Emory University

Li Xiong, Emory University Healthcare Industry Skills Innovation Award Proposal Hippocratic Database Technology Li Xiong, Emory University I propose to design and develop a course focused on the values and principles of the Hippocratic

More information