Center for Information. Security and Assurance (CISA) Charter. Mathematical, Computing, and Information Sciences (MCIS) Department



Similar documents
Cyber Security at NSU

Computer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner

Digital Forensics at the National Institute of Standards and Technology

Dublin City University

Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

COAS TECHNOLOGY PLAN

UMD Department of Mechanical and Industrial Engineering

IS Careers. MIS 4133 Software Systems

Information Security Recommendation Report

How To Pass A Network Security Course Online At Sp College

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

ICAWEB423A Ensure dynamic website security

The Protection Mission a constant endeavor

USEK Campus Information Technology Strategic Plan August

IT Networking and Security

Hamilton Campus. Information Technology Strategic Project Plan

Bellevue University Cybersecurity Programs & Courses

GFSU Certified Cyber Crime Investigator GFSU-CCCI. Training Partner. Important dates for all batches

INFORMATION TECHNOLOGY STRATEGIC PLAN

The University of Toledo College of Medicine and Life Sciences Faculty Tracks for Academic Rank and Criteria for Promotion

Table of Contents. Introduction. Audience. At Course Completion

Introduction to Cyber Security / Information Security

Sunnie Chung. Cleveland State University

Cyber Innovation and Research Consortium

North Florida Community College

St Petersburg College CTS1120 Online. Intro Network Security Foundations - (8 weeks online) Course Syllabus

Information Technology Division

The Department of Computer Science and Engineering established in 2002 offers the following academic programmes:

Wave Relay System and General Project Details

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Symantec Endpoint Protection

Certified Cyber Security Analyst VS-1160

SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES *

The SAM Spotlight A Publication of Soft-Aid for the ITAM/SAM Manager Community. Designing Effective Software Management and Compliance Policies

Microsoft Solutions for Security. Delivering the Windows Server 2003 Security Guide

Educational Requirement Analysis for Information Security Professionals in Korea

Module 1: Introduction to Designing Security

Nottingham Trent University Course Specification

INFORMATION TECHNOLOGY PLAN. THE ENLARGED CITY SCHOOL DISTRICT OF TROY, NEW YORK 2920 Fifth Avenue, Troy, NY

IBM Endpoint Manager for Server Automation

Certified Game Developer

Resume Book Spring Management Information Systems (MIS) Program. College of Business and Economics West Virginia University

REMOTE INFRASTRUCTURE MANAGEMENT COURSE CURRICULUM

EECS PhD Comprehensive Examination Guidelines

The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research

ADDITIONAL SOFTWARE AND HARDWARE REQUIREMENTS

ADDENDUM #1 Courses and Pricing

Information and Communication Technology. Patch Management Policy

Teaching Computational Thinking using Cloud Computing: By A/P Tan Tin Wee

Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro

BMC Client Management - SCAP Implementation Statement. Version 12.0

CESG Certification of Cyber Security Training Courses

Minnesota State Community and Technical College Detroit Lakes Campus

INNOVATION IN UNDERGRADUATE COMPUTER SCIENCE EDUCATION

System Requirements G E N E R A L S Y S T E M R E C O M M E N D A T I O N S

1.2. FCSM Relevant Policies or Standards

Parallels Virtualization SDK ReadMe CONTENTS:

EDUCATION FOR THE FUTURE.

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Criteria for Accrediting Computer Science Programs Effective for Evaluations during the Accreditation Cycle

Faronics Products SYSTEM REQUIREMENTS Last modified: October 2014

MCSA Security + Certification Program

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

STRATEGIC PLANNING ASSUMPTION(S)

PLCS Reporter v2.8 for IBM Tivoli Storage Manager. Business intelligence for TSM

Enterprise Governance and Planning

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

Muhammad K. Ghanbari, Computer Science dept.

IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO TABLE OF CONTENTS

Technology Fee Proposal

CST 244 Computer Forensics and Investigation Spring, 2010

Information Technology Cluster

Open Vulnerability and Assessment Language (OVAL ) Validation Program Test Requirements (DRAFT)

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Graduate Program Review of EE and CS

Installing & Using KVM with Virtual Machine Manager COSC 495

SANS Top 20 Critical Controls for Effective Cyber Defense

Information Systems and Tech (IST)

Overview of Divisions, Recent and Approaching Milestones. Office of the Vice President for Information Technology

UNIVERSITY OF SOUTH ALABAMA INFORMATION SYSTEMS

Department of Information Systems and Cyber Security

Information Resource Management Directive USAP Information Security Awareness, Training and Education Program

Information Security Policy

How to Connect to the SPSS Server (HUSPSS) Using Remote Desktop on a PC

IT Networking and Security

Shipping Products Chart. Contents

Information Technology Degree Programs

Sygate Secure Enterprise and Alcatel

CAREER OPPORTUNITIES

COMPUTER & INFORMATION TECHNOLOGY DEPARTMENT

Hamilton Campus. Information Technology Strategic Plan

IST ANNUAL PLAN UPDATE CTSC

System requirements for MuseumPlus and emuseumplus

INFORMATION TECHNOLOGY STRATEGIC PLAN

appear to provide any additional information that was not already known within the GPPSS.

Transcription:

Center for Information Security and Assurance (CISA) Charter Mathematical, Computing, and Information Sciences (MCIS) Department This charter establishes the Center for Information Assurance within the MCIS Department at Jacksonville State University Dr. Guillermo A. Francia, III 1

Contents Vision Statement... 3 Mission Statement... 4 Organization and Operation... 5 Personnel... 6 Resources... 8 Current Projects... 13 Funding... 14 Intellectual Property... 15 Endorsements... 16

Vision Statement The vision of the Center for Information Security and Assurance (CISA) is to provide leadership for information security and assurance (ISA) education, research, and practice, to promote collaborative ISA activities within and outside the JSU boundaries, to prepare the next generation of professionals in embarking on a life long commitment to ISA based on ethical and professional conduct, and to pursue excellence in ISA technology and practice. 3

Mission Statement The Mathematical, Computing, and Information Sciences (MCIS) Department s Center for Information Security and Assurance (CISA) provides an avenue for research and education in computer and network security, digital forensics, cryptography, risk assessment and mitigation, disaster recovery and management, security regulations and compliance, and information security management. CISA facilitates the partnerships and collaborations across disciplines at and community colleges in Northeast Alabama in the areas of critical and national need. CISA represents an exciting and clear vision toward contributing to the national information assurance infrastructure and manpower development. 4

Organization and Operation The CISA is composed of a group of scientists and professionals dedicated to promoting and enhancing information security and assurance research and curriculum. A tenured faculty member with at least an Associate Professor rank is designated a senior scientist. A Ph.D member with at least an Assistant Professor rank is designated a scientist. All other members are given the appropriate and specific area specialist designation. The organization is headed by a Director who is assisted by two Associate Directors who manage the two main areas of ISA: research and education. The center is in operation throughout the year. Published research activities will be maintained as technical reports and disseminated through the center s website: http://mcis.jsu.edu/cisa. The center s annual report will also be published on the same web site. 5

Personnel Dr. Guillermo A Francia, III Director and Professor of Computer Science Management of Information Security, Regulatory Compliance, Network Security, Digital Forensics Ayers Hall 228 gfrancia@jsu.edu Dr. Monica Trifas Associate Director of ISA Education Image Processing and Data Visualization Ayers Hall 245 atrifas@jsu.edu Dr. Aaron Garrett Associate Director of ISA Research Cryptography and Optimization Ayers Hall 231 agarrett@jsu.edu Dr. Donnie Ford Senior Scientist and Professor AI and Security Management Ayers Hall 244 dford@jsu.edu Dr. Sri Krishnaprasad Senior Scientist and Professor Systems Security and High Performance Computing Ayers Hall 240 skp@jsu.edu Dr. Chi Chin Chao Senior Scientist and Associate Professor Database Security and Modeling Ayers Hall 249 cchao@jsu.edu Dr. Andrew Ciganek Scientist and Assistant Professor Software Engineering and Culture Aspects Ayers Hall 234 aciganek@jsu.edu Dr. Ming Yang Scientist and Assistant Professor Digital Forensics and Image Processing Ayers Hall 239 myang@jsu.edu Dr. David Thornton Scientist and Assistant Professor Simulation and Human Computer Interface Ayers Hall 229 thornton@jsu.edu Dr. Jeffrey Zanzig Senior Scientist and Associate Professor Security Regulations, Auditing, and Compliance Merrill Hall 210 jzanzig@jsu.edu Dr. Jane Kushma Senior Scientist and Associate Professor Disaster Recovery and Management 1136 Bldg. 3181 Ft. McClellan jkushma@jsu.edu Dr. John Spain Scientist and Assistant Professor Risk Assessment and Methodologies, Information Security Management 1138 Bldg. 3181 Ft. McClellan jspain@jsu.edu 6

Ms. Sheila Lancaster Information Security Education Specialist Gadsden State Community College slancaster@gadsdenstate.edu Mr. Frank Cornutt Network Security Specialist and Instructor Gadsden State Community College fcornutt@hotmail.com 7

Resources LABORATORIES The CISA resources include two laboratories and conference rooms equipped with networked desktop computers that are configured with multiple operating systems, including Windows 2008 Server, Windows 2003 Server, Windows Vista Ultimate/Business, Windows XP SP2, Fedora Linux, Solaris 10, Ubuntu Linux, BSD Linux, Mac OSX, and Debian Linux. Several of these computers are also configured for Virtualization technology which includes VMWare, Xen, and MS Virtual Server. In addition, these laboratories are equipped with wireless devices such as laptop computers, PDAs, Wimax, and GPS receivers. Data gathering and analysis for digital forensics are facilitated by state of the art hardware and software tools such as disk jockey forensic kit, Paraben s SIM card seizure kit, and disk imaging kits. The laboratory equipment and tools are optimized for educational hands on experimentations, empirical testing, and research. Education and research activities currently supported are: Disk and flash drive forensics Network security Intrusion detection and prevention Wireless security Cryptography Cell Phone forensics Steganography Security Visualization Security log analysis Compliance tools Virtualization security 8

Figure 1. Digital Forensics Equipment Figure 2. Wireless Stations 9

Figure 3. Heterogeneous Network Figure 4. Dedicated Servers 10

Figure 5. Secured CISA Lab Entry Figure 6. Mini Library 11

PERIODICALS, BOOKS, JOURNALS and OTHER PUBLISHED MATERIALS Heterogeneous Published materials on security and information assurance topics are readily available through JSU Library s print and online collections. JSU s online collections include the entire ACM digital library, IEEE Computer, IEEE Security and Privacy, IEEE Transactions on Software Engineering, IEEE Intelligent Systems, IEEE Transactions on Parallel and Distributed Systems. In addition, several security related books, monographs, magazines, and journals are available in the CISA s mini library. Magazine subscriptions include Information Security, TechNet, Visual Studio, Government Computer News, ComputerWorld, NetworkWorld, Systems Management, Network Computing, CSO, SD Times, Embedded Systems Design, CIO, Dr. Dobbs, Better Software, Software Test and Performance, and Communications of the ACM. Figure 7. Some Lab Subscriptions 12

Current Projects Curriculum Development Laboratory Projects under development o Virtualization using Windows Virtual Server, VMWare, and Xen o Virtualization Security o Visualization of security log data o Forensics analysis of mobile devices o Wireless penetration testing o Vulnerability analysis Course modules under development o Secure coding o Compliance of security regulation o Web services security o End user security awareness Research Security of medical images Formal model of security regulation compliance Compliance metrics and benchmarks Data mining of log files Resiliency metrics 13

Funding The Center evolved using the available resources in personnel and equipment. Equipment and supplies are funded by numerous external grants and by the Technology Replacement Program at JSU. The grants that facilitated the procurement of equipment and supplies for the two laboratories were received from the National Science Foundation (NSF), Microsoft Corporation, JSU Faculty Research Grant Program, VMware Corporation, and IBM Corporation. Future plans include the rejuvenation of proposal writing efforts to continue to seek internal and external funding for CISA programs. 14

Intellectual Property The CISA approach to intellectual property is in conformance with s guidelines and policies as stated in Section 6.7 of JSU s Faculty Handbook. Section 6.7 of the handbook is reproduced below. 6.7 PATENTS, COPYRIGHTS, AND INTELLECTUAL PROPERTY Consistent with the University's objectives of supporting faculty research and maintaining a reputable academic standing, faculty members are encouraged to engage in scholarly activities that may result in the creation of patents and copyrights. Faculty members shall retain ownership of copyrights and patent rights from individual creative works if no substantial aid from the University or from an outside agency operating through official University channels is received. Rights pertaining to materials that result from University assisted efforts, externally sponsored efforts, and University assigned efforts shall be determined in accordance with the terms of the Jacksonville State University Manual of Policies and Procedures. 15

Endorsements [SIGNATURE ON FILE] Dr. J. Fred Kelley, Department Head Mathematical, Computing, and Information Sciences (MCIS) Department [SIGNATURE ON FILE] Dr. James Earl Wade, Dean College of Arts and Sciences, JSU 16