Examination of the Current Educational Contents in Information Assurance Bill Oblitey Indiana University of Pennsylvania Computer Science Department EPASEC.

Slides:



Advertisements
Similar presentations
Final Presentation Topics 1) Firewalls 1) Firewalls 2) Virtual Private Networks 2) Virtual Private Networks 3) Secure Socket Layer 3) Secure Socket Layer.
Advertisements

Security and Personnel
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Information Assurance & Network Security Certificate Prof. Rafael M. Rivera Universidad del Turabo School of Engineering Institute of Telecommunications.
Introduction to Firewall Technologies. Objectives Upon completion of this course, you will be able to: Understand basic concepts of network security Master.
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 General Policy and Law Issues.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Creation of Policies, Part.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Creation of Policies, Part.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
Guide to Computer Network Security
NETWORK SECURITY.
Computer and Information Technology Core courses focus on problem solving and communication skills for Information Technology professionals involved in.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
1 Guide to Network Defense and Countermeasures Chapter 6.
The Basics of Networking. Rick Graziani What is networking? Communication! An interconnection of computers and other devices: –Printers.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
 An Overview of IE 4382/5382 Cybersecurity for Information Systems Susan D. Urban, Ph.D Department of Industrial Engineering Texas Tech University Lubbock,
A First Course in Information Security
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
What is FORENSICS? Why do we need Network Forensics?
Chapter 9: Novell NetWare
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Computer & Network Security
Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Firewall Security.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
Firewalls and proxies Unit objectives
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
A Network Security -Firewall Bruce Turin.
1 컴퓨터 교육 2 학기 김혜원 Teaching Networking and Operating System to Information Systems Majors D. Robert Adams and Carl Erickson Department of computer Science.
Sarvajanik college of engineering and technology. Created by:- Keshvi Khambhati (co-m) Ria Bhatia (co-m) Meghavi Gandhi (co-m) Jarul Mehta(co-m) Topic.
1 NES554: Computer Networks Defense Course Overview.
Role Of Network IDS in Network Perimeter Defense.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
NETWORK INTRUSION SECURITY BREACHES, THAT MAKE NETWORKS VULNERABLE TO UNAUTHORIZED ATTACKS.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Interdisciplinary MS in Information Assurance Jim Wolfe Computer Science Department Indiana University of Pennsylvania EPASEC 2006.
A presentation by John Rowley for IUP COSC 356 Dr. William Oblitey Faculty member in attendance.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Cyber Threat Dr. John P. Abraham Professor University of Texas Pan American.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
The Challenges of Teaching an Interdisciplinary IA Course Rose Shumba Indiana University of Pennsylvania EPASEC 2006.
SY0-401 Exam Dumps CompTIA Security+ Certification Exam
(A CORPORATE NETWORK APPROACH)
Systems Security Keywords Protecting Systems
Digital Pacman: Firewall Edition
Guide to Computer Network Security
Introduction to the course
Information Assurance & Network Security Certificate
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Examination of the Current Educational Contents in Information Assurance Bill Oblitey Indiana University of Pennsylvania Computer Science Department EPASEC 2006

OverviewOverview –The Issues in IA Education –How they are being Addresses –Can we do any Better –Should IA Have its Own Discipline? –A Look at the IA Graduate

EPASEC 2006 Issues in IA Host Computer Security Network Security CybercrimeEncryption Hacking and its Effects Operating Systems Security Dealing with Malicious Code Operational Vulnerabilities SpammingPhishing Security Tools Web Security Wireless Security

EPASEC 2006 Addressing the Issues Two approaches: –Design new courses to address IA issues Several new courses get into the program Results in new concentrations or new disciplines –Embed IA issues in existing courses May strengthen some existing courses Not all issues get addressed –Some ideas are new and cannot just be embedded in core Computer Science courses

EPASEC 2006 Topics for Stand-Alone Courses Personal & Host Computer Security Network Security Cryptography Digital/Computer Forensics Information Assurance Management Physical Security Disaster Recovery

EPASEC 2006 Topics for Embedding in Courses Wireless Security Operating Systems Security Buffer Overflow Security Tools Web Security Data Base Security Cyber Terrorism Secure Storage Systems

EPASEC 2006 The Multi-disciplinary Nature IUP’s program links the disciplines of: –Computer Science –Criminology –Management Information Systems –Technology Support Systems –Political Science Most other programs are pure Computer Science Some link Computer Science and Law or other Legal Programs

EPASEC 2006 Separate Discipline? Should IA be a separate discipline from Computer Science History of the growth of Computer Science –Mathematics spawned Computer Science –Computer Science spawned Library Science & MIS –Data Communication and Networking have been spawned into Telecommunications –AI and Expert Systems held in check –Should IA also be held in check?

EPASEC 2006 Examining the IA Graduate Her/His Background –A programmer with IA intensive knowledge? Has had the core of the Computer Science program Can develop IA tools –An IA technician who is computer literate? Knows about IA tools and can use them

EPASEC 2006 Sample Security Course Unix as Firewall –Introduction to network security and firewalls –Installing and securing Linux –The TCP/IP Suite –Packet filtering and NAT –Secure Shell and Secure Copy –Socks service –Proxy service –Securing DNS –Securing –Virtual Private Networking –Hackers' tools –Detecting and countering firewall intrusions –Good practices Source:www-304.ibm.com

EPASEC 2006 Expected Skills from Course Set up, configure and administer a Linux- based firewall Identify and counter security threats Understand packet filtering and Network Address Translation (NAT) Set up socks Use a proxy server Secure Domain Name System (DNS) Respond to a security breach

EPASEC 2006 Coping with the Course Definitely a background knowledge of Linux is required What about Computer Science background? Can a student without Computer Science background be able to cope?

EPASEC 2006 Where Are We Headed? Should we be aiming at Undergraduate issues only? Do we concentrate on Graduate issues? Should we insist on strong Computer Science background before acceptance into graduate studies in IA?