Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School 410-516-8563.

Slides:



Advertisements
Similar presentations
1. Creativity and Innovation 2. Communication and Collaboration
Advertisements

Data Collection, Analysis and Preservation Computer Forensics: Data Collection, Analysis and Preservation Kikunda Eric Kajangu, Cher Vue, and John Mottola.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Gerald M. Santoro, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA (slides.
1 An Overview of Computer Security computer security.
Technology for Computer Forensics by Alicia Castro.
Introduction to Forensic Accounting and Fraud Examination McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights.
FACULTY OF COMPUTER SCIENCE & INFORMATION TECHNOLOGY, UNIVERSITY OF MALAYA.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
By Drudeisha Madhub Data Protection Commissioner Date:
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
Department of Criminal Justice, Forensic Science and Legal Studies.
15 th Conference on Software Engineering Education and Training Foundation Software Engineering Practices for Capstone Projects and Beyond Annegret Goold.
COEN 152 Computer Forensics Introduction to Computer Forensics.
Copyright Amy Woszczynski, 2006Master of Science in Information Systems (MSIS) Life After the Undergraduate Degree What’s Next?
MS in Information Systems & Assurance (MS-ISA) Stephen D. Burd Anderson School of Management & UNM Center for Information Assurance Research and Education.
Securing Information Systems
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
BA 378: Accounting Information Systems Instructor: Dr. James R. Coakley.
AFCEA/AFA July 23,  There are 35 colleges and universities across the state that are members of the University System of Georgia.  All of them.
What is FORENSICS? Why do we need Network Forensics?
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
Information Technology Programs. Why major in IT? “...Total US IT employment is predicted to double in this decade. Similarly, the security of computer.
FBI Agent Created by:. Overview The FBI is made up of detectives and investigators They gather information They use evidence for criminal cases.
Computer Forensics Principles and Practices
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University.
Fraud Examination Evidence III: Forensic Science and Computer Forensics McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
Training and Certification. Who needs digital forensic training and professional certification? Forensic examiners Investigators Crime scene specialists.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Center for Cybersecurity Research and Education (CCRE)
Emily Stansfield Police Officer.  One of the most dangerous jobs in the U.S.
CJ 317 – Computer Forensics
Csci5233 computer security & integrity 1 An Overview of Computer Security.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Latoya Anderson Training and Development 3 Core Programs Diversity in Education EDUC 3008 Technology and Education EDUC 3009 Motivation and Learning EDUC.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
Computer Forensics: A 5 Minute Introduction Santa Clara University Department of Computer Engineering April 2007.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
 Lawyers spend a lot of time doing research finding facts in books, on computers and in other places.  Lawyers also interview people to get information.
BS in Computer and Information Systems Security A 2+2 degree program between Peninsula College and Western Washington University David Bover Professor,
What Is Information Engineering Technology? John Claffy ET 280.
Chapter 2 Incident Response Management Handbook Spring Incident Response & Computer Forensics.
The Basics.  A lawyer is a person who practices law  Important Terms: ◦ Legal: relating to the law ◦ Client: a lawyer's customer ◦ Draft: prepare a.
Service Learning Lori Pollock University of Delaware NSF BPC Demo Grant, “Partnering Middle School Teachers with Undergraduate Computer Science Teams to.
FBI Phoenix Computer Crime Squad SA Tom Liffiton 10/23/2003 Maricopa Association of Governments Telecommunications Advisory Group.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Interdisciplinary MS in Information Assurance Jim Wolfe Computer Science Department Indiana University of Pennsylvania EPASEC 2006.
Soft Skills: Where Do We Teach Them in a 4-Year Environment Kathy Winters University of Tennessee, Chattanooga.
Examination of the Current Educational Contents in Information Assurance Bill Oblitey Indiana University of Pennsylvania Computer Science Department EPASEC.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Associate Degree in Cyber security
Career JEOPARDY! Cluster: Information Technology
Introduction to Computer Forensics
Undergraduate Standards
Introduction to Computer Forensics
FBI Agent Created by:.
FBI Agent Created by:.
Digital Forensics Chris Rozic.
UNM Information Assurance Scholarship for Service (SFS) Program
Introduction to Information Assurance
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
WHAT IS FORENSIC & INVESTIGATIVE SCIENCES?
UNM Information Assurance Scholarship for Service (SFS) Program
UNM Information Assurance Scholarship for Service (SFS) Program
Presentation transcript:

Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School

‘Security’ Spectrum 2 Security: Planning Preparation Prevention Detection Minimize Problem Digital Forensics: Investigation Analysis Recovery Improved preparation Security Event Time line

The Need Jobs – Network Forensics ($65-$140k – MD) – Bachelor – Product Manager ($120-$150k – NY) – MS or PhD – Info Sec. Engineer (65-80/hr - CA) - ‘Contract Investigator’ Companies – Law Enforcement (local, state and federal) – Grant Thornton – General Dynamics – Booz-Allen – SAIC – American Express

‘Computer Forensics Investigator’ Good working knowledge of computer construction, hard drive processes, data recovery, applications and operating systems. Understand networking, encryption, steganography and computer crime Recover information from erased or damaged systems or media Great deal of patience (work long hours) Common work activities include: – Examining & recovering data from computers & storage devices – Taking apart computers and reconstructing damaged systems – Preparing reports on information found – Testifying in court about the evidence and methods – Research on computer crimes and methods used to gather evidence – Training others

Carey Focus Information Security – Prevention phase Digital Forensics – Recovery & investigation phase Approach – Strong business base – Knowledge of the area – Some skills – Higher-level: research, communications, critical thinking, problem solving, self-learning, team work – ‘Humanity in Mind’

Program Goals Understand the Technology – Not be an expert in the technology – Not teaching the tools Business Technology Focus Address Larger Issues – Self-learning – Communication Written, Spoken – Critical thinking – Problem Solving – Research

Programs Carey Approach – Strong last 2 years – Partner with Community Colleges Program – B. S. degree – Strong business base – Upper focus in Security or Digital Forensics

Program Specifics Transfer credits (60 – from Community College) Carey Program (last 60 credits) – Business core (18 credits) – Skills courses (12 credits) – Required concentration courses (9 credits) – Concentration electives (9 credits) – Capstone coursework (12 credits) Project Management, Strategic Management and Sr. Project Digital Forensics -Operating Systems & Files -Legal & Ethical Issues -Forensic Computing -Network & Intrusion Forensics -Encryption & Cryptography -Information Assurance Principles Information Security -Encryption & Cryptography -Information Assurance Principles -E-Commerce Security -Software & OS Security -Securing Networks & Telecommunications - Designing, Testing & Auditing Security

Summer Digital Forensics Camp Targeted to H. S. Students – Must be H. S. student in Spring 2009 – Computer skills Goals – Generate interest in technology – Delve into the ‘innards’ of a machine – Have fun ‘investigating’ for hidden data – Understand digital investigations – Find out what not to do (security clearance later)