By Raymond Greenlaw United States Naval Academy, Annapolis, Maryland Chiang Mai University, Chiang Mai, Thailand Ray gratefully acknowledges partial support.

Slides:



Advertisements
Similar presentations
Undergoing an internal review Seek assistance from External Advisory Board.
Advertisements

USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
Introduction and Logistics Amir Houmansadr CS660: Advanced Information Assurance Spring 2015.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—1 Interconnecting Cisco Networking Devices Part 1 (ICND1 v1.0)
Cyber Education Project Accreditation Committee November 2014.
1 July 08, 2010 Information Security Officer Meeting.
1 Web-Network Technology Certificate Program  Presentation Objectives Provide information for student advisement Provide information for recruitment.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Overview CSE 465 Information Assurance
CSCD 330 Network Programming Winter 2012 Lecture 1 - Course Details.
A New Service Provided By ITS Training Services. Training Services offers: Free Seminars Extended Seminars Training on Demand High End Training Web-based.
Information Technology Services Technical Support Services Summer 2009 Accomplishments Fall 2009 Current Projects.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Course Flow Diagrams May 2-3, 2013 Support.
Computer Network Fundamentals CNT4007C
Maureen B. Higgins Assistant Director, Agency Support & Technical Assistance Office of Personnel Management December 8, 2010.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
CSCE 727 Information Warfare
Anatomy, Dissection, and Mechanics of an Introductory Cyber-Security Course’s Curriculum at the United States Naval Academy By Raymond Greenlaw.
Dr. John Lowther, Associate Professor of CS Adjunct Associate Prof. of Cognitive and Learning Sciences Computer Graphics:
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Welcome to CS 101! Introduction to Computers Spring 2015 This slide is based on Dr. Keen slides for CS101 day sections, with some modifications.
CSCD 330 Network Programming Fall/Winter/Spring 2014 Lecture 1 - Course Details.
Bethune Middle School Technology Plan Presented by: William Carter E7801-Instructional Technology Planning and Management Dr. Regina Merriwether.
Center for Cybersecurity Research and Education (CCRE)
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
Information Assurance – A Technology Transfer Success Story Deidre W. Evans, Edward L. Jones, Christy L. Chatmon Computer and Information Sciences Department.
1. Program Proposals: New Business Academic Council October 6 th,
CSCD 330 Network Programming Winter 2015 Lecture 1 - Course Details.
Welcome to CS 101! Introduction to Computers Fall 2015.
CSCE 824 Secure (and Distributed) Database Management Systems FarkasCSCE
MIDN Zac Dannelly. May 2009: President's 60-day Cyberspace Policy Review – "expand and train the workforce” May 2010: The Ad Hoc Committee on Cyber Security.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Information Security tools for records managers Frank Rankin.
Interdisciplinary MS in Information Assurance Jim Wolfe Computer Science Department Indiana University of Pennsylvania EPASEC 2006.
Benefits overview Speaker name goes here.
C YBERSECURITY P ROGRAMS Computer Science Department Boise State University By Jyh-haw Yeh.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Information Security Officer Meeting
Introduction to Computers Spring 2017
Presented By Dr. Fred Barez, Chair
Academic Affairs Update
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
E 96 Introduction to Engineering Design Peter Reiher UCLA
Maine is IT! at SMCC Grant Playbook for
C-ID IT Model Curriculum Update
DOE Nuclear Safety Research and Development Program
CPSC 441: Computer Communications
Cyber Security & Embedded Systems Training Bootcamp VISIT TONEX.COM.
Engineering Summer orientation academic guide
ACM/IEEE-CS Computer Science Curriculum
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Introduction to Computers Fall 2017
Engineering Summer orientation academic guide
Csilla Farkas Cybersecurity Csilla Farkas
CSCD 330 Network Programming Spring
Introduction to Computers Spring 2018
CSCD 330 Network Programming Spring
Engineering Summer orientation academic guide
Introduction to Computers Fall 2018
Introduction to Computers SPRING 2019
How to Mitigate the Consequences What are the Countermeasures?
UNM Information Assurance Scholarship for Service (SFS) Program
CSCD 330 Network Programming Spring
Cloud-based Resources for Cybersecurity Education and Training
UNM Information Assurance Scholarship for Service (SFS) Program
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Welcome to CAB
Presentation transcript:

By Raymond Greenlaw United States Naval Academy, Annapolis, Maryland Chiang Mai University, Chiang Mai, Thailand Ray gratefully acknowledges partial support from the Royal Golden Jubilee PhD program.

1. History 2. Course Overview 3. The Cyber Battlefield 4. Models and Tools 5. Cyber Operations 6. Some Thoughts 7. Discussion Dr. Raymond Greenlaw United States Naval Academy 2

1. History 2. Course Overview 3. The Cyber Battlefield 4. Models and Tools 5. Cyber Operations 6. Some Thoughts 7. Discussion Dr. Raymond Greenlaw United States Naval Academy 3

 May 2009 President’s 60-day Cyberspace Policy Review completes. Action item to “expand and train the workforce, including... cybersecurity expertise in the Federal government.”  July 2009 Cyber Warfare Ad Hoc Committee forms at USNA to define the scope of understanding of cyber security needed by midshipmen as future naval officers.  August 2009 Committee recommends creation of a required core course in CS and IT that provides the technical foundations of Cyber Warfare. Course will be technical, relevant to naval officers, and hands-on.  January 2010 CS Department offers Fundamentals of Cyber Security as an elective. Dr. Raymond Greenlaw United States Naval Academy 4

 April 2010 Ad Hoc Committee on Cyber Security Curriculum Options forms to examine integration of “cyber” into the USNA curriculum.  May 2010 Committee recommends a sequence: Cyber-1 during 4/C year and Cyber-2 during 2/C year.  September 2010 Dean requests Cyber-1 technical course proposal from CS Department.  November 2010 Two proposed Cyber-1 course syllabi formulated by the CS Department Cyber Warfare Committee, and approved and endorsed by the CS Department Curriculum Committee.  January 2011 CS Department offers a revised Intro to Cyber Security as a prototype Cyber-1 course. Dr. Raymond Greenlaw United States Naval Academy 5

 Spring 2011 Sup directs that Cyber-1 be offered in Fall 2011 for USNA Class of  March 2011 Formal curriculum change request to add a plebe-year course. Cyber-1 Tiger Team forms to put together course from prototype. Team is a mix of faculty from CS, Math, and EE.  Summer 2011 Numerous faculty work on course materials; course hardware and software infrastructure is acquired and tested.  August 2011 Two-week charm school given for instructors. Lectures recorded.  August 22, 2011 First day of class; SI110 begins. Dr. Raymond Greenlaw United States Naval Academy 6

1. History 2. Course Overview 3. The Cyber Battlefield 4. Models and Tools 5. Cyber Operations 6. Some Thoughts 7. Discussion Dr. Raymond Greenlaw United States Naval Academy 7

 Mission  Goals  Personnel  Mechanics  Materials Dr. Raymond Greenlaw United States Naval Academy 8

Educate each midshipman about cyber infrastructure and systems, inherent cyber vulnerabilities and threats, and appropriate defensive security procedures, thereby enabling them to make principled decisions regarding the potential benefits, consequences, and risks from a proposed use of an information system in today’s cyber-warfare environment. Dr. Raymond Greenlaw United States Naval Academy 9

1. Understand basic physical and virtual architecture of cyberspace — individual computer and program, physical components and protocols of network and Internet, and web, 2. hands on experience with components of physical and virtual architecture of cyberspace and ability to relate that experience to larger system, 3. an understanding of DoD’s pillars of IA (CIANA), inherent vulnerabilities of information systems that endanger these properties, defensive measures to ensure information systems retain these properties, and offensive measures to violate these pillars, and 4. hands on experience with defensive and offensive practices in cyberspace, and ability to relate that experience to new or more sophisticated attacks and defenses. Dr. Raymond Greenlaw United States Naval Academy 10

 600 plebes per semester  15 instructors handling 30 sections  Average section about 20 students  Course coordinator  Several course helpers  Departmental technical support  Course scheduler  University-level technical support Dr. Raymond Greenlaw United States Naval Academy 11

 2 hours lecture, 2 hours lab; 3 credits  Laptops  Software installation  Resource page  Weekly instructors’ meetings  list  Networking issues Dr. Raymond Greenlaw United States Naval Academy 12

 Websites—student, instructor, external  Instructor notes  Student notes  Common exams  Common homework  Common labs —activity sheets  Custom textbook Dr. Raymond Greenlaw United States Naval Academy 13

1. History 2. Course Overview 3. The Cyber Battlefield 4. Models and Tools 5. Cyber Operations 6. Some Thoughts 7. Discussion Dr. Raymond Greenlaw United States Naval Academy 14

 Introduction  Digital Data 1 & 2  Computer Architecture  PC Vivisection Lab  Operating Systems 1 & 2  Programs Parts 1 ‒ 5  Web: Servers, Browsers, and HTML  Web: Build Your Webpage Lab Dr. Raymond Greenlaw United States Naval Academy 15

 Web: Client-Side Scripting: non-event driven, event driven, and forms  Web: Server-Side Scripting  Web: Injection Attacks & XSS  Networks, Protocols, the Internet: Parts 1 ‒ 4  Networks: Build a LAN Prep  Networks: Build a LAN Lab  Networks: Wireless Networking  Networks: Build a Wireless-Network Lab Dr. Raymond Greenlaw United States Naval Academy 16

1. History 2. Course Overview 3. The Cyber Battlefield 4. Models and Tools 5. Cyber Operations 6. Some Thoughts 7. Discussion Dr. Raymond Greenlaw United States Naval Academy 17

 Information Assurance  Firewalls  Authentication/Cryptography Parts 1 ‒ 4  Authentication/Cryptography: X.509 Certificates Lab Dr. Raymond Greenlaw United States Naval Academy 18

1. History 2. Course Overview 3. The Cyber Battlefield 4. Models and Tools 5. Cyber Operations 6. Some Thoughts 7. Discussion Dr. Raymond Greenlaw United States Naval Academy 19

 Forensics  Phases of a Cyber Attack/Recon  Forensics Lab  Network Attack  Cyber Recon Lab  Network Defense  Malware Dr. Raymond Greenlaw United States Naval Academy 20

 Cyber Attacks: Case Studies  Cyber Attack Lab  Attack Lab Debrief  Cyber Defense Lab  Defense Lab Debrief Dr. Raymond Greenlaw United States Naval Academy 21

1. History 2. Course Overview 3. The Cyber Battlefield 4. Models and Tools 5. Cyber Operations 6. Some Thoughts 7. Discussion Dr. Raymond Greenlaw United States Naval Academy 22

 Diverse group of instructors  Man power required  Instructor commitment  Investment in software, hardware, and support  Materials  Ongoing Dr. Raymond Greenlaw United States Naval Academy 23

 Non-technical students  Performance  Retention  Workload  Recruitment of majors for CS and IT  Awareness  Big picture  Little picture Dr. Raymond Greenlaw United States Naval Academy 24

1. History 2. Course Overview 3. The Cyber Battlefield 4. Models and Tools 5. Cyber Operations 6. Some Thoughts 7. Discussion Dr. Raymond Greenlaw United States Naval Academy 25

Questions? Dr. Raymond Greenlaw United States Naval Academy 26