Information Security and Assurance Center 1 Address: 615 McCallie Avenue Phone: 423-425-4043 Chattanooga TN 37403

Slides:



Advertisements
Similar presentations
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Advertisements

Preparing Graduate Students to Lead and Manage Cyber Security Kevin A. Barton Asst Prof, CISS (210) ext 2213.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Department of Mathematics and Computer Science
Information Assurance & Network Security Certificate Prof. Rafael M. Rivera Universidad del Turabo School of Engineering Institute of Telecommunications.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Engineering Programs at GMU (Lecture #4) ENGR 107 – Intro to Engineering The slides included herein were taken from the materials accompanying Engineering.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Milos Kobliha Alejandro Cimadevilla Luis de Alba Parallel Computing Seminar GROUP 12.
Overview CSE 465 Information Assurance
Effort in hours Duration Over Weeks Or Months Inception Launch Web Lifecycle Methodology Maintenance Phases Copyright Wonderlane Studios.
National Information Assurance Partnership NIAP 2000 Building More Secure Systems for the New Millenium sm.
Security Certification
TECHNOLOGY GUIDE 3: Emerging Types of Enterprise Computing
OPeNDAP Hyrax Back-End Server (BES) Authentication and Authorization Patrick West
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
SEC835 Database and Web application security Information Security Architecture.
Wireless and Security CSCI 5857: Encoding and Encryption.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
University of Tulsa - Center for Information Security Center for Information Security: An Overview October 4th, 2002.
CONFIDENTIAL ─ RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET.
Pindaro Demertzoglou Lally School of M&T Internet-Intranets-Extranets.
Informatics Institute 6/19/081 A Draft Plan for the Informatics Institute (Graduate Program) Informatics Institute A Draft Plan for the Informatics Institute.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
CSCE 727 Information Warfare
‘INFORMATICS & MULTIMEDIA’ Department of Applied Informatics & Multimedia School of Applied Technology TEI-Crete.
1 ECE 156 Computer Network Architecture Professor Krish Chakrabarty Department of Electrical and Computer Engineering Fall 2006.
Computer Science and Engineering 1 Future of Cyber Security.
Department of Computer and Information SciencesMay 5th, 2004 HOMMER: Holistic Model for Minority Education & Research.
KFUPM-COE Industrial Advisory Council Meeting 31/5/ Department of Computer Engineering (COE) College of Computer Sciences and Engineering (CCSE)
Network Security Techniques by Bruce Roy Millard Division of Computing Studies Arizona State University
Module 9: Fundamentals of Securing Network Communication.
Federated Environments and Incident Response: The Worst of Both Worlds? A TeraGrid Perspective Jim Basney Senior Research Scientist National Center for.
SAS ‘05 Reducing Software Security Risk through an Integrated Approach David P. Gilliam, John D. Powell Jet Propulsion Laboratory, California Institute.
September 19, 2002CSG - Seattle1 Toward Sustainable Models for Funding IT in Higher Education Common Solutions Group September 19, 2002 Jack McCredie.
General rules 1. Rule: 2. Rule: 3. Rule: 10. Rule: Ask questions ……………………. 11. Rule: I do not know your skill. If I tell you things you know, please stop.
Center for Cybersecurity Research and Education (CCRE)
Information Assurance – A Technology Transfer Success Story Deidre W. Evans, Edward L. Jones, Christy L. Chatmon Computer and Information Sciences Department.
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
1 CDA 4527 Computer Networking Prof. Cliff Zou School of Computer Science University of Central Florida Fall 2005.
Security Discussion IST Retreat June IT Security Statement definition In the context of computer science, security is the prevention of, or protection.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
GSI: Security On Teragrid A Introduction To Security In Cyberinfrastructure By Dru Sepulveda.
CSCE 824 Secure (and Distributed) Database Management Systems FarkasCSCE
Computer Science and Engineering 1 Mobile Computing and Security.
IT Services Model Business Requirements IT Strategies Goals
Interdisciplinary MS in Information Assurance Jim Wolfe Computer Science Department Indiana University of Pennsylvania EPASEC 2006.
Copyright: All rights reserved.Not to be reproduced by any means without prior permission 1 Coordinator Dr. Sadiq M. Sait Department of Computer Engineering.
Who am I? Mikhail I. Gofman Assistant Professor of Computer Science at CSUF since Fall Education: Ph.D. in Computer Science at State University of.
Information Technology Support Services Focusing on our customers 1.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Department of Computer and Information Sciences
UNIT I INTRODUCTION Growing IT Security Importance and New Career Opportunities – Becoming an Information Security Specialist – Conceptualizing.
An Overview of the ITTC Networking & Distributed Systems Laboratory
Information Security at Florida State University
Information Security at Florida State University
ISMS Information Security Management System
Information Security at Florida State University
Information Security at Florida State University
UNM Information Assurance Scholarship for Service (SFS) Program
Introduction to Information Assurance
Information Assurance & Network Security Certificate
Online Learning.
UNM Information Assurance Scholarship for Service (SFS) Program
IT Applications with Emerging Techniques: Security Solutions
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Information Security and Assurance Center 1 Address: 615 McCallie Avenue Phone: Chattanooga TN Contact: Dr. Joseph M. Kizza URL: Department of Computer Science & Engineering

Information Security and Assurance Center 2 Outline Computer Science & Engineering Program Information Security and Assurance Program Laboratories Research Future

Information Security and Assurance Center 3 Computer Science & Engineering Program B.S. degree with four concentrations –Information Security and Assurance –Software Systems –Scientific Applications –Computer Engineering Four certificates –Networking –Internet Application –CNSS 4011: Information Systems Security (INFOSEC) Professionals –CNSS 4012: Senior System Manager M.S. degree in Computer Science

Information Security and Assurance Center 4 B.S. Computer Science: Information Security and Assurance Information Security Core –CPSC 375 Principles of InfoSec and Assurance –CPSC 426Computer Networks –CPSC 444Computer Network Security –CPSC 415Biometrics and Cryptography –CPSC 462Database Security Criminal Justice –CRMJ 170Introduction to Criminal Law Information Security and CPSC 400-level Electives ( choose 2) –CPSC 484Computer Crime Investigations –CPSC 472Internet Security Protocol –CPSC 454Wireless Network Security –CPSC 461Vulnerability Analysis and Auditing –CPSC 431Information Security Management –CPSC 440Wide Area Networks

Information Security and Assurance Center 5 CNSS 4011: Information Systems Security (INFOSEC) Professionals CRMJ 110 – Criminal Justice CPSC 160 – Data Structure and Problem Solving CPSC 375 – Principles of Information Security and Assurance CPSC 426 – Computer Networks CPSC 444 – Computer Network CPSC 415 – Biometrics and Cryptography

Information Security and Assurance Center 6 CNSS 4012: Senior System Managers CNSS 4011 – Certificate CPSC 461 – Vulnerability Analysis and Auditing CPSC 462 – Database Security and Auditing CPSC 484 – Computer Crime Investigation

Information Security and Assurance Center 7 Information Center Located within the Department of Computer Science Collaborating Departments - Criminal Justice & Business Mgmt First Community Response – call Web Site Questions –InfoSec Center Coordinator: Dr. Joseph M. Kizza – –Phone: 423/

Information Security and Assurance Center 8 Laboratories Dual Information Security and Assurance and Forensics Lab Located in EMCS 323 Multiple Operating Systems Run Web server, Mail server, SQL server, FTP server, IDS system

Information Security and Assurance Center 9 Ongoing Research Dependable Information Communication System (DICS) in Disaster Management DICS provides and maintains vital communication between the mass, physical environment, emergency agencies. DICS is formed by three Tiers: sustainable wireless sensor networks, fault- tolerant wireless ad hoc network and redundant network connectivity.

Information Security and Assurance Center 10 Ongoing Research Total Municipal Awareness System (TMAS): Local Version TMAS is designed to address communication weakness and vulnerabilities demonstrated in Hurricane Katrina. Built on top of Google Map, TMAS supports timely and reliable emergency modeling and communication.

Information Security and Assurance Center 11 Ongoing Research SecCMP: A Secure Chip-Multiprocessor Architecture –SecCMP handles security related problems such as key protection and core authentication in multi-core systems. –Integrated with identity based cryptography, the SecCMP provides a secure and reliable way to generate and distribute encryption keys between local host and remote site when prior distribution of keys is not available. Fine-grained Reputation-based Routing in Wireless Ad Hoc Networks (MANETs) –MANETs can support applications in a variety of areas like emergency assistance and inter-vehicle communications. –Reputation and trust management are integrated into routing protocols in MANETs in order to improve reliability in both route discovery and maintenance in MANETs

Information Security and Assurance Center 12 Future Graduate Concentration Program in Fall 2008 Center of Academic Excellence from NSA in 2008 Infrastructure Scholarship and upcoming workshops New laboratories and equipments Partnership External Grants –NSF CI-TEAM program –NSA infrastructure grant

Information Security and Assurance Center QUESTIONS 13