How To Improve Experimental Cybersecurity Research
|
|
|
- Arabella Clarke
- 5 years ago
- Views:
Transcription
1 Terry Benzel USC Information Sciences Institute May 18, 2015 The Science of Cyber Security Experimentation
2 The DETER Project A research program: To advance capabilities for experimental cybersecurity research A testbed facility: To serve as a publicly available national resource A community building activity: To foster and support collaborative science 2
3 The DETER Facility A general purpose, flexible platform for modeling, emulation, and controlled study of large, complex networked systems Elements located at USC/ISI (Los Angeles), UC Berkeley, and USC/ISI (Arlington, VA) Funded by NSF and DHS, started in 2003 Based on Emulab software, with focus on security experimentation Shared resource multiple simultaneous experiments subject to resource constraints Open to academic, industrial, govt researchers essentially worldwide very lightweight approval process 3
4 Physical Platform ~440 PC-based nodes Los Angeles, CA Nodes Arlington, VA 20 Nodes Interconnect Berkeley, CA - ~200 Nodes 1 Gb/s LA-UCB 1-10 Gb/s LA-Arlington Local and Remote access 4
5 Research Goals Advance our understanding of of experimental cybersecurity science and methodologies Enable new levels of rigor and repeatability Transform low level results to high level understanding Broaden the domains of applicability Advance the technology of experimental infrastructure Develop technologies with new levels of function, applicability, and scale Share knowledge, results, and operational capability Facility, data and tools Community and knowledge 5
6 Scalable Modeling and Emulation The problem: Traditional testbeds can model and emulate small systems at a fixed level of fidelity. The challenge: Many real problems require modeling of large, complex systems at an appropriate ( good enough ) level of fidelity. That level may be different for different parts of the modeled system. Think of this as smearing the computation power around to just where it s needed. 6
7 Containers DETER containers use virtualization to support larger experiments Containers use several different types of virtualization Selecting different virtualization types allows a trade-off: One container per physical machine high fidelity. More containers per physical machines less fidelity. 7
8 8 Scalable Control and Instrumentation Experiment scenarios require many disparate elements to be combined within a single overall scenario. These elements must be: deployed, initialized, configured, monitored and coordinated instrumented with real-time and post-mortem data collection throughout the execution of the experiment. DETER s MAGI agent infrastructure provides an architecture for scalable control and instrumentation
9 Multi-agent system to Model Some Human Behavior Testbeds must model impact of human activity in repeatable experiments Provide more realistic behavior for testing security tools But real humans are expensive and non-repeatable Model goal-directed team activity Measure impact of an attack on team goals Model impact of organization structure Model certain human characteristics Propensity to make mistakes Aspects of physiology, (soon: emotion, bounded rationality) Flexibility to changing conditions Configurable tool for experimenters 9
10 DETER User Institutions Academia Bar-Ilan University Carnegie Mellon University Columbia University Cornell University Dalhousie University DePaul University George Mason University Georgia State University Hokuriku Research Center ICSI IIT Delhi IRTT ISI Johns Hopkins University Lehigh University MIT New Jersey Institute of Technology Norfolk State University Pennsylvania State University Purdue University Rutgers University Sao Paulo State University Southern Illinois University TU Berlin TU Darmstadt Industry Texas A&M University UC Berkeley Government Air Force Research Laboratory DARPA Lawrence Berkeley National Lab Naval Postgraduate School Sandia National Laboratories Industry Agnik, LLC Aerospace Corporation Backbone Security BAE Systems, Inc. BBN Bell Labs Cs3 Inc. Distributed Infinity Inc. EADS Innovation Works FreeBSD Foundation icast Institute for Information UC Davis UC Irvine UC Santa Cruz UCLA UCSD UIUC UNC Chapel Hill UNC Charlotte Universidad Michoacana de San Nicolas Universita di Pisa University of Advancing Technology University of Illinois, Urbana-Champaign University of Maryland University of Massachusetts University of Oregon University of Southern Callfornia University of Washington University of Wisconsin - Madison USC UT Arlington UT Austin UT Dallas Washington State University Washington University in St. Louis Western Michigan University Xiangnan University Youngstown State University 10
11 DETER User Research 11
12 Education Hands on exercises Students gain from direct observation of attacks and interaction Pre packaged for both student and teacher Buffer overflows, command-injection, man-in-the-middle, worm modeling, botnets, and DoS Facility support for class administration 12
13 Next Steps - Ecosystem SRI and ISI developing strategic plan: Planning grant from NSF Study current/ future cybersecurity research Current/expected experimentation infrastructure Create roadmap for developing: Accessible, broad, and multi-organizational cybersecurity experimentation capability that meets tomorrow s research needs 13
14 The Road to Tomorrow: Cybersecurity Experimentation of the Future 14
15 Motivation: Why are We Doing This? Society s cyber dependencies are rapidly evolving In nearly every aspect of our lives, we are moving toward pervasive embedded computing with a fundamental shift in network properties These changes bring a very real and wideranging set of challenging cyber threats Addressing these challenges will require cybersecurity research based on sound scientific principles The scale and complexity of the challenges will require that researchers apply new experimentation methods that enable discovery, validation, and ongoing analysis 15
16 Research Infrastructure for Cybersecurity Research Cybersecurity R&D is still a relatively young field It involves intrinsically hard challenges Inherent focus on worst case behaviors and rare events In the context of multi-party and adversarial/competitive scenarios Research infrastructure is crucial Allow new hypotheses to be tested, stressed, observed, reformulated, and ultimately proven before making their way into operational systems Ever increasing cyber threat landscape demands new forms of R&D and new revolutionary approaches to experimentation and test Clearly a need for future research infrastructure that can play a transformative role for future cybersecurity research 16
17 The Need for Transformational Progress Transformational progress in three distinct, yet synergistic areas is required to achieve the desired objectives: 1) 2) 3) Fundamental and broad intellectual advance in the field of experimental methodologies and techniques With particular focus on complex systems and human-technical interactions New approaches to rapid and effective sharing of data and knowledge and information synthesis That accelerate multi-discipline and cross-organizational knowledge generation and community building Advanced experimental infrastructure capabilities and accessibility A Science of Cybersecurity Experimentation 17
18 Science of Cybersecurity Experimentation New direction for the field of experimental cybersecurity R&D R&D must be grounded in scientific methods and tools to fully realize the impact of experimentation Different than and complementary with the science of cybersecurity Source: New approaches to sharing all aspects of the experimental science data, designs, experiments, and research infrastructure Cultural and social shifts in the way researchers approach experimentation and experimental facilities New, advanced experimentation platforms that can evolve and are sustainable as the science and the community mature 18
19 Roadmap for a New Generation of Experimental Cybersecurity Research The roadmap presents requirements, objectives and goals for 30 key capabilities organized into 8 core areas over 3, 5, and 10 year phases Some phases build upon each other and others require new fundamental research over a long time period 8 core areas Key capabilities consider: 30 key capabilities Current experimental cybersecurity research and its supporting infrastructure Other types of research facilities Existing cyber-domain T&E capabilities (primarily DoD) The roadmap presumes advances in key computer science 19 disciplines
20 A Definition of Cybersecurity Experimentation Infrastructure General purpose ranges and testbeds (physical and/or virtual) Specialized ranges and testbeds (physical and/or virtual) Software tools that supports one or more parts of the experiment life cycle, including, but not limited to: Experiment design Testbed provisioning software Experiment control software Testbed validation Human and system activity emulators Instrumentation systems and humans Data analysis Testbed health and situational awareness Experiment situational awareness Other similarly relevant tools Specialized hardware tools simulators, physical apparatus, etc. 20
21 Ecosystem of Different Experimental Capabilities Spanning Multiple Domains The goal is not to create a single instance of a cyber experimentation testbed or facility Over time the roadmap may be realized through an ecosystem of many different instantiations from small, stand-alone and localized to large distributed experimental capabilities, all spanning multiple domains SMALL STANDALONE LOCALIZED LARGE DISTRIBUTED 21
22 Hybrid Architectures Based on Different Building Blocks Cloud technology Software defined networking (SDN) Knowledge sharing and community environments Integrated Development Environments E.g., Eclipse Emulated and simulated environments E.g., RTDS, wireless Specialized hardware E.g., FPGA, GPU, Intel Xeon Phi No single hardware/software substrate 22
23 Research Infrastructure is More than Infrastructure Research infrastructure >> infrastructure of machines and tools Scientific methodologies, experimental processes, and education are critical to effective use of the machines and tools Research infrastructure requires meta-research into: Design specification (multi-layered languages and visualization) Abstraction methodologies and techniques Semantic analysis and understanding of experimenter intent Formal methods and a rich approach to modeling to satisfy science objectives 23
24 Where is Experimentation Applicable? Overarching goal is to increase researcher effectiveness and support the generation and preservation of solid empirical evidence Infrastructure to enable research, not constrain New mechanisms to capture and share knowledge (designs, data and results) to enable peer review and allow researchers to build upon each other Experimentation is about learning To perform an evaluation (not formal T&E) To explore a hypothesis To characterize complex behavior To complement a theory To understand a threat To probe and understand a technology 24
25 Representative Cybersecurity Hard Problems Systems/software Human interactions System of system security metrics Emergent behavior in large scale systems Supply chain and root of trust Societal impacts and regulatory policies Networking Anonymity and privacy of data and communication Trust infrastructure Software defined networking (SDN) Political, social, and economic (balance-of-interest) goals in network design Pervasive communications, across organizational and political boundaries Cyber-physical systems Embedded devices Autonomous vehicles, smart transportation Electric power, smart grid Medical implants, body sensors, etc. 25
26 Experimentation It s About the Real World Experimentation should start with models of the real world Modeling and abstraction allow us to capture conceptual models of the real world with varying degrees of fidelity Key research areas include: Experiment design specifications Auto-generated model refinement Methodologies and tools to assess representation Understanding the multiple dimensions of realism Taxonomies of realism metrics for realism sufficiency Additional methods and tools can help extend these modeling activities to provide increasing forms of real world models 26
27 Leveraging Existing Infrastructure Leverage current NSF, DHS, and DOD investments as starting points GENI Community model Integration of real infrastructure (overlay network, part of real deployments) DETER Research and operational knowledge Experimental framework Specialized experimentation and cybersecurity tools E.g., MAGI, Containers MIT Lincoln Laboratory Standard experiment specification languages E.g., CRIS, CCER Specialized experimentation tools E.g., ALIVE, LARIAT, LLAF, KOALA Other government sponsored infrastructure DOD, DOE, DOT, etc. 27
28 Join Us students, post docs, research programmers, computer scientists, faculty Click to edit Master text styles Second level Third level Fourth level Fifth level
Cybersecurity Experimentation of the Future (CEF): Catalyzing a New Generation of Experimental Cybersecurity Research FINAL REPORT
Cybersecurity Experimentation of the Future (CEF): Catalyzing a New Generation of Experimental Cybersecurity Research Community Plan and Roadmap to Develop Future Experimentation Infrastructure in Support
UC AND THE NATIONAL RESEARCH COUNCIL RATINGS OF GRADUATE PROGRAMS
UC AND THE NATIONAL RESEARCH COUNCIL RATINGS OF GRADUATE PROGRAMS In the Fall of 1995, the University of California was the subject of some stunning news when the National Research Council (NRC) announced
DISCUSSION ITEM ANNUAL REPORT ON NEWLY APPROVED INDIRECT COSTS AND DISCUSSION OF THE RECOVERY OF INDIRECT COSTS FROM RESEARCH BACKGROUND
F2 Office of the President TO MEMBERS OF THE COMMITTEE ON FINANCE: For Meeting of November 17, 2010 DISCUSSION ITEM ANNUAL REPORT ON NEWLY APPROVED INDIRECT COSTS AND DISCUSSION OF THE RECOVERY OF INDIRECT
Graduate School Rankings By U.S. News & World Report: ENGINEERING SCHOOLS
Rank Universities 1 University of California, Berkeley 2 Georgia Institute of Technology 3 University of Illinois, Urbana-Champaign 4 University of Texas, Austin 5 University of Michigan, Ann Arbor 6 Purdue
Freshmen Acceptance Rate AAU Public Universities
Freshmen University of California, Berkeley 27% University of California, Los Angeles 27% University of North Carolina, Chapel Hill 37% University of Virginia 38% University of California, San Diego 44%
University Your selection: 169 universities
University Your selection: 169 universities Level of study: bachelor, master Regions: United States, compareuni T eaching & Learning Research Knowledge T ransf er International Orientation Regional Engagement
How To Rank A Graduate School
Graduate School Rankings Debate: U.S. News and World Report --and beyond Every year, U.S. News and World Report publishes a ranking of different graduate programs and, every year, college and university
US News & World Report Graduate Program Comparison 1994 2015 Year ranking was published
US News & World Report Graduate Program Comparison Year was published Select Findings from US News and World Report - Engineering Schools MIT Engineering Year that was released Rank 1 1 1 1 1 1 1 1 1 1
Summary of Doctoral Degree Programs in Philosophy
Summary of Doctoral Degree Programs in Philosophy Faculty and Student Demographics All data collected by the ican Philosophical Association. The data in this publication have been provided by the departments
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
Graduate School Rankings By U.S. News & World Report: MECHANICAL ENGINEERING
Rank Universities Score 1 University of California, Berkeley 4.8 4 Purdue University, West Lafayette 4.2 6 University of Minnesota, Twin Cities 3.9 7 Penn State University, University Park 3.8 7 Texas
Graduate School Rankings By U.S. News & World Report: ELECTRICAL/ELECTRONIC ENGINEERING
Rank Universities Score 2 University of Illinois, Urbana-Champaign 4.7 3 University of Michigan, Ann Arbor 4.4 4 University of Texas, Austin 4.2 5 Purdue University, West Lafayette 4.1 6 University of
Graduate School Rankings By U.S. News & World Report: PSYCHOLOGY (RESEARCH) - Ph.D.
PSYCHOLOGY (RESEARCH) - Ph.D. Assessment 1 University of California, Berkeley 4.6 1 University of Michigan, Ann Arbor 4.6 3 University of California, Los Angeles 4.4 3 University of Illinois, Urbana-Champaign
Summary of Doctoral Degree Programs in Philosophy
Summary of Doctoral Degree Programs in Philosophy, Opportunities, and Program Completion All data collected by the American Philosophical Association. The data in this publication have been provided by
Realization of Your Dream: Higher Study, Partnership, Collaboration Opportunities
Realization of Your Dream: Higher Study, Partnership, Collaboration Opportunities Dr. Ashutosh Dutta, Ph.D. Lead Scientist, AT&T New Jersey, USA Email: [email protected] Realization of Your Dream
U.S. News & World Report 2015 Best Colleges Rankings Summary Report
U.S. News & World Report 2015 Best Colleges ings Summary Report U.S. News World Report releases the Best Colleges ings each fall. These undergraduate rankings are used by students to help them decide where
Graduate School Rankings By U.S. News & World Report: ACCOUNTING PROGRAMS
2 University of Illinois, Urbana-Champaign 2 University of Michigan, Ann Arbor 4 Indiana University, Bloomington 6 University of California, Berkeley 7 Michigan State University 8 Ohio State University
By Brian L. Yoder, Ph.D.
Engineering by the Numbers By Brian L. Yoder, Ph.D. Bachelor s Degrees and Enrollment Engineering bachelor s degrees grew by 6 percent during the past year, reaching a total of 99,173 for 214. This continues
Psychology NRC Study S Rankings (1 of 6)
1 2 3 4 5 6 Princeton U. Harvard U. Stanford U. U. of Wisconsin at Madison Yale U. U. of Rochester U. of Michigan at Ann Arbor San Diego State U. and U. of California at San Diego Columbia U. U. of California
Psychology NRC Study R Rankings (1 of 6)
1 2 3 4 5 6 7 8 Princeton U. Harvard U. Stanford U. U. of Michigan at Ann Arbor Yale U. U. of Wisconsin at Madison U. of Rochester U. of California at Los Angeles Columbia U. Brown U. U. of Chicago U.
in the Rankings U.S. News & World Report
in the Rankings UCLA performs very well in all the national and international rankings of the best public and private universities, including the most widely known list published by U.S. News & World Report.
Graduate School Rankings By U.S. News & World Report: MARKETING PROGRAMS
3 University of California, Los Angeles 4 University of Texas, Austin 5 University of North Carolina, Chapel Hill 6 University of Virginia 7 Indiana University, Bloomington 8 University of Florida 9 University
Dr. Raju Namburu Computational Sciences Campaign U.S. Army Research Laboratory. The Nation s Premier Laboratory for Land Forces UNCLASSIFIED
Dr. Raju Namburu Computational Sciences Campaign U.S. Army Research Laboratory 21 st Century Research Continuum Theory Theory embodied in computation Hypotheses tested through experiment SCIENTIFIC METHODS
SCADA System Overview
Introduction SCADA systems are critical to the control and monitoring of complex cyber-physical systems. Now with advanced computer and communications technologies, SCADA systems are connected to networks
Graduate School Rankings By U.S. News & World Report: CIVIL ENGINEERING
Rank Universities Score 1 University of California, Berkeley 4.8 2 University of Illinois, Urbana-Champaign 4.6 3 Purdue University, West Lafayette 4.4 5 University of Michigan, Ann Arbor 4.1 6 University
in the Rankings U.S. News & World Report
UCLA performs very well in all the national and international rankings of the best public and private universities, including the most widely known list published by U.S. News & World Report. Following
Tuition and Fees. & Room and Board. Costs 2011-12
National and Regional Comparisons of Tuition and Fees & Room and Board Costs 2011-12 Table of Contents Table of Contents... 1 Comparator Institutions... 3 University of Wyoming Comparator Institutions...
U.S. News & World Report 2014 Best Colleges Rankings Summary Report
U.S. News & World Report 2014 Best Colleges ings Summary Report U.S. News World Report releases the Best Colleges ings each fall. These undergraduate rankings are used by students to help them decide where
U.S. News & World Report
IN THE RANKINGS UCLA performs very well in all the national and international rankings of the best public and private universities, including the most widely known list published by U.S. News & World Report.
in the Rankings U.S. News & World Report
in the Rankings UCLA performs very well in all the national and international rankings of the best public and private universities, including the most widely known list published by U.S. News & World Report.
BENCHMARKING UNIVERSITY ADVANCEMENT PERFORMANCE
F-14 BENCHMARKING UNIVERSITY ADVANCEMENT PERFORMANCE Benchmarking Data based on VSE stats (2007 survey results released on February 22, 2008) and peer lists including Universities in $2+ Billion-Dollar
By Brian L. Yoder, Ph.D.
Engineering by the Numbers By Brian L. Yoder, Ph.D. Bachelor s Degrees and Enrollment Degrees awarded to students graduating with a bachelor s degree from an engineering program increased by 7.5 percent
2009 GRADUATE FACULTY IN PSYCHOLOGY INTERESTED IN LESBIAN, GAY, BISEXUAL, & TRANSGENDER ISSUES SURVEY
2009 GRADUATE FACULTY IN PSYCHOLOGY INTERESTED IN LESBIAN, GAY, BISEXUAL, & TRANSGENDER ISSUES SURVEY Climate Indicators Nondiscrimination Policy for ALABAMA Auburn University University of South Alabama
SCHOOL SCHOOL S WEB ADDRESS. HOURS Tempe Arizona Ph.D. 4-5 54-84 January 15 $60 Not given 550/213
SCHOOL SCHOOL S WEB ADDRESS 1 Arizona State University http://wpcarey.asu.edu/acc/doctoral.cfm 2 Baruch College CUNY http://zicklin.baruch.cuny.edu/programs/doctoral/areas-of-study/accounting 3 Bentley
Universities classified as "very high research activity"
Universities classified as "very high research activity" 108 institutions classified as "RU/VH: Research Universities (very high research activity)" in the 2010 Carnegie Classification of Institutions
National Bureau for Academic Accreditation And Education Quality Assurance LINGUISTICS # UNIVERSITY CITY STATE DEGREE MAJOR SPECIALTY RESTRICTION
1 UNIVERSITY OF MASSACHUSETTS - BOSTON ~ BOSTON MA M 1 ARIZONA STATE UNIVERSITY - TEMPE TEMPE AZ MD ~ M for Linguistics is for Residential Program ONLY. The online option is not ~ M in Linguistics is for
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 st CENTURY SCIENCE AND ENGINEERING (CIF21)
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 st CENTURY SCIENCE AND ENGINEERING (CIF21) Goal Develop and deploy comprehensive, integrated, sustainable, and secure cyberinfrastructure (CI) to accelerate research
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21)
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) Overview The Cyberinfrastructure Framework for 21 st Century Science, Engineering, and Education (CIF21) investment
Q2 Which university will you be attending? American University (366) Arizona State University (367) Boston University (368) Brown University (439)
Decline Offer Survey Thank you for considering the University of Washington during your search for a graduate degree program. We understand that many factors influence each applicant s decision in selecting
UCLA in the Rankings. U.S. News & World Report
UCLA performs very well in all the national and international rankings of the best public and private universities, including the most widely known list published by U.S. News & World Report. Following
Undergraduate School Rankings By U.S. News & World Report:
Peer Assessment 1 University of California, Berkeley 4.5 1 University of Michigan, Ann Arbor 4.5 3 University of North Carolina, Chapel Hill 4.2 5 University of Virginia 4.1 6 Indiana University, Bloomington
The DETER Project. Advancing the Science of Cyber Security Experimentation and Test
The DETER Project Advancing the Science of Cyber Security Experimentation and Test Jelena Mirkovic, Terry V. Benzel, Ted Faber, Robert Braden, John T. Wroclawski USC Information Sciences Institute Marina
By Brian L. Yoder, Ph.D.
Engineering by the Numbers By Brian L. Yoder, Ph.D. Bachelor s Degrees and Enrollment Engineering bachelor s degrees rose by 6 percent in 212, reaching 88,176. Growth in degrees is expected to continue
Graduate School Rankings By U.S. News & World Report: COMPUTER ENGINEERING
Rank Universities Score 2 University of Illinois, Urbana-Champaign 4.6 3 University of Michigan, Ann Arbor 4.5 4 University of Texas, Austin 4.1 5 Purdue University, West Lafayette 4.0 6 University of
US News & World Report Best Undergraduate Engineering Programs: Specialty Rankings 2014 Rankings Published in September 2013
US News & World Report Best Undergraduate Engineering Programs: Specialty Rankings 2014 Rankings Published in September 2013 Aerospace/Aeronautical/Astronautical 2 Georgia Institute of Technology Atlanta,
A Guide to Graduate Study in Economics: Ranking Economics Departments by Fields of Expertise
Southern Economic Journal 2008, 74(4), 971 996 A Guide to Graduate Study in Economics: Ranking Economics Departments by Fields of Expertise Therese C. Grijalva* and Clifford Nowell{ Ph.D. programs in economics
Demographic Trends of Engineering Students
Engineering by the Numbers By Brian L. Yoder, Ph.D. Bachelor s Degrees and Enrollment Engineering bachelor s degrees grew by 5.6 percent during 211, reaching 83,1. Almost all fields grew in the number
Big Data R&D Initiative
Big Data R&D Initiative Howard Wactlar CISE Directorate National Science Foundation NIST Big Data Meeting June, 2012 Image Credit: Exploratorium. The Landscape: Smart Sensing, Reasoning and Decision Environment
SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015
SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST
Frequently Asked Questions
Q: Is there a shortage of Accounting faculty? Frequently Asked Questions A: There is going to be a very large number of retirements in the next few years. Accounting faculty do retire at an average age
BenefitsMonitor National Higher Education Participants. Mercer Health & Benefits 20
BenefitsMonitor National Higher Education Participants Arizona State University Austin Peay State University Bates College Baylor College of Medicine Baylor University Boston University Bowling Green State
GrantsNet (for training in the biomedical sciences and undergraduate science education) http://www.grantsnet.org/
Sponsored by the University of Colorado at Boulder SUMMER RESEARCH OPPORTUNITIES FOR UNDERGRADUATES Sites that have lists of opportunities: American Mathematical Society Research Experiences for Undergraduates
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
Tufts University Senior Survey 2010 Graduate Schools by Major Report
Tufts University Graduate Schools by Major Report Note: This report includes both first and second major data, resulting in several students appearing twice under their first major and again under their
Graduate School Rankings By U.S. News & World Report: ENVIRONMENTAL ENGINEERING
Rank Universities Score 1 University of California, Berkeley 4.7 2 University of Illinois, Urbana-Champaign 4.5 3 University of Texas, Austin 4.4 4 University of Michigan, Ann Arbor 4.2 5 University of
Graduate Programs Applicant Report 2011
Graduate Programs Applicant Report 2011 OHSU data was accumulated: 1 July 2010 to 30 June 2011 and refers to applicant pool for students admitted in summer/fall of 2011. No data from MBA applicants is
EL Program: Smart Manufacturing Systems Design and Analysis
EL Program: Smart Manufacturing Systems Design and Analysis Program Manager: Dr. Sudarsan Rachuri Associate Program Manager: K C Morris Strategic Goal: Smart Manufacturing, Construction, and Cyber-Physical
NSF Cyber Security Conference. FBI Counterintelligence Domain Program Briefing
NSF Cyber Security Conference FBI Counterintelligence Domain Program Briefing History/Evolution of the DECCA Program Developing Espionage and Counterintelligence Awareness ANSIR Awareness of National Security
TOURNAMENT RESULTS 1 N A T I O N A L I N T R A M U R A L - R E C R E A T I O N A L S P O R T S A S S O C I A T I O N
TOURNAMENT RESULTS 1 N A T I O N A L I N T R A M U R A L - R E C R E A T I O N A L S P O R T S A S S O C I A T I O N 2005 USA Team Tennis National Campus Championship POOL A (A1) Texas A & M University
Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu
Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu January 2014 1/29/2014 1 Our History NSA/DHS Center for Excellence in Cyber Security Education
NASPAA s Research Universities Report 3/4/16
NASPAA s Research Universities Report 3/4/16 Data Source: 2014-2015 NASPAA Annual Data Report N= 109 schools, 120 programs 70% of Research Universities Fall 2015 Current Enrollment 15552 students Average
Northrop Grumman Cybersecurity Research Consortium
Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information
Fast Facts About The Cyber Security Job Market
Cybersecurity Cybersecurity is the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Cybersecurity is the faster growing IT job, growing
AACSB Accredited Business Schools with Management Consulting Courses in MBA Programs (April 2004)
AACSB Accredited Business Schools with Management Consulting Courses in MBA Programs (April 2004) School Name Adolfo Ibanez University (Chile) University of Alabama at Birmingham (USA - Alabama) University
2014 - present: Assistant Professor, Foster Faculty Fellow Michael G. Foster School of Business, University of Washington
Hema Yoganarasimhan Foster School of Business University of Washington Box 353226, Seattle, WA 98195 Email: [email protected] http://faculty.washington.edu/hemay Research Interests Empirical measurement and
Smart Manufacturing as a Real-Time Networked Enterprise and a Market-Driven Innovation Platform
Smart Manufacturing as a Real-Time Networked Enterprise and a Market-Driven Innovation Platform Jim Davis Vice Provost IT & CTO at UCLA and SMLC Board Director Technology Denise Swink CEO SMLC Role/Viewpoint
US News & World Report Undergraduate Rankings. Updated 09/08/2014
US News & World Report Undergraduate Rankings Updated 09/08/2014 Scores 1998 1999 2000 2001 Overall score 97 98 92 96 95 93 95 94 93 94 93 94 93 91 93 94 92 93 Peer assessment score* 3.9 4.9 4.9 4.9 4.9
IEEE-Northwest Energy Systems Symposium (NWESS)
IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific
Minnetonka High School s International Baccalaureate Diploma Programme Candidates are some of the top-tier colleges recruits in the world.
Minnetonka High School s International Baccalaureate Diploma Programme Candidates are some of the top-tier colleges recruits in the world. were at American University Amherst College Baylor University
NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing
NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing Purpose of the Workshop In October 2014, the President s Council of Advisors on Science
Test Requirements at Top Colleges
Test Requirements at Top Colleges To follow are standardized test requirements for some top schools. These requirements change year to year so please make sure you research all of the schools to which
A Ranking of Political Science Programs Based on Publications in Top Academic Journals and Book Presses
A Ranking of Political Science Programs Based on Publications in Top Academic Journals and Book Presses THIS REPORT WAS CREATED AS AN INTERNAL DOCUMENT TO ACCOMPANY THE POLITICAL SCIENCE PRE-PROPOSAL FOR
DHS S&T Cyber Security R&D Program
Dept. of Homeland Security Science & Technology Directorate DHS S&T Cyber Security R&D Program PSU NSRC Industry Day State College, PA October 17, 2006 Douglas Maughan, Ph.D. Program Manager, HSARPA [email protected]
Public Health and Law Schools Reported by Survey Respondents
Public Health and Law Schools Reported by Survey Respondents The following is a list of the public health and law schools attended by survey respondents. Schools have been divided into three, mutually
Creighton University Denison University DePaul University Drexel University Duke University Eckerd University Edinboro University of Pennsylvania
COLLEGE PLACEMENT Academy of Art University Adrian College Alderson-Broaddus College Alfred University Allegheny College American University Angelo State University Arcadia University Arizona State University
College Acceptances The University of Akron The University of Alabama Albion College Allegheny College American University Anderson University-IN
College Acceptances The University of Akron The University of Alabama Albion College Allegheny College American University Anderson University-IN Arizona State University The University of Arizona Art
8/12/15 Summary of Results of Survey of US Academic Departments that Include Planetary Science
8/12/15 Summary of Results of Survey of US Academic Departments that Include Planetary Science A survey was sent out to university departments around the US that were thought to include faculty involved
network PRoteCtion and information L G S H a S P e R F o R M e D assurance networks R e D t e a M S e C U R i t Y
Solving the Federal Government s Toughest Cyber Security Problems NETWORK PROTECTION AND INFORMATION ASSURANCE NETWORKS WITH A RICH HERITAGE OF ACHIEVEMENT AND LEVERAGING THE EXPERTISE AND RESOURCES OF
NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives
NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives Center of excellence for secure integration, deployment and sustainment of Industrial Control Systems and Operational Technology
In Search of Peer Institutions for UC Merced
In Search of Peer Institutions for UC Merced UC Merced s Office of Institutional Planning and Analysis was asked to propose a set of reference institutions to be used for a variety of planning and performance
Facility Usage Scenarios
Facility Usage Scenarios GDD-06-41 GENI: Global Environment for Network Innovations December 22, 2006 Status: Draft (Version 0.1) Note to the reader: this document is a work in progress and continues to
NUMBERS. Engineering degrees increased at all levels THE YEAR IN BY MICHAEL T. GIBBONS
THE YEAR IN NUMBERS BY MICHAEL T. GIBBONS Engineering degrees increased at all levels during the 24-5 academic year. This trend has continued at the bachelor s and master s levels since 1999. Doctoral
