National Institute for Cybersecurity Studies (NICS) Portal

Similar documents
NATIONAL INSTITUTE FOR CYBERSECURITY STUDIES (NICS) PRESENTED BY PEGGY MAXSON

Anne Arundel Community College Round 1.5 Information Architecture June 22-24, 2015

NICE and Framework Overview

Up, Up, and Upgraded: New Features in GALILEO and More

Information Technology 2015 Programmes

How To Become A Cybersecurity Consultant

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

COMPUTER SCIENCE & INFORMATION TECHNOLOGY

Appendix A-2 Generic Job Titles for respective categories

Contestant Requirements:

CYBER SECURITY TRAINING SAFE AND SECURE

UMUC FED Program. Online Open House July 22, 2015

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

[STAFF WORKING DRAFT]

Catalog of Services. March 21, Veribatim Web Design and Consultation, LLC 3523 Normandy Ave Dallas, TX

Symantec Cyber Security Services: A Recipe for Disaster

Department of Homeland Security Federal Government Offerings, Products, and Services

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

The Technical Differential: Why Service Providers Choose VMware for Cloud-Hosted Desktops as a Service

the school of PUBLIC POLICY

Toward Curricular Guidance in the Cyber Sciences

EC-Council Certified Security Analyst (ECSA)

Introduction to NICE Cybersecurity Workforce Framework

About This Document. Response to Questions. Security Sytems Assessment RFQ

MIND THE GAP INFRASTRUCTURE VS. USER-BASED MONITORING

INFORMATION TECHNOLOGY

Training Program Informational Catalog

MSc in Computer and Information Security

USER EXPERIENCE DESIGNER. Juan Cordoba. M: E: W: chibchadesign.com EXPERT REVIEWS A/B TESTING RESEARCH

New-Age Master s Programme

HELP I NEED TO HIRE A USER EXPERIENCE DESIGNER

user experience interaction design web design web development web:

Graphic Design. College of Design. Undergraduate Information

SOUTH DAKOTA BOARD OF REGENTS. Committee on Academic and Student Affairs

Case Study: Security Implementation for a Non-Profit Hospital

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Information Security Engineering

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

MicroStrategy Mobile QuickStrike

Business Continuity for Cyber Threat

Cyber Security at NSU

User Security Education and System Hardening

National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

eorgette ullivan Portfolio

The Holistic Guide to BYOD in Your Business Jazib Frahim

Ethical Hacking and Penetration Testing Presented by: Adam Baneth Managing director

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Michigan Technological University. Development of System Administration & Network Security Curriculum

Training Program Informational Catalog

Cyber attack on Twitter, 250,000 accounts hacked

Hackers are here. Where are you?

Rising to the Challenge

ISM and 05D, Online Class Business Processes and Information Technology SYLLABUS Fall 2015

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

Choosing the right web design company. A slide guide made by those nice people at

In January 2012, the VetForce1 organization was formed in order to

Maryland Retired School Personnel Association Scholarship FAQ s

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Magento Enterprise Edition Technical Support Guide

NASCIO 2014 State IT Recognition Awards

COURSE SYLLABUS Digital Design

2012 NCSA / Symantec. National Small Business Study

The Institution as Learner Dr. Joyce C Romano Students In Transition Conference 2011

POSITION DETAILS. Centre for Higher Education Development (CHED)

Proposed Education & Workforce Development Plan for FY2015. Education & Workforce Development Work Group Andrew Turner November 2014

Eastern Illinois University information technology services. strategic plan. January,

Virtualized Open-Source Network Security Appliance

National Higher Education & Workforce Initiative Regional Economic Growth Through High skill, High demand Workforce Development

ReMilNet Service Experience Overview

Improving Developmental College Counseling Programs

Envisioning a Portal Solution

Information Security Organizations trends are becoming increasingly reliant upon information technology in

INFORMATION/LIBRARY SCIENCES What can I do with this degree?

CIO and Cyber Security Overview Argonne National Laboratory. Michael A. Skwarek CIO Matthew A. Kwiatkowski CISO Oct. 12, 2011

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time

Analyze. Secure. Defend. Do you hold ECSA credential?

Cisco Advanced Services for Network Security

Applied Information Technology Department

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme)

REQUEST FOR PROPOSALS: WEB INFRASTRUCTURE DEVELOPER SERVICES

National Initiative for Cybersecurity Education

SECURITY. Risk & Compliance Services

Information Technology Department. Miller School of Medicine New User Guide

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE

MAKING A COLLEGE EDUCATION MORE AFFORDABLE THROUGH INNOVATION AND COLLABORATION

Accelerated Associate to Master s Degree in Nursing

CAPSEE Conference September 19, 2014

The Business Case for Healthcare Access Solution

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW

Managed Security Services. Leverage our experienced security operations team to improve your cyber security posture

Building a Security Operations Center. Randy Marchany VA Tech IT Security Office and Lab marchany@vt.edu

Zone Labs Integrity Smarter Enterprise Security

Transcription:

National Institute for Cybersecurity Studies (NICS) Portal Presented by Anne Connell WWW.CSRC.NIST.GOV/NICE/ 10/24/2011

Human-Centered Design Process 2

Human-Centered Design Process RESEARCH 3

Human-Centered Design Process RESEARCH CONCEPT DEVELOPMENT 4

Human-Centered Design Process RESEARCH CONCEPT DEVELOPMENT REFINEMENT + IMPLEMENTATION 5

Human-Centered Design Process RESEARCH CONCEPT DEVELOPMENT REFINEMENT + IMPLEMENTATION FINAL DESIGN 6

Human-Centered Design Process We are here. RESEARCH CONCEPT DEVELOPMENT REFINEMENT + IMPLEMENTATION FINAL DESIGN 7

Methods & Deliverables RESEARCH Market Analysis Online Surveys Contextual Interviews Personas 8

Methods & Deliverables RESEARCH Market Analysis Online Surveys Contextual Interviews Personas CONCEPT DEVELOPMENT Affinity Diagramming Brainstorming Sessions Content Strategy Usability Testing Information Architecture Wireframes Prototype 9

Methods & Deliverables RESEARCH Market Analysis Online Surveys Contextual Interviews Personas CONCEPT DEVELOPMENT Affinity Diagramming Brainstorming Sessions Content Strategy Usability Testing Information Architecture Wireframes Prototype REFINEMENT + IMPLEMENTATION Look & Feel Design CMS Implementation Usability Testing Screen Designs Final Prototype 10

Methods & Deliverables RESEARCH CONCEPT DEVELOPMENT REFINEMENT + IMPLEMENTATION FINAL DESIGN Market Analysis Online Surveys Contextual Interviews Affinity Diagramming Brainstorming Sessions Content Strategy Usability Testing Look & Feel Design CMS Implementation Usability Testing Deployment Personas Information Architecture Wireframes Prototype Screen Designs Final Prototype Functional Website 11

Site Overview 12

Personas Julie Benson Mason Jones Alicia Lippert Peter Mitchell represent the intended visitors of the portal synthesize research into core needs clarify how the system might be used 13

Julie Benson Cybersecurity Workforce Entrant Age: 21 Job Title: College Student - Junior Major Responsibilities: Completing her degree Education: Penn State University Family Status: Single Quote Julie wanted to supplement her academic career with classes in cybersecurity since her degree program did not offer this topic in the disciplinary core. After having my Amazon account hacked and my password compromised, I wanted to make information systems that would prevent this from happening to anyone else. Environment Spending most of her time on a college campus, Julie lives in a dormitory. She has many friends and is a member of a sorority. She does her work and personal computing via the computer labs and her laptop in her room using a Dell with Firefox via wireless connection. She is technically savvy. Key Attributes Julie is a bright, initiative-driven person with a strong work ethic. Her belief systems and morals are not often discussed; she is rather private. She is apt and affable. Her conduct is very reasoned and she is extremely likable. 14

Mason Jones Information Technology Support Specialist Age: 28 Job Title: Information Technology Support Specialist Major Responsibilities: Provide technical support Education: University of Maryland, Baltimore County Family Status: Married Quote Mason wanted to transition from technical support into vulnerability analysis, but could not afford graduate school. He is interested in vulnerability analysis due to the multiple times he was involved in incident response of a certain protocol. I believe if we were more proactive in testing software before release we could prevent more breaches. Environment Mason works for Naval Academy in Annapolis, Md. He is married and has many social activities related to his church. He does his work on a managed machine and personal computing via his home laptop. He is currently taking courses on IP6 via computerbased training on his laptop at home. Key Attributes Being a veteran, Mason is eager to receive continuing education credits and take advantage of any training in the area, in which he is interested and enjoys. He is an active member of his church community and helps people when they have computer issues. He is well-liked and wellrespected both at work and in his personal life. 15

Alicia Lippert Cybersecurity Workforce Entrant Age: 41 Job Title: Business Analyst Major Responsibilities: Completing her degree Education: BS, The Ohio State University Family Status: Married Quote Alicia wants to advance her career by going for a graduate degree in cybersecurity. I m looking for a trusted source of information that will show me possible education and career options, as well as providing a place where I can post questions to knowledgeable experts. Environment Alicia is a 41-year-old business analyst. She has a Bachelor s degree in business and 9 years of professional experience in addition to a strong knowledge of computers. She enjoys working for A1 Secure Network Systems, Inc., but she feels that there is more room for advancement in the field of cybersecurity. Key Attributes While doing some research online, Alicia discovered that there are many different ways she could prepare for a position in the field of cybersecurity. But which ones should she focus on? Her biggest problem is finding one place where she can get accurate and current information. 16

Peter Mitchell Member of the Government Workforce Age: 39 Job Title: Information Technology Specialist Major Responsibilities: Network manager for FAA Education: BS, Civil Engineering Family Status: Married Quote Witnessing many incidents from his network admin perch, Peter believes security policy and education can lead to less overall security incidents. Security starts with our users. Until they realize the large role they play in our network security, we will continue to suffer from attacks. Environment Peter spends 8-5 in an FAA office with a large FAA datacenter down the hall. He uses his FAA-issued desktop for general office apps, along with another dedicated laptop for network troubleshooting, etc. He s competent on general IT concepts, but not from a security perspective, so he is looking to improve his skills in this area. Key Attributes A retired Navy pilot, Peter s interest in complex systems has led him to the IT field. He s working to improve his skills in the area of computer and network security. He logs many hours per day behind a system doing routine sys-admin activities, but he is interested in improving skills in network architecture, security engineering, etc. 17

(Example Scenarios) By State By Degree Level By Rating By Degree Level/ Grade K-12 Undergraduate Graduate Doctoral By Topic/Area Taxonomy needs to be developed by/ with content expert. By Kind Textbooks Curricula Other Course Materials Multimedia Further taxonomy needs to be developed by/with content expert. Alphabetical By Deadline Taxonomy needs to be developed by/ with content expert. By Target Population Workforce Professionals Government Employees Specific Job Title Further taxonomy needs to be developed by/with content expert. By Type Government Training Vocational Programs Simulation Events Static Content + Labs NICS Gap Area Courses Further taxonomy needs to be developed by/with content expert. By Topic/Area Doctrine Knowledge Experience Based Knowledge Further taxonomy needs to be developed by/with content expert. Alphabetical By State By Expertise Further taxonomy needs to be developed by/with content expert. By Employer Type Federal State Local Tribal Private Sector Non-Profit By Job Title (NICE Fun. Roles) Taxonomy needs to be developed by/ with content expert. By Expertise Taxonomy needs to be developed by/ with content expert. More research/discussion needed to be able to develop the IA further. Information Architecture National Institute for Cybersecurity Studies News & Events Awareness Education Training Careers Community About Cybersecurity News Current Events (Calendar) What is Cybersecurity CBS Topics A-Z Common CBS Issues Q&A on CBS Issues Resources CBS Degrees Directory Academic Resources Scholarship Opportunities Other Resources NICS Gap Area Courses Professional Certifications Training Directory Commercial Training Providers Directory Other Resources Job Listings Directory Job Titles Explained Q&A for Prospective Employees Job Wizard Community of Interest Formation Discussion Forum Document Collaboration Space Mission FAQ NICS Career Opportunities For General Public For Workforce For K-12 My Profile My Groups Etc. 18

Information Architecture National Institute for Cybersecurity Studies Training Scholarship Opportunities Other Resources NICS Gap Area Courses Professional Certifications Training Directory Commercial Training Providers Directory Other Resources By Kind Textbooks Curricula Alphabetical By Deadline Taxonomy needs to be developed by/ with content expert. By Target Population Workforce Professionals Government Employees By Type Government Training Vocational Programs By Topic/Area Doctrine Knowledge Experience Based Knowledge Alphabetical By State By Expertise Further taxonomy needs to be developed by/with content expert. Other Course Materials Multimedia urther taxonomy needs to be eveloped by/with content expert. Specific Job Title Further taxonomy needs to be developed by/with content expert. Simulation Events Static Content + Labs NICS Gap Area Courses Further taxonomy needs to be developed by/with content expert. Further taxonomy needs to be developed by/with content expert. 19

Wireframes communicate initial design ideas focus on content and structure, not visual design 20

Wireframes 21

Usability Testing We invite you to interact with the NICS Portal prototype, help us test-drive it and provide feedback that will further the site s development. Your input is very valuable to us. Where When Length of Session NICS Booth Until 3:30 pm 5-10 mins 23

Do you have any questions? 24

Thank you! NICS Portal Project Team Barbora Batokova SEI-CERT Anne Connell SEI-CERT Katie Clarke SEI-CERT Josh Hammerstein SEI-CERT Matt Kaar SEI-CERT Robert Kemerer SEI-CERT Margaret Maxson DHS Susan Morris Adayana Roy Siple SRA International Michelle Young SRA International 25