CyberPaths Interdisciplinary Modules

Slides:



Advertisements
Similar presentations
David A. Brown Chief Information Security Officer State of Ohio
Advertisements

OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
1 An Overview of Computer Security computer security.
© Dr. C.Hicks, MMM Engineering, Newcastle University IEE/1 Delivery and assessment issues involved in very large group teaching Dr. Christian Hicks MMM.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Creation of Policies, Part.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
The College of Information Sciences and Technology ist.psu.edu.
UMUC HS-EM Graduate Programs Competency Based Model A Work in Progress June 2014 CHDS – EMI Higher Ed Irmak Renda-Tanali, D.Sc. Collegiate Professor Director,
 An Overview of IE 4382/5382 Cybersecurity for Information Systems Susan D. Urban, Ph.D Department of Industrial Engineering Texas Tech University Lubbock,
A First Course in Information Security
Cyber vs Legislation and Ethics Colonel John Doody Panel Chair.
School of Management & Information Systems
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
© 2008 Pittsburgh Supercomputing Center Tour Your Future The Girls, Math & Science Partnership Pittsburgh Supercomputing Center Computer Network Engineering.
Ideas about ICT Management Faculty meeting to discuss the Comp/Tele program Henri Slettenhaar Webster University Geneva.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Anatomy, Dissection, and Mechanics of an Introductory Cyber-Security Course’s Curriculum at the United States Naval Academy By Raymond Greenlaw.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
CMSC104 Problem Solving and Computer Programming Spring 2011 Section 04 John Park.
CMSC104 Problem Solving and Computer Programming Spring 2009 Sections 0201 & 0301 Ms. Dawn Block.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Access Security IS3230.
CISC 849 : Applications in Fintech Jin Gu Dept of Computer & Information Sciences University of Delaware Cyber-security & Finance.
BS in Computer and Information Systems Security A 2+2 degree program between Peninsula College and Western Washington University David Bover Professor,
Anthony L. Dillon Education Associate Office of Career and Technology Education South Carolina Department of Education Spring Administrators Workshop -
Information Management System Ali Saeed Khan 29 th April, 2016.
Denial of Service detection and mitigation on GENI
Outline Unique Challenges to Cybersecurity Education
FBLA Competitive Event Selection Questionaire
International Conflict & Cyber Security
Denial of Service detection and mitigation on GENI
Cybersecurity + Liberal Arts Workshop
GENI, Cybersecurity, and Liberal Arts
Cyber Security Zafar Sadik
Developing Software Security Industry Tools
Cyber Warfare and Importance of Cyber Awareness
CMSC104 Problem Solving and Computer Programming Spring 2008
Xenia Mountrouidou (Dr. X)
BEST PRACTICES FOR AN IT SECURITY ASSESSMENT
Purpose of Class To prepare students for research and advanced work in security topics To familiarize students working in other networking areas with important.
FBLA Competitive Event Selection Questionaire
CMSC104 Problem Solving and Computer Programming Fall 2010 Section 01
GENI, Cybersecurity, and Liberal Arts
FBLA Competitive Event Selection Questionaire
Choosing your FBLA Competitive Event
Xiaohong (Dorothy) Yuan North Carolina A&T State University 11/16/2017
Unit 7 – Organisational Systems Security
Today’s Risk. Today’s Solutions. Cyber security and
CYB 100 Teaching Effectively-- snaptutorial.com
CYB 100 Become Exceptional/ newtonhelp.com. CYB 100 All Assignments For more course tutorials visit uophelp.com is now newtonhelp.com
ACM/IEEE-CS Computer Science Curriculum
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Li Yang, Carson Woods (University of Tennessee at Chattanooga
CMSC 104 Problem Solving and Computer Programming Fall 2010
Augusta University: NSA Curriculum Grant
CMSC104 Problem Solving and Computer Programming Fall 2010
CMSC104 Problem Solving and Computer Programming Spring 2010
I UNDERSTAND CONCEPTS OF CYBERSECURITY
CMSC104 Problem Solving and Computer Programming Fall 2009 Section 2
Intro Cyber Security Labs on GENI
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Curriculum Coordinator: Marela Fiacco Date : February 29, 2015
CMSC104 Problem Solving and Computer Programming Spring 2010
IT Applications with Emerging Techniques: Security Solutions
Intro Cyber Security Labs on GENI
CyberPaths Interdisciplinary Modules
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
FBLA Competitive Event Selection Questionaire
Presentation transcript:

CyberPaths Interdisciplinary Modules Xiangyang Li and Xenia Mountrouidou

Outline Project cyber paths general education modules – Xiangyang Finance Module Political Science Module General Education & Intro to Cyber Security - Xenia 11/8/2018

Standalone Module Type Topics PUI/LIA Curriculum Legal issues in CySec Case study, essay, discussion HIPPA/FERPA, Computer Security Act, Laws and Authorities, US Patriot Act Political Science International Studies Social Science Management Strategic Plan and Management, Business Continuity / Disaster Recovery Economics Leadership Social Science Human Factors Case study, essay, discussion, hands on exercise Privacy, Passwords, Usable Security Humanities Social Science Attacks and Defense GENI experiment IDS, Traffic, Log Analysis, performance Technology Cryptography Hands on exercise Cryptograms, ciphers, encryption, decryption Network components and traffic Traffic and performance analysis, protocol introduction 11/8/2018

Finance Module Module design Lecture slides financial investment basics cybersecurity investment specific materials Case study on Target breach There are other resources! Gordon-Loeb Cybersecurity Investment Model 11/8/2018

Political Science General Education Module Lecture slides on cyber warfare and international conflict Case study assignment Ukraine power grid attack Role play and analysis International Conflict Stuxnet Denial of Service as a weapon Goals: Gain an appreciation about attacks and cyberwar Research about international laws and policies 11/8/2018

General education @ CofC FYE: First Year Experience Writing Foreign Language History Humanities Mathematics & Logic Natural Science Social Sciences 11/8/2018

FYE: First Year Experience – Chasing Ghosts in the Wires http://mountrouidoux.people.cofc.edu/FYE_CySec/calendar.html Introductory knowledge: Bits & Bytes Computer Architecture Software and Operating Systems 11/8/2018

FYE: First Year Experience – Chasing Ghosts in the Wires Basic Command Line CIANA Risks, threats, vulnerabilities Laws and policies International conflict Authentication &Passwords Computer Networks & Security Social Engineering 11/8/2018

FYE Course Design Project - Open Ended Topic: IoT, Software, Human Factors, Business and cybersecurity - Specific topic: Elections 2016 Labs - Virtualization - Command Line - Hello GENI - DDos Attack & Defense -Passwords - Ransomware Case Studies - Poli Sci: cyber war, Stuxnet, Esthonia - Humanities: Social Engineering, Privacy, Ethics 11/8/2018

Assessment Pre, post surveys Focus Groups Publications Table I Profile of Entering Students Programming Experience? Programming Semesters Math Years Science Years Yes 42.2% 57.7% 3 3.3% 10% No 1 24.4% 4 74.4% 83.3%   >1 14.5% >5 22.2 6.6% Pre, post surveys Focus Groups Publications CCSC-SE 2016: “Denial of Service Lab for Experiential Cyber Security Learning”, Ledford, Mountrouidou, Li ITiCSE 2018: “Cybersecurity in Liberal Arts General Education Curriculum”, Mountrouidou, Li, Burke. CISSE 2018 11/8/2018

Assessment Results Q1 Compared to other students in this class, I feel I know a lot about computers Q2 I am confident in my problem solving ability. Q3 I am confident in my ability to persist until a solution is found. Q4 I am confident in my ability to meet unexpected challenges with success. Q5 I enjoy being challenged by seemingly unsolvable situations or problems. 11/8/2018

Assessment Results Q1 I am confident in the security of my own online accounts (e.g., banking, email, social, media). Q2 Cyber security is an important issue facing the country. Q3 Cyber security is an important topic of study for computer science students. Q4 Cyber security is an important topic of study for all students 11/8/2018

Conclusions & Future Work Cybersecurity workforce can be diversified with liberal arts students Experiential cybersecurity learning does not have to be expensive Realistic experiential learning attracts students to cybersecurity Future of project cyber paths: GENI labs SIGCSE Workshop Continuous support, research, and development

Resources Train the TA – posted in GENI educators google group https://groups.google.com/forum/#!searchin/geni- educators/train$20the$20TA%7Csort:date GENI Summer Workshops – posted in http://www.geni.net/ GENI Experimenter Wiki - http://groups.geni.net/geni/wiki/GENIExperimenter GENI google groups GENI Users: https://groups.google.com/forum/#!forum/geni-users GENI in Education https://groups.google.com/forum/#!forum/geni-educators

GENI Cyber Security and Computer Networks Labs http://blogs.cofc.edu/cyberpaths/modules/ https://github.com/mundruid/CyberPaths/ http://www.cs.unc.edu/Research/geni/geniExercises/

Thank you! Questions?