Information Assurance Program at West Point



Similar documents
Enhancing Network Security Through Competitive Cyber Exercises

Cyber Exercises, Small and Large

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Cyber Security at NSU

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Network Incident Report

Introduction to Cyber Security / Information Security

The USNA Cyber Program

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

EC Council Certified Ethical Hacker V8

DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT

A Systems Engineering Approach to Developing Cyber Security Professionals

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Certified Ethical Hacker Exam Version Comparison. Version Comparison

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

Networking: EC Council Network Security Administrator NSA

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Certified Ethical Hacker (CEH)

Meeting Cyber Security Challenges

Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

CEH Version8 Course Outline

CS549: Cryptography and Network Security

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

Bellevue University Cybersecurity Programs & Courses

CRYPTUS DIPLOMA IN IT SECURITY

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

UNM Information Assurance Scholarship for Service (SFS) Program


Network Monitoring and Forensics

The Information Security Problem

Train Like You Will Fight

Cybersecurity Strategic Talent Management. March, 2012

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Cyber Education: A Multi-Level, Multi-Discipline Approach

Network Mission Assurance

Principles of Information Assurance Syllabus

A Portable Computer Security Workshop

Building the Next Generation of Computer Security Professionals. Chris Simpson

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

Undergraduate Course Syllabus

Computer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner

EC-Council. Program Brochure. EC-Council. Page 1

Homeland Open Security Technology HOST Program

Contents Introduction xxvi Chapter 1: Understanding the Threats: Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers

Actions and Recommendations (A/R) Summary

NETWORK SECURITY ASPECTS & VULNERABILITIES

Workshop Designed & Powered by TCIL IT, Chandigarh

Patch and Vulnerability Management Program

Security Information Management (SIM)

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Defending Against Data Beaches: Internal Controls for Cybersecurity

What legal aspects are needed to address specific ICT related issues?

information security and its Describe what drives the need for information security.

COMPUTER SECURITY AND IMPACT ON COMPUTER SCIENCE EDUCATION

Course Title: Course Description: Course Key Objective: Fee & Duration:

Defending Against Cyber Attacks with SessionLevel Network Security

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

TEACHING COMPUTER SECURITY WITH A HANDS-ON COMPONENT

e-code Academy Information Security Diploma Training Discerption

Banking Security using Honeypot

[CEH]: Ethical Hacking and Countermeasures

Detailed Description about course module wise:

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

Certified Cyber Security Expert V Web Application Development

Improvements Needed With Host-Based Intrusion Detection Systems

Small-Scale Cyber Security Competitions

Certified Cyber Security Analyst VS-1160

Impact of Cybersecurity Education in High Schools and Small Businesses in Hawaii. Challenges and Opportunities NICE Conference 2015

Fundamentals of Network Security - Theory and Practice-

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Transcription:

Information Assurance Program at West Point Daniel-Ragsdale@usma.edu John.Hill@usma usma.edu Scott.Lathrop@usma usma.edu Gregory.Conti@usma usma.edu

USMA Information Assurance Program Institutional Support Quality Personnel Summer Internships IA Workshop and Conferences Outreach/ Research Student IA Club (SIGSAC) NSA Support IA Research Center (ITOC) USMA CERT Information Warfare Lab (IWAR) Courses and Curriculum 1999 2000 2001 2002 2003 Cyber Defense Exercise IA Savvy Personnel Tremendous Interest

USMA IA Program Outreach/ Research Summer Internships IA Conferences Student IA Club (SIGSAC) NSA Support IA Research Center (ITOC) USMA CERT Information Warfare Lab (IWAR) Courses and Curriculum Cyber Defense Exercise

USMA IA Program Mission Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah Blah -LTC Dan Ragsdale ITOC Director

Information Assurance Courses Primary CS482 Information Assurance IT460 Policy and Strategy of Cyberwar MA489 Cryptography LW489 Cyberlaw Supporting CS484 Computer Networks IT105 Introduction to Information Technology IT305 Introduction to Military Information Technology Other computer science courses Have IA awareness woven into them

Student IA Club ACM SIGSAC Chapter Formed January 2001 450+ Members Interdisciplinary (All Academic Departments Represented) Won 2001-2002 ACM Outstanding Activities Award SIGSAC IWAR Lab Speakers Community Service www.itoc.usma.edu/sigsac/

Summer Internships [1 of 2] NSA - Network Evaluation Intern Program US Secret Service, Electronic Crimes Branch Honeypot research Joint C4ISR Battle Center - Enhanced C4ISR Homeland Security Operations (ECHO) ITOC - Information Assurance Vulnerability Alert (IAVA) Compliance Prototype AMC-DOD - UAV multi-mission payload analysis Microsoft Microsoft Intern

Summer Internships [2 of 2] US Army Information Technology Agency - Network Security Services-Pentagon Livermore National Laboratory - UAV Simulation High Performance Computing Modernization Office - Network Monitoring Initiative RCERT Pacific - Intrusion Detection and Analysis 1st IO Command(ACERT,RCERT Korea & Europe) - Intrusion Detection and Analysis AMC-DOD - Crowd Simulation in Realistic Simulations

Guest Speaker Program Government Military Academia Business

ITOC Research Topics Information Technology and Operations Center Decision Support Automated Imagery Analysis Automated Terrain Analysis Information Assurance Network Deception (Honeynets / Network Camouflage) Open Source Tool Employment Intrusion Detection and Response Information Assurance Simulation Network and Computer Forensics Wireless Security

ITOC Outreach Projects Information Assurance Vulnerability Alert (IAVA) Compliance Prototype NSA, 1 st IO Command Network Deception (Honeynets) -1 st IO Command, US Secret Service Information Assurance Curriculum and Training Development NSF, 1 st IO Command Classroom XXI Army Training and Doctrine Command Military Academy Attack Defense Network (MAADNet) Office of the Secretary of Defense, NSF Network Forensics and Email Recovery US Secret Service Wireless Security T4IA NSF

4th Annual IEEE Information Assurance Workshop June 18-20, 2003 West Point, New York Sponsored by IEEE and NSA http://www.itoc.usma.edu/workshop/

Information Warfare Analysis and Research (IWAR) Lab Isolated network Wide variety of target machines Full 18 seat classroom Dedicated lab director Used to support courses CS482 Information Assurance (primary user) SS490 Policy and Strategy of Cyberwar (primary user) CS484 Networks (projected) IT105 Intro to Information Technology (awareness) IT305 Intro to Military Information Technology

IWAR Laboratory Design Goals Realistic Provide a real world signature Shared Resources Soft and Hard targets Heterogeneous Operating Systems Network Protocols/Equipment Offensive and Defensive Tools Reconfigurable Ghost Images Removable hard drives

IWAR Tools and Capability Firewalls Malicious Active Content Exploits Vulnerability Scanners Viruses and Worms Cryptography and Encryption Trojan Horses Application and Protocol Wrappers Buffer Overflow Exploits Honey Pots/Honeynets Access Control Methods Protocol Exploits Integrity Maintenance Systems Network Sniffers Mail and Protocol Spoofers Distributed DoS Tools Intrusion Detection Systems Race Condition Exploits Password Cracking Software Forensics Analysis Tools Port Scanners

IWAR Networks

IWAR-in-a-Box

Sponsored by the National Security Agency, Director of Information Assurance General Concept Defense of a network against an adversarial force Blue Forces US Service Academies and NPS Red Forces National Security Agency 92nd Information Warfare Aggressor Squadron 1 st Information Operations Command White Cell Cyber Defense Exercise Carnegie Mellon

Cyber Defense Network

Cyber Defense Exercise Key Educational Aspects Competitive Active learning Project-based Developmental Areas Leadership Ability Planning Ability

CDX Award Ceremony

NSA Full Time NSA Liaison IA Conference Sponsorship NSA Trip NSA Internships Intelligence Community Access CDX Support Sabbaticals NSA Information Assurance Center of Excellence Program NSA Information Assurance Director s Trophy

Preparation for War On the fields of friendly strife are sewn the seeds that upon other fields on other days will bear the fruits of victory GEN Douglas MacArthur

Preparation for Information War On the networks of friendly strife are sewn the seeds that upon other networks on other days will bear the fruits of victory MAJ Greg Conti

USMA IA Program Outreach/ Research Summer Internships IA Conferences Student IA Club (SIGSAC) NSA Support IA Research Center (ITOC) USMA CERT Information Warfare Lab (IWAR) Courses and Curriculum Cyber Defense Exercise

USMA IA Program Institutional Support Outreach/ Research Summer Internships IA Conferences Student IA Club (SIGSAC) NSA Support IA Research Center (ITOC) USMA CERT Information Warfare Lab (IWAR) Courses and Curriculum Cyber Defense Exercise IA Savvy Personnel Quality Personnel Tremendous Interest

Questions? and a reminder! 4th Annual IEEE Information Assurance Workshop June 18-20, 2003 West Point, New York Sponsored by IEEE and NSA http://www.itoc.usma.edu/workshop/