Building Security In: Injecting Security throughout the Undergraduate Computing Security.

Slides:



Advertisements
Similar presentations
School of Computing Clemson University Mathematical Reasoning  Goal: To prove correctness  Method: Use a reasoning table  Prove correctness on all valid.
Advertisements

Designed-in Security Some Major Challenges Security Group Department of Computer Science University of California, Santa Barbara Trustworthy.
ASCR Data Science Centers Infrastructure Demonstration S. Canon, N. Desai, M. Ernst, K. Kleese-Van Dam, G. Shipman, B. Tierney.
MedlinePlus Go Local – Missouri: A Different View MLA 2004 May 24, 2004.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Using Security Injections to Increase Security and Safety Awareness While Teaching Students to Use Technology Dr. Kara Nance, University of Alaska Fairbanks.
This material is based in part upon work supported by the National Science Foundation under Grant No Disconnected Internet Access for Youth in.
Computer & Information Science and Engineering Directorate (CISE) National Science Foundation (NSF) CPATH CISE Pathways to Revitalized Undergraduate Computing.
Dutchess Community College Fire Science 1 minute Activity.
International conference INNOVATIVE INFORMATION TECHNOLOGIES - IIT – 2007.
Masters in Information Science and Technology (IST) Thesis and Non-Thesis Option (30 Credits)
Dutchess Community College Fire Science Program 30 seconds and counting.
From school to university: how well prepared are today’s music technology undergraduates?
State Geological Survey Contributions to the National Geothermal Data System.
UNDERGRADUATE PROGRAMS AT STEVENS HENAGER COLLEGE.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Course Flow Diagrams May 2-3, 2013 Support.
Community Based Research and PolicyOptions Exploring the Possibilities of CBR and PolicyOptions at our Bonner Service Sites.
Security 1  26 Modules  CS0, CS1, CS2 o Buffer Overflow o Integer Error o Input Validation  Computer Literacy o Phishing o Cryptography.
© 2007 Carnegie Mellon University Secure Coding Initiative Jason A. Rafail Monday, May 14 th, 2007.
NNSA Consortium Cybersecurity Education: Needs and Capabilities Dr. Jonathan M. Graham, Director IA-REDI Dr. Claude Turner, Associate Professor Computer.
Information Security in an Introductory Course. Introduction Kathy Winters University of Tennessee at Chattanooga Department of Computer Science and Engineering.
COMPUTER SCIENCE Mercer University College of Liberal Arts.
Career Paths in Computing © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Career Paths in Computing. Computing is: Creative, Social, In demand! See videos at
Woodrow Wilson Indiana Fellowship Program Vision Statement –Highly qualified STEM teachers –Problem-based STEM curricula –Rural schools network –New models.
 address the challenges of  increasing interest and participation  improving the preparation of girls in computing and cyber.
Information Technology Lonnie Bentley, Professor and Head Department of Computer Technology (CPT) - and - H. E. (Buster) Dunsmore, Professor Department.
1 CyberWATCH Regional ATE Center, a consortium of ten community colleges, eight universities, and federal and state agencies and businesses, addresses.
Incorporating Cybersecurity Education into the CS curriculum Stephen Cooper, Stanford University.
GIS EDUCATION OPPORTUNITY IN MINNESOTA National Science Foundation ATE  ISLET DUE #  ISLET2 DUE #   GeoTechCenter.
SERPent Project Secure Epidemiology Research Platform January – October 2010 Virtual Research Environment Rapid Innovation Project Funded.
computer
CREATING SHAREABLE SECURITY MODULES Kara Nance, University of Alaska Fairbanks, Fairbanks, AK, USA Blair Taylor, Towson University, Towson, MD, USA Ronald.
Security Injections Workshop – January 2010 Anne Arundel Community College Bowie State University Community College of Baltimore County Harford Community.
The Learning Matrix A Digital Learning Environment.
Undergraduate Programs in Information Science/Systems.
THE UNIVERSITY OF TEXAS AT BROWNSVILLE & TEXAS SOUTHMOST COLLEGE AAPC-Meeting 4/11/2007 CS/CIS Department Proposal for the creation of Associate Degree.
Input Validation – common associated risks  ______________ user input controls SQL statements ultimately executed by a database server
The MSR-UR Curriculum Repository Tom Healy Lead Program Manager Microsoft Research University Relations.
Building Security In: Injecting Security throughout the Undergraduate Curriculum Towson University and Bowie State University Partnered with Anne Arundel.
Crossing Disciplinary Boundaries and Forging Collaborations Networking CPATH Projects and Community Resource.
Natick Public Schools Technology Update October 6, 2008 Dennis Roche, CISA Director of Technology.
Slide 1 Campus Design – Successes and Challenges Michael Cato, Vassar College Mike James, Northwest Indian College Carrie Rampp, Franklin and Marshall.
IDEAS NETWORK IECPCP. The Project Promoting interprofessional collaboration and team building to deliver safe and effective casualty and patient- centred.
Building Security In: Injecting Security throughout the Undergraduate Computing Curriculum PROBLEM STATEMENT  Secure coding is more important than ever.
Emily White Sewanee: The University of the South Integrating Climate Science Across Disciplines to Increase Climate Literacy
Children’s Health Exposure Analysis Resource (CHEAR) CHEAR Center for Data Science Susan Teitelbaum, PhD November 4, 2015.
Building Security In January 2009 Workshop Harry Hochheiser, Building Security In: January 2009 Workshop Harry Hochheiser Towson.
ESupport for Work-Based Learning in Foundation Degrees Project Director: Prof Mark Stiles Project Co-ordinator: Fleur Corfield
Helios STEM Schools Pilot Grant Funded Opportunities for: Integration Collaboration Next Generation Implementation.
Example – SQL Injection MySQL & PHP code: // The next instruction prompts the user is to supply an ID $personID = getIDstringFromUser(); $sqlQuery = "SELECT.
Building Security In: Workshop – August 2009 Anne Arundel Community Bowie State University Community College of Baltimore County Harford Community College.
Computational Thinking The Fourth ‘R’ Joan Peckham Harriet Taylor National Science Foundation CISE/CNS/EWF.
Computer Science & Engineering 2111 Database Objects 1 CSE 2111 Introduction to Database Management Systems.
참 잘 오셨소, 어서 오십시오 The National Center for Information and Communications Technologies A National Science Foundation.
Information Literacy: Web Resources Do you have APA guidelines? How do I cite a blog? Can I start a sentence with "So, I told her to..."?.
FSU COLLEGE OF COMMUNICATION AND INFORMATION Information Technology Information, Communication, & Technology.
CS 2130 Computational Structures (Discrete Mathematics for Computing)
“Cool” Cybersecurity Modules: No Grading Required!
A Low Cost, Portable Platform for Information Assurance and Security Education Dan C. Lo, Kai Qian Department of Computer Science and Software Engineering.
COMPUTER SCIENCE FOR NEW HAMPSHIRE
Department of Computer and Information Sciences
CSCE 548 Secure Software Development Final Exam – Review 2016
Scope of this workshop and that of curriculum initiative (What?)
Hood College Master of Science in Bioinformatics (Proposed)
4 Core Modules to be delivered on themes of:
ACM/IEEE-CS Computer Science Curriculum
Gregory Morton COSC380 February 16, 2011
My Library Expands Network
The Why & How of Secure Coding
Presentation transcript:

Building Security In: Injecting Security throughout the Undergraduate Computing Security Injection Modules  CS0, CS1, CS2  Integer overflow  Buffer overflow  Input Validation  Computer Literacy  Database, Web, & Networking  Security Checklists Collaboration & Dissemination 1.Develop at TU and BSU 2.Pilot at TU and BSU 3.Deploy at 3 partner community colleges 4.Deploy across 15 MAISA universities and colleges Blair Taylor, Siddharth Kaza, Shiva Azadegan, Mike O’Leary, Towson University (TU) Claude Turner, Bowie State University (BSU) This project is supported by the National Science Foundation CCLI program DUE

Building Security In: Injecting Security throughout the Undergraduate Computing Security Injection Modules  CS0, CS1, CS2  Integer overflow  Buffer overflow  Input Validation  Computer Literacy  Database, Web, & Networking  Security Checklists Collaboration & Dissemination 1.Develop at TU and BSU 2.Pilot at TU and BSU 3.Deploy at 3 partner community colleges 4.Deploy across 15 MAISA universities and colleges Blair Taylor, Siddharth Kaza, Shiva Azadegan, Mike O’Leary, Towson University (TU) Claude Turner, Bowie State University (BSU) This project is supported by the National Science Foundation CCLI program DUE

Building Security In: Injecting Security throughout the Undergraduate Computing Security Injection Modules  CS0, CS1, CS2  Integer overflow  Buffer overflow  Input Validation  Computer Literacy  Database, Web, & Networking  Security Checklists Collaboration & Dissemination 1.Develop at TU and BSU 2.Pilot at TU and BSU 3.Deploy at 3 partner community colleges 4.Deploy across 15 MAISA universities and colleges Blair Taylor, Siddharth Kaza, Shiva Azadegan, Mike O’Leary, Towson University (TU) Claude Turner, Bowie State University (BSU) This project is supported by the National Science Foundation CCLI program DUE