Schools and Security Programs - PowerPoint PPT Presentation

1 / 26
About This Presentation
Title:

Schools and Security Programs

Description:

David Tran. Arif Selcuk Uluagac. Ying Xia. 6/20/09. 2 ... United States Air Force Academy. Florida State University. Nova Southeastern University ... – PowerPoint PPT presentation

Number of Views:96
Avg rating:3.0/5.0
Slides: 27
Provided by: adamle2
Category:

less

Transcript and Presenter's Notes

Title: Schools and Security Programs


1
Schools andSecurity Programs
  • Michael Courson
  • Adam Leonard
  • Joel Stanley
  • David Tran
  • Arif Selcuk Uluagac
  • Ying Xia

2
Center of Academic Excellence in IA Education
(CAEIAE) Program
  • 4-year colleges and graduate-level universities
    are eligible to apply
  • Offered annually
  • The 9th annual call for applications is now open
    till 15 December 2006.
  • Each applicant must pass a rigorous review
  • Applicants are evaluated against stringent
    criteria.
  • Applicants must possess current certification
    under the Information Assurance Courseware
    Evaluation Program
  • Valid for five academic years,
  • The school must reapply to retain its CAEIAE
    designation.

3
Center of Academic Excellence in IA Education
(CAEIAE) Program
  • IA courseware must be certified prior to
    application
  • Due before 31 August
  • Applicants must clearly demonstrate, how they
    meet each of the ten program criteria
  • Minimum requirements must be met for each of the
    ten criteria.
  • Results announced in June
  • CAEIAE Institutions serve as regional centers of
    IA expertise

4
Objective of the criteria
  • ..The criteria are designed to measure and
    recognize the depth and maturity of Information
    Assurance (IA) academic programs, and to
    stimulate the development of broad-ranging IA
    programs in order to meet the varying needs of
    the student population, including work force
    professionals, as well as the employment needs of
    government and industry. Institutions
    successfully meeting the criteria are
    "designated" as National Centers of Academic
    Excellence in Information Assurance Education by
    the National Security Agency and the Department
    of Homeland Security

5
Ten Criteria
6
NSA Centers of Academic Excellence (Total 75)
  • Auburn
  • University of Alaska Fairbanks
  • Naval Postgraduate School
  • University of California at Davis
  • California State Polytechnic University, Pomona
  • United States Air Force Academy
  • Florida State University
  • Nova Southeastern University
  • Clark Atlanta University
  • Georgia Institute of Technology
  • Kennesaw State University
  • Idaho State University
  • University of Idaho
  • DePaul University
  • Illinois Institute of Technology
  • University of Illinois at Urbana-Champaign
  • Purdue University
  • Iowa State University
  • University of Louisville
  • University of New Orleans
  • Capitol College
  • Johns Hopkins University
  • Towson University
  • University of Maryland, Baltimore County
  • University of Maryland University College
  • Boston University
  • Northeastern University
  • University of Massachusetts, Amherst
  • University of Detroit, Mercy
  • Walsh College
  • Eastern Michigan University
  • University of Minnesota
  • Mississippi State University
  • University of Nebraska at Omaha
  • New Jersey Institute of Technology
  • Stevens Institute of Technology
  • New Mexico Tech

7
NSA Centers of Academic Excellence
  • University of Pittsburgh
  • West Chester University of Pennsylvania
  • Dakota State University
  • Fountainhead College of Technology
  • University of Memphis
  • Southern Methodist University
  • Texas AM University
  • University of Dallas
  • University of North Texas
  • University of Texas, Dallas
  • University of Texas, San Antonio
  • Norwich University
  • George Mason University
  • James Madison University
  • Virginia Polytechnic and State University
  • University of Washington
  • George Washington University
  • Information Resources Management College
  • Pace University
  • Polytechnic University
  • Rochester Institute of Technology
  • State University of New York, Buffalo
  • State University of New York, Stony Brook
  • Syracuse University
  • U.S. Military Academy, West Point
  • North Carolina State University
  • University of North Carolina, Charlotte
  • East Carolina University
  • Air Force Institute of Technology
  • Ohio State University
  • University of Tulsa
  • Oklahoma State University
  • Portland State University
  • Carnegie Mellon University
  • Drexel University
  • East Stroudsburg University of Pennsylvania
  • Indiana University of Pennsylvania

8
NSA Centers of Academic Excellence
  • University of Illinois at Urbana-Champaign
  • Certificate in Security
  • A few special topics classes
  • Florida State University
  • Masters degree in Information Security
  • Several classes on network and computer security
  • Kennesaw State University
  • Bachelors degree in Information Security and
    Assurance
  • Masters degree with concentration on Security
  • Many classes covering a wide range of security
    topics
  • Georgia Institute of Technology
  • Masters degree in Information Security
  • Many classes covering cryptography, network and
    computer security

9
Other Schools
  • University of Virginia
  • Certificate in Information Security Management
  • Classes in security policy, threat assesment, and
    security audits
  • University of Wisconsin-Madison
  • Certificate in Information Security
  • Classes in network security and countermeasures
  • Stanford University
  • Masters degree in Computer and Network Security
  • Classes in network and computer security
    cryptography
  • Johns Hopkins University
  • Masters degree in Security Informatics
  • Classes covering many security topics

10
Other Schools
  • Mississippi State University
  • Certificate in Information Security for BS and MS
    program
  • Virginia Tech
  • Classes in network security and countermeasures
  • Purdue University
  • Core area in Information Security and Assurance

11
Selected Schools Security Programs
BS
1
MS
5
Certification
4
Classes
2
12
Security Research Areas
  • Forensics
  • Prediction
  • Visualization
  • Cryptography

13
Forensics
  • The simple definition of computer forensics is a
    technological, systematic inspection of the
    computer system and its contents for evidence or
    supportive evidence of a crime or other computer
    use that is being inspected. 1
  • DHS and Secret Service are setting up a new
    computer forensics institute in Alabama designed
    to train law enforcement officers. 2
  • As of 2006, there are about 100 colleges and
    universities across the nation offering
    undergraduate and graduate courses in digital
    forensics, with a few even offering majors. This
    is up from a mere handful that existed five years
    ago. 3

14
Sample List of Schools
  • Purdue
  • Johns Hopkins
  • Tulsa
  • Carnegie Mellon
  • University of Central Florida
  • Georgia Tech
  • Many many online degree programs

15
Prediction
  • Categories
  • Intrusion Detection Systems
  • Honeynet
  • Virus Modeling

16
Intrusion Detection Systems
  • IDS have been the focus of many schools and
    companies in the US.
  • IDS can be passive or reactive.
  • Types of IDS Includes
  • Network IDS
  • Protocol IDS
  • Application IDS
  • Host IDS

17
Honeynet
  • The Honeynet Project is a non-profit volunteer,
    research organization dedicated to improving the
    security of the Internet at no cost to the
    public. All of our work is released as and we are
    firmly committed to the ideals of OpenSource. Our
    goal, simply put, is to make a difference. We
    accomplish this goal in the following three ways
    4
  • Awareness
  • Information
  • Tools

18
Honeynet Participants
  • UNC Charlotte
  • Georgia Tech
  • West Point
  • The Southern California Group
  • Azusa Pacific University
  • Cal Poly Pomona

19
Virus Modeling
  • Example Using NS2 to model the behavior of a
    worm on a dumbbell shaped network.
  • Papers on Simulating Worm Outbreaks Available at
    http//www.wormblog.com/2004/11/simulating_worm.ht
    ml

20
Example Schools
  • University of Illinois at Urbana Champaign
  • Stony Brook University
  • University of Minnesota
  • Georgia Tech

21
Security Visualization
  • Network sensors and other security measures
    generate huge amounts of security data that must
    be analyzed.
  • Creating visualizations and graphical systems is
    an important aspect of Information Security that
    is being researched by many schools.
  • Visualizations are extremely helpful in Intrusion
    Detection Systems where large amounts of alarm
    data are generated.
  • Information Visualizations are also prone to
    attacks and must be secured properly.

22
School Research on Security Visualization
  • Georgia Institute of Technology
  • Countering Security Information Overload through
    Alert and Packet Visualization 1
  • IDS Rainstorm Visualizing IDS Alarms 2
  • Attacking Information Visualization System
    Usability Overloading and Deceiving the Human
    3
  • Mississippi State University
  • Visual Data Analaysis for Detecting Flaws and
    Intruders in Computer Network Systems 4
  • Stanford University
  • Network Security Visualization 5
  • Virginia Tech
  • Computer Security Visualization 6

23
Cryptography
  • Traditionally the study of means of converting
    information from its normal, comprehensible form
    into an incomprehensible format, rendering it
    unreadable.
  • A comprehensive list of schools focusing on
    cryptography and security in their curriculum
  • http//avirubin.com/courses.html

24
History of Cryptography
  • Three distinct phases
  • Through WW I
  • simple mnemonic devices
  • limited size, a few thousand characters
  • Mechanization of cryptography
  • electromechanical devices
  • complex, larger, and more accurate
  • electronic devices improved speed/accuracy
  • Last three decades
  • Extension of cryptography to the information age
  • using electronic data to replace tangible
    documents
  • digital signatures and authentication

25
References
  • http//www.nsa.gov/ia/academia/caeiae.cfm
  • http//avirubin.com/classes.html
  • 1 http//en.wikipedia.org/wiki/Computer_forensic
    s
  • 2 http//arstechnica.com/news.ars/post/20070313-
    dhs-secret-service-to-open-computer-forensic-insti
    tute.htm
  • 3 http//www.usatoday.com/tech/news/techinnovati
    ons/2006-06-05-digital-forensics_x.htm
  • 4 http//www.honeynet.org/

26
Questions..
  • THANK YOU
Write a Comment
User Comments (0)
About PowerShow.com