Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro



Similar documents
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Introduction Open Source Security Tools for Information Technology Professionals

Information Security Curriculum Creation: A Case Study

Cyber Security at NSU

Introduction to Cyber Security / Information Security

Critical Controls for Cyber Security.

INDIANAPOLIS, IN 2011 CATALOG Volume 78

Open Source Security Tools for Information Technology Professionals

Minnesota State Community and Technical College Detroit Lakes Campus

TEACHING COMPUTER SECURITY WITH A HANDS-ON COMPONENT

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

Bellevue University Cybersecurity Programs & Courses

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

AC : INNOVATIVE NETWORK SECURITY COURSE DEVELOPMENT

CRYPTUS DIPLOMA IN IT SECURITY

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

EDUCATION FOR THE FUTURE.

Chapter 1 The Principles of Auditing 1

information security and its Describe what drives the need for information security.

Computer and Information Science

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

MS Information Security (MSIS)

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Teaching Information Security to Engineering Managers

Building the Next Generation of Computer Security Professionals. Chris Simpson

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach

COMPUTER SCIENCE & INFORMATION TECHNOLOGY

NETWORK SECURITY (W/LAB) Course Syllabus

Vendor Audit Questionnaire

Four Top Emagined Security Services

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

INNOVATION IN UNDERGRADUATE COMPUTER SCIENCE EDUCATION

NIST Cyber Security Activities

CCNA Security v1.0 Scope and Sequence

Linux Network Security

Egyptian Best Practices Securing E-Services

Security Transcends Technology

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

Ethical Hacking Course Layout

Information Security Policy

InfoSec Academy Application & Secure Code Track

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

Generic Aspects and Special Issues for High Speed Networks. Carsten Benecke, DFN-FWL, University of Hamburg

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Security + Certification (ITSY 1076) Syllabus

A Systems Engineering Approach to Developing Cyber Security Professionals

UNM Information Assurance Scholarship for Service (SFS) Program

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Hosted by Lunarline: School of Cyber Security

Meeting Cyber Security Challenges

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

Bachelor of Information Technology (Network Security)

Minor in ii INFORMATION SECURITY i at ESIEA Laval, France

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

NICE and Framework Overview

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Assessment of Learning Report Computer Science CPT Fall 2008 Spring I. Introduction and Background

Information Assurance Program at West Point

Master of Science in Information Systems & Security Management. Courses Descriptions

Access FedVTE online at: fedvte.usalearning.gov

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.

Goals. Understanding security testing

Managing Security in a Free/Open Source Environment

TUSKEGEE CYBER SECURITY PATH FORWARD

The institution offers career-related educational programs that integrate lifelong learning with knowledge and skills to help students:

IDS and Penetration Testing Lab ISA656 (Attacker)

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

University of Maryland Cybersecurity Center (MC 2 )

IT Networking and Security

CCNA Security v1.0 Scope and Sequence

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

The Protection Mission a constant endeavor

The institution offers career-related educational programs that integrate lifelong learning with knowledge and skills to help students:

Transcription:

Interdisciplinary Program in Information Security and Assurance By Kossi Edoh NC A&T State University Greensboro

Information Assurance The protection of electronic information and infrastructures that are used to create, store, process and communicate the information To ensure availability, integrity, authentication, confidentiality, and nonrepudiation.

Introduction Security practitioners have been developed from the job, or recruited from law enforcement or military There is the demand for information assurance professionals from diverse backgrounds and with multidisciplinary expertise Need properly trained professionals to secure our critical infrastructure

Introduction Continued The National Information Assurance Education and Training Partnership program among Industry and Academia (formed in 1990) National Centers of Academic Excellence in Information Assurance Education (CAEIAE) program Now sponsored by NSA and DHS

Criteria for CAEIAE status Evidence of partnership in IS education IS treated as multidisciplinary science University promotes practice of IS IS research Broader IS curriculum Faculty productivity in IS research & scholarship State of art IS resources Concentrations in IS University recognition of IS Dedicated IS faculty

Existing Programs Univ. NC Charlotte and NC A&T Scholarship of Service Program (SFS 2002) NCA&T FUTURES grant 2005/2006 Participation Departments Criminal Justice Department of Mathematics Business and Economics

FUTURES grant 2005/2006 Department of Computer Science School of Technology College of Engineering Students were selected from these departments to work on interdisciplinary research topics.

Goal Develop a program in Information Assurance & Security involving Several Departments Required courses will be taught primarily in the various departments

Curriculum Development Guidelines Curriculum should represent a consensus from the Info Security stakeholders Curriculum be designed to help Info Security faculty produce competent and confident entry-level graduates Curriculum be based on sound methodologies Flexible and adaptable to most departments involved in the program.

Methodology and Demands Backward Curriculum Design Process Begin with desired outcomes and goals and work backward to design learning objectives for related courses. Answer the Question: What should an information security graduate be qualified to do and what positions are available for them

Positions Forensics Network Administrators System Administrators Intrusion Detection System (IDS) Engineers Information Security Manager Integration Reference Point (IRP) Handler Disaster Recovery/Business Continuity Planning (DR/BCP) Manager Information Security Consultant

Roles CISO- Access and manage programs that secure org. information Security Managers- Accountable for operation of security programs Security Administrators hybrid of security manager and technician Security Technician- Take care of security programs Security Staffer- Watch security programs run intrusion console and emails

Approaches to Implement IS Curricula Elements added to existing courses Elements added to capstone courses Design independent security courses Information security certificates/minors Information security degree programs

Number of Courses Involve critical stakeholders Create employable students who can advance academically Capitalize on available resourcesfaculty, classrooms, labs Support national program objectives

Number of Courses One course Introduction to IS or Management of IS (Business) Two courses Technical IS Introduction to IS or Management of IS

Number of courses continued Three courses Introduction to IS Management of IS Technical IS Four or more courses First three plus Firewalls, VPNs OS Security Computer Forensics Security and Law Contingency Planning E-commerce

Proposed Areas of Research Information Security Fundamentals Information Privacy Security Resources Information Security Policy Risk Management Access Control Cryptography

Proposed Area Continue Operating System Security E-Commerce Security Firewalls Intrusion Detection Network Auditing Tools and Penetration Testing Virtual Private Networks Wireless Network Security Incident Response Computer Forensics

Information Assurance Research Laboratory Network and server equipment to support research in intrusion detection and incident response (NMAP scanner) system penetration testing, and assessment development of applications resilient to network degradation algorithm development for intrusion detection vulnerability assessment wireless security protocols, and similar areas

Open Source Software Tool Ethereal Snort Netcat TCPDump Hping2 DSniff GFI LANguard Ettercap Whisker Open Yes Yes Yes Yes Yes Yes Commercial Yes Yes Linux Linux/Windows Linux/Windows Linux/Windows Linux/Windows Linux Linux/Windows Windows Linux/Windows Linux/Windows

Open Source Security Lab Use Virtual machines (Linux running on Windows or NT/2000 and Windows running on Linux) www.vmware.com

Faculty A number of faculty members are involved in the work and activities of Information Assurance Research Laboratory Dr. Kossi Edoh Dr. Verada King Dr. Stephen Providence Professor Mayes Dr. John Kelly

Training for faculty Faculty need to attend IS curriculum programs like the NCISSE, WISE. Faculty workshops on curriculum design for IS From one faculty expect to others Security resources CERT, CIAC, SANS and NIST

End Questions?

Extra Stuff- Advisory Board Industry members

Legal and Ethical issues Protection of traditional knowledge Comparative effectiveness Gray markets for manufacturing Economic of legal systems

Interactive Course and Security Lab Laboratory Firewalls, network Analyzer, Port Scanner, Stenography, Wireless LAN Firewalls and Intrusion detection experiments (Check Point firewall and ISS real Secure IDS sensor) Cryptography Lab Stenography Lab Hybrid Encryption Systems Network Analyzer Lab Vulnerability/Port Scanner Lab Firewall lab Wireless LAN