Security Research at the Center for Advanced Technology in Telecommunications

Size: px
Start display at page:

Download "Security Research at the Center for Advanced Technology in Telecommunications"

Transcription

1 Security Research at the Center for Advanced Technology in Telecommunications

2 Highlights NSA Center of Excellence in IA Education, NSF/NSA Cyber Corps Program (ASPIRE), NY State funded Cybercrime Initiative, NSA Center of Excellence in IA Research, Center for Interdisciplinary Studies in Security and Privacy, Six Departments across NYU and NYU-Poly National Science Foundation, 2010 support for PhD students Vibrant graduate research and education Over a dozen faculty members actively involved More than $16 million in external funding for research, education and outreach over the last 10 years Computer Security Awareness Week, Embedded Systems Challenge, 2008-

3 Network Security Robust DDoS Defense System J. Chao. High Speed IPS J. Chao VoIP security H. Schulzrinne, N. Memon, R. Karri Countering DoS Attacks With Multipath Overlays A. Keromytis Wireless Fingerprinting Sybill attacks and defenses Lakshmi, Courant P2P security Keith Ross Host/Dev Security Disk Forensics - Reassembly of Scattered File Fragments N Memon Secure Device Pairing N. Saxena Visual Passwords Design and Evaluation Cloud security J. Cappos Virtualization security J. Cappos

4 Multimedia Security Hardware Trust Digital Watermarks Audio/Video Authentication Steganography, Steganalysis, E. Wong Image Forensics Digital Rights Management Cyber Security Processor (CYSEP) J. Chao Accelerator to support Secure VoIP R. Karri Security-aware multicore architectures R. Karri, N. Memon, H. Hadimioglu Secure Virtualization R. Karri, N. Memon Fault Attack Resistant High-Speed Crypto Architectures R. Karri Scan Chains In Crypto Hardware R. Karri

5 NSF ASPIRE award prepares its recipients with strong technical training and a security mindset that looks beyond just technology while approaching problems. ASPIRE nurtures leadership, community service and good citizenship in its scholars, producing a cadre of Scholarship for Service graduates ready for some of the most crucial challenges of our time. Graduated about 70 ASPIRE Fellows Core faculty: Memon, Karri, Cappos, Frankl, Zimmernan, Ghose, Nissenbaum, Kapila

6 Center for Interdisciplinary Studies in Security and Privacy (CRISSP) ( MORE SECURE CRITICAL INFRASTRUCTURE STONGER SECURITY THRU USABILITY LAW AND POLICY THAT REFLECT THE CABABILITIES AND LIMITATIONS OF TECHNOLOGY BALANCE OF SECURITY AND PRIVACY PUBLIC POLICY LAW, ETHICS SECURITY TECHNOLOGY HUMAN BEHAVIOR BUSINESS ECONOMICS MORE SECURE VIRTUAL ENTERPRISES STRONGER CYBERLAW ENFOCEMENT MORE COST EFFECTIVE ENTERPRISE SECURITY

7 CRISSP Participating departments Security technology (NYU-Poly, NYU-Courant) Law (NYU-Law) Ethics (NYU-Steinhardt) Public Policy (NYU-Wagner) Business and Economics (NYU-Stern) Human Behavior (NYU-Poly, NYU) Funded by NYU-NYU-Poly seed funds, NSF IGERT, NYU-AD Research Institute Core Faculty: Memon, Nissenbaum, Ghose, Zimmerman, Karri, Cappos.

8 6 th in the series October, 2012 Looking for Sponsors for 2012 $500 $25K!! High school, BS, MS, and PhD >200 unique participants More than 450 total event registrations >100 unique universities AT&T Best Paper award!!

9 EMBEDDED SYSTEMS CYBER SECURITY AWARENESS POLYTECHNIC INSTITUTE OF NYU CHALLENGE 2011 FUNDED BY THE NATIONAL SCIENCE FOUNDATION REGISTER FOR THIS YEAR S COMPETITION ONLINE AT: REGISTRATION OPENS AUGUST 1, 2011 REGISTRATION DEADLINE SEPTEMBER 1, 2011 AWARDS CEREMONY NOVEMBER 11, 2011 TEST YOUR SKILLS AGAINST THE BEST The Embedded Systems Challenge is an annual hardware hacking competition organized by Polytechnic Institute of New York University. Students from all levels from universities across the country/world are invited to compete. The competition focuses on several hardware security challenges. Reference designs will be sent electronically to all participants. An FPGA board and development tools are mailed to all the participants. As a sponsor, Xilinx has provided the FPGA boards for 2008, 2009 and 2010 competitions. Finalists get a free trip to NYC to participate in the awards ceremony. 1 ST PLACE: $500 2 ND PLACE: $250 3 RD PLACE: $100 5 th in the series October 2012 Looking for sponsors for 2012 Objectives Whitehat hardware hacking Open source hardware trust benchmarks Funded by NSF, Army, AFRL, Industry 2 summer interns in Intel SeCoE 2 summer interns in Intel Processor ESC participants joined Intel full time

Center for Advanced Technology in Telecommunications (CATT) Research Overview

Center for Advanced Technology in Telecommunications (CATT) Research Overview Center for Advanced Technology in Telecommunications (CATT) Research Overview Mission The New York State Foundation for Science, Technology, and Innovation (NYSTAR) designated NYU Poly as the New York

More information

Cyber Security at NSU

Cyber Security at NSU Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

EC-Council Ethical Hacking and Countermeasures

EC-Council Ethical Hacking and Countermeasures EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Information Assurance Program at West Point

Information Assurance Program at West Point Information Assurance Program at West Point Daniel-Ragsdale@usma.edu John.Hill@usma usma.edu Scott.Lathrop@usma usma.edu Gregory.Conti@usma usma.edu USMA Information Assurance Program Institutional Support

More information

UNM Information Assurance Scholarship for Service (SFS) Program

UNM Information Assurance Scholarship for Service (SFS) Program UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and

More information

Teaching Information Security to Engineering Managers

Teaching Information Security to Engineering Managers Teaching Information Security to Engineering Managers Julie Ryan Assistant Professor The George Washington University Washington, DC http://www.seas.gwu.edu/~infosec/ 1 Why Bother? Lots of CS and EE programs

More information

University of Maryland Cybersecurity Center (MC 2 )

University of Maryland Cybersecurity Center (MC 2 ) University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge

More information

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015)

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015) TRUST TRUST: : Team for Research in Ubiquitous Secure Technology A Collaborative Approach to Advancing Cyber Security Research and Development Larry Rohrbough Executive Director, TRUST University of California,

More information

How To Become A Cybersecurity Consultant

How To Become A Cybersecurity Consultant Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Welcome to the NSF Webinar on our newest solicitation on hardware security.

Welcome to the NSF Webinar on our newest solicitation on hardware security. Welcome to the NSF Webinar on our newest solicitation on hardware security. I am Keith Marzullo, the division director of the Computer Network Systems division at NSF. And seated next to me is Celia Merzbacher,

More information

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers

More information

Denial of Service Attacks and Resilient Overlay Networks

Denial of Service Attacks and Resilient Overlay Networks Denial of Service Attacks and Resilient Overlay Networks Angelos D. Keromytis Network Security Lab Computer Science Department, Columbia University Motivation: Network Service Availability Motivation:

More information

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of

More information

Cybersecurity Definitions and Academic Landscape

Cybersecurity Definitions and Academic Landscape Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: Balakrishnan.Dasarathy@umuc.edu

More information

Call for Papers for Next-Generation Networking and Internet Symposium

Call for Papers for Next-Generation Networking and Internet Symposium Call for Papers for Next-Generation Networking and Internet Symposium Scope and Motivation: The focus of the Next-Generation Networking Symposium includes emerging topics in the broad area of networking,

More information

The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research

The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research The University of Alabama Cyber Research Initiatives Cyber Forensics Research Cyber Security Research Cyber Forensics Research Department of Criminal Justice College of Arts and Sciences Cyber Crime Research

More information

MARYLAND CYBERSECURITY CENTER

MARYLAND CYBERSECURITY CENTER MARYLAND CYBERSECURITY CENTER cyber.umd.edu INNOVATIVE INTERDISCIPLINARY RESEARCH The Maryland Cybersecurity Center (MC2) brings together experts in computer science and engineering with colleagues in

More information

Computer Concepts And Applications CIS-107-TE. TECEP Test Description

Computer Concepts And Applications CIS-107-TE. TECEP Test Description Computer Concepts And Applications CIS-107-TE This TECEP tests content covered in a one-semester course in computer concepts and applications. It focuses on an overview of computers, including historical

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information

Participants: Introduction:

Participants: Introduction: National Conversation A Trusted Cyber Future Discussion Led by Dan Massey, CSD Program Manager Moderator: Joe Gersch (Secure 64) Department of Homeland Security Science and Technology Directorate (DHS

More information

Crafting an Undergraduate Information Security Emphasis Within Information Technology

Crafting an Undergraduate Information Security Emphasis Within Information Technology Crafting an Undergraduate Information Security Emphasis Within Information Technology Patricia Y. Logan, Ph.D. Information Systems and Technologies, Weber State University Ogden, Utah, 84408-3804 plogan@weber.edu

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

Page: Designed & Executed By: Presents Cyber Security Training

Page: Designed & Executed By: Presents Cyber Security Training Page: 1 Designed & Executed By: TM S I v8 RAINNVESTIGATOR Cyber Security Training Presents T CCE TechBharat Certified Cyber Expert TechBharat Certified Cyber Expert EC-Council Computer Hacking Forensic

More information

Encouraging young people to develop the aptitude and skills to become the core of a strong cybersecurity community.

Encouraging young people to develop the aptitude and skills to become the core of a strong cybersecurity community. US Cyber Challenge To view the complete article, please go to http://csis.org/uscc Part of the: Technology and Public Policy Encouraging young people to develop the aptitude and skills to become the core

More information

Computer Science at James Madison University

Computer Science at James Madison University Computer Science at James Madison University Dr. Sharon Simmons Department Head for Computer Science Dr. Nathan Sprague and Dr. Chris Mayfield Faculty Members and CS Advisors February 14, 2015 1 WHAT IS

More information

Homeland Open Security Technology HOST Program

Homeland Open Security Technology HOST Program Homeland Open Security Technology HOST Program Informational Briefing August 2011 Sponsored by: U.S. Department of Homeland Security Science and Technology Directorate Implemented by: Open Technology Research

More information

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management

More information

Turgut Ozal University. Computer Engineering Department. TR-06010 Ankara, Turkey

Turgut Ozal University. Computer Engineering Department. TR-06010 Ankara, Turkey Dr. YILDIRAY YALMAN Associate Professor CONTACT INFORMATION Turgut Ozal University Computer Engineering Department TR-06010 Ankara, Turkey Phone: +90 (0)312-5515437 E-mail: yyalman@turgutozal.edu.tr RESEARCH

More information

Forensic Cyber Security Research Expert

Forensic Cyber Security Research Expert Forensic Cyber Security Research Expert Package including: Salary of 32,000 to 36,000 (including pension) + 6,000 training budget + 6 months fully funded working in the US + benefits Full time fixed term

More information

W ith an estimated 14 billion devices connected to

W ith an estimated 14 billion devices connected to Renesas Synergy Security Portfolio Delivers Comprehensive Protection from Industrial and IoT Threats Advanced capabilities give developers tools to counter attacks W ith an estimated 14 billion devices

More information

PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA

PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA Panel Chair: Dr. Susan M. Bridges, Mississippi State University Panelists: Dr. Blaine W. Burnham, Georgia Tech Dr. Dipankar Dasgupta,

More information

POLICIES TO MITIGATE CYBER RISK

POLICIES TO MITIGATE CYBER RISK POLICIES TO MITIGATE CYBER RISK http://www.tutorialspoint.com/information_security_cyber_law/policies_to_mitigate_cyber_risk.htm Copyright tutorialspoint.com This chapter takes you through the various

More information

MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1

MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1 MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:

More information

Outline. Who conducts research related to CIIP in the U.S.? Universities. What is Critical Information Infrastructure? Who sponsors this research?

Outline. Who conducts research related to CIIP in the U.S.? Universities. What is Critical Information Infrastructure? Who sponsors this research? Critical Information Infrastructure Research in the U.S. An informal status report The 2nd US-Japan Experts Workshop on Critical Information Infrastructure Protection (CIIP) Tokyo, Japan Outline Definitions,

More information

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus Graduate Council Document 03-24a Approved by the Graduate Council 11/20/03 Proposal for a Graduate Certificate in Information Assurance Education Track 2 Submitted by the School of Technology West Lafayette

More information

ACADEMIC AFFAIRS COUNCIL ******************************************************************************

ACADEMIC AFFAIRS COUNCIL ****************************************************************************** ACADEMIC AFFAIRS COUNCIL AGENDA ITEM: 5.Q DATE: April 1, 2015 ****************************************************************************** SUBJECT: Articulation Agreement DSU & NSA Board of Regents Policy

More information

Meeting Cyber Security Challenges

Meeting Cyber Security Challenges Meeting Cyber Security Challenges Presented to Naval Postgraduate School Cyber Summit 29 October 2009 Cynthia Irvine, PhD, Professor Naval Postgraduate School UNCLASSIFIED Overview Challenges in Cyber

More information

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu MS in Computer Science with specialization in Computer Security Prof. Clifford Neuman bcn@isi.edu Computer Security Specialization Computer Security is a hot area of study with a critical need Needed by

More information

Educational Requirement Analysis for Information Security Professionals in Korea

Educational Requirement Analysis for Information Security Professionals in Korea Educational Requirement Analysis for Information Security Professionals in Korea Sehun Kim Dept. of Industrial Engineering, KAIST, 373-1, Kusong-dong, Yusong-gu, Taejon, 305-701, Korea shkim@kaist.ac.kr

More information

1 Culminating project

1 Culminating project 1 Culminating project The project is meant for you to delve into a specific topic of computer security that interests you. Projects are meant to be instructive and fun. We encourage and expect you to apply

More information

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES SECURITY

More information

e-code Academy Information Security Diploma Training Discerption

e-code Academy Information Security Diploma Training Discerption e-code Academy Information Security Diploma Training 2015 I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. OBJECTIVE... 3 LIST OF POSTGRADUATE COURSES... 3 FIRST SEMESTER

More information

Your customers protected against cybercrime. New commercial opportunities for you

Your customers protected against cybercrime. New commercial opportunities for you Your customers protected against cybercrime New commercial opportunities for you The vulnerability management solution for SMEs Through ThreadScan ThreadStone offers SMEs optimal security control of systems

More information

Microsemi Security Center of Excellence

Microsemi Security Center of Excellence Microsemi Security Center of Excellence Sales and FAE Training August 24, 2015 1 Outline What is the Security Center of Excellence (SCoE)? Overview of Microsemi s Security capabilities and expertise Threat

More information

HOW I BUILT A CYBER SECURITY RESEARCH CENTER FROM GROUND ZERO Dr. Bhavani Thuraisingham

HOW I BUILT A CYBER SECURITY RESEARCH CENTER FROM GROUND ZERO Dr. Bhavani Thuraisingham HOW I BUILT A CYBER SECURITY RESEARCH CENTER FROM GROUND ZERO Dr. Bhavani Thuraisingham Louis A. Beecherl, Jr. I Distinguished Professor of Computer Science Director of the Cyber Security Research Center

More information

PREPARE YOUR INCIDENT RESPONSE TEAM

PREPARE YOUR INCIDENT RESPONSE TEAM PREPARE YOUR INCIDENT RESPONSE TEAM JUNE 2015 Michael Harrington, Fidelis Cybersecurity It s a big problem... The ongoing cyber-thefts from The scale of international theft the In networks 2013, the of

More information

Graduate Information Science and Technology Program

Graduate Information Science and Technology Program Graduate Information Science and Technology Program Why Information Science? The opportunities for information science graduates are seemingly limitless. The amount of available information triples each

More information

Center for Information. Security and Assurance (CISA) Charter. Mathematical, Computing, and Information Sciences (MCIS) Department

Center for Information. Security and Assurance (CISA) Charter. Mathematical, Computing, and Information Sciences (MCIS) Department Center for Information Security and Assurance (CISA) Charter Mathematical, Computing, and Information Sciences (MCIS) Department This charter establishes the Center for Information Assurance within the

More information

This is great news for us and UTC. We are going to start looking for funding and development of programs beneficial to UTC and the community.

This is great news for us and UTC. We are going to start looking for funding and development of programs beneficial to UTC and the community. ----- Original Message ----- From: Joseph Kizza To: Herbert Burhenn Sent: Friday, January 12, 2007 1:31 PM Subject: Re: New center Hello Provost Herbert Burhenn - This is great news for us and UTC. We

More information

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach This material is based upon work supported by the National Science Foundation under Grant No. 1516724 Project Organization University

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

S 2 ERC @ Virginia Tech Program Overview

S 2 ERC @ Virginia Tech Program Overview S 2 ERC @ Virginia Tech Program Overview T. Charles Clancy, PhD Co-Director, NSF Security and Software Engineering Research Center Associate Professor, Electrical and Computer Engineering http://www.cyber.vt.edu/s2erc

More information

A DOCTORAL PROGRAM WITH SPECIALIZATION IN INFORMATION SECURITY A High Assurance Constructive Security Approach

A DOCTORAL PROGRAM WITH SPECIALIZATION IN INFORMATION SECURITY A High Assurance Constructive Security Approach A DOCTORAL PROGRAM WITH SPECIALIZATION IN INFORMATION SECURITY A High Assurance Constructive Security Approach Cynthia E. Irvine and Timothy E. Levin Department of Computer Science, Naval Postgraduate

More information

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT Telecom Testing and Security Certification A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT 1 Need for Security Testing and Certification Telecom is a vital infrastructure

More information

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved Siemens AG - Corporate Technology - IT Security Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved Not a single

More information

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201. PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize

More information

CHAPTER 10: COMPUTER SECURITY AND RISKS

CHAPTER 10: COMPUTER SECURITY AND RISKS CHAPTER 10: COMPUTER SECURITY AND RISKS Multiple Choice: 1. In a survey of more than 500 companies and government agencies, percent detected computer security breaches. A. 20 B. 75 C. 85 D. 99 Answer:

More information

Yier Jin RESEARCH INTERESTS

Yier Jin RESEARCH INTERESTS Yier Jin Department of Electrical Engineering and Computer Science University of Central Florida, Orlando, FL 32816 Phone: (407) 823-5321 (Office), (203) 859-1202 (Mobile) Fax: (407) 823-5483 Email: yier.jin@ucf.edu

More information

A brief on Two-Factor Authentication

A brief on Two-Factor Authentication Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.

More information

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response Incident Response What is the most importance component of an Incident Response Program? Tools? Processes? Governance?

More information

ASK PC Certified Information Systems Security Expert - CISSE

ASK PC Certified Information Systems Security Expert - CISSE Course Description As part of our mission to spread the awareness of IT security in the Middle East, we understand that an Arabic course will be valuable for native speakers. This is a comprehensive course

More information

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information

Voice Over IP: Security & QOS Test Lab

Voice Over IP: Security & QOS Test Lab Submitted to Voice Over IP: Security & QOS Test Lab Proposed by: The Capstone 5 Tom Anderson Craig Schurr Heather Hapes Anthony Lucas Mauro Gonzalez Fort Hays State University February 11, 2005 1 Project

More information

Agenda Item 2. USM Cyber Security Landscape and Contributions to the State

Agenda Item 2. USM Cyber Security Landscape and Contributions to the State Agenda Item 2 USM Cyber Security Landscape and Contributions to the State BOARD OF REGENTS SUMMARY OF ITEM FOR ACTION INFORMATION OR DISCUSSION TOPIC: USM Cyber Security Landscape and Contributions to

More information

MEDIA, TECHNOLOGY, AND INFORMATION LAW. Yale Law School

MEDIA, TECHNOLOGY, AND INFORMATION LAW. Yale Law School MEDIA, TECHNOLOGY, AND INFORMATION LAW Yale Law School MEDIA,TECHNOLOGY, AND INFORMATION LAW Yale Law School Yale Law School has long focused on the intersection of media, technology, information, and

More information

Introduction to Hardware Security and Trust

Introduction to Hardware Security and Trust Introduction to Hardware Security and Trust Ramesh Karri (rkarri@nyu.edu) Professor of Electrical and Computer Engineering IEEE Computer Society Distinguished visitor (Hardware Security) http://engineering.nyu.edu/people/ramesh-karri

More information

Digital Forensics Workforce Training for Wounded Warriors

Digital Forensics Workforce Training for Wounded Warriors Digital Forensics Workforce Training for Wounded Warriors David A. Dampier 1, Kendall Blaylock 2, Robert Wesley McGrew 3 Abstract Mississippi State University has a long history of providing digital forensics

More information

Top Five Ways to Protect Your Network. A MainNerve Whitepaper

Top Five Ways to Protect Your Network. A MainNerve Whitepaper A MainNerve Whitepaper Overview The data security challenges within the business world have never been as challenging as they are today. Not only must organizations providers comply with stringent State

More information

Information Assurance Curricula and Certifications

Information Assurance Curricula and Certifications Information Assurance Curricula and Certifications Abstract Victor Piotrowski Department of Mathematics and Computer Science University of Wisconsin-Superior vpiotrow@uwsuper.edu Although there have been

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information

Introduction to Computer Networking: Trends and Issues

Introduction to Computer Networking: Trends and Issues Introduction to Computer Networking: Trends and Issues Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Indo-US Collaboration in Engineering Education (IUCEE) Webinar,

More information

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST

More information

I n t r o d u c t i o n

I n t r o d u c t i o n and Mission Information technology is a dynamic discipline that addresses the use of computing and I n t r o d u c t i o n information technology in business, education, government, and other organizations.

More information

FALL 2012 / SPRING 2013

FALL 2012 / SPRING 2013 GRADUATE STUDENT MANUAL DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING FALL 2012 / SPRING 2013 FOR ELECTRICAL ENGINEERING COMPUTER ENGINEERING TELECOMMUNICATION NETWORKS SYSTEMS ENGINEERING ELECTROPHYSICS

More information

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V Subject Name: Cyber Security and Forensics (CSF) (Elective-II) Subject Code: 2650008 1. Learning Objectives: To understand

More information

POLYTECHNIC SCHOOL OF ENGINEERING NEW YORK UNIVERSITY

POLYTECHNIC SCHOOL OF ENGINEERING NEW YORK UNIVERSITY POLYTECHNIC SCHOOL OF ENGINEERING NEW YORK UNIVERSITY Department of Electrical and Computer Engineering GRADUATE STUDENT MANUAL 1 This manual describes curriculum requirements for the graduate degrees

More information

Acceptable Use Policy ("AUP")

Acceptable Use Policy (AUP) Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while

More information

SICSA* Scottish Informatics and Computer Science Alliance. Cyber Security in Scottish Universities

SICSA* Scottish Informatics and Computer Science Alliance. Cyber Security in Scottish Universities SICSA* Scottish Informatics and Computer Science Alliance Cyber Security in Scottish Universities Dr Martin Beaton Cyber Security Business Development Executive What is SICSA? Collaboration of Scottish

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

WHAT IS NYC MEDIA LAB?

WHAT IS NYC MEDIA LAB? WHAT IS NYC MEDIA LAB? NYC Media Lab connects technologists in digital media and technology companies with bright minds in New York City s universities in order to drive innovation and talent development.

More information

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses Outline IT Security: General Trends and Research Directions Sherif El-Kassas Department of Computer Science The American University in Cairo Practical considerations Academic and research perspective National

More information

Cybersecurity Strategic Talent Management. March, 2012

Cybersecurity Strategic Talent Management. March, 2012 Cybersecurity Strategic Talent Management March, 2012 Cyber Operations - Starts with People Exploit Intel Attack Cyber Operations Defend Enablers 2 Talent Management Challenge Mission: Attract, Develop,

More information

Monitoring applications to increase security in 40G and 100G networks

Monitoring applications to increase security in 40G and 100G networks Monitoring applications to increase security in 40G and 100G networks Cyber Security and Today s Communication Technologies TPEB workshop, 30.1.2014 Petr Kastovsky kastovsky@invea.com Company Introduction

More information

Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu

Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu January 2014 1/29/2014 1 Our History NSA/DHS Center for Excellence in Cyber Security Education

More information

CEH Version8 Course Outline

CEH Version8 Course Outline CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information

More information

KING FAHD UNIVERSITY OF PETROLEUM & MINERALS COLLEGE OF COMPUTER SCIENCES AND ENGINEERING DEPARTMENT OF INFORMATION & COMPUTER SCIENCE

KING FAHD UNIVERSITY OF PETROLEUM & MINERALS COLLEGE OF COMPUTER SCIENCES AND ENGINEERING DEPARTMENT OF INFORMATION & COMPUTER SCIENCE KING FAHD UNIVERSITY OF PETROLEUM & MINERALS COLLEGE OF COMPUTER SCIENCES AND ENGINEERING DEPARTMENT OF INFORMATION & COMPUTER SCIENCE MASTER OF SCIENCE IN SECURITY AND INFORMATION ASSURANCE Graduate Program

More information

Cyber Innovation and Research Consortium

Cyber Innovation and Research Consortium Cyber Innovation and Research Consortium Mission Conduct, coordinate and promote cyber and cyber security innovation, research, and policy 2 Focus Basic and Applied Research Education and Curriculum Outreach

More information

Train Like You Will Fight

Train Like You Will Fight Train Like You Will Fight Reliability First Workshop 1 October 2015 Dr. Joe Adams Disclaimer 2 The content of this presentation is based on personal and professional experience of the speaker. The content

More information

Developing Network Security Strategies

Developing Network Security Strategies NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network

More information

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com UCL MSc in Information Security Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com About UCL Established in 1826 First institution to welcome students of any race, class or religion,

More information

GRADUATE APPLICATION INSTRUCTIONS

GRADUATE APPLICATION INSTRUCTIONS 201/201 GRADUATE APPLICATION INSTRUCTIONS All applicants must submit all of the required materials listed below to complete their applications for review. Do not send materials/credentials to departments.

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information

A Study of Key management Protocol for Secure Communication in Personal Cloud Environment

A Study of Key management Protocol for Secure Communication in Personal Cloud Environment , pp.51-58 http://dx.doi.org/10.14257/ijsia.2014.8.4.05 A Study of Key management Protocol for Secure Communication in Personal Cloud Environment ByungWook Jin 1 and Keun-Wang Lee 2,* 1 Dept. of Computer

More information