Security Education for the new Generation



Similar documents
Secure Programming: A Way of Life (or Death) Matt Bishop Computer Security Laboratory Dept. of Computer Science University of California at Davis

HP Fortify application security

College of Business AACSB Continuous Improvement Review Accreditation Report

Information Assurance Curricula and Certifications

Graduate Program Review of EE and CS

Proposal for Differential Tuition Dwight Look College of Engineering Texas A&M University November 2010

M.S. in Computational Finance and Risk Management University of Washington Seattle

HR 2272 Conference Report STEM Education Provisions Summary

Link to University's Strategic Plan (Strategy #) Goal 1.1 Strategy 1.1.1

Becoming a Cyber Professional: A Discussion with Recent Graduates

COMING TOGETHER, ENVISIONING THE FUTURE: THE STRATEGIC PLAN OF THE DEPARTMENT OF COMMUNICATION, UNIVERSITY OF MARYLAND

Minority Degree Attainment in IT: What the National Data Show

Realization of Your Dream: Higher Study, Partnership, Collaboration Opportunities

Draft. Graduate Education Strategic Plan. Contents. DRAFT September 29, 2014

Dr. James R. Lumpkin, Dean

Participants: Introduction:

Evolving Modalities for Doctoral Education

Graduate Education in Physics Conference: Sustaining Thriving Programs by Embracing Challenges and Opportunities in the 21 st Century

Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce

Cyber Intelligence Workforce

Becoming a Cyber Professional: A Discussion with Recent Graduates

Discover Viterbi: Cyber Security Engineering & Informatics Programs

BEST PRACTICES FOR BUSINESS SCHOOLS TO LEAD IN EXPANDING OPPORTUNTIES FOR WOMEN IN BUSINESS AND TO ADAPT TO THE 21 ST -CENTURY WORKFORCE

Family Leave Policy Proposal for Engineering and Public Policy Author: Rebecca Balebako

Graduate School Infosession Day One with Dr. Sheila Humphreys and Professor Mike Franklin

Profitable, secure, flexible career.

MASTER S VS. PH.D. WHICH ONE TO CHOOSE? HOW FAR TO GO? A.J. Brush, Microsoft Research Rita H. Wouhaybi, Intel Labs

National Initiative for Cyber Security Education

Nayda G. Santiago, PhD, PE, Associate Professor Electrical and Computer Engineering Department University of Puerto Rico, Mayaguez Campus Femprof

PhDs in Business. Working at the Frontiers of New Knowledge

The National Cybersecurity Workforce Framework Delaware Cyber Security Workshop September 29, 2015

The GW CyberCorps Program

NLN VISION: TRANSFORMING RESEARCH IN NURSING EDUCATION A Living Document from the National League for Nursing. NLN Board of Governors November 2012

Computer and Network Security in Higher Education

How To Become A Security Professional

MAYS BUSINESS SCHOOL STRATEGIC PLAN 2010

AC : EXPLORING THE DIVERSITY IN FACULTY CAREERS: FORMATIVE AND SUMMATIVE ASSESSMENT IN A PREPARING FU- TURE FACULTY COURSE

MEMORANDUM. Rename the Department of Civil and Construction Engineering to the Department of Civil, Construction and Environmental Engineering, ISU

Graduate Program Goals Statements School of Social Work College of Education and Human Development

The Role of NSF Advanced Technological Education Centers in National Cybersecurity Education Efforts

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Evaluation of Intellectual Property Course Offerings for undergraduate engineering students in the Mid Atlantic Region

HUMAN RESOURCE MANAGEMENT AND DEVELOPMENT

FISSEA March 20, 2013 Kathy Roberson SFS Program Manager

Preparing for an Academic Job Search

Comparative Analysis of PhD programs in Engineering Education

PH.D. IN BUSINESS ADMINISTRATION

BACHELOR OF ARCHITECTURAL STUDIES (BAS) SCHOOL OF ARCHITECTURE, UNIVERSITY OF WATERLOO

Master of Cyber Security

OAKLAND UNIVERSITY DEAN OF THE SCHOOL OF NURSING

A Guide to applying to US CS PhD programs for EngSci/ECE

The School of Education & Human Services The University of Michigan Flint Standards and Criteria for Promotion and Tenure

HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA Enterprise Security

Khade, Aly, & Murti Trends in Graduate Operations Management Curricula at Leading Universities in the United States

27.9% of the graduates responded. Respondents. Degree Surveys with Salaries Male Average Female Average. Table of Contents

Fast-track to Developing Supply Chain Management Professionals

A Comparison of Selected Categories of Accreditation Standards of NAIT, TEC-ABET and AACSB

Physics Careers. 2-Mar

University of Connecticut (Storrs & Regionals)

Request for Entitlement to Plan Bachelor of Science in Supply Chain Management University of Wisconsin Stout September 2008

Scholarship for Service (SFS) PhD with Information Assurance (IA) Concentration*

We present the salient features of our 5 year plan in italics and for each item present its mid-term status in bold.

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Toward Curricular Guidance in the Cyber Sciences

Purdue University Department of Computer Science West Lafayette, IN Strategic Plan

MASTER OF ARTS DEGREE PROGRAMS

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

CONNECTING CAREER AND TECHNICAL EDUCATION WITH THE COLLEGE AND CAREER READINESS AGENDA

Doctor of Philosophy (Ph.D.) in Art Education

Summit on Education in Secure Software Final Report

School of Public Policy University of Maryland Strategic Plan

SOUTH DAKOTA BOARD OF REGENTS. Committee on Academic and Student Affairs

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.

Master s Degree Programs. Global Technology Leadership

MSU College of Engineering, Fall 2015

DIFFERENTIAL TUITION REQUEST

Statement of. William D. Green. Executive Chairman of the Board, Accenture. and

Security Transcends Technology

Exploring a National Cyber Security Exercise for Community Colleges

How To Increase A Nursing Program Fee At The University Of Azar

The University of California at Berkeley. A Brief Overview July 2007 For Presentation in Tokyo by Professor Stephen Cohen

Celebrating Partnerships: 2015 NACME Continuum Meeting

Academic and Professional Degree Students

Insert sponsor logo here. Dell SecureWorks ISACA Webinar Program ISACA. All rights reserved.

The life of a physics graduate student, or what I do

Applying to Graduate School Frequently Asked Questions 1. What are the differences between Master s, PhD, and MFA programs?

SCHOOL OF BUSINESS STATE UNIVERSITY OF NEW YORK AT NEW PALTZ

Our Mission To provide leadership, resources, and support for academically rigorous graduate study. *************

University-Industry Work Group: Education

MBAs for Specialized Audiences

Journal of Homeland Security and Emergency Management

Quality Graduate Programs and Their Role in Undergraduate Education at Clemson

Graduate Curriculum Issues Allen Goldman, U of Minnesota

Employee Surveys: Four Do s and Don ts. Alec Levenson

STATE OF IOWA JUNE 8, 2011 UNDERGRADUATE AND GRADUATE PROGRAMS IN THE COLLEGE OF BUSINESS ACCREDITATION REPORT AT IOWA STATE UNIVERSITY

School of Accounting Florida International University Strategic Plan

DEAN OF THE SCHOOL OF HEALTH SCIENCES

TO MEMBERS OF THE COMMITTEE ON EDUCATIONAL POLICY: DISCUSSION ITEM FUNDING UNIVERSITY OF CALIFORNIA GRADUATE ACADEMIC STUDENTS EXECUTIVE SUMMARY

Systems Engineering Beyond Aerospace and Defense

An Integrated Process Safety Curriculum: It s more than just technical content! Outline of Talk

Transcription:

Security Education for the new Generation SESSION SESSION ID: ID: MASH-W02 Wednesday, Feb 26, 9:20 AM @ WEST 3018 Jacob West Chief Technology Officer HP Enterprise Security Products Matt Bishop Professor University of California, Davis

A Message from Matt Sorry I cannot be here! Jacob and I prepared the slides together, and have known each other for years. This talk represents our views. 2

Defining security State of play today Opportunities Existing resources 3 Conclusion

Security Stuff vs. Secure Stuff Security Stuff Responsible for security Focus on security activities Opportunities for apprenticeship Clear career path for the motivated Doing Stuff Securely Responsible for stuff Impact on security, but not focus Few opportunities to learn Hard to map interest to career

What Are We Talking About? Robust programming Programming that prevents abnormal termination or unexpected actions A secure program conforms to a security policy And implicitly requires robustness, but robust programming does not require such conformance Here, secure is used in the sense of robust

Why This Matters Example: Exploit a buffer overflow to force a program to do things it should not Definitely non-robust Does not handle invalid input properly Is it non-secure? That depends if one can Use the buffer overflow to do things that the security policy disallows (yes) Use the buffer overflow to do only things that I could already do (no)

Defining security State of play today Opportunities Existing resources 7 Conclusion

Problem: 84% of Breaches Target Software Networks Hardware Applications Security Measures Intellectual Property Switch/Router security Firewalls Customer NIPS/NIDS Data VPN Net-Forensics Anti-Virus/Anti-Spam Business DLP Processes Host FW Host IPS/IDS Trade Vuln. Assessment Secrets tools

Software Security Today The line between secure and insecure is often subtle Many seemingly non-security decisions impact security Small problems hurt a lot A single bad line of code can put a company in the news Smart people make dumb mistakes As a group, programmers repeat the same security mistakes over and over We need non-experts to get security right Security and development are both full time jobs

Becoming a Doctor 10-12+ years

Becoming a Programmer Enter Workforce 4 years Learn Everything On-the-Job Training? Certification?

Top 9 Undergraduate Computer Science Programs 12 10 8 Required classes with security content Restricted electives with security content Restricted electives with security focus 6 4 2 0 Berkeley Carnegie Mellon Cornell Georgia Tech Michigan MIT Stanford Illinois Austin

Top 9: Courses with Security as a Focus Junior/Seniors specialize Only 3 of 9 offer security track Cornell: Security & Trustworthy Systems Track (4 classes) Michigan: Security Track (4 classes) Austin: Information Security Certificate Program (5 classes) 20 18 16 14 12 10 8 6 4 2 0 Berkeley Carnegie Mellon Graduate Cornell Georgia Michigan MIT Stanford Illinios Austin Undergraduate

Top 9: Courses Focus on Traditional Security Software security appears at 3 of 9 General Cryptography Network Web Forensics Software Mobile Privacy Policy/Risk

The Fundamental Problem We don t write software that is robust Some exceptions in special cases We don t build systems to meet security requirements Many different models for developing software

What Will Drive Improvement? Commercial Financial savings (avoid cleaning up messes) Simpler maintenance Improved reputation Government Financial savings (avoid cleaning up messes) Simpler maintenance National security Software liability?

Software Liability You can t say I m not responsible for anything Chain of distribution (e.g. supply chain) liability exists now You can limit liability somewhat by defining use and environment Then you re liable in that context but (probably) not in others It is coming... EULAs may not be enforceable (adhesion contracts)

So What s Holding Us Back? Commercial and Government Need to spend more money Longer time-to-market No legal liability for bad software Need to pay more attention to installation, maintenance, and use Lack of people to write good code

So What s Holding Us Back? Academia Robust coding not seen as integral to programming Textbooks loaded with examples of non-robust programming Lack of support for enforcing and grading for robust coding Ties into lack of graders who really know about this Lack of faculty who understand robust programming And intimidation factor for those who know they don t understand it

Lack of Resources Assurance costs! Industry expected to deliver secure, robust products without resources for the extra effort required to deliver them Academia expected to teach and reinforce robust programming without resources for the extra effort in supporting this

Lack of People Need to teach people how to write robust programming Need to emphasize the practice, both in education and industry Continuous practice is key to reinforcing, maintaining, extending skills

Defining security State of play today Opportunities Existing resources 27 Conclusion

Focus for Rest of Talk Everyone lacks resources! How can industry and government work with academia? Carrots, not sticks Security tuned to environment and use What is secure varies among companies and government organizations

What Do We Need to Teach Secure Programming? Summit on Education in Secure Software (SESS) Diana Burley The George Washington University Matt Bishop University of California at Davis Funded by NSF 60 participants: academia / industry / government nob.cs.ucdavis.edu/~bishop/notes/2011-sess/2011-sess.pdf

SESS Objectives Engage stakeholders from academia, industry, and government to discuss teaching secure programming Use discussion as basis for a collaborative effort to develop a comprehensive agenda for secure software education

Recommendations Increase faculty who understand the importance of secure coding Establish professional development opportunities for faculty Integrate computer security content into existing courses Provide faculty support for the inclusion of security content Require at least one computer security course for all college students

Recommendations Promote collaborative problem solving and solution sharing Encourage partnerships and collaborative curriculum development Use innovative teaching methods to strengthen the foundation of computer security knowledge Develop metrics to assess progress toward meeting educational goals Highlight the role that computer security professionals should play in key business decision making processes

Summary Holistic view of secure education suggests programmers and nonprogrammers alike must be educated in the core principles Structural enablers Cultural shift among faculty and industry stakeholders that supports the development of a holistic view of software security Identification of measurable objectives and corresponding measurements Development of national licensure programs Alignment of expectations for university education and realistic

What Can Academia Do? Include robustness in evaluation of programs and projects Create a secure programming clinic Like an English clinic, or a writing clinic for law schools Provide supplementary material for textbooks, classes These should emphasize robust programming

What Can Industry Do? Key is to show more than say secure development is important Make clear that the skills are important for hiring Mention their need in job openings Preference to those with skill in this also helps

Work With Students and Faculty Internships Students love these; good recruiting tool Tasks requiring robust programming emphasize its importance to students Help teach students Review students code Team with colleges in senior/capstone projects

What Will This Do? Increase student demand If students see it as important, they will ask about it in class, evaluate programs, faculty in part on it Increase your visibility Good recruiting tools A corporate good citizen

Government Support Act like an industry Government can also fund programs (e.g. DHS and the Software Assurance Curriculum Project) Programs should support future faculty (as well as engineers) People willing to commit to teaching Imperative: target funding towards this specific purpose Require funding to be used for supporting robust programming If done as adjunct, likely to disappear in the main purpose of the funding

Defining security State of play today Opportunities Existing resources 42 Conclusion

Existing Resources Industry academic enablement programs Tradeshows and conferences Competitions and contests Training and certification Specialized university programs

Industry Academic Enablement Programs Focused on facilitating university education in security Notable Programs Cisco IBM Delivery Methods Hewlett-Packard Microsoft Direct to students or young professionals with certification programs Define a methodology, enlist industry specialists to assist with delivery Collaborate with universities and non-profits on research

Tradeshows and Conferences Notable Conferences IEEE Symposium on Security and Privacy ACM Computer and Communications Security The Colloquium (Colloquium on Info. System Security Education) USENIX Security Symposium Goals Share advancements in research Enhance with curricula security-centric topics

Competitions and Contests Notable Competitions CyberPatriot National Collegiate Cyber Defense Competition UCSB ictf Cyber Security Awareness Week (CSAW) DEFCON Why Capture-the-Flag? Goal-oriented and rewards both participation and success Opportunity to network with peers and industry professionals

Training and Certification Notable Programs (ISC) 2 SANS Institute CompTIA Motivations and Objectives Industry effort to develop and ensure baseline skillsets Differentiate candidates for human resources and hiring managers Validate and recertify relevant security experience

Scholarship Programs Government Scholarships (for work commitment) CyberCorp: Scholarships for Service DOD Information Assurance Scholarship Program Private Scholarships (ISC) 2 Scholarships (Community College, Undergrad, Grad) Armed Forces Communications and Electronics Association (Community College, Undergrad, Grad) National Security Scholars Program (Undergrad) Symantec Graduate Fellowship (Grad) Applied Computer Security Associates (Undergrad, Grad)

Scholarship for Women Studying Information Security Support women with a demonstrated interest in security, through coursework, internships or work experience to complete a Bachelors or Masters degree Must be entering junior or senior year of Bachelors or first year of Masters Administered by Applied Computer Security Associates (ACSA) and Committee on the Status of Women in Computer Research (CRA-W) Awarded a single $10k scholarship annually pre-2014 Includes attendance at ACSA, CRAW, as well as internship opportunities

Defining security State of play today Opportunities Existing resources 71 Conclusion

Many Myths Myths about universities confuse how academia can put teaching secure programming into practice There is no room If students learn to write secure programs Academic institutions are We know what to do And some questionable ideas don t help either Testing students knowledge Unsupported mandates

Myth #1 There is no room in curricula for a course on secure programming You don t need a separate course Simply check programs submitted during all courses for robustness Make writing robust programs beneficial (through grades or other mechanisms) Provide resources so students can see how to do this, or get help to do it

Myth #2 If students learn to write secure programs, the state of software and system security will dramatically improve Will companies accept increased cost, time to market? Will customers pay higher prices, endure longer development times? Will students be encouraged (required) to practice what they learned?

Myth #3 Academic institutions are hierarchical in organization Implication is that deans, provosts, presidents can order this taught Learning styles, environments differ May not be a 'best' or 'right' way to teach this

Myth #4 We know what to do and how to do it We have ideas, but don t know Needed: research on education Needed: funding, people to do this The Summit on Education in Secure Software suggested ways to do this SESS results are general Approaches must be tailored to various environments

Questionable Idea #1 Testing students knowledge Who creates the tests? Who is being tested? How do you know that you are testing what is important? (that is, the right thing ) Who determines what is an acceptable result? Teaching to the test, rather than to learn the material

Questionable Idea #2 Unsupported mandates The support has to come from somewhere It s like a zero-sum game What do you want to weaken? If you only have so many resources, something will have to give You don t want to weaken the core foundation of understanding why certain programming paradigms are critical

Conclusion We must all hang together, or we shall all hang separately. - Benjamin Franklin The state of practice can, and must, change Understand that academia is a different environment completely Teaching robust programming, and nothing more, will not help The marketplace must also change, as must current practice The public will be the main driver (unfortunately, probably with lawsuits)

Questions? SESSION ID: Jacob West jbw@hp.com Chief Technology Officer HP Enterprise Security Products Matt Bishop mabishop@ucdavis.edu Professor University of California, Davis