Establishing and Maintaining a Cybersecurity Program: The GWU EMSE Experience



Similar documents
Teaching Information Security to Engineering Managers

Information Assurance in Practice: Information Security in Small Businesses

Information Security Policy


Introduction to Cyber Security / Information Security

Research Imperatives

UNM Information Assurance Scholarship for Service (SFS) Program

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Bachelor of Applied Information Science (Information Systems Security)

Minnesota State Community and Technical College Detroit Lakes Campus

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Actions and Recommendations (A/R) Summary

$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus

A B.S. Degree in Informatics: Computer Science in Context

American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education

CNA 432/532 OSI Layers Security

Bellevue University Cybersecurity Programs & Courses

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Cyber Education triangle clarifying the fog of cyber security through targeted training

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Cybercrimes: A Multidisciplinary Analysis

Transfer Course Conversion to Columbia College Equivalencies

MS Information Security (MSIS)

Online Undergraduate Courses

Computer Forensics and Security Management (MSCFSM)

Security within a development lifecycle. Enhancing product security through development process improvement

Information Systems Security Certificate Program

Law & Ethics, Policies & Guidelines, and Security Awareness

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

plantemoran.com What School Personnel Administrators Need to know

Chairman Johnson, Ranking Member Carper, and Members of the committee:

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Altius IT Policy Collection Compliance and Standards Matrix

Introduction to Ethical Hacking and Network Defense. Objectives. Hackers

Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Information Assurance Curricula and Certifications

InfoSec Academy Application & Secure Code Track

(Instructor-led; 3 Days)

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Department of Information Systems and Cyber Security

Computer Security and Investigations

information security and its Describe what drives the need for information security.

Critical Controls for Cyber Security.

Zurich Security And Privacy Protection Policy Application

CS Ethical Hacking Spring 2016

Public Private Partnerships and National Input to International Cyber Security

Cybercrime: Protecting Your Digital Assets in Today's Threat Landscape

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP

ISO Controls and Objectives

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

UVic Department of Electrical and Computer Engineering

How to get from laws to technical requirements

Identity Fraud: Presented by: MOHD ZABRI ADIL TALIB Head, Digital Forensics CyberSecurity Malaysia

Cybersecurity Major. College of Arts and Letters Interdisciplinary Studies. Program Guide. Version 3 August 2015.

White Paper. Sarbanes Oxley and iseries Security, Audit and Compliance

U. S. Attorney Office Northern District of Texas March 2013

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

How To Secure An Extended Enterprise

NORTH CAROLINA COMMUNITY COLLEGE SYSTEM H. Martin Lancaster, President

CSC 474 Information Systems Security

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Bachelor of Science (BSc), Information Technology (IT) Semester-based Layout of the Program

MS In Forensic Computing (MSFC) Saint Joseph s College. (33 Credits, including a Practicum/Internship)

Cybersecurity: Protecting Your Business. March 11, 2015

IT Security Management 100 Success Secrets

CSTA- Oracle Academy 2014 U.S. High School CS Survey: The State of Computer Science in U.S. High Schools: an Administrator s Perspective.

Education for the Future.

Cloud Security & Standardization. Markku Siltanen Tietoturvakonsultti CISA, CGEIT, CRISC

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

Information Security Law: Control of Digital Assets.

Computer Information Security. Course Syllabus

The Five Habits of Highly Secure Organizations

M.S. in Business and Information Systems

CIS 4204 Ethical Hacking Fall, 2014

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015

Release: 1. ICTNWK607 Design and implement wireless network security

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Impact of Cybersecurity Education in High Schools and Small Businesses in Hawaii. Challenges and Opportunities NICE Conference 2015

Online Undergraduate Courses

Acceptance Page 2. Revision History 3. Introduction 14. Control Categories 15. Scope 15. General Requirements 15

Computer Science at James Madison University

CORE 573. Community Rehabilitation and Disability Studies. Disability and the Law. Calendar Description. Content/Objectives. Outcomes/Competencies

Distributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

Network & Information Security Policy

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

POINT OF CONTACT Office of the Enrollment Management 3501 University Blvd East, Adelphi, MD

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Into the Breach Transitioning info an infosec career. Ray Pompon, CISSP

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Transcription:

Establishing and Maintaining a Cybersecurity Program: The GWU EMSE Experience Julie J.C.H. Ryan, D.Sc. Assistant Professor Engineering Management and System Engineering School of Engineering and Applied Science The George Washington University

Context Diagram Ten Schools/Colleges GWU BPA Law etc SEAS CCAS Medical Intellectual Property Criminal Justice Forensics (CyberCrime) etc ME ECE CS EMSE CE Grad Cert in CompSec (4 courses) M.S. in Computer Science D.Sc. in Computer Science Grad Cert in InfoSec Mgmt (6 courses) M.S. in EMSE (Concentration Infosec) D.Sc. in EMSE (Concentration Infosec)

The EMSE Program History: Began in 1996 with a single class Intro and Overview of Information Security By 1998, had a six class Graduate Certificate Program 18 graduate credit hours By 2001, had a handful Doctoral students Expecting the first one to finish up Spring 2003 Effective Fall 2002, MS in EMSE with a Concentration in Infosec Mgmt 36 graduate credit hours, Certificate Program classes comprise core To date (Summer 2002): 619 students taken the intro class 135 have completed the Graduate Certificate Program Approximately 100 currently enrolled in Graduate Certificate Program

The Classes The Graduate Education Certificate (also the MS Core) EMSE 218: Intro & Overview Everything at a micron deep EMSE 315: Law Contracts, Case law, torts, ethics, etc EMSE 312: Protect (minus Crypto) Personnel, Physical, Ops, Computer, Network, etc EMSE 313: Crypto All crypto, all the time EMSE 314: Detect Audit, monitor, IDS, etc EMSE 316: React/Correct Biz continuity, crisis mgmt, recovery The MS Electives (2 of ) EMSE 317: Cybercrime Criminal law, forensics processes EMSE 318: Info Ops Effect of global economy on security EMSE 319: Emerging Issues Wireless security EMSE 320: E-Commerce How to, how to secure The EMSE Core requirements for all MS tracks EMSE 212: Mgt of Tech Orgs EMSE 260: F&A for Engr Mgrs EMSE 269: Decision Theory EMSE 283: Systems Engineering

Topics Covered The short list: Threats Vulnerability assessments Risk management Secure computing Operational security Admin security Policy Law Ethics Network security Life cycle management Personnel security History of computer security History of comms security Crypto, crypto, crypto And more. Common Criteria Rainbow series Auditing Monitoring Intrusion detection systems Crisis management Business continuity planning Resource allocation Security engineering Malicious software Trust Passwords Authentication Access control And still more

Computer Science What We Don t Teach Not a single line of code generated Not a single algorithm developed Electrical Engineering Not a single circuit analyzed Hands on skills Not a single firewall configured Not a single system administrated Hacking Cover the theory in advanced classes but forbid them to do it BUT! We do teach them why each and every element of those specialties is a critical component of security engineering and management

Why Why and How Huge requirement for education of non-computer science types Weapons acquisition managers Program managers of all other sorts The other engineers increasingly required to work with IT Senior executives forced to deal with security issues Business types in the IT workforce with no computer science background Strongly believe in the systems engineering approach to security in operational environments Solution in real world is not a computer science problem How Started small, built over time Used the feedback from students on what worked and what didn t Continually modify course approach and content

Textbooks Challenges Lots of good books out there but not any one just right for our purposes Too much computer science, too much math, too much focus on protection Couldn t make the students buy 10 books for one class Wrote our own, currently in rewrite Expect to have rewrite done end of summer Students Knowledge Base No math, darn little science, incredibly weak writing skills Can t assume a core base of KSA!!! What s going wrong at the undergraduate level? Have incorporated basic skill instruction into program: Plagiarism 101 Writing 101 Speaking 101 Logic 101

A Particular Challenge Institutional and Professional Liability Duty of due care required of educational institutions and professors Legislation, Regulations, Common law Educators have a clear duty to anticipate dangers Educators have a clear duty to protect students from injury Duty may extend to third parties who are foreseeable victims What can go wrong? Students might get busted Hacking, illicit intercept of comms, exceeding authorized access Civil liability in non-criminal cases Other ills Insider trading, ITAR violations, disclosure of trade secrets, copyright violations, etc etc etc Defenses include security engineering of course offerings Policies, procedures, technologies, practices, and warnings

Contact Information Julie J.C.H. Ryan, D.Sc. 1776 G. Street NW #110 Washington DC, 20052 jjchryan@seas.gwu.edu http://www.seas.gwu.edu/~infosec/ The George Washington University is an NSA Certified Center of Academic Excellence in Information Assurance Education and meets the Federal Training Standards for Information Systems Security Professionals (NSTISSI 4011). We offer Graduate Certificate, Master s, and Doctoral level education in Information Security Management for professionals from all educational backgrounds. GWU is located in the heart of Washington DC very near the White House and other government offices.