Cybersecurity + Liberal Arts Workshop

Slides:



Advertisements
Similar presentations
TRAINING SERVICES NIGTEL-CS TRAINING SERVICE Mobile Telecommunications in Africa especially Nigeria has recorded rapid growth and expansion in the.
Advertisements

1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Yan Chen Dept. of Computer Science Northwestern University Information Security Curriculum Development in Northwestern.
Security administrators The experts need better tools too!
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Course Flow Diagrams May 2-3, 2013 Support.
Cyber vs Legislation and Ethics Colonel John Doody Panel Chair.
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
CPT 123 Internet Skills Class Notes Internet Security Session A.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
1 COPYRIGHT © 2015 ALCATEL-LUCENT. ALL RIGHTS RESERVED. Cognitive Security: Security Analytics and Autonomics for Virtualized Networks Lalita Jagadeesan.
Sample Presentation Headline REPRESENTATIVE SUBHEAD TO SUPPORT SUBJECT Presenter’s Name Presenter’s Title Presentation Date DeterLab A Tool for Cybersecurity.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Center for Cybersecurity Research and Education (CCRE)
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
Examination of the Current Educational Contents in Information Assurance Bill Oblitey Indiana University of Pennsylvania Computer Science Department EPASEC.
Digital Security Focus Area & Critical Infrastructure Protection in H2020 SC7 WP Aristotelis Tzafalias Trust and Security Unit DG Communications.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Denial of Service detection and mitigation on GENI
Outline Unique Challenges to Cybersecurity Education
An Introduction To ARP Spoofing & Other Attacks
A Low Cost, Portable Platform for Information Assurance and Security Education Dan C. Lo, Kai Qian Department of Computer Science and Software Engineering.
GENI, Pen Testing, & other stories
Denial of Service detection and mitigation on GENI
GENI, Cybersecurity, and Liberal Arts
Intrusion Detection Systems
Port Knocking Benjamin DiYanni.
Xenia Mountrouidou (Dr. X)
FYE Cybersecurity Chasing Ghosts in the Wires
CMIT100 Chapter 15 - Information.
Secure Software Confidentiality Integrity Data Security Authentication
Cyber Resilient Energy Delivery Consortium
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Course Introduction and Student Success
Computer Science Courses
Wireless Network Security
Outline Basics of network security Definitions Sample attacks
CSCI 392: Seminar in Computing and Society
GENI, Cybersecurity, and Liberal Arts
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Spoofing Basics Presentation developed by A.F.M Bakabillah Cyber Security and Networking Consultant MCSA: Messaging, MCSE RHCE ITIL CEH.
Rapid Research - Cybercrime
CyberPaths Interdisciplinary Modules
Privacy Through Anonymous Connection and Browsing
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
CSCD 330 Network Programming Spring
CSCD 330 Network Programming Spring
V. Arun College of Information and Computer Sciences
Rapid Research - Cybercrime
Intro Cyber Security Labs on GENI
CSCD 330 Network Programming Spring
COVERT STORAGE CHANNEL MODULE
World-Leading Research with Real-World Impact!
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Autonomous Network Alerting Systems and Programmable Networks
6. Application Software Security
Outline Basics of network security Definitions Sample attacks
COVERT STORAGE CHANNEL MODULE
Computer Science Courses in the Major
Intrusion Detection Systems
Intro Cyber Security Labs on GENI
CyberPaths Interdisciplinary Modules
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Computer Science Dr Hwang Chair, Computer Science Department
Presentation transcript:

Cybersecurity + Liberal Arts Workshop Xenia Mountrouidou (Dr. X)

Outline Motivation Cybersecurity & Liberal Arts Cyber Paths GENI

Motivation: Cybersecurity Education Challenges Cybersecurity: fast paced, changing field Predominantly undergraduate institutions have limited resources Experiential learning in cybersecurity requires large investments

Cybersecurity Education: Solutions General education can feed diverse cohorts to the cybersecurity profession Cloud computing infrastructures can be instrumental

Broadening the Path to the STEM Profession through Cybersecurity Learning

Cybersecurity Paths General education – Discover Intro to cybersecurity – Understand Cybersecurity courses & capstone – Apply

Liberal Arts Education: Gen Ed Definition: a program of education (as in some liberal-arts colleges and secondary schools) intended to develop students as personalities rather than trained specialists and to transmit a common cultural heritage — compare liberal education.

General Education & Cybersecurity Aesthetic and interpretive understanding; Hacker = Aesthete (Brian Harvey, UC Berkley), CITA @ CofC Culture and belief Empirical reasoning; Security Assessment, Pen Test Ethical reasoning; Ethics vs Aesthetics Science of living systems; Science of the physical universe; Societies of the world; and The United States in the world.  ``computer hacker,'' is someone who lives and breathes computers, who knows all about computers, who can get a computer to do anything. http://harvardmagazine.com/2007/03/general-education-finall.html

Cybersecurity & Liberal Arts

Standalone Module Type Topics PUI/LIA Curriculum Legal issues in CySec Case study, essay, discussion HIPPA/FERPA, Computer Security Act, Laws and Authorities, US Patriot Act Political Science International Studies Social Science Management Strategic Plan and Management, Business Continuity / Disaster Recovery Economics Leadership Social Science Human Factors Case study, essay, discussion, hands on exercise Privacy, Passwords, Usable Security Humanities Social Science Attacks and Defense GENI experiment IDS, Traffic, Log Analysis, performance Technology Cryptography Hands on exercise Cryptograms, ciphers, encryption, decryption Network components and traffic Traffic and performance analysis, protocol introduction

CofC Gen Ed FYE: First Year Experience Writing Foreign Language History Humanities Mathematics & Logic Natural Science Social Sciences

FYE: First Year Experience – Chasing Ghosts in the Wires Basic Command Line Cyber Defense Cyber Threats Fundamental Security Design Principles Intro to Cryptography IA Fundamentals IT System Components

Denial of Service Lab for non-CS Majors Pre-installed topology ping - verification Iperf - performance Hping3 - DoS Hypothesis testing Experiments on GENI GENI: Virtual laboratory for networking and distributed systems research and education

What is GENI? (a sneak preview) Obtain compute resources from locations around the United States; Connect compute resources using Layer 2 networks in topologies best suited to their experiments; Install custom software or even custom operating systems on these compute resources; Control how network switches in their experiment handle traffic flows; Run their own Layer 3 and above protocols by installing protocol software in their compute resources and by providing flow controllers for their switches.

GENI and Gen Ed Wofford College of Charleston Computational Science Gen Ed 15 students Mandatory for Lab requirement College of Charleston FYE 20 students Mandatory for first year students gen ed

Pilot Survey Conducted at Wofford College. Cohort: 15 students – 2 computer science declared majors Self-assessment of CS knowledge: 40% novice; 40% intermediate; 20% advanced Pilot Questionnaire: I have a better understanding of CS. I understand how information is transmitted through the internet. I understand the basics of computer attacks and computer network attacks. I understand how computer and network attacks can harm me and my organization. I am considering to take another CS course.

Results

Comments Q: What did you like best about the GENI lab and why? I liked the opportunity to take part in a live experiment with real computers. Doing to the denial of service attack was really cool. I liked that we did a real world issue in a safe and controlled environment. Working with terminal and the command line It was cool to see how flooding a computer actually works rather than it just happens. I liked how we were able to simulate a real attack. This really puts it into prospective on how hackers can do this to anyone.

Comments Q: What did you like least about the GENI lab. I did not like how repetitive it was, and how some things took a very long time to do. I think that my least favorite thing about GENI was trying to get GENI to work. The GENI infrastructure seemed to be unstable and difficult to work with at times. It's also hard to have a complete understanding of how to perform the lab without already having an understanding in computer science.

Preliminary results - FYE Lab 20 students – 6 computer science declared majors Pre & Post Survey Demographic questions Perception Class Focus Group – 4 students

Preliminary Results

Cybersecurity courses & GENI Intrusion Detection Systems Digital Certificate Advanced topics

Intrusion Detection Systems and Mitigation Goals: Install Snort IDS on monitor machine Duplicate all traffic to monitor Create a custom alert for Snort IDS Use mitigation script Drop malicious traffic Send Spoofed SYN Send SYN-ACK Resend SYN-ACK Attacker Server Spoofed Client

Digital Certificate Create a certificate authority Validate & revoke certificate Understand OpenSSL

Advanced Topics Covert Channel Communication Manipulate TCP flags to send exfiltrated passwords Analyze traffic using information theory Software Defined Networking (SDN) solutions for security Use SDN flow tables to identify attacker Use network programmability to drop malicious traffic

Conclusions With cybersecurity in liberal arts we produce better citizens in our graduates Cybersecurity labs + cloud infrastructure = experiential learning with low overhead Cybersecurity belongs to the liberal arts

Questions? Thank you!

Please take the survey to help us improve this workshop goo.gl/i6787a

appendix

Paths to Cybersecurity Education Cohort A CySec Module Cohort B CySec Course Cohort C.1 CySec Capstone Cohort C.2 CS Major or CS Minor

Political Science General Education Module International Conflict Stuxnet Denial of Service International Conflict Stuxnet Denial of Service as a weapon Goals: Gain an appreciation about attacks and cyberwar Research about international laws and policies

Finance General Education Module Gordon Loeb Model