Dr. Dave Dampier Professor of Computer Science and Engineering Director, Distributed Analytics and Security Institute and the Center for Computer Security Research Mississippi State University
CAE-2Y: Center of Academic Excellence in Information Assurance/Cyber Defense Education for Community Colleges (32) CAE-IA/CD: Center of Academic Excellence in Information Assurance/Cyber Defense Education (130) CAE-R: CAE in Information Assurance/Cyber Defense Research (58) CAE-Cyber: Center of Academic Excellence in Cyber Operations (13) Seven institutions have CAE-(IA/CD, R, and Cyber) AFIT, Auburn, CMU, MSU, NPS, Northeastern, NYU Poly, Tulsa https://www.nsa.gov/ia/academic_outreach/nat_cae/
Originally known as CAE-IAE (Information Assurance Education) Oldest credential, started in 2000 Most basic credential available to four year institutions To achieve this designation, curriculum has to be mapped to a detailed set of knowledge units derived from NICE framework. Very time-intensive process (probably at least 100 man-hours for someone very familiar with the curriculum.) Course/Textbook/Syllabus/Required Activity NICE National Initiative for Cyber Security Education http://crsc.nist.gov/nice/framework
OPERATE AND MAINTAIN SECURELY PROVISION PROTECT AND DEFEND OVERSIGHT AND DEVELOPMENT ANALYZE INVESTIGATE COLLECT AND OPERATE
SECURELY PROVISION Specialty areas responsible for conceptualizing, designing, and building secure information technology (IT) systems (i.e., responsible for some aspect of systems development). OPERATE AND MAINTAIN Specialty areas responsible for providing support, administration, and maintenance necessary to ensure effective and efficient information technology (IT) system performance and security.
PROTECT AND DEFEND Specialty areas responsible for identification, analysis, and mitigation of threats to internal information technology (IT) systems or networks. INVESTIGATE Specialty areas responsible for investigation of cyber events and/or crimes of information technology (IT) systems, networks, and digital evidence.
COLLECT AND OPERATE Specialty areas responsible for specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence. ANALYZE Specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence.
OVERSIGHT AND DEVELOPMENT Specialty areas providing leadership, management, direction, and/or development and advocacy so that individuals and organizations may effectively conduct cybersecurity work
CAE-IA/CD 2001/2004/2007/2012/2014-2021 CAE-R 2008/2014-2021 CAE-Cyber 2013-2018 Students and Faculty with clearances up to TS/SCI Cross-disciplinary; multi-college Builds on degree programs in College of Engineering and College of Business BBA Business Information Systems BS Computer Science, Computer Engineering, Electrical Engineering, Industrial Engineering, Software Engineering MS Computer Science, Electrical and Computer Engineering, Industrial Engineering MSIS Information Systems PhD Computer Science, Electrical and Computer Engineering, Industrial Engineering, Business Administration (Information Systems)
Dr. David Dampier Professor of Computer Science and Engineering Computer Security and Digital Forensics Director of DASI Dr. Drew Hamilton Professor of Computer Science and Engineering Computer Security and Digital Forensics Assoc. VP for Research Dr. Merrill Warkentin Professor of Management Information Systems Social Aspects of Security Dr. Yogi Dandass Associate Professor of Computer Science and Engineering FPGA Development and Supply Chain Security Dr. Tommy Morris Associate Professor of Electrical and Computer Engineering Electrical Grid and Control System Security Director of CIPC Dr. Mahalingam Ramkumar Associate Professor of Computer Science and Engineering Trustworthy Computing Dr. Rob Crossler Assistant Professor of Management Information Systems Data Security and Privacy Dr. Wes McGrew Assistant Research Professor of Computer Science and Engineering Control Systems Human Machine Interface Security and Malware Reverse Engineering
BIS 4113/6113: BIS Security Policy Constructing and maintaining security policies for organizations CSE 4243/6243: Information and Computing Security Introductory class with weekly lab exercises, final exercise is Capture the Flag exercise. Cross-listed as ECE 4763/6763 CSE 4273/6273: Computer Crime and Digital Forensics Practical training in investigative techniques with lab, semester long practical exercise, final exercise is Mock Trial CSE 4363/6363: Reverse Engineering of Malware Practical training in malware reverse engineering, semester long practical exercise CSE 4383/6383: Cryptography and Network Security Programming assignments CSE/ECE 8990: Full Graduate Level Special topics classes in current security research
Advanced Digital Forensics - CSE Advanced Topics in Network Security - CSE Computer Security Research Seminar (INSURE) - ECE Cyber Physical System Security - ECE Information Security Research Design - MIS Internet Security Protocols - CSE Process Control System Security - ECE Security in the Cloud - CSE Security in Cooperative Systems - CSE Software Security -CSE Trustworthy Computing -CSE
Dr. David A. Dampier Professor of Computer Science and Engineering Director, Distributed Analytics & Security Institute dad6@msstate.edu