An Information Assurance and Security Curriculum Implementation
|
|
|
- Lorraine Campbell
- 10 years ago
- Views:
Transcription
1 Issues in Informing Science and Information Technology Volume 3, 2006 An Information Assurance and Security Curriculum Implementation Samuel P. Liles and Reza Kamali Purdue University Calumet, Hammond, IN, USA Abstract A holistic approach to security education is important to providing practitioners the scope of learning necessary for integration of their skills into the enterprise. Specifically domains of knowledge can easily be identified that allow for this holistic approach to be implemented into a new program of study or curriculum for information assurance and security. Within the Purdue Calumet CIT Department a new curriculum has been written and the program of study has been approved for implementation and the first students have applied to the program. The domains of systems assurance, software assurance, and operations assurance are as critical to the success as the overall goal of ABET accreditation of the program to the ACM SIGITE draft specifications when finalized. Keywords: Information Assurance, Security, Curriculum, SIGITE, ACM Introduction The benefits and responsibilities having been fully weighed by the Purdue Calumet CIT Department, a strong case for positive acceptance was made for aligning the Purdue Calumet CIT Department with the ACM SIGITE (Curriculum) guidelines. The ACM SIGITE group has been working on a ABET accrediting program for information technology education in a four year program. These guidelines were mapped to multiple information technology disciplines, and specifically to a new information assurance and security program that is now accepting students. This document shows how the new program was designed and how it aligns with a variety of different certifying bodies and specifically with NTISSI 4011(NTISSI). The process utilized wove a tapestry of the guidelines as proposed by SIGITE. The topics when given were processed into outcome based learning objectives (Bloom, 1956). These objectives were then processed as requirements against the NTISSI 4011 certification standard as a prerequisite of the program. One of the basic outcomes of this new curriculum was at the two year level all information technology students would attain the NTISSI 4011 certification as well as a broad based information technology education. This is one of the closest implementations to the newly Material published as part of this publication, either on-line or in print, is copyrighted by the Informing Science Institute. Permission to make digital or paper copy of part or all of these works for personal or classroom use is granted without fee provided that the copies are not made or distributed for profit or commercial advantage AND that copies 1) bear this notice in full and 2) give the full citation on the first page. It is permissible to abstract these works so long as credit is given. To copy in all other cases or to republish or to post on a server or to redistribute to lists requires specific permission and payment of a fee. Contact [email protected] to request redistribution permission. proposed SIGITE guidelines. Domains of knowledge Domain areas for the entire curriculum were addressed and knowledge area requirements were examined as found in previous papers (Davis, 2003; Laswell, 1999). These were invaluable resources and allowed the Purdue Calumet CIT Department to evaluate and concentrate
2 Information Assurance and Security Curriculum Implementation on the most likely areas of specialization for undergraduate instruction. Having a pattern of courses put together that would advance students quickly from novice to subject matter expert was a goal. Having a framework for knowledge to be wrapped around also was part of the success strategy for the Purdue Calumet CIT Department. Each of the outcome base learning objectives was processed for level of skill based on the Bloom Taxonomy (Bloom, 1956) for education. The objectives were then looked at for area of expertise as applied to the individual curricula guidelines. Balance of instructional expectation was attained by insuring that freshman and sophomore classes were balanced strongly towards the lower levels of Blooms taxonomy with fewer upper level objectives. Consequently upper level courses have higher level objectives and significantly fewer lower level objectives with an expectation that prior courses prepared the student sufficiently. As part of the preparation of that expectation course designers met and built a map of the course objectives and knowledge requirements. Before beginning the mapping of objectives, the role of a student completing the course was discussed. What would a successful student from this program do as a career? Was the objective to create practitioners, scholars, or graduate school aspirants? These objectives were addressed within the Purdue Calumet CIT Department and a plan was put in place. The Proposed Process for Certification Starting with the documents provided by NTISSI, the Purdue Calumet CIT Department set up learning objectives that coincided. The first goal was to attain 4011 certification at the two year level even though the Purdue Calumet CIT Department is currently a four year program. Truly utilizing ad hoc methods, the learning objectives were split between the four courses known as platform technologies, operating system administration, networking, and fundamentals of information assurance and security. These four courses are split out from the objectives as set in the accreditation guidelines for 4011 certification and the outcome based learning objectives basically mirror Added to this and coinciding nicely with the draft ACM SIGITE guidelines (Curriculum) the courses also serve to help with this accreditation goal. Both of these programs sincerely support each other and help in the curriculum design process. Inclusive Modularity Multiple domains of information assurance knowledge were identified and three knowledge domains were taxonomically derived and provided the structure for the curriculum modules as areas of interest (Maconachy, 2001). The first module is systems assurance. This module is inclusive of the operating systems, networks, hardware systems, and the other mature sciences of securing systems. The second module is the software assurance module. This second module, though less holistic, is inclusive of the sub disciplines of software auditing, secure coding practices, analysis of software, and implementing software in the enterprise. The third module is a well defined module of operations assurance where the concepts of physical security, policies, procedures, risk analysis, and the other organizational non-technical controls exist. The three domains as discussed can be sliced and defined differently depending on the perspectives of the evaluators for defining threads of knowledge through the program. The domains became increasingly important for sequencing courses and providing knowledge dependencies for curriculum design. The three domains of information assurance as identified also allow for future growth of the program as cohesive specializations. Pursuant to the goal statements of the Purdue Calumet CIT Department the final outcome of the program is to provide a student that has a well rounded information technology background with a broad based specialization in information assurance and security. 384
3 Liles & Kamali Systems Assurance Systems assurance is the practice of hardening operating systems from known threats, analyzing and auditing hardware and devices for known threats, and remeditating the devices and computing platforms within the enterprise (Maconachy, 2001). For instance, proper configuration and defensive strategies employed for protecting a network and specifically a router would be considered systems assurance. Ensuring that user accounts are active and properly used with permissions inside of the enterprise would be considered systems assurance. Table 1 Systems Assurance Courses Systems Assurance Courses Fundamentals of Information Assurance: This course covers security mechanisms, fundamental aspects, operational issues, policy, attacks, security domains, forensics, information states, security services, threat analysis, vulnerabilities, and other topics. Systems Assurance: This course covers the implementation of systems assurance with computing systems. Topics include confidentiality, integrity, authentication, non-repudiation, intrusion detection, physical security, and encryption. Extensive laboratory exercises are assigned. Assured Systems Design and Implementation: This course covers the design and implementation of assured systems in an enterprise environment. Topics include hardening of operating systems, choice of platforms, design criteria within the assured systems domain. Extensive laboratory exercises are assigned. Computer Forensics: This course covers the techniques used in the forensic analysis of computerized systems for gathering evidence to detail how a system has been exploited or used. Extensive laboratory exercises are assigned. Software Assurance Software assurance is a selection of sub disciplines merged into a practice. Software assurance is the practice of requirements gathering, secure coding, testing, auditing, and implementation of software in the enterprise protecting against known vulnerabilities. Software assurance is the preparation of source code such that known vulnerabilities are excluded from the product. Software assurance is also about preparing robust source code so that unknown vulnerabilities create secure failure conditions (Software, 1992). Preparation can include auditing of commercial off the shelf software (COTS), or free open source software (F/OSS) being implemented within the enterprise, or third party prepared/contracted source code. Software assurance includes normally associated computer science topics such as Software Engineering (SE), Software Quality Assurance (SQA), Highly Assured Computing (HAC), Capability Maturity Model (CMM), and other development lifecycle issues. Further software assurance elements include domain crossing topics such as end of life cycle, maintenance, retirement, reusability, and legacy adaptation strategies. Software assurance definitively includes practice oriented computing concepts including secure coding, threat modeling, vulnerability analysis, implementation, auditing, and defensive integration of software within the enterprise. 385
4 Information Assurance and Security Curriculum Implementation Software Assurance Courses Table 2 Software Assurance Courses Programming Fundamentals: This course covers fundamental data structures, fundamental programming constructs, objectoriented programming, algorithms and problem-solving, event-driven programming, recursion, and other topics. Advanced Programming: This course covers advanced topics in programming languages, GUI development, threaded applications, components, testing and debugging methods and advanced topics in event-driven and object oriented programming techniques. Extensive laboratory exercises are assigned. Software Assurance: This course covers defensive programming techniques, bounds analysis, error handling, advanced testing techniques, detailed code auditing, and software specification in a trusted assured environment. Extensive laboratory exercises are assigned. Operations Assurance Operations assurance advocates the tools of physical security and operational characteristics found in a cohesive information technology organization (Software,1999). Within the curriculums scope are the concepts of physical security, data center design, and legal and procedural reporting. Items that are of great concern to the enterprise that would be found here include disaster recovery and planning. The concept of business continuity and risk analysis are threads of knowledge that run through the domain area of operations assurance. Within operations assurance you would find for example the implications of HIPPA, DMCA, or the concepts of physical security. Paradoxically items often overlooked as part of information assurance would be the concept of back up and recovery testing procedures, insurance, and other litigation aspects of operations. The ability to define, categorize, and apply financial loss expectation documents to management of an enterprise is a valuable skill. Table 3 Operations Assurance Courses Operations Assurance Courses Ethical and Legal Issues of IT: This course covers professional communications, social context of computing, teamwork concepts and issues, intellectual properties, legal issues in computing, organization context, professional and ethical issues, responsibilities, privacy and civil liberties, and other topics. Disaster recovery and planning: This course covers risk management and business continuity. Topics include disaster recovery strategies, mitigation strategies, risk analysis, and development of contingency plans for unexpected outages and component failures. Extensive laboratory exercises are assigned. Information Assurance Risk Assessment: This course covers industry and government requirements and guidelines for information assurance and auditing of computing systems. Topics include risk assessment and implementation of standardized requirements and guidelines. 386
5 Liles & Kamali Conclusion Developing a holistic approach to information assurance and security curriculum was an onerous task. As defined in other publications (Laswell, 1999) there are a variety of approaches to the concept of information assurance and security. With only a relatively small number of courses to deal with in developing a curriculum and not wanting to follow a standard computer science model the solution at the Purdue Calumet CIT Department is to focus on implementations of security strategies. These implementation strategies fit within the overall goal for the Purdue Calumet CIT Department to attain accreditation through SIGITE. Developing courses that split into three domains was in consideration arbitrary but definitely necessary for defining the knowledge areas. Other divisions were considered along these same lines, or even further devolvement of the topics into common knowledge areas as defined in other people s work. Keeping in mind the practitioner approach these three domain areas served quite well at helping meet the overall goals. Further the three domain areas fit nicely at segmenting the courses and though some would argue with a particular course filling a slot often the flexibility is overlooked. This flexibility is part of the final solution to the curriculum modules and allows for growth in the overall courses. References Bloom, B. S. (1956). Taxonomy of educational objectives: Handbook I: Cognitive domain. Longmans, Green & Company Curriculum: Proposed standards for IT curriculum. Retrieved 6/12/2005 from Crowley, E. (2003). Information system security curricula development. Proceeding of the 4 th Conference on Information Technology Curriculum, pp Davis, J. & Dark, M. (2003). Defining a curriculum framework in information assurance and security. ASEE Annual Conference, Nashville, TN, June. Laswell, B., Simmel, D., & Behrens, S. (1999). Information Assurance Curriculum and Certification: State of the Practice. CMU/SEI-99-TR-021, Software Engineering Institute, Carnegie Mellon, Pittsburg, PA, Sept. Maconachy W. V., Schou C. D., Ragsdale D., & Welch D. (2001). A model for information assurance: An integrated approach. Proceedings 2001 IEEE Information Assurance Workshop, West Point, NY, 2001, pp National Information Systems Security (INFOSEC) Glossary. (1997). NSTISSI No. 4009, National Security Telecommunications and Information Systems Security Committee, August. NSTISSI, (1994). No National Training Standard for Information Systems Security (INFOSEC) Professionals. Software Assurance Standard. (1992). NASA-STD , NOVEMBER 10, Biographies Samuel P. Liles III is an Assistant Professor of Computer Information Technology at Purdue University Calumet. He is currently involved in research identifying the knowledge skills and abilities of cyber adversaries and mitigation strategies. Dr. Reza Kamali is an Associate Professor and Department Head of Computer Information Technology at Purdue University Calumet, Hammond, Indiana. He was a founding member of SITE, which later became ACM's SIGITE. He was a member of the IT2006 Task Force and a member of The Joint Task Force for Computing Curricula
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
Information Security Curriculum Creation: A Case Study
Information Security Curriculum Creation: A Case Study Bradley Bogolea College of Engineering The Pennsylvania State University University Park, Pa 16802 [email protected] Kay Wijekumar School of Information
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
Release: 1. ICA60308 Advanced Diploma of Information Technology (E-Security)
Release: 1 ICA60308 Advanced Diploma of Information Technology (E-Security) ICA60308 Advanced Diploma of Information Technology (E-Security) Modification History Not Applicable Approved Page 2 of 8 Description
Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
Master of Science in Information Security and Assurance
Master of Science in Information Security and Assurance The Master of Science in Information Security and Assurance is a competency-based degree program that encompasses the 10 security domains that are
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
Security Software Engineering: Do it the right way
Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, 2007 19 Security Software Engineering: Do it the right way Ahmad
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Principles of Information Assurance Syllabus
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
Software Assurance Competency Model
Software Assurance Competency Model Thomas Hilburn, Embry-Riddle Aeronautical University Mark Ardis, Stevens Institute of Technology Glenn Johnson, (ISC) 2 Andrew Kornecki, Embry-Riddle Aeronautical University
Information Security Management Curriculum Development: An Australian Example
Proceedings of Informing Science & IT Education Conference (InSITE) 2009 Information Security Management Curriculum Development: An Australian Example Matthew Warren and Shona Leitch School of Information
Information Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
Cybersecurity Definitions and Academic Landscape
Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: [email protected]
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
Cyber Defense Operations Graduate Certificate
The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
MS Information Security (MSIS)
MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in
Information Systems and Tech (IST)
California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey
PROGRAMME DETAIL SPECIFICATION. Programme Summary
PROGRAMME DETAIL SPECIFICATION Programme Summary 1 Awarding institution Liverpool John Moores University 2 Teaching institution university Liverpool John Moores University 3a Programme accredited by: 3b
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
defense through discovery
defense through discovery about krypton krypton is an advisory and consulting services firm, specialized in the domain of information technology (it) and it-related security krypton is a partnership amongst
Using Rational Software Solutions to Achieve CMMI Level 2
Copyright Rational Software 2003 http://www.therationaledge.com/content/jan_03/f_cmmi_rr.jsp Using Rational Software Solutions to Achieve CMMI Level 2 by Rolf W. Reitzig Founder, Cognence, Inc. Over the
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
Risk mitigation for business resilience White paper. A comprehensive, best-practices approach to business resilience and risk mitigation.
Risk mitigation for business resilience White paper A comprehensive, best-practices approach to business resilience and risk mitigation. September 2007 2 Contents 2 Overview: Why traditional risk mitigation
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
Educational Requirement Analysis for Information Security Professionals in Korea
Educational Requirement Analysis for Information Security Professionals in Korea Sehun Kim Dept. of Industrial Engineering, KAIST, 373-1, Kusong-dong, Yusong-gu, Taejon, 305-701, Korea [email protected]
How To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
COMPUTER SECURITY AND IMPACT ON COMPUTER SCIENCE EDUCATION
COMPUTER SECURITY AND IMPACT ON COMPUTER SCIENCE EDUCATION T. Andrew Yang Computer Science Department Indiana University of Pennsylvania Indiana, Pennsylvania 15705 TEL: 724-357-7995 Email address: [email protected]
SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles
PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the
A Systems Engineering Approach to Developing Cyber Security Professionals
A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
MICHIGAN TEST FOR TEACHER CERTIFICATION (MTTC) TEST OBJECTIVES FIELD 050: COMPUTER SCIENCE
MICHIGAN TEST FOR TEACHER CERTIFICATION (MTTC) TEST OBJECTIVES Subarea Educational Computing and Technology Literacy Computer Systems, Data, and Algorithms Program Design and Verification Programming Language
April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 [email protected] James J. Costello Director, Enterprise IT Security April 8,
CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data
CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical
Department of Information Systems and Cyber Security
The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association
PROGRAMME DETAIL SPECIFICATION. Programme Summary
PROGRAMME DETAIL SPECIFICATION Programme Summary 1 Awarding institution Liverpool John Moores University 2 Teaching institution university LIVERPOOL JOHN MOORES UNIVERSITY 3a Programme accredited by: 3b
Practitioner Certificate in Information Assurance Architecture (PCiIAA)
Practitioner Certificate in Information Assurance Architecture (PCiIAA) 15 th August, 2015 v2.1 Course Introduction 1.1. Overview A Security Architect (SA) is a senior-level enterprise architect role,
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE
RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE
Networking and Information Security
Networking and Information Security College of Engineering & Information Sciences Careers That Fit You Build a career around your interests and talents Do you like figuring out how things work? Solving
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE LCDR Chris Eagle, and John L. Clark Naval Postgraduate School Abstract: Key words: In this paper, we describe the Capture-the-Flag (CTF) activity
Solutions and IT services for Oil-Gas & Energy markets
Solutions and IT services for The context Companies operating in the Oil-Gas & Energy sectors are facing radical changes that have a significant impact on their business processes. In this context, compliance
Four Top Emagined Security Services
Four Top Emagined Security Services. www.emagined.com Emagined Security offers a variety of Security Services designed to support growing security needs. This brochure highlights four key Emagined Security
IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies
IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document
Information Systems Security in a Computer Engineering Technology Program
Information Systems Security in a Computer Engineering Technology Program by Gary D. [email protected] Department of Electrical and Computer Engineering Technology Indiana University Purdue University Fort
---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
Program Proposal for a Minor
S15-1 Program Proposal for a Minor 1. Name of the proposed minor. Cyber Security 2. Name of the department(s) involved. Electrical and Computer Engineering 3. Name of contact person(s). Julie Rursch ([email protected]),
NIST Cyber Security Activities
NIST Cyber Security Activities Dr. Alicia Clay Deputy Chief, Computer Security Division NIST Information Technology Laboratory U.S. Department of Commerce September 29, 2004 1 Computer Security Division
Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro
Interdisciplinary Program in Information Security and Assurance By Kossi Edoh NC A&T State University Greensboro Information Assurance The protection of electronic information and infrastructures that
Criteria for Accrediting Computer Science Programs Effective for Evaluations during the 2004-2005 Accreditation Cycle
Criteria for Accrediting Computer Science Programs Effective for Evaluations during the 2004-2005 Accreditation Cycle I. Objectives and Assessments The program has documented, measurable objectives, including
Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare
CIO-SP 3 Task Areas Ten task areas constitute the technical scope of this contract: Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare The objective of this task area is
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Atif Ahmad & Anthonie Ruighaver University of Melbourne, Australia Abstract The design and implementation
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Cybersecurity education for the next generation Emerging best practices
Cybersecurity education for the next generation Emerging best practices Presented at the 2013 NIST/NICE Workshop Gaithersburg, Maryland Marisa S. Viveros Vice President, Cyber Security Innovation IBM Corporate
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance Sponsored by the U.S. Department of Homeland Security (DHS), the Software Engineering Institute
Cyber Security Risk Management: A New and Holistic Approach
Cyber Security Risk Management: A New and Holistic Approach Understanding and Applying NIST SP 800-39 WebEx Hosted by: Business of Security and Federal InfoSec Forum April 12, 2011 Dr. Ron Ross Computer
Hackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
Security for NG9-1-1 SYSTEMS
The Next Generation of Security for NG9-1-1 SYSTEMS The Challenge of Securing Public Safety Agencies A white paper from L.R. Kimball JANUARY 2010 866.375.6812 www.lrkimball.com/cybersecurity L.R. Kimball
Click to edit Master title style
EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS
CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS Prerequisites: CIS 175 Course Description This course is designed to give students a fundamental understanding of computer and network
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie
Implementing Cisco IOS Network Security v2.0 (IINS)
Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners
Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.
Corporate Overview MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.com IS&P Practice Areas Core Competencies Clients & Services
Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT
Telecom Testing and Security Certification A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT 1 Need for Security Testing and Certification Telecom is a vital infrastructure
Bachelor of Science in Business Administration - Information Systems and Technology Major
Bachelor of Science in - Information Systems and Technology Major Ling Li, Chair Li Xu, Information Technology Area Coordinator Roya Ardalan, Chief Discipline Advisor The information systems and technology
Computer and Information Science Division xxx
59 xxx The has a mission of being committed to developing and delivering quality, student-centered programs that provide students with the core knowledge and skills to meet the needs of stakeholders in
