Yampolskiy, Analysis of Cyber Infrastructure Authentication Failure Vulnerabilities to Inform Security Decisions
|
|
|
- Randall Eaton
- 9 years ago
- Views:
Transcription
1 CREATE FY2016 Statement of Work Yampolskiy, Analysis of Cyber Infrastructure Authentication Failure Vulnerabilities to Inform Security Decisions In this project, we develop and apply a model for estimating probabilities for cyber infrastructure user authentication failures. We estimate failure probabilities using available empirical data and expert judgment. Failure probability estimation provides a decision-analytic theoretical basis for assessing the benefits of development of additional authentication modalities and overall configuration of an optimal multimodal authentication system for secure cyber infrastructure. Project Technical Description: 1. Theme Areas: Risk and Decision Analysis - Management of Risks from Intelligent, Adaptive Adversaries 2. Principal Investigator: Roman Yampolskiy 3. Institution: University of Louisville 4. Co-Investigators: Anthony M. Barrett and Seth Baum (Global Catastrophic Risk Institute) 5. Research Transition Lead: Anthony M. Barrett 6. Keywords: Cyber infrastructure, emergingthreat assessment, intelligence analysis, risk and decision analysis Example Biometric User Authentication Process 7. Brief Description: Many kinds of cyber security failure modes have been found and exploited by intelligent, adaptive adversaries. Efforts to develop more secure systems often aim to balance security benefits against costs imposed on users. Risk analysis and decision analysis methods hold potential for informing decisions to prioritize cyber security development efforts. In this project, we develop and apply a model for estimating probabilities for cyber infrastructure user authentication failure modes. Failure probability estimation provides a decision-analytic theoretical basis for assessing the benefits of development of additional authentication modalities and overall configuration of an optimal multimodal system. We identify cyber security system failure modes, and represent those within our model. To estimate the probabilities of each specific type of failure, we employ two main methods: first, we find and incorporate available empirical data, and second, we use expert judgment to create some approximate estimates. For our main candidate application case, we propose to focus on systems that provide continuous authentication to cyber infrastructure by profiling multiple physical and/or behavioral biometrics of users. We will select a specific application case in partnership with an end customer at the US Department of Homeland Security (DHS), which has significant responsibility for helping to secure U.S. critical infrastructure that have some kind of cyber vulnerabilities in their control and communication systems (including the electric power grid, telecommunications systems, chemical industry plants, and many other Critical Infrastructure/Key Resources areas). 8. Research Objectives: The main research objectives of the proposed year s project are to develop and apply a methodology for cyber system failure mode probability assessment, to inform security system development decisions. The proposed project s methodology will be designed for implementation by risk analysts and cyber security 3710 McClintock Avenue, RTH 314 ~ Los Angeles, CA ~ (213) ~
2 practitioners. Yampolskiy, Analysis of Cyber Infrastructure Authentication Failure Vulnerabilities to Inform Security Decisions 9. Research Transition Objectives: The main research transition objectives of the proposed year s project are to identify and develop a practical prototype and/or application case for cyber system failure mode probability assessment. The case study will be selected to best inform practical security system development decisions of a DHS end customer, e.g. for the DHS Office of Cyber Security and Communications (CS&C). 10. Interfaces to CREATE Projects: This work will seek to build on work from CREATE s projects on adaptive-adversary risk analysis, emerging-threat technology risks [1], expert elicitation [2], and assessment of value of information [3]. 11. Previous or current work relevant to the proposed project: The PI (Yampolskiy) has conducted numerous cyber security development projects [4-7] and is also the Director of Cybersecurity Laboratory and an Associate Professor of Computer Engineering and Computer Science at the University of Louisville. The Co-PI of the proposed work (Barrett) was the PI of the CREATE Year 10 (Year 4 of Cooperative Agreement) project Analysis of Current and Future Catastrophic Risks from Emerging-Threat Technologies and the CREATE Year 11 (Year 5 of Cooperative Agreement) project Extending Analysis of Current and Future Catastrophic Risks from Emerging-Threat Technologies. The PI (Barrett) has also developed attack path and accident scenario fault-tree logic models and computational models in assessing risks of terrorism scenarios in CREATE s Adaptive Adversary Modeling methodology development project [8], and other work at CREATE and elsewhere. The third investigator (Baum) has performed expert elicitation to quantitatively forecast the development of rapidly developing technology in artificial intelligence. 12. Major Deliverables, Research Transition Products and Customers: Project deliverables and products will include reports and computational models for a methodology to use available information and expert judgment to assess cyber system security failure mode estimation probabilities and inform security development decisions. The reports will include discussion of methodological limitations, extensions, and practitioner implementation steps. The proposed year s application prototype and/or case will be designed with the end customer. The focus will be selected to maximize customer value within constraints. Potential end customers at DHS include a variety of offices with programs on user authentication and infrastructure security, such as the Office of Cyber Security and Communications (CS&C), including the US Computer Emergency Readiness Team (US-CERT) or another part of the National Cybersecurity and Communications Integration Center (NCCIC), as well as the Science & Technology (S&T) Cyber Security Division. 13. Technical Approach: To develop and apply a model for estimating probabilities for cyber infrastructure user authentication failure modes, we use the following steps. 1. Identify and model cyber security system failure modes 2. Estimate the probabilities of each specific type of failure 3. Use failure probability estimates in decision analysis to assess the benefits of development of Page 2 of 6
3 additional authentication modalities and overall configuration of an optimal multimodal system For inputs to both steps one and two, we employ two sources of information: We find and incorporate available empirical data, and We use expert elicitation to capture the best judgment available, reflecting uncertainties, for cases where empirical data is lacking To estimate probabilities for each failure mode, we will use empirical data and/or expert judgment in several complementary ways designed to make greatest use of available information. Where possible, we will directly estimate the probabilities of failures. We will also seek to characterize attributes of the failure modes that could be used indirectly to estimate failure probabilities. For example, for failure modes that could be caused by intelligent adversaries, we will seek to characterize relevant attributes of attack difficulty and attractiveness that could affect an adversary s probabilities of attempting such an attack and of succeeding in such an attack. (We will aim for compatibility with analogous frameworks used in other DHS intelligent-adversary modeling efforts.) For our main candidate application case, we plan to focus on systems that provide continuous authentication to cyber infrastructure by profiling multiple physical and/or behavioral biometrics of users. We also plan to consider an alternate application case, in which we use the same failure mode probability estimation analysis methods on a different cyber authentication problem: authentication of a secure communication protocol involving steganography/side channel free communication between two parties. Such authentication methods are key parts of cyber security systems, which underpin a broad range of critical infrastructures in sectors with which DHS works. We will select a specific methodology application case in discussion with research partners after project funding is secured. The case will be selected to maximize value within constraints. We are in contact with potential research partners, both at DHS and in technology-related nongovernmental organizations, who could serve as clients and/or sources of experts for this project. (Several offices in DHS CS&C have communicated their interest and indicated that the proposed study could be relevant to their development and technology programs.) We will appropriately protect sensitive information, while providing description of our methods sufficient to allow other researchers to examine and employ them. Finally, we will seek case studies that would allow prototype application of probability estimation methods. However, our investigators efforts in those areas will necessarily be limited in the proposed one-year project. We would propose more extensive related work in follow-on projects. The PI (Yampolskiy) will lead work on cyber security system modeling, and co-lead work on identification of failure modes as well as research transition efforts. (Yampolskiy will be assisted by a graduate student.) The Co-PI (Barrett) will lead work on estimating the probability that a particular system will perform as specified, and will co-lead work on identification of failure modes, as well as colead expert elicitations. Barrett will also co-lead the research transition effort. Finally, the third investigator (Baum) will co-lead expert elicitations. As part of the project, we plan to develop and apply computational models using commercially available off-the-shelf (COTS) software, such as Analytica by Lumina Decision Systems or R statistical software. The computational models will reflect the frameworks and specific examples used in the application case, Page 3 of 6
4 including relevant scenario fault-tree logic model structures and parameter estimates. The prototypes and computational models will be provided to the application case research end customer to aid in transition to operational use of methods and implementation by risk practitioners. 14. Major Milestones and Dates: 1. Conduct initial literature review, conduct initial discussions with end customer, subject matter experts, and build first-iteration models using representative data available at that point, -- November Conduct initial discussions with subject matter experts, conduct initial analyses -- January Conduct expert elicitations and obtain other data to improve models and analyses -- March Finalize models and analyses; write final report June Develop research transition product development plan and conduct webinar June References: 1. Barrett, A.M. Analyzing Current and Future Catastrophic Risks from Emerging-Threat Technologies [cited May 5, 2014]; Available from: 2. Hora, S.C., Probability Modeling and Expert Judgment, in Research Project Summaries. 2011, CREATE. 3. Willis, H.H. and M. Moore, Improving the Value of Analysis for Biosurveillance. Decision Analysis, Yampolskiy, R.V., Action Based User Authentication. International Journal of Electronic Security and Digital Forensics, (3): p Yampolskiy, R.V. and V. Govindaraju, Behavioral Biometrics: a Survey and Classification. International Journal of Biometrics, (1): p Yampolskiy, R. and M. Gavrilova, Artimetrics: Biometrics for Artificial Entities. IEEE Robotics and Automation Magazine, (4): p Yampolskiy, R. and D. D'Souza, Natural vs Artificial Face Classification using Uniform Local Directional Patterns and Wavelet Uniform Local Directional Patterns, in Conference on Computer Vision and Pattern Recognition (CVPR), IEEE Computer Society Workshop on Biometrics. 2014: Columbus, Ohio. 8. Barrett, A.M., et al., Adaptive Adversary Modeling for Terrorism Risk Management, in Fifth Annual Conference of the Security Analysis and Risk Management Association. 2011: Arlington, Virginia. Page 4 of 6
5 16. CVs (of the Principal Investigator and Co-PI): Roman V. Yampolskiy (Principal Investigator) EDUCATION Ph.D., Computer Science and Engineering, University at Buffalo (2008) B.S. and M.S., Computer Science, Rochester Institute of Technology (2004) PROFESSIONAL EXPERIENCE Associate Professor - Speed School of Engineering, University of Louisville - Department of Computer Engineering and Computer Science Dates Position, Research Center, Supervisor Summer 2014 Summer 2012 Summer 2011 Associate Professor, with TENURE awarded from August 1, Assistant Professor, Department of Computer Engineering & Computer Science Founding Director, Cyber Security Laboratory, University of Louisville Visiting Faculty (Funded by NSF) Information Systems & Internet Security, Polytechnic School of Engineering, New York University. Advisor: Dr. Nasir Memon Postdoctoral Student (80/3150 = 2.5% Acceptance Rate, Funded by Google) Singularity University, Graduate Studies Program, Mountain View, CA. Advisor: Dr. Ray Kurzweil Postdoctoral Student. New Kind of Science Summer Institute (NKSSI), Boston, MA. Advisor: Dr. Stephen Wolfram Researcher, Center for Unified Biometrics and Sensors. University at Buffalo. Supervisor: Dr. Venu Govindaraju Research 100+ Peer-Reviewed Publications (60% of papers as the first or only author) o 29 Journal, 65 Conference, 11 Book Chapters, 6 books, 16 Workshop papers H-Index = 14, based on 700+ Citations (Google Scholar) PI or Co-PI on Multiple Cybersecurity Related Projects Mentoring Graduated: 2 PhD, 3 MS Thesis and 11 MS Project students Currently supervising 3 PhD students (all ABD), 2 MS students and 1 undergraduate Served on the Defense Committees for 17 students (MS Thesis and PhD) Promotion of Research Research featured by: BBC, Yahoo, MSNBC, New Scientist, Forbes, ACM, 200+ news stories, dozens of interviews for TV, Radio, and Magazines Over 3 million viewers/readers, 1000s of comments, articles reposted 100s of times. Page 5 of 6
6 Anthony M. Barrett (Co-PI) EDUCATION Ph.D., Engineering & Public Policy, Carnegie Mellon University (2009). Bachelor of Science, Chemical Engineering, University of California, San Diego (2000). PROFESSIONAL EXPERIENCE Senior Risk Analyst, 2013 Present; ABS Consulting, Arlington, VA Supporting risk analysis efforts of several parts of US Department of Homeland Security (DHS), including Infrastructure Security Compliance Division (ISCD) and Domestic Nuclear Detection Office (DNDO). Stanton Nuclear Security Fellow, ; RAND Corporation, Arlington, VA Conducted independent research to analyze residual risks of inadvertent and accidental nuclear war scenarios during one-year residential fellowship. Director of Research and Co-Founder, 2011 Present, Global Catastrophic Risk Institute (GCRI) Leading research initiatives on topics including nuclear war and emerging technologies. Risk Analyst, ; ABS Consulting, Arlington, VA Principal Investigator on US DHS Chemical Security Analysis Center project to develop metrics for risk impacts of changes in hazardous chemical processes and supply chains. Researched and developed analytic methodologies for Adaptive Adversary Modeling for Terrorism Risk Analysis as member of project team funded by DHS Science and Technology. Also led or contributed to risk and decision analysis projects for several other parts of the US Department of Homeland Security (DHS), including the Domestic Nuclear Detection Office (DNDO), the Office of Risk Management and Analysis (RMA), and the US Coast Guard. Postdoctoral Research Associate, ; National Center for Risk & Economic Analysis of Terrorism Events (CREATE), University of Southern California, Los Angeles, CA Graduate Research Assistant, ; Department of Engineering & Public Policy, Carnegie Mellon University, Pittsburgh, PA Federal Fellow to US Department of Homeland Security, 2005; American Society of Mechanical Engineers / AAAS / DHS, Washington, DC SELECTED PUBLICATIONS Barrett, A. M., S. D. Baum and K. R. Hostetler, Analyzing and Reducing the Risks of Inadvertent Nuclear War Between the United States and Russia, Science and Global Security, Vol. 21, No. 2, pp Barrett, A.M. and E.A. Casman, Should Cities Invest in Sheltering-in-Place Measures against Chlorine Truck Attacks by Terrorists?, Risk Analysis, Vol. 33, No. 5, pp Barrett, A.M., and P.J. Adams, Chlorine Truck Attack Consequences and Mitigation, Risk Analysis, Vol. 31 (2011), No. 8, pp Barrett, A.M., Cost Effectiveness of On-site Chlorine Generation for Chlorine Truck Attack Prevention, Decision Analysis, Vol. 7 (2010), No. 4, pp Barrett, A.M., Modeling and Analysis for Robust Risk Management: PortSec Resource Allocation Decision Support Framework, in Workshop on Grand Challenges in Modeling, Simulation and Analysis for Homeland Security (MSAHS-2010), March 17-18, 2010, Washington, DC. Page 6 of 6
How To Write A Book On Risk Management
National Center for Risk and Economic Analysis of Terrorism Events CREATE FY2015 (Year 11) Call for White Papers CREATE, the DHS-sponsored Center of Excellence at the University of Southern California,
M.A., Political Science 2006 University of California, Riverside
NOAH C. DORMADY The Ohio State University John Glenn School of Public Affairs 210Q Page Hall 1810 College Road Columbus, Ohio 43210 Phone: (614) 688-1668 Fax (614) 292-4868 Email: [email protected] Research
Curriculum Vitae. March 2012
March 2012 Curriculum Vitae Lisa S. Nelson Graduate School of Public and International Affairs University of Pittsburgh 3E25 Wesley Posvar Hall Pittsburgh, Pennsylvania 15260 (412) 648-7601 (office) [email protected]
Department of Political Science Phone: (805) 893-5902 University of California, Santa Barbara Fax: (805) 893-3309
NEIL NARANG Department of Political Science Phone: (805) 893-5902 University of California, Santa Barbara Fax: (805) 893-3309 Ellison Hall, Office 3710 Email: [email protected] Santa Barbara, CA
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
CAROL KRAKER STOCKMAN, Ph.D. 5033 Castleman Street, Pittsburgh, Pennsylvania 15232-2106 412.980.2800 / [email protected]
CAROL KRAKER STOCKMAN, Ph.D. 5033 Castleman Street, Pittsburgh, Pennsylvania 15232-2106 412.980.2800 / [email protected] CONSULTANT and APPLIED BEHAVIORAL HEALTH ECONOMIST, providing sound and well-crafted
2010 Master of Science Computer Science Department, University of Massachusetts Amherst
Scott Niekum Postdoctoral Research Fellow The Robotics Institute, Carnegie Mellon University Contact Information Smith Hall, Room 228 Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213
Decision and Risk Analysis, Applied Probability, Economics of Information, Homeland Security
CURRICULUM VITAE NİYAZİ ONUR BAKIR, Ph.D. Department of Industrial Engineering TOBB University of Economics and Technology TOBB Ekonomi ve Teknoloji Üniversitesi, Endüstri Müh. Bölümü, Söǧütözü, 06560,
TESTIMONY. Analyzing Terrorism Risk HENRY WILLIS CT-252. November 2005
TESTIMONY Analyzing Terrorism Risk HENRY WILLIS CT-252 November 2005 Testimony presented before the House Homeland Security Committee, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk
9700 South Cass Avenue, Lemont, IL 60439 URL: www.mcs.anl.gov/ fulin
Fu Lin Contact information Education Work experience Research interests Mathematics and Computer Science Division Phone: (630) 252-0973 Argonne National Laboratory E-mail: [email protected] 9700 South
Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC
Visualization, Modeling and Predictive Analysis of Internet Attacks Thermopylae Sciences + Technology, LLC Administrative POC: Ms. Jeannine Feasel, [email protected] Technical POC: George Romas, [email protected]
JOHN M. CZARNETZKY CURRENT POSITION. UNIVERSITY OF MISSISSIPPI, School of Law, University, Mississippi. Professor of Law (1994 to present).
JOHN M. CZARNETZKY Professor of Law Mitchell McNutt and Sams Lecturer in Law Jessie D. Puckett, Jr. Lecturer in Law University of Mississippi School of Law Post Office Box 1848 481 Coliseum Drive University,
Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach
Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach Executing a Critical Infrastructure Risk Management Approach Risk is defined as the potential for an unwanted outcome resulting
WMD Terrorism Risk Assessment in the Department of Homeland Security. Why Risk Assessment? Probabilistic Risk Assessment
WMD Terrorism Risk Assessment in the Department of Homeland Security Why Risk Assessment? Joint U.S. EPA and DHS Conference On Real-World Applications and Solutions for Microbial Risk Assessment Steve
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
Fast Facts About The Cyber Security Job Market
Cybersecurity Cybersecurity is the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Cybersecurity is the faster growing IT job, growing
Master of Science in Software Engineering Student Guide
King Fahd University of Petroleum & Minerals College of Computer Sciences and Engineering Information and Computer Science Department Master of Science in Software Engineering Student Guide http://www.ccse.kfupm.edu.sa/swe/
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
Cyber Security Research and Development: A Homeland Security Perspective
Cyber Security Research and Development: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D 202-772-9867 Outline! DHS Organizational Overview Cyber Security Stakeholders
Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)
Statement of Mike Sena President, National Fusion Center Association Director, Northern California Regional Intelligence Center (NCRIC) Joint Hearing of the Subcommittee on Emergency Preparedness, Response,
Cyber Adversary Characterization. Know thy enemy!
Cyber Adversary Characterization Know thy enemy! Brief History of Cyber Adversary Modeling Mostly Government Agencies. Some others internally. Workshops DARPA 2000 Other Adversaries, RAND 1999-2000 Insider
Industrial Control Systems Security Guide
Industrial Control Systems Security Guide Keith Stouffer, Engineering Lab National Institute of Standards and Technology NIST SP 800-82, Rev 2 and ICS Cybersecurity Testbed Keith Stouffer Project Leader,
USF Graduate Catalog 2014 2015 SECTION 23. http://www.grad.usf.edu/
SECTION 23 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 23 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate
I N S T I T U T E F O R D E FE N S E A N A L Y S E S NSD-5216
I N S T I T U T E F O R D E FE N S E A N A L Y S E S NSD-5216 A Consistent Approach for Security Risk Assessments of Dams and Related Critical Infrastructure J. Darrell Morgeson Jason A. Dechant Yev Kirpichevsky
v. 03/03/2015 Page ii
The Trident University International (Trident) catalog consists of two parts: Policy Handbook and Academic Programs, which reflect current academic policies, procedures, program and degree offerings, course
Cyber Security Awareness Workshop
December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing
Tutorials: Abstracts and Speakers Bio
Tutorials: Abstracts and Speakers Bio 1. Name of Speaker: Rene van Dorp Affiliation: George Washington University, Washington, DC Email or other contact info:[email protected] Brief bio: J. Rene van Dorp
Discover Viterbi: Computer Science
Discover Viterbi: Computer Science Gaurav S. Sukhatme Professor and Chairman USC Computer Science Department Meghan Balding Graduate & Professional Programs November 2, 2015 WebEx Quick Facts Will I be
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
Discover Viterbi: Systems Architecting & Engineering. Professor Azad Madni. Meghan McKenna Balding
Discover Viterbi: Systems Architecting & Engineering Professor Azad Madni Meghan McKenna Balding November 9, 2015 WebEx Quick Facts Will I be able to get a copy of the slides after the presentation? YES!
John Noll, Ph.D. Research Associate, ATRIUM Laboratory, Marshall School of Business, University of Southern California,
CURRICULUM VITAE John Noll, Ph.D. Computer Engineering Department, Santa Clara University 500 El Camino Real, Santa Clara, CA 95053-0566 (415) 948-5795 [email protected] www.cse.scu.edu/ jnoll Education
Cyber Security and Insider Threat: Research and Challenges
Cyber Security and Insider Threat: Research and Challenges Dr. Deanna D. Caputo The MITRE Corporation Usability, Security, and Privacy of Computer Systems: A Workshop July 21 & 22, 2009 Washington DC Problem:
Master of Cyber Security
Master of Cyber Security Dr. Winnie Callahan Assoc. Director, Informatics Meghan Balding Graduate & Professional Programs September 17, 2013 WebEx Quick Facts Will I be able to get a copy of the slides
Risk-Informed Security: Summary of Three Workshops
Risk-Informed Security: Summary of Three Workshops N. Siu Office of Nuclear Regulatory Research U.S. Nuclear Regulatory Commission Presented at INMM/ANS Workshop on Safety-Security Risk-Informed Decision-Making
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
EDUCATION: EXPERIENCE: Ph.D. Iowa State University, Fall 1998 Fields: Public Economics, Environmental Economics, Microeconomic Theory
Kevin Siqueira University of Texas at Dallas School of Economic, Political and Policy Sciences 800 W Campbell Rd, GR 31 Richardson, TX 75080-3021 (972) 883-6480 [email protected] EDUCATION: Ph.D. Iowa
Discover Viterbi: Petroleum Engineering
Discover Viterbi: Petroleum Engineering Professor Iraj Ershaghi, Director of Petroleum Engineering Program Mork Family Department of Chemical Engineering & Materials Science Meghan Balding Graduate & Professional
National Cybersecurity & Communications Integration Center (NCCIC)
National Cybersecurity & Communications Integration Center (NCCIC) FOR OFFICIAL USE ONLY NCCIC Overview NCCIC Overview The National Cybersecurity and Communications Integration Center (NCCIC), a division
EDUCATION DEGREES University of California Ph.D. Information & Computer Science 1990
Bonnie E. Melhart Associate Provost and Dean of University Programs TCU Box 297024 Fort Worth, Texas 76129 [email protected] Office phone: 817.257.5570 Home phone: 817-341-2560 Mobile phone: 817-726-4635
Curriculum Vitae EXPERIENCE WORK HISTORY
Jerry O. Wyatt President Wyatt Security Consultants, LLC P O Box 3446 Houston, Texas 77253-3446 281/361-9826 Office/Fax 713/444-0893 - Cell [email protected] www.wscsecurity.com Curriculum Vitae EXPERIENCE
CARVER+Shock Vulnerability Assessment Tool
Published by: Government Training Inc. ISBN: 978-09832361-7-7 CARVER+Shock Vulnerability Assessment Tool A Six Step Approach to Conducting Security Vulnerability Assessments on Critical Infrastructure
DHS. CMSI Webinar Series
DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for
INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT
INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT UNDERGRADUATE Bachelor's programs Bachelor of Business Administration with a concentration in information systems and technology management (http:// bulletin.gwu.edu/business/undergraduate-programs/
B.Sc. in Computer Engineering, School of Electrical and Computer Engineering,
Narges Khakpour Postdoctoral Researcher Theoretical Computer Science School of Computer Science and Communication Royal Institute of Technology (KTH) Stockholm E-mail: [email protected] Leiden Institute
Panel Session: Lessons Learned in Smart Grid Cybersecurity
PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory
Department of Electronic Information Engineering, Beihang Univerisity Specialization: Electrical Engineering, Completion: July 2004
Jin Kocsis (Jin Wei) CURRICULUM VITAE Assistant Professor Department of Electrical and Computer Engineering Auburn Science and Engineering Center, Room 554 The University of Akron Akron, OH, 44325-3905
Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary
Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary May 2007 Environmental Protection Agency Executive Summary
Discover Viterbi: Cyber Security Engineering & Informatics Programs
Discover Viterbi: Cyber Security Engineering & Informatics Programs Professor Cyrus Shahabi Professor Clifford Neuman Meghan Balding Graduate & Professional Programs November 11, 2015 WebEx Quick Facts
Data Security Concerns for the Electric Grid
Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical
Department of Political Science
California State University, San Bernardino 1 Department of Political Science Department of Political Science Social and Behavioral Sciences Building, Room 112 (909) 537-5535 Department of Political Science
JOHN DAVIDSON WOODWARD, JR.
JOHN DAVIDSON WOODWARD, JR. Professor of the Practice of International Relations The Frederick S. Pardee School of Global Studies, Boston University 152 Bay State Road, Boston, MA 02215 E-mail: [email protected]
ECONOMIC ASPECTS OF CYBER/INFORMATION SECURITY
ECONOMIC ASPECTS OF CYBER/INFORMATION SECURITY Lawrence A. Gordon Ernst & Young Alumni Professor of Managerial Accounting & Information Assurance The Robert H. Smith School of Business University of Maryland
HOMELAND SECURITY INTELLIGENCE RPAD 556
HOMELAND SECURITY INTELLIGENCE RPAD 556 Dr. James E. Steiner Public Service Professor Rockefeller College The University at Albany, SUNY 423 State Street 518 708 4183 Office hours: by appointment Course
Introduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
Post-Graduation Survey Results 2014 Dietrich College of Humanities & Social Sciences STATISTICS Bachelor of Science
Post-Graduation Survey Results 2014 Bachelor of Science EMPLOYERS AND JOB TITLES Employer Job Title City State/Country Major Alteryx Solutions Developer Bolder CO Econ-Stats Annalect Data Scientist New
TAMMY L. RAPP 7801 Angel Ridge Rd. Athens, OH 45701 (330) 357-7709 [email protected] [email protected]
EDUCATION TAMMY L. RAPP 7801 Angel Ridge Rd. Athens, OH 45701 (330) 357-7709 [email protected] [email protected] 2009 PhD University of Connecticut Organizational Behavior 2003 MBA Alliant International
Brian Alan Snyder, Ph. D.
Brian Alan Snyder, Ph. D. Current work address Department of Mathematics and Computer Science Work phone: (906) 635-2658 Lake Superior State Home phone: (906) 253-9822 650 West Easterday Ave. Department
Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett
Issue Paper Center for Strategic Leadership, U.S. Army War College May 2003 Volume 04-03 Wargaming Homeland Security and Army Reserve Component Issues By Professor Michael Pasquarett Background The President
V&V and QA throughout the M&S Life Cycle
Introduction to Modeling and Simulation and throughout the M&S Life Cycle Osman Balci Professor Department of Computer Science Virginia Polytechnic Institute and State University (Virginia Tech) Blacksburg,
Discover Viterbi: New Programs in Computer Science
Discover Viterbi: New Programs in Computer Science Gaurav S. Sukhatme Professor and Chairman USC Computer Science Department Meghan McKenna Balding Graduate & Professional Programs April 23, 2013 WebEx
SECURITY AND RESILIENCE STUDIES
MASTER OF SCIENCE SECURITY AND RESILIENCE STUDIES Networked for Success. Networked for Industry. Networked for Life. College of Social Sciences and Humanities The number of job postings requiring graduate-level
RYAN K. BAGGETT [email protected]
RYAN K. BAGGETT [email protected] EDUCATION Eastern Kentucky University College of Justice and Safety Department of Safety, Security, and Emergency Management 24 Stratton Building 521 Lancaster Avenue
Department of Homeland Security Federal Government Offerings, Products, and Services
Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity
CURRICULUM VITAE. Ph.D. Candidate Kent State University, Department of Geography
DAVID E. WIDNER Phone: (330) 685-0000 [email protected] CURRICULUM VITAE 2621 Fairland St Cuyahoga Falls, Ohio 44221 Ph.D. Candidate, Department of Geography EDUCATION PhD, Geography (Cognate, Biology)
Teaching in School of Electronic, Information and Electrical Engineering
Introduction to Teaching in School of Electronic, Information and Electrical Engineering Shanghai Jiao Tong University Outline Organization of SEIEE Faculty Enrollments Undergraduate Programs Sample Curricula
Joshua G. Rosett PUBLICATIONS. Refereed Journal Articles
Joshua G. Rosett Curb Family Associate Professor of Business and Law and George R. Roberts Fellow Robert Day School of Economics and Finance Claremont McKenna College 500 E. 9 th St. Claremont, CA 91711
Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 )
Curriculum Vitae Michael Tu Current Employment: (August, 2012 ) Assistant Professor Department of Computer Information Technology and Graphics School of Technology Purdue University Calumet Email: [email protected]
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
Physics Graduate Program Handbook
Carnegie Mellon University Department of Physics November 14, 2012 Version 1.1 Physics Graduate Program Handbook This document presents the rules and requirements governing the Graduate Program in the
USF Graduate Catalog 2015 2016 SECTION 18. http://www.grad.usf.edu/
SECTION 18 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 18 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate
Managing Cyber Risks to Transportation Systems. Mike Slawski Cyber Security Awareness & Outreach
Managing Cyber Risks to Transportation Systems Mike Slawski Cyber Security Awareness & Outreach The CIA Triad 2 SABSA Model 3 TSA Mission in Cyber Space Mission - Facilitate the measured improvement of
June Zhang (Zhong-Ju Zhang)
(Zhong-Ju Zhang) Carnegie Mellon University Dept. Electrical and Computer Engineering, 5000 Forbes Ave. Pittsburgh, PA 15213 Phone: 678-899-2492 E-Mail: [email protected] http://users.ece.cmu.edu/~junez
Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission
Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012 American expectations of how their government
UNM Information Assurance Scholarship for Service (SFS) Program
UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and
2014 - present: Assistant Professor, Foster Faculty Fellow Michael G. Foster School of Business, University of Washington
Hema Yoganarasimhan Foster School of Business University of Washington Box 353226, Seattle, WA 98195 Email: [email protected] http://faculty.washington.edu/hemay Research Interests Empirical measurement and
David Richard Tannenbaum
David Richard Tannenbaum UCLA Anderson School of Management 110 Westwood Plaza, Cornell Hall D502 Los Angeles, CA 90095-1481 Phone: (559) 362-0372 Email: [email protected] Webpage: webfiles.uci.edu/dtannenb/www/
