New Forms of Experiential Education on Cyber-Physical Security

Slides:



Advertisements
Similar presentations
NCATS REDESIGN METHODOLOGY A Menu of Redesign Options Six Models for Course Redesign Five Principles of Successful Course Redesign Four Models for Assessing.
Advertisements

Design Throughout the Biomedical Engineering Curriculum Willis J. Tompkins Department of Biomedical Engineering University of Wisconsin Madison, Wisconsin,
GEORGE MASON UNIVERSITY Center for Infrastructure Protection and Homeland Security Integrating Critical Infrastructure into Emergency Management Programs.
Academic Advising Implementation Team PROGRESS REPORT April 29, 2009.
2010 Challenges and Initiatives for Ministry of Education and Science of Georgia.
CounterMeasures: An Interactive Game for Security Training Advised by: Mark Claypool Kathi Fisler Craig Jordan (IMGD) Matt Knapp (CS) Dan Mitchell (CS)
Universal Design for Learning in the College Classroom Abstract This Faculty Learning Community (FLC) integrated components of Universal Design for Learning.
Camille Kandiko, Indiana University Bloomington Jon Acker and William Fendley, The University of Alabama Lawrence Redlinger, The University of Texas at.
InTeGrate Assessment David Steer, University of Akron Ellen Iverson, Carleton College May 2012.
Tulane University Dave Rice Workshop on BME Teaching of Innovation, Design & Entrepreneurship.
Platte County High School Board of Education Goal 1: Review and/or modify graduation requirements and course offerings in an effort to improve flexibility,
Copyright © 2014 by The University of Kansas Developing a Plan for Financial Sustainability.
Members of the NSAC Placement Testing Specialist Transfer Credit Evaluation Team AP credits Dual credits Academic Advisors First year of study at Benedictine.
0 Biomedical Engineering Society Annual Meeting - Nashville, TN Presentation to the Biomedical Engineering Society October 2, 2003 Biomedical Engineering.
LINKS Evaluation. Why evaluate? Evaluation of the LINKS Advising Program is particularly important in this pilot year. It gives participating staff, students.
How does collaborative group work affect science learning?
MIDN Zac Dannelly. May 2009: President's 60-day Cyberspace Policy Review – "expand and train the workforce” May 2010: The Ad Hoc Committee on Cyber Security.
Understanding the Potential of IT
Smart City Hacked??? Technology & Society. American cities vulnerable to large-scale cyber attack
Instructional Design Course Evaluation Phase. Agenda The Evaluation Process Expert Review Small Group Review The Pilot Feedback and Revision Evaluation.
Assessment without Levels. Assessment without levels What to assess?
Check In Check Out (CICO) Program Overview. What is CICO? The CICO Program is a school-wide, check-in, check-out prevention program for students who are.
Nevada STEM Program Recognition Rubric K-12 Program Definitions Exploratory The Exploratory STEM program describes a school program that has intermittent.
E VALUATION PLAN FOR COURSE DESIGN Embedding Literacy and Numeracy Module.
Mechatronics and Robotics: A K—20 Continuum
Zeynep Dilli and Neil Goldsman
Designing for the Next Generation of Engineers
Huntsville City Schools Cyber Security Program Update
Assuring Digital Customer Experience & Last Mile Customer Experience
Training on Infection Prevention and Control
Keywords: Capstone design course, business plan, interdisciplinary collaboration Integration of Real-life Engineering Design Problems into Engineering.
The Vertically-Integrated Projects (VIP) Program: Integrating Undergraduate Education and Graduate Research Bloom, B. S. (Ed.). (1956). Taxonomy of educational.
Keywords: Engineering ethics, design education,
2016 Student Astronaut Challenge Coach Training
Benefits of UG Research Experiences
MGT 498 TUTORIAL Success trials - mgt498tutorial.com
Digital “Show-How” Active Methods for Teaching Programming
Arash E. Zaghi, PhD, PE University of Connecticut
Academic Support Tuition project Phase 2
Increasing Hands-On Technology Use
Presented by: Co-op 2.0 Project Team
Group 4 Project.
Lisa Benson Clemson University
Cyber Offense vs. Cyber Defense: A Theoretical Framework
National planning for Open Research euroCRIS 2017, 30 May 2017
SUNY Applied Learning Resolution.
“Plan the work. Work the plan.” ~ Old Saying
BIS 320 Competitive Success-- snaptutorial.com
MGT 498 EDU Education Your Life / mgt498edu.com
BIS 320 Education for Service-- snaptutorial.com
MGT 498 Education for Service/tutorialrank.com
MGT 498 TUTORIAL Education for Service--mgt498tutorial.com.
BIS 320 Inspiring Innovation-- snaptutorial.com
Actions that make a difference using employee survey results.
ECE 477 Final Presentation Group 2  Spring 2005
Discover, Design, Build:
EDP and BIOLOGY: A Multi-disciplinary Engineering Challenge
Project Oriented Mentoring and Supervision of Students
Developing a Plan for Financial Sustainability
Industry Placement Planning
~ Sociology ~ Experiential Learning
Life after grad By-Nolan Kenoras.
CS 410 Professional Workforce Development I
Employee engagement Delivery guide
The Vertically-Integrated Projects (VIP) Program: Integrating Undergraduate Education and Graduate Research Bloom, B. S. (Ed.). (1956). Taxonomy of educational.
Technology Department Annual Update
Assessment at Northeastern University
PD Goals Program Overview December, 2012
PD Goals Program Overview December, 2012
Lecture 1 Project Organization
Presentation transcript:

New Forms of Experiential Education on Cyber-Physical Security Yunsi Fei Keywords Competition Attack and defense Team work New Forms of Experiential Education on Cyber-Physical Security

Why? NU’s unique brand of experiential learning and co-op program have been well recognized Cyber and physical security is a requirement of many real-world systems and infrastructures Secure design and implementation (defense) require deep understanding of vulnerabilities – attacks Competition-based lab course will be an effective and innovative form of experiential education on practical security

What? Embedded Catch-the-Flag Competition Two phases Six weeks of secure design and implementation of a digital lock/PIN system Six weeks of hacking on other teams’ implementations, catch the flags Final project presentation

How? Learning objectives Advisor-student interaction Learn the basic design principles for secure embedded systems Apply these principles into the real design and implementation Identify vulnerabilities of an embedded device and launch real attacks Understand the hacking process and perform ethic hacking. Advisor-student interaction More hands-off advising – similar to research Open-ended design and flexibility Advisor suggests reading materials, helps the design process, introduces possible attacks, sets up timeline and checkpoints, and monitors progress Encourage team work

Where? Northeastern University, and/or other universities in the New England area Pilot course in Spring 2016: 4 credit Independent Study Two NU teams participated in a competition among four universities Each team 8 students (mostly senior ECE students) Collaborative team work Vigorous testing, debugging, and reprogramming Report and presentation

Prognosis Competition Effective and engaging competition design Allocation of time between the two phases More post-competition feedback on the design, implementation, and attacks Appropriate team size How to make the competition multi-disciplinary – cyber, physical, infrastructure, and social engineering? How to involve more advisors/faculty members? How to evaluate the class?