New England Cyber Security

Size: px
Start display at page:

Download "New England Cyber Security"

Transcription

1 New England Cyber Security Academic Resource Guide * Boston University Brandeis University Brown University Dartmouth College Harvard and MIT: Project Minerva Northeastern University University of Massachusetts, Amherst University of Massachusetts, Boston University of Massachusetts, Lowell Worcester Polytechnic Institute *Listings in development as of September 14, 2011

2 About the Advanced Cyber Security Center The ACSC is a collaborative, cross-sector research facility working to address the most critical and sophisticated cyber security challenges. Based at the MITRE Corporation campus in Bedford, MA, the Center takes advantage of the region's unparalleled university, industrial and research resources to develop next-generation solutions and strategies for protecting the nation's public and private IT infrastructure. By drawing on expertise from across health care, energy, defense, financial services and technology, the Center brings together expert practitioners to share best practices, conduct real-time threat analysis and develop next-generation secure computing architecture, among other functions. About Mass Insight Global Partnerships Mass Insight Global Partnerships, founded in 1989, is a Boston-based consulting and research firm that builds strategic pre-competitive alliances between higher education, industry and government, both regionally and globally. We focus on market-driven solutions that are supported by the appropriate role of government. Mass Insight organizes collaborative, performance-based leadership initiatives supported by individual members, and uses communications, publications, policy research and public opinion surveys to shape public-private actions and develop innovative partnerships. Our clients, partners and sponsors represent a range of sectors, including universities, financial institutions, IT/communications, life sciences, defense, utilities, professional firms, nonprofits and foundations, trade organizations, and state agencies Mass Insight Global Partnerships

3 Boston University Accreditations: National Center for Academic Excellence in Information Assurance Education and Research Degree/Certificate Programs: Graduate Certificates in Digital Forensics, Information Security and Medical Information Security and Privacy Metropolitan College, Computer Science Department MS, Security Concentration (Computer Science, Computer Information Systems, Telecommunication) Metropolitan College, Computer Science Department Research Centers, Consortia and Collaborative Initiatives: Center for Reliable Information Systems and Cyber Security (RISCS) o Cryptology Compositional Security Obfuscation Zero-Knowledge Computation Pseudo Randomness Quantum Computation o Networks Wireless Networks Internet Measurements and Modeling Information Theoretic Approaches o Trustworthy Cloud Computing o Compositional Programming and Certification of Internet Flow Networks and Cyber- Physical Systems o Data Mining with emphasis on Social-Network Analysis o Economic Approaches for Reducing Spam and Malware o Major Collaborative Research Initiatives: Towards Trustworthy Interactions in the Cloud (Addressing security and privacy concerns in cloud computing; $3M, 5-year project led by Professor Azer Bestavros in collaboration with Brown University and UC Irvine) Securing the Open Softphone (Addressing new threats harbored by softphones from the user and system standpoints; $3M, 5-year project led by Professor Mark Crovella) 1 New England Cyber Security Academic Resource Guide Advanced Cyber Security Center

4 A recursive InterNet Architecture (RINA) (RINA is a new recursive network architecture through which application processes communicate via a distributed IPC facility; $500,000 5-year project led by Professor Ibrahim Matta) Faculty Experts; Research and Interests: Azer Bestavros, Professor: Networking, Trustworthy Cloud Computing Ran Canetti, Professor: Cryptography, Obfuscation, Compositional Security Lou Chitkushev, Associate Professor, Chair, MET CS: Network Security, BioMedical Informatics, Security and Privacy of BioMedical Data Mark Crovella, Professor: Networking, Security of SoftPhones Steve Homer, RISCS Co-Director; Professor: Quantum Computing, Complexity, Experimental Algorithms Sharon Goldberg, Asst. Professor: Network Security, Applied Cryptography Leonid Levin, Professor: Cryptography; Pseudo Randomness Leo Reyzin, Professor: Cryptography and Zero Knowledge Computation Ari Trachtenberg, Assoc. Professor: Error-Correcting Codes, Security of Wireless and Sensor Networks, David Starobinski, Assoc. Professor: Network Modeling, Performance Evaluation, and Security of High-Speed, Wireless, and Sensor Networks Anatoly Temkin, Assoc. Chair, MET Computer Science Department: Cryptography, Information Security Education Nikos Triandopoulos, BU and EMC: Information Security and Privacy, Cloud Security Marshall Van Alstyne, Professor: Economic Models Spam and Malware Reduction Tanya Zlateva, Director, Center for Reliable Information Systems and Cyber Security (RISCS); infor, MET Assoc. Dean: Information Security Education, Biometrics 2 New England Cyber Security Academic Resource Guide Advanced Cyber Security Center

5 Brandeis University Accreditations: Courses certified by the Information Assurance Courseware Evaluation (IACE) Committee on National Security Systems (CNSS) Degree/Certificate Programs: MS in Information Assurance MS in IT Management with concentration in Security Graduate Certificate in Information Assurance Faculty Experts; Research and Interests: Charles Brooks, Instructor in the Rabb School of Continuing Studies, Division of Graduate Professional Studies. Mr. Brooks holds multiple industry certifications including the CISSP and the C EH. He also holds the EMC Technology Architect specialist certification in Information Storage Security Design o Expertise: network security, security testing and code auditing, storage area network security o Research interests: changes required for network security to support virtualization and cloud implementations Derek Brink, Instructor in the Rabb School of Continuing Studies, Division of Graduate Professional Studies. Derek is vice president and research fellow for IT Security and IT GRC at Aberdeen Group o Expertise: Principles of Incident Response and Disaster Recovery. o Research interests: Identities and Access Data Protection IT Infrastructure IT Governance, Risk Management, and Compliance o Current research: Security and Cloud Computing Best Practices correlating the recommendations of the Cloud Security Alliance with enterprise performance in terms of security, compliance, application uptime, flexibility and responsiveness, and total annual cost 3 New England Cyber Security Academic Resource Guide Advanced Cyber Security Center

6 Security and Cloud Computing Deployment Options market trends and intentions regarding adoption of on-premise versus as-a-service deployment models, and capabilities of leading vendors in these areas Ramesh Nagappan, Instructor in the Rabb School of Continuing Studies, Division of Graduate Professional Studies o Expertise: Applied Cryptography, Information Security and Identity Assurance including PKI, Smartcards and Biometrics. o Research interests and current research: Cryptography hardware/software Cloud infrastructure security Identity Management Biometric Identity Assurance Network and Applications Security Roy Wattanasin, Instructor in the Rabb School of Continuing Studies, Division of Graduate Professional Studies o Expertise: Computer security incident handling, Forensic and malware analysis, Security Awareness, Policies, Standards and Procedures, Web application security, Security infrastructure and open source security software o Research interests: Penetration testing Reverse engineering medical devices 4 New England Cyber Security Academic Resource Guide Advanced Cyber Security Center

7 Brown University Faculty Experts; Research and Interests: Tom Doeppner, Associate Professor (Research) of Computer Science and Vice Chair o Expertise: OS support for security o Research interests/current research: OS and distributed systems Rodrigo Fonseca, Assistant Professor of Computer Science. o Expertise: Distributed systems, networking, operating systems o Research interests/current research: Understanding execution of distributed systems, software-defined networking, power modeling. Shriram Krishnamurthi, Associate Professor of Computer Science. o Expertise: Programming languages, verification, software engineering o Research interests/current research: Secure language design, program analyses for security, access-control policy analysis, human policy authoring interfaces Anna Lysyanskaya, Associate Professor of Computer Science o Expertise: Privacy-enhancing technologies o Research interests/current research: Cryptographic protocols Steve Reiss, Professor of Computer Science o Expertise: Software engineering o Research interests/current research: Understanding the dynamic behavior of software systems; development tools and environments. John Savage, An Wang Professor of Computer Science o Expertise: Theoretical computer science, cybersecurity technology and policy. o Research interests/current research: Secure computation, formulation of international agreements to reduce piracy. Roberto Tamassia, Plastech Professor of Computer Science o Expertise: Applied cryptography, analysis and design of algorithms, data management, distributed systems o Research interests/current research: Security and privacy issues in cloud computing Data integrity and persistence in outsource storage systems Security visualization Mobile data management 5 New England Cyber Security Academic Resource Guide Advanced Cyber Security Center

8 Dartmouth College Research Centers, Consortia and Collaborative Initiatives: Strategic Healthcare Information Technology Advanced Research Projects (SHARP) o Security and risk mitigation Glassmeyer/McNamee Center for Digital Strategies o Healthcare IT and Operations o Information Security o Technology and Trust o Collaborative Knowledge Networks o Electronic Collaboration Study Institute for Information Infrastructure Protection (I3P) o Privacy Policies, Perceptions and Trade-offs o Leveraging Human Behavior to Reduce Security Risk Faculty Experts; Research and Interests: Sean Smith, Professor, Department of Computer Science o Interests: Information security attacks and defenses, for industry and government o Research: I3P David Kotz, Champion International Professor, Department of Computer Science; Associate Dean, Faculty for the Sciences o Interests: Wireless networks, wireless security, sensor-network security, security and privacy issues in pervasive computing o Research: SHARP Stephen Taylor, Professor of Computer Engineering, Thayer School of Engineering o Information Operations; Distributed Computing and Systems; Computer and Network Security; Surveillance Technologies Eugene Santos, Professor of Engineering, Thayer School of Engineering o Research Interests: Intelligent systems; Artificial intelligence; Probabilistic reasoning; Adversarial modeling; Intent inferencing; User modeling; Information retrieval; Evolutionary computation; Socio-cultural modeling o Current Research: Adversary intent inferencing and adversarial modeling; Agent-based systems engineering; Bayesian knowledge bases, enginnering, verification, and validation; Complex network systems; Deception detection; Distributed information retrieval; High performance search and optimization; Influence of culture and society on 6 New England Cyber Security Academic Resource Guide Advanced Cyber Security Center

9 attitudes and behaviors; Information processing and summarization; Insider threat; Process query systems; User modeling and user intent inferencing Denise Anthony, Associate Professor of Sociology; Research Director, Institute for Security, Technology and Society; Faculty Affiliate, The Dartmouth Institute for Health Policy and Clinical Practice Adjunct in Community and Family Medicine o Faculty Research and Teaching Interests: Collective Action Problems; Economic Sociology; Health Care and Health Policy; Organizations and Institutions; Trust and Social Control o Research Projects: SHARP; I3P Eric Johnson, Director of Tuck s Glassmeyer/McNamee Center for Digital Strategies; Benjamin Ames Kimball Professor of the Science of Administration Management, Tuck School of Business o Impact of information technology on supply chain management Hany Farid, Professor, Computer Science; Chief Technology Officer and co-founder, Fourandsix Technologies, Inc. o Digital forensics, image analysis, computer vision, and human perception Sergey Bratus, Research Assistant Professor, Computer Science Department o Research Interests: Unix security, in particular in Linux kernel security, detection and reverse engineering of malware (primarly kernel mode, Linux and Windows); wireless networking; visualizations of computer security-related information; applications of Natural Language Processing for better indexing, search and navigation of natural language documents o Projects: Batteaxe; Baffle; Kerf; LZfuzz; Windsock George Cybenko, Dorothy and Walter Gramm Professor of Engineering, Thayer School of Engineering o Signal Processing; Neural Computing; Parallel Processing; Computational Behavioral Analysis; Machine Learning of Processes; Mission, Network and Computer Security; Insider Threat Analysis; Human Terrain of Computer Networks; Computer Network Operations (CNO) Planning Martin Wybourne, Vice Provost for Research; Francis and Mildred Sears Professor of Physics; Chair of the Institute for Information Infrastructure Protection (I3P) o Electrical, thermal and mechanical properties of nanoscale systems, ranging from semiconductor devices to nanoparticles organized on biological molecules 7 New England Cyber Security Academic Resource Guide Advanced Cyber Security Center

10 Harvard and MIT: Project Minerva Degree/Certificate Program: None, but courses in International Cybersecurity Policy at Harvard Kennedy School, Difficult Problems in Cyberlaw at Harvard Law School, and Cyber International Relations at MIT are offered via funding from the project. Faculty Experts; Research and Interests: Venkatesh Narayanamurti, Principal Investigator and Benjamin Peirce Professor of Technology and Public Policy and a Professor of Physics at Harvard. Venky is also the Director of the Science, Technology and Public Policy Program at the Belfer Center for Science and International Affairs at the Harvard Kennedy School (HKS). o Expertise: solid state, computer, and communication technologies, and on the management of science, technology and public policy Nazli Choucri, Principal Investigator and Professor of Political Science and Associate Director of MIT s Technology and Development Program (TDP) o Current research: CyberPolitics in International Relations, examines ways in which cyberspace influences, even alters, power and capabilities at local, national, international, and global levels of analysis. Joseph Nye, Harvard University Distinguished Service Professor at Harvard Kennedy School o Research interests and current research: State and non-state cyber actors and power Melissa Hathaway, Senior Advisor Jonathan Zittrain, Professor of Harvard Law School, Harvard School of Government, Professor of Computer Science, Harvard School of Engineering and Applied Sciences; Co-founder and Faculty Co-Director, Berkman Center for Internet & Society o Research interests: Control of Digital Property & Content Cryptography Electronic Privacy Internet Governance Technology in Education Roger Hurwitz, Research Scientist, Computer Science and Artificial Intelligence Laboratory, MIT John Mallery, Research Scientist, Computer Science and Artificial Intelligence Laboratory, MIT 8 New England Cyber Security Academic Resource Guide Advanced Cyber Security Center

11 David Clark, Senior Research Scientist, Computer Science and Artificial Intelligence Laboratory, MIT o Recent activities: Architecture of the Internet in post-pc era, extensions to support realtime traffic, explicit allocation of service, pricing and related economic issues and policy issues surrounding local loop employment Stuart Madnick, John Norris Maguire Professor of Information Technology, MIT Sloan School of Management & Professor of Engineering Systems, MIT School of Engineering o Expertise: Database and information integration technologies, impact of information technologies, Internet applications Silvio Micali, Ford Professor of Engineering, Computer Science and Artificial Intelligence Laboratory, MIT o Expertise: cryptography, zero knowledge, pseudo-random generation, and secure protocols o Research interest: Mechanism design Cindy Williams, Principal Research Scientist, Security Studies Program, MIT Patrick Winston, Ford Professor of Artificial Intelligence and Computer Science at the Massachusetts Institute of Technology o Expertise: artificial intelligence Daniel Goldsmith, Research Associate, MIT Sloan School o Expertise: system dynamics modeling o Research interest: management science, political dissidents in cyberspace Michael Sechrist, Minerva Project Manager, Harvard Kennedy School o Expertise: undersea communication cable security and policy, physical infrastructure risk management o Research interest: cybersecurity (with focus: cyber crime and cyber espionage), information security, particularly within private spheres Michael Siegel, Principal Research Scientist for Management Science, MIT Sloan School o Expertise: integration of heterogeneous information systems, information technology, and financial services o Research interests: Strategy, application, and implementation for financial services and electronic commerce 9 New England Cyber Security Academic Resource Guide Advanced Cyber Security Center

12 Northeastern University Accreditations: National Center for Academic Excellence in Information Assurance Education and Research Degree/Certificate Programs: M.S., Information Assurance, College of Computer and Information Science Ph.D., Information Assurance, College of Computer and Information Science Research Centers, Consortia and Collaborative Initiatives: Institute for Information Assurance o Communications/Networks Jamming/anti-jam Networking and Algorithms Communications, Encryption, and Watermarking Trust in social networks o Database and Information Retrieval Kerf Tool Kit Machine Learning of Vulnerabilities Reasoning and forecasting under uncertainty o Software and Architecture Aspectual Security Computer Architecture Language and Ontology-based Security Virtual Machines Software Vulnerability Faculty Experts; Research and Interests: Agnes Chan, Professor and Associate Dean, College of Computer and Information Science; Co- Director, Institute for Information Assurance o Wireless Security, Reconfigurable Shift Register Sequences, Nonlinear Feedback Shift Register Sequences, Electronic Cash, Secret Sharing Schemes, Cryptography David Kaeli, Professor and Associate Dean, College of Engineering; Co-Director, Institute for Information Assurance 10 New England Cyber Security Academic Resource Guide Advanced Cyber Security Center

13 o Performance and design of high-performance computer systems and software, architectural features for security, virtualization, power modeling, database systems Engin Kirda, Associate Professor, College of Computer and Information Science and College of Engineering o Web security, malware and vulnerability analysis, intrusion detection, other computer security issues William Robertson, Assistant Professor, Department of Computer Science o Web security, anomaly detection, malware analysis, trusted computing architectures Amy Sliva, Assistant Professor, College of Computer and Information Science and College of Social Sciences and Humanities o Applying behavioral model to address public policy and international security Guevara Noubir, Associate Professor, College of Computer and Information Science o Network and wireless security 11 New England Cyber Security Academic Resource Guide Advanced Cyber Security Center

14 University of Massachusetts, Amherst Accreditations: National Center for Academic Excellence in Information Assurance Education & Research Degree/Certificate Programs: BS in Computer Science, Concentration in Security and Privacy, Department of Computer Science Research Centers, Consortia and Collaborative Initiatives: The Center for Forensics & Society o Mobile phone triage and forensic investigation o Criminal investigation of child exploitation on p2p networks o Anonymous communication systems o Forensics of wireless and mobile systems SPQR (Security and Privacy Research at UMass Amherst) o Pay-as-you-Go security and privacy in ITPS (Integrated Transportation Payment Systems) UMass Database and Information Management Lab o Private Dissemination of Social Network Data o Private Dissemination of Communication Traces o Security History privacy and accountability in database systems MobilityFirst: Future Internet Architecture o Accountability, security, robustness in mobile internetworks. Faculty Experts; Research and Interests: Wayne Burleson, Professor of Electrical and Computing Engineering o VLSI Circuit Design, VLSI Architectures for DSP, Cryptography, Graphics, Embedded Security (RFID, PUF, TRNG, Side-channels, Payment Systems, Transportation, Medical Devices) Jane E. Fountain, Professor of Political Science and Public Policy o Information technology policy and governance Kevin Fu, Associate Professor of Computer Science o Security and privacy of medical devices 12 New England Cyber Security Academic Resource Guide Advanced Cyber Security Center

15 Aura Ganz, Professor of Electrical and Computer Engineering o Network security, Trustworthy computing Dennis Goeckel, Professor of Electrical Engineering o RF fingerprinting, Network security theory C.V. Hollot, Professor and Department Head, Electrical and Computer Engineering o Theory and application of feedback control David Jensen, Associate Professor of Computer Science o Data mining, Statistical aspects and architecture of systems for knowledge discovery in databases Jim Kurose, Distinguished University Professor of Computer Science, and Executive Associate Dean, College of Natural Sciences o Network protocols and architecture, Network measurement, Sensor networks, Smart grid Brian Levine, Professor of Computer Science o Center for Forensics, Wireless and mobile networking, Peer-to-peer networking Gerome Miklau, Associate Professor of Computer Science o Secure management of large-scale data, Privacy, Anonymization Christof Paar, Adjunct Professor of Electrical and Computer Engineering o Applied cryptography, Security of embedded systems Don Towsley, Distinguished Professor of Computer Science o Wireless network security, Keying, Anonymization Arun Venkataramani, Associate Professor of Computer Science o Network security and robustness 13 New England Cyber Security Academic Resource Guide Advanced Cyber Security Center

16 University of Massachusetts, Boston Degree/Certificate Programs: BS in Computer Science Graduate Certificate in Database Management BS in Information Technology (The College of Science and Mathematics and the College of Management) MS in Information Technology (College of Management) Faculty Experts; Research and Interests: Bo Sheng, Assistant Professor of Computer Science o Sensor networks, RFID management and optimization Gabriel Ghinita, Assistant Professor of Computer Science o Secure Data Provenance and Trustworthiness Assessment, Privacy-Preserving Sharing of Location Data, Secure Data Outsourcing in Cloud Computing, P2P and Grid Data Management Ramakhrisna Ayyagari, Assistant Professor of Management Science and Information Systems, College of Management o Information Security Jonathan W. Kim, Assistant Professor of Management Science and Information Systems, College of Management o Information Security and Digital Forensics Jean-Pierre Kuilboer, Chairman & Associate Professor of Management Information Systems, College of Management o Information Security, Privacy, Digital Forensics and Data Mining 14 New England Cyber Security Academic Resource Guide Advanced Cyber Security Center

17 University of Massachusetts, Lowell Degree/Certificate Programs: Graduate Certificate in Network Security, Computer Science Department Research Centers, Consortia and Collaborative Initiatives: Center for Network and Information Security o Security of cloud storage, wireless security, intrusion detection Center for Cyber Forensics o Cyber forensics theory applications for public safety and national security responses Faculty Experts; Research and Interests: Guanling Chen, Associate Professor, Department of Computer Science; Associate Director, Center for Network and Information Security o Wireless Network Security, Intrusion Detection System, Location Privacy James Forest, Associate Professor, Department of Criminal Justice o Studies on terrorism, weapons of mass destruction, and security Xinwen Fu, Assistant Professor, Department of Computer Science; Director, Center for Cyber Forensics o Network Security and Privacy, Network Forensics, Computer Forensics Benyuan Liu, Associate Professor, Department of Computer Science o Mobile wireless networks, sensor networks, social computing Yan Luo, Associate Professor of Electrical and Computer Engineering o Multicore Processor Architecture, Heterogeneous Computing, Network Virtualization, Cloud Computing, Embedded Systems Jie Wang, Professor and Chair, Department of Computer Science; Director, Center for Network and Information Security; Co-Director, Center for Cyber Forensics o Network security, security protocols, complex networks, wireless networks, optimization algorithms, mathematical modeling, complexity theory 15 New England Cyber Security Academic Resource Guide Advanced Cyber Security Center

18 Worcester Polytechnic Institute Degree/Certificate Programs: Graduate Certificates in Information Security and Information Security Management, Computer Science and Electrical and Computer Engineering Research Centers, Consortia and Collaborative Initiatives: Cryptography and Information Security (CRIS) Laboratory o Crypto for ultra-low power devices o Hardware security o Efficient arithmetic algorithms o Fault tolerant cryptography o Cryptography for network processors o Trust in IC design Wireless Networking and Cyber Security Laboratory o Data security and privacy in cloud computing o Wireless network security o Network protocols: routing, network coding based protocols Applied Logic and Security Group (ALAS) o Web privacy and privacy leakage o Policy engineering o Authentication protocols Faculty Experts; Research and Interests: Wenjing Lou, Associate Professor, Department of Electrical and Computer Engineering o Security and routing issues in wireless networks, security and privacy issues in cloud computing, security and privacy issues in cyber physical systems (including E-Healthcare systems) Berk Sunar, Assistant Professor, Department of Computer and Electrical Engineering; Director, Cryptography and Information Security Laboratory o Finite fields, elliptic curve cryptography, hardware design, computer arithmetic Richard Stanley, Adjunct Assistant Professor, Electrical Engineering; Founder and Coordinator, WPI graduate certificate program in Information Security o Information systems security, telecommunications 16 New England Cyber Security Academic Resource Guide Advanced Cyber Security Center

19 Christof Paar, Affiliated Professor and Founder, CRIS Laboratory; Co-Founder, CHES (Cryptographic Hardware and Embedded Systems) Workshop series o Efficient software and hardware algorithms for cryptographic schemes, side channel attacks, security in pervasive applications, other aspects of embedded security Craig Wills, Professor and Department Head, Department of Computer Science; Applied Logic and Security Lab o Web privacy awareness, attitudes and actions, privacy leakages on the web and preventative techniques, systems and networking, service-oriented computing, deterministic management of distributed objects Kathi Fisler, Associate Professor, Department of Computer Science; Applied Logic and Security Lab o Policy authoring and policy engineering, interaction between software and human reasoning styles Joshua Guttman, Professor, Department of Computer Science; Applied Logic and Security Lab o Information security, remote attestation and authentication protocols, logic, programming languages Daniel Dougherty, Professor, Department of Computer Science; Applied Logic and Security Lab o Firewall analysis and policy engineering, programming languages, automated deduction 17 New England Cyber Security Academic Resource Guide Advanced Cyber Security Center

20 Mass Insight Global Partnerships 18 Tremont Street, Suite 930 Boston, MA Tel:

New England Cybersecurity Academic Resource Guide

New England Cybersecurity Academic Resource Guide Advanced Cyber Security Center New England Cybersecurity Academic Resource Guide Boston University Brandeis University Brown University Dartmouth College Harvard Kennedy School Massachusetts Institute

More information

New England Cyber Security

New England Cyber Security New England Cyber Security Academic Resource Guide * Boston University Brandeis University Brown University Dartmouth College Harvard Kennedy School Massachusetts Institute of Technology Northeastern University

More information

University-Industry Work Group: Education

University-Industry Work Group: Education University-Industry Work Group: Education Tanya Zlateva Director, Center for Reliable Information Systems and Cyber Security (RISCS) Associate Dean for Academic Programs, Metropolitan College (MET) Boston

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

Cybersecurity at the Nexus of a Hyper- Connected World

Cybersecurity at the Nexus of a Hyper- Connected World Cybersecurity at the Nexus of a Hyper- Connected World Azer Bestavros, Wayne Burleson, Frans Kaashoek, Greg Morrisett, and Engin Kirda Draft of April 4, 2012 This document identifies a number of major

More information

Master of Science in Computer Science

Master of Science in Computer Science Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus Graduate Council Document 03-24a Approved by the Graduate Council 11/20/03 Proposal for a Graduate Certificate in Information Assurance Education Track 2 Submitted by the School of Technology West Lafayette

More information

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

Xianrui Meng. MCS 138, 111 Cummington Mall Department of Computer Science Boston, MA 02215 +1 (857) 540 0460 xmeng@cs.bu.edu www.xianruimeng.

Xianrui Meng. MCS 138, 111 Cummington Mall Department of Computer Science Boston, MA 02215 +1 (857) 540 0460 xmeng@cs.bu.edu www.xianruimeng. Xianrui Meng MCS 138, 111 Cummington Mall Boston, MA 02215 +1 (857) 540 0460 xmeng@cs.bu.edu www.xianruimeng.org RESEARCH INTERESTS In my research, I investigate practical privacy-preserving solutions

More information

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and

More information

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions Computer Scientist Conduct research in latest computer and network security technologies for high assurance system security solutions Develop algorithms, tools and techniques to enhance information assurance

More information

CHASE Survey on 6 Most Important Topics in Hardware Security

CHASE Survey on 6 Most Important Topics in Hardware Security University of Connecticut CHASE Survey on 6 Most Important Topics in Hardware Security Prepared By Prof. M. Tehranipoor Charles H. Knapp Associate Professor in Engineering Innovation Topics! Counterfeit

More information

The Advanced Cyber Security Center (ACSC): A Cyber Threat Information Sharing Consortium. Bruce J. Bakis, The MITRE Corporation

The Advanced Cyber Security Center (ACSC): A Cyber Threat Information Sharing Consortium. Bruce J. Bakis, The MITRE Corporation The Advanced Cyber Security Center (ACSC): A Cyber Threat Information Sharing Consortium Bruce J. Bakis, The MITRE Corporation Outline Essence Goals Member value proposition Organization Milestones Sharing

More information

Academic Planning Self-Study 2014

Academic Planning Self-Study 2014 Academic Planning Self-Study 2014 Department of Computer Science College and Graduate School of Arts and Sciences Boston University Submitted: October 10, 2014 1 I. THE CURRICULAR CONTEXT A. Degrees and

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

TITLE HERE Subtitle here. Cloud Standards Customer Council Cloud Industry Symposium June 18, 2014 Boston, MA

TITLE HERE Subtitle here. Cloud Standards Customer Council Cloud Industry Symposium June 18, 2014 Boston, MA TITLE HERE Subtitle here Cloud Standards Customer Council Cloud Industry Symposium June 18, 2014 Boston, MA The New England goal and opportunity The Goal: The New England region is committed to be a global

More information

Applied and Integrated Security. C. Eckert

Applied and Integrated Security. C. Eckert Applied and Integrated Security 1 Joseph von Fraunhofer (1787-1826) Researcher discovery of Fraunhofer Lines in the sun spectrum Inventor new methods of lens processing Entrepreneur head of royal glass

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey

More information

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute

More information

James B. Fenwick, Jr., Program Director and Associate Professor Ph.D., The University of Delaware FenwickJB@appstate.edu

James B. Fenwick, Jr., Program Director and Associate Professor Ph.D., The University of Delaware FenwickJB@appstate.edu 118 Master of Science in Computer Science Department of Computer Science College of Arts and Sciences James T. Wilkes, Chair and Professor Ph.D., Duke University WilkesJT@appstate.edu http://www.cs.appstate.edu/

More information

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science

More information

Department of Information Systems and Cyber Security

Department of Information Systems and Cyber Security The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association

More information

About Our 2015 WTA Cyber Security Speakers and Sessions

About Our 2015 WTA Cyber Security Speakers and Sessions About Our 2015 WTA Cyber Security Speakers and Sessions The constant threat of cyber security attacks is the number one concern for most businesses today. Weaknesses in networks and data security can expose

More information

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India 1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India Call for Papers Colossal Data Analysis and Networking has emerged as a de facto

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST

More information

ATTPS Publication: Trustworthy ICT Taxonomy

ATTPS Publication: Trustworthy ICT Taxonomy Publication: worthy ICT Taxonomy Roger Berkley worthy ICT Taxonomy Research Cybersecurity technology is a considerably large subdomain of ICT. Technology experts like Gartner have identified at least 94

More information

Strategic Plan On-Demand Services April 2, 2015

Strategic Plan On-Demand Services April 2, 2015 Strategic Plan On-Demand Services April 2, 2015 1 GDCS eliminates the fears and delays that accompany trying to run an organization in an unsecured environment, and ensures that our customers focus on

More information

Center for. Emergency Management and Homeland Security. what keeps you awake at night? mitigate prepare respond recover manage

Center for. Emergency Management and Homeland Security. what keeps you awake at night? mitigate prepare respond recover manage Center for Emergency Management and Homeland Security what keeps you awake at night? mitigate prepare respond recover manage diverse areas of expertise comprehensive, timely and cost-effective solutions

More information

MS Information Security (MSIS)

MS Information Security (MSIS) MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in

More information

Office of the Provost

Office of the Provost Office of the Provost Change to an Existing Degree Program Form Proposed Change to an Existing Degree: Academic Components Please answer all relevant questions below. Consultation with the appropriate

More information

The Department of Electrical and Computer Engineering (ECE) offers the following graduate degree programs:

The Department of Electrical and Computer Engineering (ECE) offers the following graduate degree programs: Note that these pages are extracted from the full Graduate Catalog, please refer to it for complete details. College of 1 ELECTRICAL AND COMPUTER ENGINEERING www.ece.neu.edu SHEILA S. HEMAMI, PHD Professor

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

Guidelines for Establishment of Contract Areas Computer Science Department

Guidelines for Establishment of Contract Areas Computer Science Department Guidelines for Establishment of Contract Areas Computer Science Department Current 07/01/07 Statement: The Contract Area is designed to allow a student, in cooperation with a member of the Computer Science

More information

Cybersecurity and internal audit. August 15, 2014

Cybersecurity and internal audit. August 15, 2014 Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices

More information

Recommended Courses by ECE Topic Area

Recommended Courses by ECE Topic Area Recommended Courses by ECE Topic Area Undergraduate Students: Verify a course is an approved Science/Math/Engineering Elective or Technical Elective for your major. Graduate Students: A maximum of 6 credits

More information

The Masters of Science in Information Systems & Technology

The Masters of Science in Information Systems & Technology The Masters of Science in Information Systems & Technology College of Engineering and Computer Science University of Michigan-Dearborn A Rackham School of Graduate Studies Program PH: 1-59-561; FAX: 1-59-692;

More information

Center for Information. Security and Assurance (CISA) Charter. Mathematical, Computing, and Information Sciences (MCIS) Department

Center for Information. Security and Assurance (CISA) Charter. Mathematical, Computing, and Information Sciences (MCIS) Department Center for Information Security and Assurance (CISA) Charter Mathematical, Computing, and Information Sciences (MCIS) Department This charter establishes the Center for Information Assurance within the

More information

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois

More information

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Information Science & Systems Courses INFO 101 - Introduction to Information Technology Introduces

More information

Obtaining Enterprise Cybersituational

Obtaining Enterprise Cybersituational SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational

More information

The M.S. Degree in Robotics Engineering

The M.S. Degree in Robotics Engineering The M.S. Degree in Robotics Engineering A multidisciplinary degree spanning Computer Science, Electrical and Computer Engineering, and Mechanical Engineering Robotics B.S. in Robotics Engineering Approved

More information

Special Sessions on Cybersecurity Research for Critical Infrastructure Thursday, February 12, 2015 In Oceans 12

Special Sessions on Cybersecurity Research for Critical Infrastructure Thursday, February 12, 2015 In Oceans 12 Special Sessions on Cybersecurity Research for Critical Infrastructure Thursday, February 12, 2015 In Oceans 12 Session 1, 8:30 10:00, Oceans 12 Michael Siegel Principal Research Scientist, and Associate

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

Cyber Security @ DTU. Lars Ramkilde Knudsen

Cyber Security @ DTU. Lars Ramkilde Knudsen Cyber Security @ DTU Lars Ramkilde Knudsen Professor @ Technical University of Denmark (DTU) Member of the Academy of Technical Sciences in Denmark Chief Cryptographer @ Dencrypt Finans IT Dagen About

More information

University of Maryland Cybersecurity Center (MC 2 )

University of Maryland Cybersecurity Center (MC 2 ) University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge

More information

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document

More information

EECS PhD Comprehensive Examination Guidelines

EECS PhD Comprehensive Examination Guidelines EECS PhD Comprehensive Examination Guidelines EECS Graduate and Research Committee Graduate students accepted in the EECS doctoral program may take comprehensive exam as early as the last semester of their

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC

Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC Visualization, Modeling and Predictive Analysis of Internet Attacks Thermopylae Sciences + Technology, LLC Administrative POC: Ms. Jeannine Feasel, jfeasel@t-sciences.com Technical POC: George Romas, gromas@t-sciences.com

More information

NATIONAL SUN YAT-SEN UNIVERSITY

NATIONAL SUN YAT-SEN UNIVERSITY NATIONAL SUN YAT-SEN UNIVERSITY Department of Electrical Engineering (Master s Degree, Doctoral Program Course, International Master's Program in Electric Power Engineering) Course Structure Course Structures

More information

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Please consult the Department of Engineering about the Computer Engineering Emphasis. COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals

More information

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015)

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015) TRUST TRUST: : Team for Research in Ubiquitous Secure Technology A Collaborative Approach to Advancing Cyber Security Research and Development Larry Rohrbough Executive Director, TRUST University of California,

More information

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2. CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and

More information

CYBERSYSTEMS AND INFORMATION SECURITY (CSIS) CURRICULUM

CYBERSYSTEMS AND INFORMATION SECURITY (CSIS) CURRICULUM CYBERSYSTEMS AND INFORMATION SECURITY (CSIS) CURRICULUM The approved (by ACHE in 12/2009) and accredited (by SACS in 12/2010) Master of Science degree program in Cybersystems and Information Security will

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

Cyber Security and Big Data: The Role of CCICADA

Cyber Security and Big Data: The Role of CCICADA CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Meeting Cyber Security and Big Data: The Role of CCICADA CCICADA Center, Rutgers University Fred S. Roberts, Director September 17, 2013 Team Profile

More information

The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research

The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research The University of Alabama Cyber Research Initiatives Cyber Forensics Research Cyber Security Research Cyber Forensics Research Department of Criminal Justice College of Arts and Sciences Cyber Crime Research

More information

Enterprise Capabilities Descriptions

Enterprise Capabilities Descriptions 1 SYSTEMS ENGINEERING & INTEGRATION 6 COMMUNICATIONS SYSTEMS 11 LIFECYCLE SYSTEMS ENGINEERING 12 LIFECYCLE SYSTEMS INTEGRATION 13 MISSION INTEGRATION 14 DISCIPLINES 15 DOMAINS 2 CYBER 21 CYBER STRATEGIC

More information

Cybersecurity at ODU ( www.odu.edu/ccser )

Cybersecurity at ODU ( www.odu.edu/ccser ) Cybersecurity at ODU ( www.odu.edu/ccser ) We offer a variety of options for individuals to learn about cybersecurity. These include: a. Twenty-one separate undergraduate courses related to the topic.

More information

The Massachusetts Open Cloud

The Massachusetts Open Cloud The Rafik B. Hariri Institute for Computing at Boston University The Massachusetts Open Cloud Azer Bestavros Founding Director Hariri @ BU = Incubator for Big R&D Ideas 2 1 Important Driver: Big Data Not

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

I. System Activities that Impact End User Privacy

I. System Activities that Impact End User Privacy I. System Activities that Impact End User Privacy A. The Information Life Cycle a. Manual processes i. Interaction ii. Data entry b. Systems i. Operating and file ii. Database iii. Applications iv. Network

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

Embedded Java & Secure Element for high security in IoT systems

Embedded Java & Secure Element for high security in IoT systems Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product

More information

Data Security Concerns for the Electric Grid

Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical

More information

The Masters of Science in Information Systems & Technology

The Masters of Science in Information Systems & Technology The Masters of Science in Information Systems & Technology College of Engineering and Computer Science University of Michigan-Dearborn A Rackham School of Graduate Studies Program PH: 313-593-5361; FAX:

More information

Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC)

Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Photo courtesy of Justin Reuter Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Photo courtesy of Justin Reuter University Consortium

More information

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the

More information

No Free Lunch in Cyber Security

No Free Lunch in Cyber Security No Free Lunch in Cyber Security George Cybenko gvc@dartmouth.edu Jeff Hughes jeff.hughes@tenet3.com MTD Workshop Scottsdale AZ November 3, 2014 Acknowledgements Kate Farris, Ph.D. Student, Dartmouth Dr.

More information

SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.

SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved. SECURITY MEETS BIG DATA Achieve Effectiveness And Efficiency 1 IN 2010 THE DIGITAL UNIVERSE WAS 1.2 ZETTABYTES 1,000,000,000,000,000,000,000 Zetta Exa Peta Tera Giga Mega Kilo Byte Source: 2010 IDC Digital

More information

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach This material is based upon work supported by the National Science Foundation under Grant No. 1516724 Project Organization University

More information

The Next Generation Security Operations Center

The Next Generation Security Operations Center The Next Generation Security Operations Center Vassil Barsakov Regional Manager, CEE & CIS RSA, the Security Division of EMC 1 Threats are Evolving Rapidly Criminals Petty criminals Unsophisticated Organized

More information

Jack Baskin School of Engineering The University of California, Santa Cruz. Steve Kang, Dean and Prof. of Electrical Engineering October 15, 2003

Jack Baskin School of Engineering The University of California, Santa Cruz. Steve Kang, Dean and Prof. of Electrical Engineering October 15, 2003 Jack Baskin School of Engineering The University of California, Santa Cruz Steve Kang, Dean and Prof. of Electrical Engineering October 15, 2003 1 UC Santa Cruz 1965 Present 2003 2003 0404 enrollment of

More information

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,

More information

http://iew3.technion.ac.il/

http://iew3.technion.ac.il/ Faculty of Industrial Engineering & Management The Technion Israel Institute of Technology http://iew3.technion.ac.il/ Professor Boaz Golany, Dean History Spun out of Mech. Eng. in 1958 Unique combination

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

Update On Smart Grid Cyber Security

Update On Smart Grid Cyber Security Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats

More information

A Biologically Inspired Approach to Network Vulnerability Identification

A Biologically Inspired Approach to Network Vulnerability Identification A Biologically Inspired Approach to Network Vulnerability Identification Evolving CNO Strategies for CND Todd Hughes, Aron Rubin, Andrew Cortese,, Harris Zebrowitz Senior Member, Engineering Staff Advanced

More information

Human Factors in Information Security

Human Factors in Information Security University of Oslo INF3510 Information Security Spring 2014 Workshop Questions Lecture 2: Security Management, Human Factors in Information Security QUESTION 1 Look at the list of standards in the ISO27000

More information

Bill Guenther, Chairman, CEO and Founder Mass Insight Global Partnerships. Robert F. Brammer, Ph.D., President and CEO Brammer Technology, LLC

Bill Guenther, Chairman, CEO and Founder Mass Insight Global Partnerships. Robert F. Brammer, Ph.D., President and CEO Brammer Technology, LLC Bill Guenther, Chairman, CEO and Founder Mass Insight Global Partnerships Robert F. Brammer, Ph.D., President and CEO Brammer Technology, LLC CSF Conference June 25, 2012 An Initiative of 18 Tremont Street,

More information

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their

More information

Information Systems Security Certificate Program

Information Systems Security Certificate Program Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses Outline IT Security: General Trends and Research Directions Sherif El-Kassas Department of Computer Science The American University in Cairo Practical considerations Academic and research perspective National

More information

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information

More information

Cloud security architecture

Cloud security architecture ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software powered by Calibrate www.medallionlearning.com

More information