Undergraduate Research in Information Assurance SOUNDARARAJAN EZEKIEL COMPUTER SCIENCE DEPARTMENT INDIANA UNIVERSITY OF PENNYLVANIA INDIANA, PA 15705.

Slides:



Advertisements
Similar presentations
The Messy World of Grey Literature in Cyber Security 8 th Grey Literature Conference 4-5 December 2006 New Orleans, Louisiana Patricia Erwin – I3P Senior.
Advertisements

Growth Opportunities October 8, Presentation to College of STEM Advisory Board.
Space Grant Workforce Development Initiative: Initial Survey Results Michaela Schaaf Karisa Vlasek Mary Fink Brent Bowen Melissa Wurdeman NASA Nebraska.
1 Quality Enhancement Challenge S. David Stamps, Provost and Vice President for Academic Affairs University of South Florida.
Assessment of Undergraduate Programs Neeraj Mittal Department of Computer Science The University of Texas at Dallas.
Outreach at the J. Willard Marriott Library Peter L. Kraus,Outreach Coordinator LOEX of the West
K-16 programs College of Engineering and Computing.
Vice-rector of research department A.S. Karakushikova Director of Research and Education activities of Academic and Research Institution of Fundamental.
Information Literacy and Inquiry-based learning Pamela McKinney Learning Development and Research Associate (Information Literacy) at CILASS CILASS identifies.
Issues for staff and students in mainstreaming inquiry based learning
School of Business University of Bridgeport Admissions Presentation Robert Gilmore, Ph.D. Associate Dean School of Business.
Successful Graduation Projects
NTUST National Taiwan University of Science and Technology 2009 School of Management.
Global Projects Preparation: Infusing Information Literacy into Project-Based Curricula Christine Drew Manager, Instruction & Outreach IT liaison to IGSD,
University of Delaware PBL Faculty Institute, University of Cincinnati November 1, 2001 Transforming Undergraduate Education Institute for Transforming.
May 14, 2008 Nancy Hale, Seidenberg Sandy Flank, Education Thinkfinity, Technology and Community Initiative at Pace University.
Student Success Students Temple College.  Is a self-paced, individualized program based upon a pre-assessment that addresses the specific academic needs.
University of Delaware Experience It Yourself: An Introduction to Problem-Based Learning Institute for Transforming Undergraduate Education George Watson.
David L. Spooner1 IT Education: An Interdisciplinary Approach David L. Spooner Rensselaer Polytechnic Institute.
Race to the Top Program Update January 30, State Funding 2.
FAMA COLLEGE Private provider of Higher Education in Kosovo The institution commenced its activity from 2003/04 academic year active students
Grants as Planning Stepping Stones: Strategic Initiatives for Engagement with India at Winston-Salem State University UNC India Summit UNC General Administration.
College of Integrated Science and Technology (CISAT)
Addressing the Pre-service Learning Needs of Education Majors in Math and Science Through Technology
1 By The Numbers. 2 One of largest programs of its kind at a major research institution Replication is underway at other universities. US Department of.
NYIT TUES Evaluation May 2014 Dr. Sarah McPherson Evaluator NYIT School of Education.
LEFIS W2 Posgraduate Workshop 1 LEFIS, WG 2 Postgraduate studies Meeting, Rotterdam.
Technology in High Schools Kenyon Walker & Fawzia Rashid.
EXPANDING THE CIRCLE 83 Avan Nu Po Road, Santa Fe, NM | F  | | Institute of American Indian Arts.
BUILDING THE VISION Gregory G. Dell’Omo FACULTY CONVOCATION August 26, 2005.
Centre for Teaching and Learning c o l l a b o r a t i v e r e s p o n s i v e p r a g m a t i c The CTL Experience for a New Faculty Member Dr Joy Mighty.
Community Psychology: A Brief Introduction Society for Community Research and Action (American Psychological Association, Division 27) Council of Education.
Preparing Future Faculty (PFF) Daniel Denecke Director, Best Practices Council of Graduate Schools (US)
Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School
CSURF C enter for the S upport of U ndergraduate R esearch and Fellowships Located on the 2 nd Floor of Randall Library URI Undergraduate Research Involvement.
Staff Development Approaches at The University of Georgia: Philosophy, Models, and Financial Support University of Georgia Institute of Higher Education.
ScholarSHIP “Undergraduate Research at Shippensburg University”
November 9, 2009 Visual Analytics for Command, Control, and INteroperability Environments David S. Ebert, Director.
How to Go to Graduate School Biology Dept., Saint Louis University Dr. Downes & Dr. Nordell.
Department of Computer and Information SciencesMay 5th, 2004 HOMMER: Holistic Model for Minority Education & Research.
Evolving Schools, Evolving Workplaces in the Bluegrass: Building a Career Pipeline Tuesday, August 5, 2014 Jaleh Rezaie, Ph.D. Director, STEM-H Institute.
IB Diploma Parent Meeting Wednesday September 9, 2015.
KJC001 (sp2015.ppt – May 12, 2015) – Industry senior project presentation Industry-based Senior Project in the Department of Computer Science and Engineering.
School of Industrial Engineering - University of Oklahoma 1 HTIC-REU Research Experience for Undergraduates at the Human Technology Interaction Center.
Linking research and teaching Associate Professor Angela Brew The University of Sydney.
Please answer the following questions before the session on the notepad at your table and turn in to the presenter (Mark) 1. How familiar are you with.
Information Science &Technology at Mercer University.
Information Assurance – A Technology Transfer Success Story Deidre W. Evans, Edward L. Jones, Christy L. Chatmon Computer and Information Sciences Department.
© 2012 CAPELLA UNIVERSITY T WENTY YEARS OF ENHANCING ONLINE STUDENT S UCCESS Amy Buechler-Steubing & Siri Sorensen Capella University – Learning Assistance.
School of Natural Sciences & Mathematics A Faculty Member’s Perspective.
Information Science &Technology at Mercer University August 22, 2001.
THE OFFICE OF TEACHING & LEARNING Julanna Gilbert.
2007. Faculty of Education ► Staff 300 (incl.100 in Teacher training school) ► 20 professorships ► 80 lecturers ► 9 senior assistants ► 12 assistants.
Aisha R. Morris (UNAVCO) and Rebecca Haacker (NCAR) PARTERNSHIPS FOR BUILDING A DIVERSE STEM WORKFORCE SOARS Center for Higher Education NCAR UCAR air.
SCI-MA-TECH A Program of Educational Excellence.  The main purpose of SCI-MA-TECH is to increase interest and promote excellence in science, math, engineering.
Faculty of Applied Science and Technology /Applied Computing INDUSTRY AND EDUCATION A PRACTIONER’S VIEW OF INDUSTRY / RESEARCH DRIVEN.
Spring 2013 OMSP Request For Proposal. The purpose of this PowerPoint is to highlight critical components of the Request for Proposals that have historically.
Department of Mathematics and Computer Science
When most people think of UT Not many people think of research, and even fewer think of UNDERGRADUATE research.
1 Item 3 - Research and Development of High Security Remote Authentication Technology Item 3 - Research and Development of High Security Remote Authentication.
University of Southern Mississippi
Department of Computer and Information Sciences
Transforming Undergraduate Education
Information Science &Technology at Mercer University
Ronald L. Larsen Dean & Professor
Industry-based Senior Project in the
Quality assurance and curriculum development
Computer Science Section
IT Applications with Emerging Techniques: Security Solutions
University of Southern Mississippi
Presentation transcript:

Undergraduate Research in Information Assurance SOUNDARARAJAN EZEKIEL COMPUTER SCIENCE DEPARTMENT INDIANA UNIVERSITY OF PENNYLVANIA INDIANA, PA 15705

PURPOSE Our research offers outstanding undergraduates the chance to work closely with faculty in an intensive research Work on cutting-edge research, not just providing clerical task Apply the knowledge to real world problems Provides hands-on experiences to enhances their educational success Gives students first-hand exposure an environment similar to the graduate school Students work under faculty mentorship either on an individual basis or as part of a research team Enhance critical skills in communication, independent thinking, creativity and problem solving

Rationale US has more than 3500 institutions of higher education More than 2000 offer only associate and bachelor degrees Research I universities ( about 100) – 50 or more doctoral degree– more $40 million federal support Research II universities( about 40) – similar to Research I but they receive federal funds between $15.5 to $40 million Includes extensive libraries, well-equipped labs, sophisticated computer capabilities, and university presses housed in. Outstanding researcher are not limited to these institutions; nearly all colleges and universities can point to strong scholars within their department

Continue Differences between research institution and others –Research:- Provides other programs( sports, visual and performing arts) Size- funding sources 80%-90% freshmen graduate with in 5 years Setting and locations Produce 32% undergraduates( they are only 3% in total schools) –Publics schools– Produce 60% undergraduates Enroll huge number of working students– graduation delays beyond 5 years Developing curriculum freshman through senior level Most of the students come from the state and more likely commuters

Continue The % of population of selected nation that enters college and universities ( USA 52%, Canada 49%, UK 43%) Undergraduates major source for research institution– many students from research institution never saw their world famous professor– all they come across TAs – now they try to emphasize teaching– no interaction The Boyer commission concluded that research based learning must become “ …The ideal undergraduate education would turn the prevailing undergraduate culture of receivers into a culture of inquirers, a culture in which faculty, graduate students, and undergraduates share an adventure of discovery.”

Faculty benefits Integrate teaching and research Develop deeper relationship with students Ignite student thinking skills and discoveries Mentoring next generation of professionals Changing the learning culture Enhance their knowledge Keep their knowledge up to date “ learning is based on discovery guided by mentoring rather than on the transmission of information “– faculty can learn from students

IUP Computer Science -- Research We realized that undergraduates are our wealth We want to provide maximal opportunities for intellectual and creative development Many faculty take part in leading undergraduate research Example : Profs. Jim, Bill, Rose and Raj Many of our undergraduates take part in research, in which students work with faculty Students received hourly wages and academic credits( some projects)

Rose’s Work ACM grants since 2004 Four female students are currently working on the Computer Security Awareness ( ) –Enhance the public's understanding and acceptance of information security issues through awareness and education –The project involved investigating on the current computer security practices and techniques and hosting security awareness workshops at IUP.

Continue The Use of HCI techniques in evaluating Security Tools ( ) –this project is to initiate some groundwork on improving user interfaces for computer security software –outcome from this project will be a collection of available principles for good user interface design for security software and a set of case studies on the usability of the tools. Security and Biometric Devices ( ) –The goal of this project is to investigate the public’s understanding and acceptance of biometric devices as a method of user authentication

Covert Channel Research Profs. Jim, Bill, Raj with 4 students Received grant from NSA about $100k Goal: Prepared 110 page white paper on Unclassified Covert Channels –This document provides an overview of the current state of practice for covert channels. We focus on the main areas associated with the study of covert channels. The topics covered are: –History of Secret Communication, The Evolution of the definition of Covert Channel, Security Models, Examples of Covert Channels, Covert Channel Analysis, Performance Measures and Software Practice Students presented papers –PACISE 2005( Pennsylvania Association of Computer and Information Science Educators) –ABIT 2005( Academy of Business and Information Technology) –IUP research appreciation week – poster presentation

Raj and Bill’s Works Worked on many topics –Covert channels –Robotics– Prof Smith worked together –Iris recognition –Network Signal analysis –Steganography –Physical Security ( Bill with one student) Used techniques –Signal processing, Image processing, fractals, wavelets and other traditional methods About students involved in last 4 years

Continue Paper presented in local, national and international conferences Such as: –PACISE –ABIT –IUP poster presentations –Secure IT( Informational Technology Security Conference) –International Conference on Parallel and Distributed Computing Networks –International conference on Internet and Multimedia systems and Applications –World Multiconference on Systemic, Cybernetics and Informatics –GOVSEC

IUP Internship Our internship program can offer an invaluable adjunct to research based learning by allowing the students concrete contexts in which to apply research principles Intern experience can provide learning that cannot be replicated in the class room Prof. Shubra is our intern Coordinator The interns are competitively selected and take 23 week -long (including summer) training program Placed students in various Gov, Private and Non-profit organizations across the nation.

Future Make the research based learning the standard Mentor every student Construct an inquiry-based freshman year Seminar learning –Already established IA group- Meet every Tuesday 6:00- 7:00 pm –Topics Cisco router configuration, computer forensic, vulnerability analysis, wireless security feature, file encryption, cyber attacks, biometrics, window password, SQL Injection, ARP spoofing etc. Build freshman foundations– long term mentor, integrating transfer students Interdisciplinary education

Continue Link communication skills and course work– we are doing this in many courses– need to expand in every course –Example:- In our Seminar on Technical Topics course allow senior students to pick IA related topics for their presentations– –The goal of this course is “Reading, review, and discussion of the current literature of computer science and industry professional and technical journals; oral presentations” Use information technology creativity– learn state- of-the-art practices Work with community – planning to work with John. P. Murtha Homeland Security Center Graduate program– working on one—I am inviting Professor Jim to talk about our Masters Program